Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 14:06
Static task
static1
Behavioral task
behavioral1
Sample
d32a8401b857fbb891912abead93dfaae79b11991588e406a49442b3ee42542a.exe
Resource
win10v2004-20241007-en
General
-
Target
d32a8401b857fbb891912abead93dfaae79b11991588e406a49442b3ee42542a.exe
-
Size
651KB
-
MD5
0d89c92c25eb0de4083f264e5bc3a2ec
-
SHA1
fbbb72707460e091862a4e2a5e59caf10467f84f
-
SHA256
d32a8401b857fbb891912abead93dfaae79b11991588e406a49442b3ee42542a
-
SHA512
9afb8140bb749daa58e8cd6a91af101e7cd497b852e769bd6b7699e67ccc2e795bd86b809023f7c6329463298b9b5c0aaa1e214ef79971e31968e21febe9f6bb
-
SSDEEP
12288:Vy90Kd9yj0vb83UtJ/PJiPSaOj1g8gWClW0wxH2XmQVxOO+4FIDU:Vy3d9EIuUtJ/PJISMeV2X5COnFIo
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/2764-15-0x00000000020E0000-0x00000000020FA000-memory.dmp healer behavioral1/memory/2764-19-0x0000000005090000-0x00000000050A8000-memory.dmp healer behavioral1/memory/2764-48-0x0000000005090000-0x00000000050A3000-memory.dmp healer behavioral1/memory/2764-46-0x0000000005090000-0x00000000050A3000-memory.dmp healer behavioral1/memory/2764-44-0x0000000005090000-0x00000000050A3000-memory.dmp healer behavioral1/memory/2764-42-0x0000000005090000-0x00000000050A3000-memory.dmp healer behavioral1/memory/2764-40-0x0000000005090000-0x00000000050A3000-memory.dmp healer behavioral1/memory/2764-38-0x0000000005090000-0x00000000050A3000-memory.dmp healer behavioral1/memory/2764-36-0x0000000005090000-0x00000000050A3000-memory.dmp healer behavioral1/memory/2764-34-0x0000000005090000-0x00000000050A3000-memory.dmp healer behavioral1/memory/2764-32-0x0000000005090000-0x00000000050A3000-memory.dmp healer behavioral1/memory/2764-30-0x0000000005090000-0x00000000050A3000-memory.dmp healer behavioral1/memory/2764-28-0x0000000005090000-0x00000000050A3000-memory.dmp healer behavioral1/memory/2764-26-0x0000000005090000-0x00000000050A3000-memory.dmp healer behavioral1/memory/2764-24-0x0000000005090000-0x00000000050A3000-memory.dmp healer behavioral1/memory/2764-22-0x0000000005090000-0x00000000050A3000-memory.dmp healer behavioral1/memory/2764-21-0x0000000005090000-0x00000000050A3000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 34465524.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 34465524.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 34465524.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 34465524.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 34465524.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 34465524.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/1976-57-0x0000000002570000-0x00000000025AC000-memory.dmp family_redline behavioral1/memory/1976-58-0x0000000004A50000-0x0000000004A8A000-memory.dmp family_redline behavioral1/memory/1976-66-0x0000000004A50000-0x0000000004A85000-memory.dmp family_redline behavioral1/memory/1976-72-0x0000000004A50000-0x0000000004A85000-memory.dmp family_redline behavioral1/memory/1976-94-0x0000000004A50000-0x0000000004A85000-memory.dmp family_redline behavioral1/memory/1976-92-0x0000000004A50000-0x0000000004A85000-memory.dmp family_redline behavioral1/memory/1976-88-0x0000000004A50000-0x0000000004A85000-memory.dmp family_redline behavioral1/memory/1976-86-0x0000000004A50000-0x0000000004A85000-memory.dmp family_redline behavioral1/memory/1976-84-0x0000000004A50000-0x0000000004A85000-memory.dmp family_redline behavioral1/memory/1976-82-0x0000000004A50000-0x0000000004A85000-memory.dmp family_redline behavioral1/memory/1976-80-0x0000000004A50000-0x0000000004A85000-memory.dmp family_redline behavioral1/memory/1976-76-0x0000000004A50000-0x0000000004A85000-memory.dmp family_redline behavioral1/memory/1976-74-0x0000000004A50000-0x0000000004A85000-memory.dmp family_redline behavioral1/memory/1976-70-0x0000000004A50000-0x0000000004A85000-memory.dmp family_redline behavioral1/memory/1976-68-0x0000000004A50000-0x0000000004A85000-memory.dmp