Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 14:18
Static task
static1
Behavioral task
behavioral1
Sample
747ce822c71b5b4e2cb112ee2c9a40d6542511193e89552d34632ca97a4cf817.exe
Resource
win10v2004-20241007-en
General
-
Target
747ce822c71b5b4e2cb112ee2c9a40d6542511193e89552d34632ca97a4cf817.exe
-
Size
1.0MB
-
MD5
09933ae4d3b29451129578a2b89e1beb
-
SHA1
101369508cd616c17915e222fd28135c5c66d480
-
SHA256
747ce822c71b5b4e2cb112ee2c9a40d6542511193e89552d34632ca97a4cf817
-
SHA512
6645bca8e84934be5de509e2751a796f1cb56f0eabd2098e8405256d8537bebca54e3590076a7437aeecb3303345ffcb5b6e158fce5fdcfe9649b136cd5c32a8
-
SSDEEP
24576:cy57eiqTH3h7iQt89fsuj8Jy1zBaZKkjibW1UZGM/84RCG:L571qH8DVN88gIbWSZGyTR
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/1508-23-0x0000000002770000-0x000000000278A000-memory.dmp healer behavioral1/memory/1508-25-0x0000000002880000-0x0000000002898000-memory.dmp healer behavioral1/memory/1508-31-0x0000000002880000-0x0000000002892000-memory.dmp healer behavioral1/memory/1508-53-0x0000000002880000-0x0000000002892000-memory.dmp healer behavioral1/memory/1508-51-0x0000000002880000-0x0000000002892000-memory.dmp healer behavioral1/memory/1508-49-0x0000000002880000-0x0000000002892000-memory.dmp healer behavioral1/memory/1508-47-0x0000000002880000-0x0000000002892000-memory.dmp healer behavioral1/memory/1508-45-0x0000000002880000-0x0000000002892000-memory.dmp healer behavioral1/memory/1508-43-0x0000000002880000-0x0000000002892000-memory.dmp healer behavioral1/memory/1508-42-0x0000000002880000-0x0000000002892000-memory.dmp healer behavioral1/memory/1508-39-0x0000000002880000-0x0000000002892000-memory.dmp healer behavioral1/memory/1508-37-0x0000000002880000-0x0000000002892000-memory.dmp healer behavioral1/memory/1508-35-0x0000000002880000-0x0000000002892000-memory.dmp healer behavioral1/memory/1508-33-0x0000000002880000-0x0000000002892000-memory.dmp healer behavioral1/memory/1508-29-0x0000000002880000-0x0000000002892000-memory.dmp healer behavioral1/memory/1508-27-0x0000000002880000-0x0000000002892000-memory.dmp healer behavioral1/memory/1508-26-0x0000000002880000-0x0000000002892000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr348866.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr348866.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr348866.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr348866.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr348866.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr348866.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4656-62-0x00000000025C0000-0x00000000025FC000-memory.dmp family_redline behavioral1/memory/4656-63-0x0000000002A00000-0x0000000002A3A000-memory.dmp family_redline behavioral1/memory/4656-67-0x0000000002A00000-0x0000000002A35000-memory.dmp family_redline behavioral1/memory/4656-65-0x0000000002A00000-0x0000000002A35000-memory.dmp family_redline behavioral1/memory/4656-64-0x0000000002A00000-0x0000000002A35000-memory.dmp family_redline behavioral1/memory/4656-75-0x0000000002A00000-0x0000000002A35000-memory.dmp family_redline behavioral1/memory/4656-97-0x0000000002A00000-0x0000000002A35000-memory.dmp family_redline behavioral1/memory/4656-95-0x0000000002A00000-0x0000000002A35000-memory.dmp family_redline behavioral1/memory/4656-93-0x0000000002A00000-0x0000000002A35000-memory.dmp family_redline behavioral1/memory/4656-91-0x0000000002A00000-0x0000000002A35000-memory.dmp family_redline behavioral1/memory/4656-89-0x0000000002A00000-0x0000000002A35000-memory.dmp family_redline behavioral1/memory/4656-87-0x0000000002A00000-0x0000000002A35000-memory.dmp family_redline behavioral1/memory/4656-85-0x0000000002A00000-0x0000000002A35000-memory.dmp family_redline behavioral1/memory/4656-83-0x0000000002A00000-0x0000000002A35000-memory.dmp family_redline behavioral1/memory/4656-81-0x0000000002A00000-0x0000000002A35000-memory.dmp family_redline behavioral1/memory/4656-79-0x0000000002A00000-0x0000000002A35000-memory.dmp family_redline behavioral1/memory/4656-73-0x0000000002A00000-0x0000000002A35000-memory.dmp family_redline behavioral1/memory/4656-71-0x0000000002A00000-0x0000000002A35000-memory.dmp family_redline behavioral1/memory/4656-69-0x0000000002A00000-0x0000000002A35000-memory.dmp family_redline behavioral1/memory/4656-77-0x0000000002A00000-0x0000000002A35000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 4948 un384239.exe 1568 un239635.exe 1508 pr348866.exe 4656 qu264046.