Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 13:36
Static task
static1
Behavioral task
behavioral1
Sample
6fb65b8165cdb5a18a670648fc4b670f3701a03d20922a75087970117d97c597.exe
Resource
win10v2004-20241007-en
General
-
Target
6fb65b8165cdb5a18a670648fc4b670f3701a03d20922a75087970117d97c597.exe
-
Size
690KB
-
MD5
fed201a22556bf78aea0f5cfd2bc7ec4
-
SHA1
611dfa394bd20c1356c8bab37c4fceb988d7c395
-
SHA256
6fb65b8165cdb5a18a670648fc4b670f3701a03d20922a75087970117d97c597
-
SHA512
75aa2346fd1e8a9ed2c015fd91ca34ae006c422da18b24a2fadbb98707d1acd8ee02eb6939eeefe9070089633ef46abfab9c25d50578a26f2bbc3066f7a7fb53
-
SSDEEP
12288:Ay909kgt7wUAXz+xXT9TDeuArNXMQfnCsGeniNxmBqEEFRhl4i:Ay2kgtrQWnRc1M9N1fD6i
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/3308-19-0x0000000002500000-0x000000000251A000-memory.dmp healer behavioral1/memory/3308-21-0x00000000049F0000-0x0000000004A08000-memory.dmp healer behavioral1/memory/3308-37-0x00000000049F0000-0x0000000004A03000-memory.dmp healer behavioral1/memory/3308-35-0x00000000049F0000-0x0000000004A03000-memory.dmp healer behavioral1/memory/3308-49-0x00000000049F0000-0x0000000004A03000-memory.dmp healer behavioral1/memory/3308-47-0x00000000049F0000-0x0000000004A03000-memory.dmp healer behavioral1/memory/3308-45-0x00000000049F0000-0x0000000004A03000-memory.dmp healer behavioral1/memory/3308-43-0x00000000049F0000-0x0000000004A03000-memory.dmp healer behavioral1/memory/3308-41-0x00000000049F0000-0x0000000004A03000-memory.dmp healer behavioral1/memory/3308-39-0x00000000049F0000-0x0000000004A03000-memory.dmp healer behavioral1/memory/3308-33-0x00000000049F0000-0x0000000004A03000-memory.dmp healer behavioral1/memory/3308-32-0x00000000049F0000-0x0000000004A03000-memory.dmp healer behavioral1/memory/3308-29-0x00000000049F0000-0x0000000004A03000-memory.dmp healer behavioral1/memory/3308-27-0x00000000049F0000-0x0000000004A03000-memory.dmp healer behavioral1/memory/3308-25-0x00000000049F0000-0x0000000004A03000-memory.dmp healer behavioral1/memory/3308-22-0x00000000049F0000-0x0000000004A03000-memory.dmp healer behavioral1/memory/3308-23-0x00000000049F0000-0x0000000004A03000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 30883043.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 30883043.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 30883043.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 30883043.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 30883043.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 30883043.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3704-60-0x00000000022D0000-0x000000000230C000-memory.dmp family_redline behavioral1/memory/3704-61-0x0000000002470000-0x00000000024AA000-memory.dmp family_redline behavioral1/memory/3704-79-0x0000000002470000-0x00000000024A5000-memory.dmp family_redline behavioral1/memory/3704-69-0x0000000002470000-0x00000000024A5000-memory.dmp family_redline behavioral1/memory/3704-67-0x0000000002470000-0x00000000024A5000-memory.dmp family_redline behavioral1/memory/3704-65-0x0000000002470000-0x00000000024A5000-memory.dmp family_redline behavioral1/memory/3704-63-0x0000000002470000-0x00000000024A5000-memory.dmp family_redline behavioral1/memory/3704-62-0x0000000002470000-0x00000000024A5000-memory.dmp family_redline behavioral1/memory/3704-93-0x0000000002470000-0x00000000024A5000-memory.dmp family_redline behavioral1/memory/3704-91-0x0000000002470000-0x00000000024A5000-memory.dmp family_redline behavioral1/memory/3704-89-0x0000000002470000-0x00000000024A5000-memory.dmp family_redline behavioral1/memory/3704-87-0x0000000002470000-0x00000000024A5000-memory.dmp family_redline behavioral1/memory/3704-85-0x0000000002470000-0x00000000024A5000-memory.dmp family_redline behavioral1/memory/3704-83-0x0000000002470000-0x00000000024A5000-memory.dmp family_redline behavioral1/memory/3704-81-0x0000000002470000-0x00000000024A5000-memory.dmp family_redline behavioral1/memory/3704-77-0x0000000002470000-0x00000000024A5000-memory.dmp family_redline behavioral1/memory/3704-75-0x0000000002470000-0x00000000024A5000-memory.dmp family_redline behavioral1/memory/3704-73-0x0000000002470000-0x00000000024A5000-memory.dmp family_redline behavioral1/memory/3704-71-0x0000000002470000-0x00000000024A5000-memory.dmp family_redline behavioral1/memory/3704-95-0x0000000002470000-0x00000000024A5000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 2244 un672165.exe 3308 30883043.exe 3704 rk574763.