Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 14:16
Static task
static1
Behavioral task
behavioral1
Sample
8b184c236fd99e49677da43a93a5695509731d61fc15ebde9731c717544af2db.exe
Resource
win10v2004-20241007-en
General
-
Target
8b184c236fd99e49677da43a93a5695509731d61fc15ebde9731c717544af2db.exe
-
Size
706KB
-
MD5
b7d8018d953c487d4d79a64e4223abef
-
SHA1
d8e7781353e837444c733dc4952fafc783b8013d
-
SHA256
8b184c236fd99e49677da43a93a5695509731d61fc15ebde9731c717544af2db
-
SHA512
184e9622cbc8baf75f0d987ece75bf10d8e37f1219cd976fa4b67d2e70e4eeb082bdc202c6794100737a903e11d77e7bf16ba5aaebdd900edebf1a512ba9b426
-
SSDEEP
12288:jy90vItruCxs/F92Uz8jCldIKhAhnlGqsBlYlLLgr4iUHOQ3wEoISAxEHKT:jy2sRxs/FEUzb0RsoyUH3zSGIKT
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/4172-17-0x0000000004AC0000-0x0000000004ADA000-memory.dmp healer behavioral1/memory/4172-19-0x0000000004D00000-0x0000000004D18000-memory.dmp healer behavioral1/memory/4172-48-0x0000000004D00000-0x0000000004D12000-memory.dmp healer behavioral1/memory/4172-46-0x0000000004D00000-0x0000000004D12000-memory.dmp healer behavioral1/memory/4172-44-0x0000000004D00000-0x0000000004D12000-memory.dmp healer behavioral1/memory/4172-42-0x0000000004D00000-0x0000000004D12000-memory.dmp healer behavioral1/memory/4172-40-0x0000000004D00000-0x0000000004D12000-memory.dmp healer behavioral1/memory/4172-38-0x0000000004D00000-0x0000000004D12000-memory.dmp healer behavioral1/memory/4172-36-0x0000000004D00000-0x0000000004D12000-memory.dmp healer behavioral1/memory/4172-34-0x0000000004D00000-0x0000000004D12000-memory.dmp healer behavioral1/memory/4172-32-0x0000000004D00000-0x0000000004D12000-memory.dmp healer behavioral1/memory/4172-30-0x0000000004D00000-0x0000000004D12000-memory.dmp healer behavioral1/memory/4172-28-0x0000000004D00000-0x0000000004D12000-memory.dmp healer behavioral1/memory/4172-26-0x0000000004D00000-0x0000000004D12000-memory.dmp healer behavioral1/memory/4172-24-0x0000000004D00000-0x0000000004D12000-memory.dmp healer behavioral1/memory/4172-22-0x0000000004D00000-0x0000000004D12000-memory.dmp healer behavioral1/memory/4172-21-0x0000000004D00000-0x0000000004D12000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr380334.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr380334.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr380334.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr380334.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr380334.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr380334.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3768-60-0x0000000004BE0000-0x0000000004C1C000-memory.dmp family_redline behavioral1/memory/3768-61-0x00000000070D0000-0x000000000710A000-memory.dmp family_redline behavioral1/memory/3768-65-0x00000000070D0000-0x0000000007105000-memory.dmp family_redline behavioral1/memory/3768-77-0x00000000070D0000-0x0000000007105000-memory.dmp family_redline behavioral1/memory/3768-95-0x00000000070D0000-0x0000000007105000-memory.dmp family_redline behavioral1/memory/3768-93-0x00000000070D0000-0x0000000007105000-memory.dmp family_redline behavioral1/memory/3768-91-0x00000000070D0000-0x0000000007105000-memory.dmp family_redline behavioral1/memory/3768-89-0x00000000070D0000-0x0000000007105000-memory.dmp family_redline behavioral1/memory/3768-87-0x00000000070D0000-0x0000000007105000-memory.dmp family_redline behavioral1/memory/3768-85-0x00000000070D0000-0x0000000007105000-memory.dmp family_redline behavioral1/memory/3768-83-0x00000000070D0000-0x0000000007105000-memory.dmp family_redline behavioral1/memory/3768-79-0x00000000070D0000-0x0000000007105000-memory.dmp family_redline behavioral1/memory/3768-75-0x00000000070D0000-0x0000000007105000-memory.dmp family_redline behavioral1/memory/3768-71-0x00000000070D0000-0x0000000007105000-memory.dmp family_redline behavioral1/memory/3768-69-0x00000000070D0000-0x0000000007105000-memory.dmp family_redline behavioral1/memory/3768-67-0x00000000070D0000-0x0000000007105000-memory.dmp family_redline behavioral1/memory/3768-81-0x00000000070D0000-0x0000000007105000-memory.dmp family_redline behavioral1/memory/3768-73-0x00000000070D0000-0x0000000007105000-memory.dmp family_redline behavioral1/memory/3768-63-0x00000000070D0000-0x0000000007105000-memory.dmp family_redline behavioral1/memory/3768-62-0x00000000070D0000-0x0000000007105000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3360 un182241.exe 4172 pr380334.exe 3768 qu505034.