Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 14:07
Static task
static1
Behavioral task
behavioral1
Sample
7ea2732b926ade32452d0070607583f9cd04b15c4b872620ebe0d46cb4651111.exe
Resource
win10v2004-20241007-en
General
-
Target
7ea2732b926ade32452d0070607583f9cd04b15c4b872620ebe0d46cb4651111.exe
-
Size
707KB
-
MD5
fa1e382fc41c2312ad2b298800a79494
-
SHA1
f15b527d8dbf67e34945fad765f897408384ed40
-
SHA256
7ea2732b926ade32452d0070607583f9cd04b15c4b872620ebe0d46cb4651111
-
SHA512
2d5401920b3a4e4d409a32b93843f880383a54703a5e99395e189f45a812d90fb50907d96ed7b2dec927a82756b76e86e96b025175097fa1b1a3d29a47cdb324
-
SSDEEP
12288:fy90dUTi9uAd9Qkq00tuRYDbNPUAl+5JXBGdFzOAy6w/cE8+EOSYBn:fyyUm9uAfQkqTxPUa+ZGdFKZ7Pbn
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/3596-17-0x0000000004860000-0x000000000487A000-memory.dmp healer behavioral1/memory/3596-19-0x0000000004D00000-0x0000000004D18000-memory.dmp healer behavioral1/memory/3596-36-0x0000000004D00000-0x0000000004D12000-memory.dmp healer behavioral1/memory/3596-48-0x0000000004D00000-0x0000000004D12000-memory.dmp healer behavioral1/memory/3596-46-0x0000000004D00000-0x0000000004D12000-memory.dmp healer behavioral1/memory/3596-44-0x0000000004D00000-0x0000000004D12000-memory.dmp healer behavioral1/memory/3596-42-0x0000000004D00000-0x0000000004D12000-memory.dmp healer behavioral1/memory/3596-40-0x0000000004D00000-0x0000000004D12000-memory.dmp healer behavioral1/memory/3596-38-0x0000000004D00000-0x0000000004D12000-memory.dmp healer behavioral1/memory/3596-30-0x0000000004D00000-0x0000000004D12000-memory.dmp healer behavioral1/memory/3596-28-0x0000000004D00000-0x0000000004D12000-memory.dmp healer behavioral1/memory/3596-26-0x0000000004D00000-0x0000000004D12000-memory.dmp healer behavioral1/memory/3596-24-0x0000000004D00000-0x0000000004D12000-memory.dmp healer behavioral1/memory/3596-34-0x0000000004D00000-0x0000000004D12000-memory.dmp healer behavioral1/memory/3596-32-0x0000000004D00000-0x0000000004D12000-memory.dmp healer behavioral1/memory/3596-22-0x0000000004D00000-0x0000000004D12000-memory.dmp healer behavioral1/memory/3596-21-0x0000000004D00000-0x0000000004D12000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr507189.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr507189.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr507189.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr507189.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr507189.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr507189.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4732-59-0x0000000004BC0000-0x0000000004BFC000-memory.dmp family_redline behavioral1/memory/4732-60-0x00000000071C0000-0x00000000071FA000-memory.dmp family_redline behavioral1/memory/4732-61-0x00000000071C0000-0x00000000071F5000-memory.dmp family_redline behavioral1/memory/4732-70-0x00000000071C0000-0x00000000071F5000-memory.dmp family_redline behavioral1/memory/4732-94-0x00000000071C0000-0x00000000071F5000-memory.dmp family_redline behavioral1/memory/4732-92-0x00000000071C0000-0x00000000071F5000-memory.dmp family_redline behavioral1/memory/4732-88-0x00000000071C0000-0x00000000071F5000-memory.dmp family_redline behavioral1/memory/4732-86-0x00000000071C0000-0x00000000071F5000-memory.dmp family_redline behavioral1/memory/4732-84-0x00000000071C0000-0x00000000071F5000-memory.dmp family_redline behavioral1/memory/4732-82-0x00000000071C0000-0x00000000071F5000-memory.dmp family_redline behavioral1/memory/4732-80-0x00000000071C0000-0x00000000071F5000-memory.dmp family_redline behavioral1/memory/4732-78-0x00000000071C0000-0x00000000071F5000-memory.dmp family_redline behavioral1/memory/4732-76-0x00000000071C0000-0x00000000071F5000-memory.dmp family_redline behavioral1/memory/4732-74-0x00000000071C0000-0x00000000071F5000-memory.dmp family_redline behavioral1/memory/4732-72-0x00000000071C0000-0x00000000071F5000-memory.dmp family_redline behavioral1/memory/4732-68-0x00000000071C0000-0x00000000071F5000-memory.dmp family_redline behavioral1/memory/4732-66-0x00000000071C0000-0x00000000071F5000-memory.dmp family_redline behavioral1/memory/4732-64-0x00000000071C0000-0x00000000071F5000-memory.dmp family_redline behavioral1/memory/4732-62-0x00000000071C0000-0x00000000071F5000-memory.dmp family_redline behavioral1/memory/4732-90-0x00000000071C0000-0x00000000071F5000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 5064 un607665.exe 3596 pr507189.exe 4732 qu262677.