Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 14:09
Static task
static1
Behavioral task
behavioral1
Sample
b4abdf10768452a791abdbac2107b271a4f38ee897fe1a10ac4cbccaae8882f3.exe
Resource
win10v2004-20241007-en
General
-
Target
b4abdf10768452a791abdbac2107b271a4f38ee897fe1a10ac4cbccaae8882f3.exe
-
Size
690KB
-
MD5
8ecf7f11c0227cc8e7ea3924f803e616
-
SHA1
28824b574f91e9803a8ff703cc9fa02328213ab9
-
SHA256
b4abdf10768452a791abdbac2107b271a4f38ee897fe1a10ac4cbccaae8882f3
-
SHA512
cd5b1969169af111c14fd40d3278286a315d22b75544e913376a674e00e112ff8fdfcabf14222badd0f5e4a64ff77c5a228182cd6300d934a39f3b31f13a6f4e
-
SSDEEP
12288:hy90FBMuIq5tOCNd9SrcSRKIUxanqhhOi+0nev2BmBo8zxVLc:hyKMuIaff9SlIw8hO4e2BYVzxVLc
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/3196-19-0x0000000002220000-0x000000000223A000-memory.dmp healer behavioral1/memory/3196-21-0x00000000024F0000-0x0000000002508000-memory.dmp healer behavioral1/memory/3196-49-0x00000000024F0000-0x0000000002503000-memory.dmp healer behavioral1/memory/3196-47-0x00000000024F0000-0x0000000002503000-memory.dmp healer behavioral1/memory/3196-46-0x00000000024F0000-0x0000000002503000-memory.dmp healer behavioral1/memory/3196-43-0x00000000024F0000-0x0000000002503000-memory.dmp healer behavioral1/memory/3196-41-0x00000000024F0000-0x0000000002503000-memory.dmp healer behavioral1/memory/3196-39-0x00000000024F0000-0x0000000002503000-memory.dmp healer behavioral1/memory/3196-37-0x00000000024F0000-0x0000000002503000-memory.dmp healer behavioral1/memory/3196-36-0x00000000024F0000-0x0000000002503000-memory.dmp healer behavioral1/memory/3196-33-0x00000000024F0000-0x0000000002503000-memory.dmp healer behavioral1/memory/3196-31-0x00000000024F0000-0x0000000002503000-memory.dmp healer behavioral1/memory/3196-29-0x00000000024F0000-0x0000000002503000-memory.dmp healer behavioral1/memory/3196-28-0x00000000024F0000-0x0000000002503000-memory.dmp healer behavioral1/memory/3196-25-0x00000000024F0000-0x0000000002503000-memory.dmp healer behavioral1/memory/3196-24-0x00000000024F0000-0x0000000002503000-memory.dmp healer behavioral1/memory/3196-22-0x00000000024F0000-0x0000000002503000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 71657265.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 71657265.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 71657265.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 71657265.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 71657265.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 71657265.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4652-61-0x00000000023D0000-0x000000000240C000-memory.dmp family_redline behavioral1/memory/4652-62-0x0000000002650000-0x000000000268A000-memory.dmp family_redline behavioral1/memory/4652-66-0x0000000002650000-0x0000000002685000-memory.dmp family_redline behavioral1/memory/4652-74-0x0000000002650000-0x0000000002685000-memory.dmp family_redline behavioral1/memory/4652-97-0x0000000002650000-0x0000000002685000-memory.dmp family_redline behavioral1/memory/4652-94-0x0000000002650000-0x0000000002685000-memory.dmp family_redline behavioral1/memory/4652-93-0x0000000002650000-0x0000000002685000-memory.dmp family_redline behavioral1/memory/4652-90-0x0000000002650000-0x0000000002685000-memory.dmp family_redline behavioral1/memory/4652-89-0x0000000002650000-0x0000000002685000-memory.dmp family_redline behavioral1/memory/4652-86-0x0000000002650000-0x0000000002685000-memory.dmp family_redline behavioral1/memory/4652-84-0x0000000002650000-0x0000000002685000-memory.dmp family_redline behavioral1/memory/4652-82-0x0000000002650000-0x0000000002685000-memory.dmp family_redline behavioral1/memory/4652-80-0x0000000002650000-0x0000000002685000-memory.dmp family_redline behavioral1/memory/4652-79-0x0000000002650000-0x0000000002685000-memory.dmp family_redline behavioral1/memory/4652-76-0x0000000002650000-0x0000000002685000-memory.dmp family_redline behavioral1/memory/4652-72-0x0000000002650000-0x0000000002685000-memory.dmp family_redline behavioral1/memory/4652-70-0x0000000002650000-0x0000000002685000-memory.dmp family_redline behavioral1/memory/4652-68-0x0000000002650000-0x0000000002685000-memory.dmp family_redline behavioral1/memory/4652-64-0x0000000002650000-0x0000000002685000-memory.dmp family_redline behavioral1/memory/4652-63-0x0000000002650000-0x0000000002685000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3572 un980742.exe 3196 71657265.exe 4652 rk339834.