family_redline behavioral1/memory/1976-64-0x0000000004A50000-0x0000000004A85000-memory.dmp family_redline behavioral1/memory/1976-90-0x0000000004A50000-0x0000000004A85000-memory.dmp family_redline behavioral1/memory/1976-78-0x0000000004A50000-0x0000000004A85000-memory.dmp family_redline behavioral1/memory/1976-62-0x0000000004A50000-0x0000000004A85000-memory.dmp family_redline behavioral1/memory/1976-60-0x0000000004A50000-0x0000000004A85000-memory.dmp family_redline behavioral1/memory/1976-59-0x0000000004A50000-0x0000000004A85000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 1300 st223185.exe 2764 34465524.exe 1976 kp390189.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 34465524.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 34465524.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d32a8401b857fbb891912abead93dfaae79b11991588e406a49442b3ee42542a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st223185.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5840 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d32a8401b857fbb891912abead93dfaae79b11991588e406a49442b3ee42542a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language st223185.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 34465524.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kp390189.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2764 34465524.exe 2764 34465524.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2764 34465524.exe Token: SeDebugPrivilege 1976 kp390189.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3916 wrote to memory of 1300 3916 d32a8401b857fbb891912abead93dfaae79b11991588e406a49442b3ee42542a.exe 84 PID 3916 wrote to memory of 1300 3916 d32a8401b857fbb891912abead93dfaae79b11991588e406a49442b3ee42542a.exe 84 PID 3916 wrote to memory of 1300 3916 d32a8401b857fbb891912abead93dfaae79b11991588e406a49442b3ee42542a.exe 84 PID 1300 wrote to memory of 2764 1300 st223185.exe 85 PID 1300 wrote to memory of 2764 1300 st223185.exe 85 PID 1300 wrote to memory of 2764 1300 st223185.exe 85 PID 1300 wrote to memory of 1976 1300 st223185.exe 93 PID 1300 wrote to memory of 1976 1300 st223185.exe 93 PID 1300 wrote to memory of 1976 1300 st223185.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\d32a8401b857fbb891912abead93dfaae79b11991588e406a49442b3ee42542a.exe"C:\Users\Admin\AppData\Local\Temp\d32a8401b857fbb891912abead93dfaae79b11991588e406a49442b3ee42542a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st223185.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st223185.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\34465524.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\34465524.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2764
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp390189.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp390189.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1976
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:5840
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
497KB
MD512cb3ad9691a714038ec59b87a252659
SHA1159483c4f0d4eda3969bc0426a0dacb939ed7875
SHA25682065eaf6cf1f9acc02d635700019688e07656182283df76f84312a13160817a
SHA512d0b02e6dda208036ad302d5f47a6f3251dad1d256e13f321cddefc17986fd264ad246c8d4dbd02c04bba4e1d3363b0d0ae1eb670ff10e9f147311c2374739063
-
Filesize
175KB
MD5a165b5f6b0a4bdf808b71de57bf9347d
SHA139a7b301e819e386c162a47e046fa384bb5ab437
SHA25668349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a
SHA5123dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1
-
Filesize
341KB
MD51bd17d206fa3583a2af68138bfceeea9
SHA1ecf31fd2ba9a55831d7990eb510f38ee79d2a30f
SHA256c676d4099e9237a0a85fb79e164a2782fe4104cfc9e3873d62bd19bc253f591d
SHA512c225e207dcf4111e8668b1b857e8a0046b79c57529f74ed4c813a7c44752532170ca20ae2fc2bb10192c51ec1b0e3c3f7c705aadbbc2835466e2b70a46bc6bdc