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr507189.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr507189.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7ea2732b926ade32452d0070607583f9cd04b15c4b872620ebe0d46cb4651111.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un607665.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4816 3596 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr507189.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu262677.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ea2732b926ade32452d0070607583f9cd04b15c4b872620ebe0d46cb4651111.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un607665.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3596 pr507189.exe 3596 pr507189.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3596 pr507189.exe Token: SeDebugPrivilege 4732 qu262677.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1248 wrote to memory of 5064 1248 7ea2732b926ade32452d0070607583f9cd04b15c4b872620ebe0d46cb4651111.exe 84 PID 1248 wrote to memory of 5064 1248 7ea2732b926ade32452d0070607583f9cd04b15c4b872620ebe0d46cb4651111.exe 84 PID 1248 wrote to memory of 5064 1248 7ea2732b926ade32452d0070607583f9cd04b15c4b872620ebe0d46cb4651111.exe 84 PID 5064 wrote to memory of 3596 5064 un607665.exe 85 PID 5064 wrote to memory of 3596 5064 un607665.exe 85 PID 5064 wrote to memory of 3596 5064 un607665.exe 85 PID 5064 wrote to memory of 4732 5064 un607665.exe 98 PID 5064 wrote to memory of 4732 5064 un607665.exe 98 PID 5064 wrote to memory of 4732 5064 un607665.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ea2732b926ade32452d0070607583f9cd04b15c4b872620ebe0d46cb4651111.exe"C:\Users\Admin\AppData\Local\Temp\7ea2732b926ade32452d0070607583f9cd04b15c4b872620ebe0d46cb4651111.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un607665.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un607665.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr507189.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr507189.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3596 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3596 -s 10764⤵
- Program crash
PID:4816
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu262677.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu262677.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4732
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3596 -ip 35961⤵PID:1116
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
552KB
MD5eeeef87ab6639bc3a24fd3d0e9b19b37
SHA1436e8a897fb25a526ed06a77d0cfb59a0427f4f1
SHA256fafcc2e2a96d52101036ad94cc76e245d044fc4e699193a81dee8110e514f1e9
SHA512fb089924f9cb948d2d68b6382a27490c8498f8e98f0f68a1fcc139153958c20f3f67fbebb9514ce217b4dc7adb2ba3f4d976cb30560f053acb3cc0923084b764
-
Filesize
279KB
MD5851226a8cd2cfe2fbbac5ba6681b7942
SHA114146b1d9cddd827595431cc38ea9069ef0d49c8
SHA256d62decd6ceaf242876d4e764a29d7fb1dd7f60af950324a132e2c6e611047c00
SHA5129d5bccf57121803a1c3f7200a1eed4923af1afe948c1e48048098d30ea1b2404c90859c6372ac145214d6c07daba1015952b55361c88e471d08c84eaa09d8b67
-
Filesize
362KB
MD52329827fefeb0c94ae4e36a38ead558f
SHA15bf5a67b9269511d0f8fdaff6cdd0cb6a2525123
SHA256f571e1188d761b91db8b5c4be0cca3e45140598d9ee1285c05573b21d79a53f5
SHA51227754db0c847dfdb3cf549140ce97ee87dbfb4c7bc68e1cecd154a1d99d90c9ea0fb4d6df51672aa3ad615fc40d8bb9017ff337fb2de810be1a236495dcaa283