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr380334.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr380334.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8b184c236fd99e49677da43a93a5695509731d61fc15ebde9731c717544af2db.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un182241.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3956 4172 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8b184c236fd99e49677da43a93a5695509731d61fc15ebde9731c717544af2db.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un182241.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr380334.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu505034.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4172 pr380334.exe 4172 pr380334.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4172 pr380334.exe Token: SeDebugPrivilege 3768 qu505034.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1052 wrote to memory of 3360 1052 8b184c236fd99e49677da43a93a5695509731d61fc15ebde9731c717544af2db.exe 84 PID 1052 wrote to memory of 3360 1052 8b184c236fd99e49677da43a93a5695509731d61fc15ebde9731c717544af2db.exe 84 PID 1052 wrote to memory of 3360 1052 8b184c236fd99e49677da43a93a5695509731d61fc15ebde9731c717544af2db.exe 84 PID 3360 wrote to memory of 4172 3360 un182241.exe 85 PID 3360 wrote to memory of 4172 3360 un182241.exe 85 PID 3360 wrote to memory of 4172 3360 un182241.exe 85 PID 3360 wrote to memory of 3768 3360 un182241.exe 101 PID 3360 wrote to memory of 3768 3360 un182241.exe 101 PID 3360 wrote to memory of 3768 3360 un182241.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b184c236fd99e49677da43a93a5695509731d61fc15ebde9731c717544af2db.exe"C:\Users\Admin\AppData\Local\Temp\8b184c236fd99e49677da43a93a5695509731d61fc15ebde9731c717544af2db.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un182241.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un182241.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr380334.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr380334.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4172 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4172 -s 10804⤵
- Program crash
PID:3956
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu505034.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu505034.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3768
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4172 -ip 41721⤵PID:2712
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
552KB
MD5edb0202b5fbba7956d90ed43b2b86938
SHA1ca85a17fe1ff0e253c9d3f5afb25384280e723a5
SHA256afa68c38672c2949851e6d2ba5a8b2199c04d694511cf411ccc2161778e6720b
SHA5121e3a56b6d544e2bc38490beba674b712468c2c6c83cc888b44ba08adc94dc424c4e82ca549ada808c1b16e37dae164617d8281c7a150a508d6a945ae763f4e66
-
Filesize
299KB
MD58e2a5cd0d725b2fc7f0fbcad278ff26b
SHA15ffdb011d366f74ef0e517e45cfbe220e629d30b
SHA256de2b6824a1a07fa5dcf2cfaa2a0fdedf12c9908a0c487ffd84445a14c214506f
SHA512c90871b440b968d15dce8aa2d2bc851332015093997fcda67d88f3375eea0d77b53ac452285338a58ff2f2115de5b579b769b012abf3504db8bf1eb9aa00e7d0
-
Filesize
381KB
MD50a671d909ebbba4ddda8360525e79f03
SHA18db12e8b5e079cb0b2ca864ab3639379df2d0d46
SHA25637564a98c7c524addd1920f1bb376a0c4c6f846e19b6d3f5605e346ec1ec4be7
SHA51262188dd904d0bc061712479e4b9cffdb22f82f379defa01193421866cbea33230be193ef73d4b42204d06201dd29200d2a0e99c7854f51eab372fd589f90f6c1