Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 14:04
Static task
static1
Behavioral task
behavioral1
Sample
87d0736cc4b3a15613ac3bf20afe23f2be07ccb4620ee5223cdf6400cee52035.exe
Resource
win10v2004-20241007-en
General
-
Target
87d0736cc4b3a15613ac3bf20afe23f2be07ccb4620ee5223cdf6400cee52035.exe
-
Size
695KB
-
MD5
a77f2775bd759720f6be370be398d446
-
SHA1
fb4d57ae20efa8f6049c5f184065fa1c4676e3dc
-
SHA256
87d0736cc4b3a15613ac3bf20afe23f2be07ccb4620ee5223cdf6400cee52035
-
SHA512
9a5f7e87f23ad7cfe78504309ce69fb39bb335931f4a35ba4dac9212c7c24207dfa3995726245ae0693217fc3046e6bd9547eccf5e9e63eb6e215ca871a68448
-
SSDEEP
12288:fy900O4BQpzHBgO0jeDyOB4ByWke89SQDZRhuaHq0iDVe72dBHwxz++g:fy040+jOJBJ9e1EjxTOe72dBQRg
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/3428-18-0x00000000071E0000-0x00000000071FA000-memory.dmp healer behavioral1/memory/3428-20-0x0000000007270000-0x0000000007288000-memory.dmp healer behavioral1/memory/3428-36-0x0000000007270000-0x0000000007283000-memory.dmp healer behavioral1/memory/3428-48-0x0000000007270000-0x0000000007283000-memory.dmp healer behavioral1/memory/3428-46-0x0000000007270000-0x0000000007283000-memory.dmp healer behavioral1/memory/3428-44-0x0000000007270000-0x0000000007283000-memory.dmp healer behavioral1/memory/3428-42-0x0000000007270000-0x0000000007283000-memory.dmp healer behavioral1/memory/3428-40-0x0000000007270000-0x0000000007283000-memory.dmp healer behavioral1/memory/3428-38-0x0000000007270000-0x0000000007283000-memory.dmp healer behavioral1/memory/3428-34-0x0000000007270000-0x0000000007283000-memory.dmp healer behavioral1/memory/3428-32-0x0000000007270000-0x0000000007283000-memory.dmp healer behavioral1/memory/3428-30-0x0000000007270000-0x0000000007283000-memory.dmp healer behavioral1/memory/3428-28-0x0000000007270000-0x0000000007283000-memory.dmp healer behavioral1/memory/3428-26-0x0000000007270000-0x0000000007283000-memory.dmp healer behavioral1/memory/3428-24-0x0000000007270000-0x0000000007283000-memory.dmp healer behavioral1/memory/3428-22-0x0000000007270000-0x0000000007283000-memory.dmp healer behavioral1/memory/3428-21-0x0000000007270000-0x0000000007283000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 49287517.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 49287517.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 49287517.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 49287517.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 49287517.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 49287517.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2828-60-0x0000000004A00000-0x0000000004A3C000-memory.dmp family_redline behavioral1/memory/2828-61-0x0000000004CA0000-0x0000000004CDA000-memory.dmp family_redline behavioral1/memory/2828-71-0x0000000004CA0000-0x0000000004CD5000-memory.dmp family_redline behavioral1/memory/2828-75-0x0000000004CA0000-0x0000000004CD5000-memory.dmp family_redline behavioral1/memory/2828-95-0x0000000004CA0000-0x0000000004CD5000-memory.dmp family_redline behavioral1/memory/2828-93-0x0000000004CA0000-0x0000000004CD5000-memory.dmp family_redline behavioral1/memory/2828-91-0x0000000004CA0000-0x0000000004CD5000-memory.dmp family_redline behavioral1/memory/2828-89-0x0000000004CA0000-0x0000000004CD5000-memory.dmp family_redline behavioral1/memory/2828-85-0x0000000004CA0000-0x0000000004CD5000-memory.dmp family_redline behavioral1/memory/2828-83-0x0000000004CA0000-0x0000000004CD5000-memory.dmp family_redline behavioral1/memory/2828-81-0x0000000004CA0000-0x0000000004CD5000-memory.dmp family_redline behavioral1/memory/2828-79-0x0000000004CA0000-0x0000000004CD5000-memory.dmp family_redline behavioral1/memory/2828-77-0x0000000004CA0000-0x0000000004CD5000-memory.dmp family_redline behavioral1/memory/2828-73-0x0000000004CA0000-0x0000000004CD5000-memory.dmp family_redline behavioral1/memory/2828-69-0x0000000004CA0000-0x0000000004CD5000-memory.dmp family_redline behavioral1/memory/2828-67-0x0000000004CA0000-0x0000000004CD5000-memory.dmp family_redline behavioral1/memory/2828-87-0x0000000004CA0000-0x0000000004CD5000-memory.dmp family_redline behavioral1/memory/2828-65-0x0000000004CA0000-0x0000000004CD5000-memory.dmp family_redline behavioral1/memory/2828-63-0x0000000004CA0000-0x0000000004CD5000-memory.dmp family_redline behavioral1/memory/2828-62-0x0000000004CA0000-0x0000000004CD5000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 1196 un736269.exe 3428 49287517.exe 2828 rk884014.