Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 13:38
Static task
static1
Behavioral task
behavioral1
Sample
3fabc9e92c2c1f328d0ea07fd8a9cc93f3f9fb7f8dd5010574561e7f8c1cb063.exe
Resource
win10v2004-20241007-en
General
-
Target
3fabc9e92c2c1f328d0ea07fd8a9cc93f3f9fb7f8dd5010574561e7f8c1cb063.exe
-
Size
674KB
-
MD5
8cc44867975363568ce9b9877c4f5339
-
SHA1
266676e461dc14a35c5483d7ae78c5fbba59f7e8
-
SHA256
3fabc9e92c2c1f328d0ea07fd8a9cc93f3f9fb7f8dd5010574561e7f8c1cb063
-
SHA512
c3768aa06e1e15f2832670ef6b669d0dae8be07bc08af21553d2d63566ed96fbbcebe2f19075f180151ed704ecdd3632bfd5e4b5e276c0cfe32a0ae413554440
-
SSDEEP
12288:Hy90P2Ksgc4j0ZtJWPCt2liHdKAJowLlu1UEPjzz+BQfeuwadDTt:HyVKsgc4utJWPr6KAyGu1vPjzz4FatTt
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/4424-15-0x0000000002370000-0x000000000238A000-memory.dmp healer behavioral1/memory/4424-18-0x0000000004980000-0x0000000004998000-memory.dmp healer behavioral1/memory/4424-41-0x0000000004980000-0x0000000004993000-memory.dmp healer behavioral1/memory/4424-47-0x0000000004980000-0x0000000004993000-memory.dmp healer behavioral1/memory/4424-45-0x0000000004980000-0x0000000004993000-memory.dmp healer behavioral1/memory/4424-43-0x0000000004980000-0x0000000004993000-memory.dmp healer behavioral1/memory/4424-25-0x0000000004980000-0x0000000004993000-memory.dmp healer behavioral1/memory/4424-23-0x0000000004980000-0x0000000004993000-memory.dmp healer behavioral1/memory/4424-21-0x0000000004980000-0x0000000004993000-memory.dmp healer behavioral1/memory/4424-20-0x0000000004980000-0x0000000004993000-memory.dmp healer behavioral1/memory/4424-39-0x0000000004980000-0x0000000004993000-memory.dmp healer behavioral1/memory/4424-37-0x0000000004980000-0x0000000004993000-memory.dmp healer behavioral1/memory/4424-35-0x0000000004980000-0x0000000004993000-memory.dmp healer behavioral1/memory/4424-33-0x0000000004980000-0x0000000004993000-memory.dmp healer behavioral1/memory/4424-31-0x0000000004980000-0x0000000004993000-memory.dmp healer behavioral1/memory/4424-29-0x0000000004980000-0x0000000004993000-memory.dmp healer behavioral1/memory/4424-27-0x0000000004980000-0x0000000004993000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 48157825.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 48157825.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 48157825.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 48157825.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 48157825.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 48157825.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/4848-57-0x0000000004A20000-0x0000000004A5C000-memory.dmp family_redline behavioral1/memory/4848-58-0x0000000004AA0000-0x0000000004ADA000-memory.dmp family_redline behavioral1/memory/4848-80-0x0000000004AA0000-0x0000000004AD5000-memory.dmp family_redline behavioral1/memory/4848-94-0x0000000004AA0000-0x0000000004AD5000-memory.dmp family_redline behavioral1/memory/4848-92-0x0000000004AA0000-0x0000000004AD5000-memory.dmp family_redline behavioral1/memory/4848-90-0x0000000004AA0000-0x0000000004AD5000-memory.dmp family_redline behavioral1/memory/4848-86-0x0000000004AA0000-0x0000000004AD5000-memory.dmp family_redline behavioral1/memory/4848-82-0x0000000004AA0000-0x0000000004AD5000-memory.dmp family_redline behavioral1/memory/4848-78-0x0000000004AA0000-0x0000000004AD5000-memory.dmp family_redline behavioral1/memory/4848-76-0x0000000004AA0000-0x0000000004AD5000-memory.dmp family_redline behavioral1/memory/4848-74-0x0000000004AA0000-0x0000000004AD5000-memory.dmp family_redline behavioral1/memory/4848-72-0x0000000004AA0000-0x0000000004AD5000-memory.dmp family_redline behavioral1/memory/4848-70-0x0000000004AA0000-0x0000000004AD5000-memory.dmp family_redline behavioral1/memory/4848-66-0x0000000004AA0000-0x0000000004AD5000-memory.dmp family_redline behavioral1/memory/4848-88-0x0000000004AA0000-0x0000000004AD5000-memory.dmp family_redline