Analysis
-
max time kernel
144s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 14:05
Static task
static1
Behavioral task
behavioral1
Sample
634ed994aa6fd38d89c72638d9138fc6be253bd4588b7b1dfb5834555381e299.exe
Resource
win10v2004-20241007-en
General
-
Target
634ed994aa6fd38d89c72638d9138fc6be253bd4588b7b1dfb5834555381e299.exe
-
Size
697KB
-
MD5
1456075b23d8fa7291807013c150d214
-
SHA1
62bbbbfa9a62b83e8045a8b1ef67b30188517970
-
SHA256
634ed994aa6fd38d89c72638d9138fc6be253bd4588b7b1dfb5834555381e299
-
SHA512
6c3843625b869e9e4de9c65a294ba4f52299b21573607214131ed3d6886fca6ba8738e51d5bcaa4fda1382b2b26f4712956c15c9a85a19fd40ec887c3108426c
-
SSDEEP
12288:eEfVZyPPKCueO+ueO+ueO+u9tdN9tdN9tdN9tdN8scM8scM8scM8Xy90S7ZVajU1:eEfVZyPPKCueO+ueO+ueO+u9tdN9tdN9
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/868-18-0x0000000004CC0000-0x0000000004CDA000-memory.dmp healer behavioral1/memory/868-20-0x0000000004CE0000-0x0000000004CF8000-memory.dmp healer behavioral1/memory/868-47-0x0000000004CE0000-0x0000000004CF2000-memory.dmp healer behavioral1/memory/868-48-0x0000000004CE0000-0x0000000004CF2000-memory.dmp healer behavioral1/memory/868-44-0x0000000004CE0000-0x0000000004CF2000-memory.dmp healer behavioral1/memory/868-42-0x0000000004CE0000-0x0000000004CF2000-memory.dmp healer behavioral1/memory/868-41-0x0000000004CE0000-0x0000000004CF2000-memory.dmp healer behavioral1/memory/868-38-0x0000000004CE0000-0x0000000004CF2000-memory.dmp healer behavioral1/memory/868-36-0x0000000004CE0000-0x0000000004CF2000-memory.dmp healer behavioral1/memory/868-34-0x0000000004CE0000-0x0000000004CF2000-memory.dmp healer behavioral1/memory/868-32-0x0000000004CE0000-0x0000000004CF2000-memory.dmp healer behavioral1/memory/868-30-0x0000000004CE0000-0x0000000004CF2000-memory.dmp healer behavioral1/memory/868-28-0x0000000004CE0000-0x0000000004CF2000-memory.dmp healer behavioral1/memory/868-26-0x0000000004CE0000-0x0000000004CF2000-memory.dmp healer behavioral1/memory/868-25-0x0000000004CE0000-0x0000000004CF2000-memory.dmp healer behavioral1/memory/868-22-0x0000000004CE0000-0x0000000004CF2000-memory.dmp healer behavioral1/memory/868-21-0x0000000004CE0000-0x0000000004CF2000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr460975.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr460975.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr460975.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr460975.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr460975.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr460975.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3716-60-0x0000000007160000-0x000000000719C000-memory.dmp family_redline behavioral1/memory/3716-61-0x0000000007790000-0x00000000077CA000-memory.dmp family_redline behavioral1/memory/3716-67-0x0000000007790000-0x00000000077C5000-memory.dmp family_redline behavioral1/memory/3716-75-0x0000000007790000-0x00000000077C5000-memory.dmp family_redline behavioral1/memory/3716-95-0x0000000007790000-0x00000000077C5000-memory.dmp family_redline behavioral1/memory/3716-93-0x0000000007790000-0x00000000077C5000-memory.dmp family_redline behavioral1/memory/3716-89-0x0000000007790000-0x00000000077C5000-memory.dmp family_redline behavioral1/memory/3716-87-0x0000000007790000-0x00000000077C5000-memory.dmp family_redline behavioral1/memory/3716-83-0x0000000007790000-0x00000000077C5000-memory.dmp family_redline behavioral1/memory/3716-81-0x0000000007790000-0x00000000077C5000-memory.dmp family_redline behavioral1/memory/3716-80-0x0000000007790000-0x00000000077C5000-memory.dmp family_redline behavioral1/memory/3716-77-0x0000000007790000-0x00000000077C5000-memory.dmp family_redline behavioral1/memory/3716-73-0x0000000007790000-0x00000000077C5000-memory.dmp family_redline behavioral1/memory/3716-71-0x0000000007790000-0x00000000077C5000-memory.dmp family_redline behavioral1/memory/3716-69-0x0000000007790000-0x00000000077C5000-memory.dmp family_redline behavioral1/memory/3716-91-0x0000000007790000-0x00000000077C5000-memory.dmp family_redline behavioral1/memory/3716-85-0x0000000007790000-0x00000000077C5000-memory.dmp family_redline behavioral1/memory/3716-65-0x0000000007790000-0x00000000077C5000-memory.dmp family_redline behavioral1/memory/3716-63-0x0000000007790000-0x00000000077C5000-memory.dmp family_redline behavioral1/memory/3716-62-0x0000000007790000-0x00000000077C5000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4212 un608164.exe 868 pr460975.exe 3716 qu655857.