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 49287517.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 49287517.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 87d0736cc4b3a15613ac3bf20afe23f2be07ccb4620ee5223cdf6400cee52035.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un736269.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2308 3428 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rk884014.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 87d0736cc4b3a15613ac3bf20afe23f2be07ccb4620ee5223cdf6400cee52035.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un736269.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 49287517.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3428 49287517.exe 3428 49287517.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3428 49287517.exe Token: SeDebugPrivilege 2828 rk884014.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2548 wrote to memory of 1196 2548 87d0736cc4b3a15613ac3bf20afe23f2be07ccb4620ee5223cdf6400cee52035.exe 84 PID 2548 wrote to memory of 1196 2548 87d0736cc4b3a15613ac3bf20afe23f2be07ccb4620ee5223cdf6400cee52035.exe 84 PID 2548 wrote to memory of 1196 2548 87d0736cc4b3a15613ac3bf20afe23f2be07ccb4620ee5223cdf6400cee52035.exe 84 PID 1196 wrote to memory of 3428 1196 un736269.exe 85 PID 1196 wrote to memory of 3428 1196 un736269.exe 85 PID 1196 wrote to memory of 3428 1196 un736269.exe 85 PID 1196 wrote to memory of 2828 1196 un736269.exe 98 PID 1196 wrote to memory of 2828 1196 un736269.exe 98 PID 1196 wrote to memory of 2828 1196 un736269.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\87d0736cc4b3a15613ac3bf20afe23f2be07ccb4620ee5223cdf6400cee52035.exe"C:\Users\Admin\AppData\Local\Temp\87d0736cc4b3a15613ac3bf20afe23f2be07ccb4620ee5223cdf6400cee52035.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un736269.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un736269.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\49287517.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\49287517.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3428 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3428 -s 10884⤵
- Program crash
PID:2308
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk884014.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk884014.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2828
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3428 -ip 34281⤵PID:1020
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
541KB
MD5fd82eecade96178751ee6aaf9f2a38de
SHA1eec8a6aa7eca64b6e05fbaa310844290fc7602fc
SHA25622775044fdd5eee34167e0e8f7fd550eadfa764068474a1e1696cc91cc3b9919
SHA5121124f394c87cc1212e62c8d8c3a86403206126d7bbf5e2cf8920d01cd93f679ec30bab3944560c67dc1aca268ced98662e785d95eb7ffdecd0e177cba4995acc
-
Filesize
264KB
MD59583c59289e013fa815bf1e8a03ec569
SHA1eddce806d419c1eddc8ef40def6a4b6c0e0ca520
SHA2566e99b87a3fdad02438758bf12cb45ab62d0d193cefc1c21f96b7d598422a94df
SHA512671d6eaa1094f4ebbe1a794ffb24a73a322e87b18962d90b15f2b48099c8ea6a50523a67bf8e3a4f8579e902c6f6f5d05cd5f6c56a876728ca639849cd6bba0a
-
Filesize
348KB
MD5eca557a85a1e85c40a43b626a76dc987
SHA116af9614f612b8061a72c8a1a121976e0862b6ff
SHA25645d62d2b84b58fa96d689860c8bc6268f12e2ad805b1bb6959c62ad22e423148
SHA512e1ce0e61bfefd7505d5118728233cd6e17e29e3607065e6f4b73cd5e53beca4eaa5cbb8aca5931a80d1202109bf3134219306d70a532aae7aff2466e2ec58332