behavioral1/memory/4848-84-0x0000000004AA0000-0x0000000004AD5000-memory.dmp family_redline behavioral1/memory/4848-68-0x0000000004AA0000-0x0000000004AD5000-memory.dmp family_redline behavioral1/memory/4848-64-0x0000000004AA0000-0x0000000004AD5000-memory.dmp family_redline behavioral1/memory/4848-62-0x0000000004AA0000-0x0000000004AD5000-memory.dmp family_redline behavioral1/memory/4848-60-0x0000000004AA0000-0x0000000004AD5000-memory.dmp family_redline behavioral1/memory/4848-59-0x0000000004AA0000-0x0000000004AD5000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 1668 st343142.exe 4424 48157825.exe 4848 kp077233.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 48157825.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 48157825.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3fabc9e92c2c1f328d0ea07fd8a9cc93f3f9fb7f8dd5010574561e7f8c1cb063.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st343142.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5952 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3fabc9e92c2c1f328d0ea07fd8a9cc93f3f9fb7f8dd5010574561e7f8c1cb063.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language st343142.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 48157825.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kp077233.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4424 48157825.exe 4424 48157825.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4424 48157825.exe Token: SeDebugPrivilege 4848 kp077233.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4636 wrote to memory of 1668 4636 3fabc9e92c2c1f328d0ea07fd8a9cc93f3f9fb7f8dd5010574561e7f8c1cb063.exe 86 PID 4636 wrote to memory of 1668 4636 3fabc9e92c2c1f328d0ea07fd8a9cc93f3f9fb7f8dd5010574561e7f8c1cb063.exe 86 PID 4636 wrote to memory of 1668 4636 3fabc9e92c2c1f328d0ea07fd8a9cc93f3f9fb7f8dd5010574561e7f8c1cb063.exe 86 PID 1668 wrote to memory of 4424 1668 st343142.exe 87 PID 1668 wrote to memory of 4424 1668 st343142.exe 87 PID 1668 wrote to memory of 4424 1668 st343142.exe 87 PID 1668 wrote to memory of 4848 1668 st343142.exe 98 PID 1668 wrote to memory of 4848 1668 st343142.exe 98 PID 1668 wrote to memory of 4848 1668 st343142.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\3fabc9e92c2c1f328d0ea07fd8a9cc93f3f9fb7f8dd5010574561e7f8c1cb063.exe"C:\Users\Admin\AppData\Local\Temp\3fabc9e92c2c1f328d0ea07fd8a9cc93f3f9fb7f8dd5010574561e7f8c1cb063.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st343142.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st343142.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\48157825.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\48157825.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4424
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp077233.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp077233.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4848
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:5952
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
519KB
MD5e07a17a87fe3d1b35f13954f0bdde09d
SHA1ec7f203e9a6d799166577a0fc88cff18e5bc1f4b
SHA256bca37a7344cdf694578a7ea74dd8ff41b6bd85a39fc220b2d59084d56815fb44
SHA51201c962c170c26ecbd40f969f7f6305cdecd5d2267a784f4a38dd33e2ad5c13f18af3e38d924c21de1b830d34b438ba3aa3d4a648324b9a74912f338b33a1a312
-
Filesize
175KB
MD5f82426088c4641f2e943d65e88723bdf
SHA1d60cf0e2550a4c24430fd0fb14e4d74481315df0
SHA2564b25b8a81d8cc16841f65832dd24c0c300dda2eac08c08ac0cf2ca793453a357
SHA51233cd1d12dd5b7333ce6835037c7b3c95868c801621a88e7e64a116de4ca9fc6ba99d7f308c93d044f0fbf46a1da36370eacbdf31afc3fa7834ab4700c063b209
-
Filesize
415KB
MD5f40866b0872fb86b6460202d2b2f773c
SHA1762922d522fef152f7615a2121d1eda1f6bc7d52
SHA2569616a46d82d267f04116fa8c410c6e8fff8a45eaf8adc222145aa8a7027ff7b2
SHA5122bfe0b47cb8384ee8d6380af4641ab177eea73ed3dffed2ea1217ed21a288e824073d6924df11406fdf934781d8b11d654bc850207eedc5540e6bec85560ecde