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 71657265.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 71657265.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b4abdf10768452a791abdbac2107b271a4f38ee897fe1a10ac4cbccaae8882f3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un980742.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4268 3196 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b4abdf10768452a791abdbac2107b271a4f38ee897fe1a10ac4cbccaae8882f3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un980742.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 71657265.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rk339834.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3196 71657265.exe 3196 71657265.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3196 71657265.exe Token: SeDebugPrivilege 4652 rk339834.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2356 wrote to memory of 3572 2356 b4abdf10768452a791abdbac2107b271a4f38ee897fe1a10ac4cbccaae8882f3.exe 84 PID 2356 wrote to memory of 3572 2356 b4abdf10768452a791abdbac2107b271a4f38ee897fe1a10ac4cbccaae8882f3.exe 84 PID 2356 wrote to memory of 3572 2356 b4abdf10768452a791abdbac2107b271a4f38ee897fe1a10ac4cbccaae8882f3.exe 84 PID 3572 wrote to memory of 3196 3572 un980742.exe 85 PID 3572 wrote to memory of 3196 3572 un980742.exe 85 PID 3572 wrote to memory of 3196 3572 un980742.exe 85 PID 3572 wrote to memory of 4652 3572 un980742.exe 97 PID 3572 wrote to memory of 4652 3572 un980742.exe 97 PID 3572 wrote to memory of 4652 3572 un980742.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4abdf10768452a791abdbac2107b271a4f38ee897fe1a10ac4cbccaae8882f3.exe"C:\Users\Admin\AppData\Local\Temp\b4abdf10768452a791abdbac2107b271a4f38ee897fe1a10ac4cbccaae8882f3.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un980742.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un980742.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\71657265.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\71657265.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3196 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 10884⤵
- Program crash
PID:4268
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk339834.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk339834.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4652
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3196 -ip 31961⤵PID:3972
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
536KB
MD5f609fde531e23ca71335dadfd34673ac
SHA1be09bf51d4ff3cbefb690679c82dd2737e7ea500
SHA256e8523b5138e81de092d64cbbde368e136f5fa68ca5bd1d41cf895203d93d4c2a
SHA5122ad8308ce67dcb49a1ec8f3b8db363fb8ca3730048c393b0cfb853dd95292de580178d22be9993ac93509e5f0b25a8782060d4ce7f52144736be5d44a85f5f4b
-
Filesize
259KB
MD5d05d0b22725d86638a7a64dc7817b5c6
SHA1285273e9c9dc07f132d2b3a603ede14fb875026a
SHA256aeda1f62f47d0f9b81d375957e3aa962eca1076ca272de53d9f28b34df3f5fb2
SHA51236abeb89f17a31e0db217ec9568d908641815af73fb3c9f6e03cc52f4c3e11a57c03c7e0f73f700d784a46c00c7a8a3d0054ebc2075ca7bc182f26c62b4e34a2
-
Filesize
341KB
MD524ffda693b68f50af7b380a6944d0af4
SHA1baf06b0ee245ea502ad7ea24b2de6ef2d1bbf950
SHA25696760d39cb9fd31842983ae7dffadf85fc8830e6dd348ef1cb0f5a4c90461564
SHA51271d877ade607602129dcbd6334eb8286b138f1eccbf5968d1f94b471f20a28bff0e907427ce013eaef70710781450129d073c82df6042ecad9e08aba31868d02