Analysis
-
max time kernel
139s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 14:01
Static task
static1
Behavioral task
behavioral1
Sample
0339905c8bf3f9bf516b34b943617b08385c97f299d72a39c1af7689f5077a89.exe
Resource
win10v2004-20241007-en
General
-
Target
0339905c8bf3f9bf516b34b943617b08385c97f299d72a39c1af7689f5077a89.exe
-
Size
479KB
-
MD5
aaa6707015e652156725a7089893ed5e
-
SHA1
b1331420da7c5cba309d9aa5e9b104401556e075
-
SHA256
0339905c8bf3f9bf516b34b943617b08385c97f299d72a39c1af7689f5077a89
-
SHA512
4ca6db923632da286d8f58023a01f5edc184fefafe11fdb44059f3e04d11a8e9964a318301b623746d85ed8a4313d97aac6c1998769eb4f5de62947a9a3208ff
-
SSDEEP
12288:JMrZy90JX2Lx15g2MqJQ5Qb64ShdFygvz4NTSDMp0mqp1:Mylr5g2FK+0hdkg0TSDMpSp1
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/3224-15-0x00000000023C0000-0x00000000023DA000-memory.dmp healer behavioral1/memory/3224-19-0x0000000004F50000-0x0000000004F68000-memory.dmp healer behavioral1/memory/3224-23-0x0000000004F50000-0x0000000004F62000-memory.dmp healer behavioral1/memory/3224-45-0x0000000004F50000-0x0000000004F62000-memory.dmp healer behavioral1/memory/3224-43-0x0000000004F50000-0x0000000004F62000-memory.dmp healer behavioral1/memory/3224-41-0x0000000004F50000-0x0000000004F62000-memory.dmp healer behavioral1/memory/3224-39-0x0000000004F50000-0x0000000004F62000-memory.dmp healer behavioral1/memory/3224-37-0x0000000004F50000-0x0000000004F62000-memory.dmp healer behavioral1/memory/3224-35-0x0000000004F50000-0x0000000004F62000-memory.dmp healer behavioral1/memory/3224-47-0x0000000004F50000-0x0000000004F62000-memory.dmp healer behavioral1/memory/3224-33-0x0000000004F50000-0x0000000004F62000-memory.dmp healer behavioral1/memory/3224-31-0x0000000004F50000-0x0000000004F62000-memory.dmp healer behavioral1/memory/3224-29-0x0000000004F50000-0x0000000004F62000-memory.dmp healer behavioral1/memory/3224-27-0x0000000004F50000-0x0000000004F62000-memory.dmp healer behavioral1/memory/3224-25-0x0000000004F50000-0x0000000004F62000-memory.dmp healer behavioral1/memory/3224-21-0x0000000004F50000-0x0000000004F62000-memory.dmp healer behavioral1/memory/3224-20-0x0000000004F50000-0x0000000004F62000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k5795935.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k5795935.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k5795935.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k5795935.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k5795935.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k5795935.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x000a000000023b88-53.dat family_redline behavioral1/memory/840-55-0x0000000000C30000-0x0000000000C58000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 2304 y2275570.exe 3224 k5795935.exe 840 l7874828.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k5795935.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k5795935.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0339905c8bf3f9bf516b34b943617b08385c97f299d72a39c1af7689f5077a89.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y2275570.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y2275570.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k5795935.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l7874828.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0339905c8bf3f9bf516b34b943617b08385c97f299d72a39c1af7689f5077a89.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3224 k5795935.exe 3224 k5795935.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3224 k5795935.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4936 wrote to memory of 2304 4936 0339905c8bf3f9bf516b34b943617b08385c97f299d72a39c1af7689f5077a89.exe 86 PID 4936 wrote to memory of 2304 4936 0339905c8bf3f9bf516b34b943617b08385c97f299d72a39c1af7689f5077a89.exe 86 PID 4936 wrote to memory of 2304 4936 0339905c8bf3f9bf516b34b943617b08385c97f299d72a39c1af7689f5077a89.exe 86 PID 2304 wrote to memory of 3224 2304 y2275570.exe 87 PID 2304 wrote to memory of 3224 2304 y2275570.exe 87 PID 2304 wrote to memory of 3224 2304 y2275570.exe 87 PID 2304 wrote to memory of 840 2304 y2275570.exe 97 PID 2304 wrote to memory of 840 2304 y2275570.exe 97 PID 2304 wrote to memory of 840 2304 y2275570.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\0339905c8bf3f9bf516b34b943617b08385c97f299d72a39c1af7689f5077a89.exe"C:\Users\Admin\AppData\Local\Temp\0339905c8bf3f9bf516b34b943617b08385c97f299d72a39c1af7689f5077a89.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2275570.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2275570.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k5795935.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k5795935.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3224
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l7874828.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l7874828.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:840
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD510ad2fb448226789680845e8f8950e91
SHA1fff24f74ec3fa537e4a042e89dd6d49e6e21c704
SHA25641715fe7b51fa890f1f8dc7d0f5c6dec915528f40d53cee9077d4f2a4f9120fd
SHA5129c8d093893d8376345baa5bb5b8320e8466bf45f219a537712d6787b470f1d88638b6326df26c09caec53f0fa8118e14c435861ef2cbf3c585e3063c2a6e75c2
-
Filesize
175KB
MD5c5a393d4ce32c576c89bdf41524f7888
SHA1adffbae0ac1f18d2d83e5bae3f900ac537bb85a8
SHA256b8e336e6cb7f279db22ad97bbe64efc8401e29667a3388bcd7083b37b461cf3c
SHA512a3b3ca3f15b64cecf220df05a1f8408981cfaadaa8ff296995a10cf81437eac5077df2fb226c11f51831895e6da08a0639b8e326d5b4ff72377c00604d1ae5e3
-
Filesize
137KB
MD5aa58b7b3574c62db924a54991a5b776d
SHA10e18b2adc0eb9dd245689381e4c0aa1276d1d9a0
SHA2568d8667c611c544271086cf06704e7daaace3f55c92af6400c720193c50624d2c
SHA51289e09957c6ab03148f9bba35e754f57b9bec63e4f4387578ff4a1232c4b15cfa89485797a2a38e2f54810a2475c65731f4bd4882964dce5f77e4a31a20874730