Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 13:36
Static task
static1
Behavioral task
behavioral1
Sample
879cddefdd04de096aa19c799ce82144db7b792c97e1a2ab81bfc0d8823681b3.exe
Resource
win10v2004-20241007-en
General
-
Target
879cddefdd04de096aa19c799ce82144db7b792c97e1a2ab81bfc0d8823681b3.exe
-
Size
747KB
-
MD5
c74892d6263d802b9f25628c1713f130
-
SHA1
c2b590f8afd24d8c42edd2097a31c87116e60b98
-
SHA256
879cddefdd04de096aa19c799ce82144db7b792c97e1a2ab81bfc0d8823681b3
-
SHA512
e497b66d3145d1c08f89ec6574d92a70a30c5f6301170c1552f705cffc553ce872b551a4b41ee71477cff467327c773293e3de7b08d0fa7f8828d47153d214d1
-
SSDEEP
12288:PAy90f8WPqKYg1wjdv2sk/wrFK/xPMjhEX0uyORi+W8aDs7w1vAf8C:PAym807lsk/mFKJPMY/YQ7wvVC
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/264-19-0x00000000025A0000-0x00000000025BA000-memory.dmp healer behavioral1/memory/264-21-0x00000000027B0000-0x00000000027C8000-memory.dmp healer behavioral1/memory/264-49-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/264-47-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/264-45-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/264-43-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/264-41-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/264-39-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/264-37-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/264-33-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/264-31-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/264-29-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/264-27-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/264-25-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/264-23-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/264-22-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/264-35-0x00000000027B0000-0x00000000027C2000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 72728759.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 72728759.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 72728759.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 72728759.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 72728759.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 72728759.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4724-60-0x0000000004D70000-0x0000000004DAC000-memory.dmp family_redline behavioral1/memory/4724-61-0x00000000053E0000-0x000000000541A000-memory.dmp family_redline behavioral1/memory/4724-77-0x00000000053E0000-0x0000000005415000-memory.dmp family_redline behavioral1/memory/4724-67-0x00000000053E0000-0x0000000005415000-memory.dmp family_redline behavioral1/memory/4724-65-0x00000000053E0000-0x0000000005415000-memory.dmp family_redline behavioral1/memory/4724-63-0x00000000053E0000-0x0000000005415000-memory.dmp family_redline behavioral1/memory/4724-62-0x00000000053E0000-0x0000000005415000-memory.dmp family_redline behavioral1/memory/4724-89-0x00000000053E0000-0x0000000005415000-memory.dmp family_redline behavioral1/memory/4724-95-0x00000000053E0000-0x0000000005415000-memory.dmp family_redline behavioral1/memory/4724-93-0x00000000053E0000-0x0000000005415000-memory.dmp family_redline behavioral1/memory/4724-91-0x00000000053E0000-0x0000000005415000-memory.dmp family_redline behavioral1/memory/4724-87-0x00000000053E0000-0x0000000005415000-memory.dmp family_redline behavioral1/memory/4724-85-0x00000000053E0000-0x0000000005415000-memory.dmp family_redline behavioral1/memory/4724-83-0x00000000053E0000-0x0000000005415000-memory.dmp family_redline behavioral1/memory/4724-81-0x00000000053E0000-0x0000000005415000-memory.dmp family_redline behavioral1/memory/4724-79-0x00000000053E0000-0x0000000005415000-memory.dmp family_redline behavioral1/memory/4724-75-0x00000000053E0000-0x0000000005415000-memory.dmp family_redline behavioral1/memory/4724-73-0x00000000053E0000-0x0000000005415000-memory.dmp family_redline behavioral1/memory/4724-71-0x00000000053E0000-0x0000000005415000-memory.dmp family_redline behavioral1/memory/4724-69-0x00000000053E0000-0x0000000005415000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3700 un650004.exe 264 72728759.exe 4724 rk160346.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 72728759.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 72728759.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 879cddefdd04de096aa19c799ce82144db7b792c97e1a2ab81bfc0d8823681b3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un650004.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2560 sc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3908 264 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 879cddefdd04de096aa19c799ce82144db7b792c97e1a2ab81bfc0d8823681b3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un650004.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 72728759.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rk160346.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 264 72728759.exe 264 72728759.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 264 72728759.exe Token: SeDebugPrivilege 4724 rk160346.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4944 wrote to memory of 3700 4944 879cddefdd04de096aa19c799ce82144db7b792c97e1a2ab81bfc0d8823681b3.exe 84 PID 4944 wrote to memory of 3700 4944 879cddefdd04de096aa19c799ce82144db7b792c97e1a2ab81bfc0d8823681b3.exe 84 PID 4944 wrote to memory of 3700 4944 879cddefdd04de096aa19c799ce82144db7b792c97e1a2ab81bfc0d8823681b3.exe 84 PID 3700 wrote to memory of 264 3700 un650004.exe 85 PID 3700 wrote to memory of 264 3700 un650004.exe 85 PID 3700 wrote to memory of 264 3700 un650004.exe 85 PID 3700 wrote to memory of 4724 3700 un650004.exe 96 PID 3700 wrote to memory of 4724 3700 un650004.exe 96 PID 3700 wrote to memory of 4724 3700 un650004.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\879cddefdd04de096aa19c799ce82144db7b792c97e1a2ab81bfc0d8823681b3.exe"C:\Users\Admin\AppData\Local\Temp\879cddefdd04de096aa19c799ce82144db7b792c97e1a2ab81bfc0d8823681b3.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un650004.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un650004.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\72728759.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\72728759.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:264 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 264 -s 10804⤵
- Program crash
PID:3908
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk160346.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk160346.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4724
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 264 -ip 2641⤵PID:2228
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2560
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD516aa4f3f4dd4452961fa0223dd8966fb
SHA130e2d5ed93d236ee99ff0b2184aea0f2e462d661
SHA2560a4ca9978067414dc571d462f2334bd32424bb77d6d9ad78009252ab093563cd
SHA512833ac705f63bf61ccf2438865fd2324f01fdc02c4cc41f8ab13499acf1161c463e0248bd997c50c84fb88677d9ca5487210e17bdb150d222919cfbde121f6952
-
Filesize
378KB
MD52246d54fd68cf066c24def35fb1585f5
SHA19985c38feb7f6144d5f14ebc5b95d042b02b8334
SHA256569c3dd371fba6913115d16d4a4bac11d14fac77aeff0ed8b68358e8f1d39e20
SHA512f6e50213efa21ef5cf0b4bb29a75f10b99433e5f9977cf73085e6712cf4fe3dabf1777b8cd6b8d23436a21f44d07d102567d5fd42a9ade84152e4df17d2725e4
-
Filesize
460KB
MD5a496b1da59034e7566abc8874ce6ea0a
SHA10554a2d930afbd971c4a1c5f27974331fc74d633
SHA256e136647aad15d5ff4cebae4f4534709f7986ef6be32078ef3a603c2d7d0ffd93
SHA512b50b51d4b68f6e4a150012b323b37a7047e3b72df05ee6870a236c15d6fa2bf29496e1d7c78b20ac1de7c9de6d9a82ec149b8b4567818f9c0d5ca7a9d14293c9