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr460975.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr460975.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 634ed994aa6fd38d89c72638d9138fc6be253bd4588b7b1dfb5834555381e299.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un608164.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 448 868 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 634ed994aa6fd38d89c72638d9138fc6be253bd4588b7b1dfb5834555381e299.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un608164.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr460975.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu655857.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 868 pr460975.exe 868 pr460975.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 868 pr460975.exe Token: SeDebugPrivilege 3716 qu655857.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4828 wrote to memory of 4212 4828 634ed994aa6fd38d89c72638d9138fc6be253bd4588b7b1dfb5834555381e299.exe 84 PID 4828 wrote to memory of 4212 4828 634ed994aa6fd38d89c72638d9138fc6be253bd4588b7b1dfb5834555381e299.exe 84 PID 4828 wrote to memory of 4212 4828 634ed994aa6fd38d89c72638d9138fc6be253bd4588b7b1dfb5834555381e299.exe 84 PID 4212 wrote to memory of 868 4212 un608164.exe 85 PID 4212 wrote to memory of 868 4212 un608164.exe 85 PID 4212 wrote to memory of 868 4212 un608164.exe 85 PID 4212 wrote to memory of 3716 4212 un608164.exe 97 PID 4212 wrote to memory of 3716 4212 un608164.exe 97 PID 4212 wrote to memory of 3716 4212 un608164.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\634ed994aa6fd38d89c72638d9138fc6be253bd4588b7b1dfb5834555381e299.exe"C:\Users\Admin\AppData\Local\Temp\634ed994aa6fd38d89c72638d9138fc6be253bd4588b7b1dfb5834555381e299.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un608164.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un608164.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr460975.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr460975.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:868 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 868 -s 10804⤵
- Program crash
PID:448
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu655857.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu655857.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3716
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 868 -ip 8681⤵PID:2100
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
543KB
MD5d92beaeba812e119a02d14f4c909ebaf
SHA1dc55cd1bb0804891140967056b4f2840783828b7
SHA256e1f8931ce7fa4dad8a7fb7e9075dab8204ccc45bd50ae8cf008f1f70978953ad
SHA51243d097872889d4ddea15867950c0b722f4f55db83e20bed31d2c62cabfcca092186d10de941c5ce2484ae90dc0363c3a36540bae4cd6d8165780dfb88e72ea71
-
Filesize
269KB
MD5c428d534fba62ca47a33c81a485421e2
SHA1c6914822898cfc5dbe181e85c146052526e3b242
SHA256c8551aea51bdbe6ccc32d04e71241dcfd606b8ddde2aafc58753bb671460ffaf
SHA51278b9f9f9dd97ec80007b48758da4df4f46360ebb91e2728afb42170b73d21c919387413953b28480b0dfb3ef890809acf960dd4a6113781f6b68118e6b566436
-
Filesize
352KB
MD5c5d94f0ceca8ebac890e25c8e03ab229
SHA1ea87b945d3cceb338f3ad0660ed82633c3a6a1b3
SHA25607b5b9bb951a6d170e4348de25b626812e9dc25ec7caecda453bf63818ab125f
SHA5120abbd8f8a363328eb4f251bf89aff9a2262b3450535b5da9287e85275209fc1408d2190162b4d3fccc8aea784dcc4cd80552ef4388a956e7f7636dad4a44f2bc