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 30883043.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 30883043.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6fb65b8165cdb5a18a670648fc4b670f3701a03d20922a75087970117d97c597.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un672165.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1680 3308 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6fb65b8165cdb5a18a670648fc4b670f3701a03d20922a75087970117d97c597.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un672165.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 30883043.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rk574763.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3308 30883043.exe 3308 30883043.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3308 30883043.exe Token: SeDebugPrivilege 3704 rk574763.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3724 wrote to memory of 2244 3724 6fb65b8165cdb5a18a670648fc4b670f3701a03d20922a75087970117d97c597.exe 84 PID 3724 wrote to memory of 2244 3724 6fb65b8165cdb5a18a670648fc4b670f3701a03d20922a75087970117d97c597.exe 84 PID 3724 wrote to memory of 2244 3724 6fb65b8165cdb5a18a670648fc4b670f3701a03d20922a75087970117d97c597.exe 84 PID 2244 wrote to memory of 3308 2244 un672165.exe 85 PID 2244 wrote to memory of 3308 2244 un672165.exe 85 PID 2244 wrote to memory of 3308 2244 un672165.exe 85 PID 2244 wrote to memory of 3704 2244 un672165.exe 96 PID 2244 wrote to memory of 3704 2244 un672165.exe 96 PID 2244 wrote to memory of 3704 2244 un672165.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fb65b8165cdb5a18a670648fc4b670f3701a03d20922a75087970117d97c597.exe"C:\Users\Admin\AppData\Local\Temp\6fb65b8165cdb5a18a670648fc4b670f3701a03d20922a75087970117d97c597.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un672165.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un672165.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\30883043.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\30883043.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3308 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3308 -s 11004⤵
- Program crash
PID:1680
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk574763.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk574763.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3704
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3308 -ip 33081⤵PID:2960
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
536KB
MD5bbe86ffce31e6bf8d1dd5929511c5dcd
SHA134aeb3156bc4a658b07aa843d030e43479c3f023
SHA256d6ec731c68e54e6128b92378eec64dd246e56b52826bffcc4a866ead2ce19bc2
SHA5121dee45361ab47d78f76b7e2809619b48eff7013f6a263f998877f7ab2f74a0da27407a5fdd3cff4afbd935393eade2d2816cd748ff69973d9850afda469d2f45
-
Filesize
258KB
MD50bf860621ba56dfb991fc47ed1e5b208
SHA156a0edf00b5acbba441cc6873fa66264ab3ae060
SHA2561e57761e5aa0c2a4b21da47a49fd05f33b86d513219fcac0d39862c93aeca52e
SHA512c66ac4af3c32a0f209580e9e7d970bd6dbc7488b42e84c4f6edd3a5f0b3296e6ea4a8b1c5cd29208918d140d19791e34a4f2897d0f0584f4832c49baae1c2dc8
-
Filesize
341KB
MD55eb960a79b40a13c17f21baa37763302
SHA192aa89a0465779f968a181f59843fb57bf4be2cf
SHA25633f209cb9ca293c01f57af96698d8a2b70db534ec914f0cf7dd21c3c8f5cc817
SHA512ac069144dab415933ea9ac3306ad22b08abbb1c893cde094bf6ec9e750482fdd98281c08ee0efed286088808e6fdce6b0e2f70d9e7c06ffd771a9bd8c8200cc5