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr348866.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr348866.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 747ce822c71b5b4e2cb112ee2c9a40d6542511193e89552d34632ca97a4cf817.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un384239.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un239635.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4240 1508 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu264046.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 747ce822c71b5b4e2cb112ee2c9a40d6542511193e89552d34632ca97a4cf817.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un384239.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un239635.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr348866.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1508 pr348866.exe 1508 pr348866.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1508 pr348866.exe Token: SeDebugPrivilege 4656 qu264046.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4568 wrote to memory of 4948 4568 747ce822c71b5b4e2cb112ee2c9a40d6542511193e89552d34632ca97a4cf817.exe 84 PID 4568 wrote to memory of 4948 4568 747ce822c71b5b4e2cb112ee2c9a40d6542511193e89552d34632ca97a4cf817.exe 84 PID 4568 wrote to memory of 4948 4568 747ce822c71b5b4e2cb112ee2c9a40d6542511193e89552d34632ca97a4cf817.exe 84 PID 4948 wrote to memory of 1568 4948 un384239.exe 85 PID 4948 wrote to memory of 1568 4948 un384239.exe 85 PID 4948 wrote to memory of 1568 4948 un384239.exe 85 PID 1568 wrote to memory of 1508 1568 un239635.exe 86 PID 1568 wrote to memory of 1508 1568 un239635.exe 86 PID 1568 wrote to memory of 1508 1568 un239635.exe 86 PID 1568 wrote to memory of 4656 1568 un239635.exe 97 PID 1568 wrote to memory of 4656 1568 un239635.exe 97 PID 1568 wrote to memory of 4656 1568 un239635.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\747ce822c71b5b4e2cb112ee2c9a40d6542511193e89552d34632ca97a4cf817.exe"C:\Users\Admin\AppData\Local\Temp\747ce822c71b5b4e2cb112ee2c9a40d6542511193e89552d34632ca97a4cf817.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un384239.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un384239.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un239635.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un239635.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr348866.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr348866.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1508 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1508 -s 10645⤵
- Program crash
PID:4240
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu264046.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu264046.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4656
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1508 -ip 15081⤵PID:1924
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
749KB
MD565619a9a7dcd479f40600e4c1c6f9213
SHA1c9530c9119f9369f22eb345b882f07c1064709da
SHA2560f29bd73fab487eef7bfb07f8e324ed160974f2df24a2252b7c8a1096db4df1c
SHA5121319f7347cb6f9adbda3ce3510f7d9215b3b5e6fbd984824dbf720a33f3fe761048aa33ffc3585f54a4cd90a15969c360f26816ef025c76f7af30d9a07e5d2bc
-
Filesize
595KB
MD56f7a21f4fa2b2b452620073629094880
SHA18f31783e8aa989533a438c51a59795584aacb05b
SHA256c363006d65d0290288131e8bd12bdd9e7ce2b25a9d6596ac342fc37da44a6599
SHA51239596b32d31aa620fada12a1dc081105cb4e809030554b7f51c4e78bce8d9d12c2cefef718d0d8632a2623cd1c0820f16b9314ffcad5085318b12f64ee3b9845
-
Filesize
389KB
MD54c10c67fb991dc35c529a43bf541cbcd
SHA15abc241f4135d341577ec31b5841f004baec9991
SHA2565caa01f3199473691a34d3d737e01013849b6c19673538ddedb95e6ab9bf6a50
SHA512f97ad12f9ef9114715ae2721690ae9decf3a8526f91b67a8fa0e0c1a2b224b2f384eb9694e3652949be563b863ca6c55a7805f986bfc08b17a6f15e53fa5f2fe
-
Filesize
472KB
MD5dbca3f92e1e449f376c9c4204c748518
SHA1809fab2b27a687a1de19de1a4a7d7693c9e96e35
SHA256136be7920ff23ddbd7d4e6444d0f7839bd64bc20879171fedc8022e0fa9f93d6
SHA512fa6e51310d83952cf0ba53509e1808d5022270ccb5ce1e78d3b0be29693820395f33d3843701e284fdb287370e77e5ee22ee6901f79ba3a01df3ed7e016d8d39