Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04/11/2024, 14:23
Static task
static1
Behavioral task
behavioral1
Sample
5779ed5f12f033de6f86754e153c98eefece302f45237c5298ef785b05e35d04.exe
Resource
win10v2004-20241007-en
General
-
Target
5779ed5f12f033de6f86754e153c98eefece302f45237c5298ef785b05e35d04.exe
-
Size
705KB
-
MD5
3cde2a632e5134489f1340a33d580205
-
SHA1
822ccedd95a99df86e7a03c2cbc2a98bf3c8515e
-
SHA256
5779ed5f12f033de6f86754e153c98eefece302f45237c5298ef785b05e35d04
-
SHA512
edb8fd25f5e79078bb10e1eb1229f3df3186b0dd48b6c7974cfec3ac09714a45ae80853986c2bce6548e9e4ff28af0b973746aa665083917fe375cc897be9626
-
SSDEEP
12288:+y90sNTiWF9t9tsrxLHjXm0RtMz7tNhPfmF9miCZajLIiZtIxaJ2aqsz:+y/T9t9tqxLHj5RtU7fe9miuaPuM8sz
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/3476-18-0x00000000049D0000-0x00000000049EA000-memory.dmp healer behavioral1/memory/3476-20-0x0000000007160000-0x0000000007178000-memory.dmp healer behavioral1/memory/3476-22-0x0000000007160000-0x0000000007172000-memory.dmp healer behavioral1/memory/3476-21-0x0000000007160000-0x0000000007172000-memory.dmp healer behavioral1/memory/3476-48-0x0000000007160000-0x0000000007172000-memory.dmp healer behavioral1/memory/3476-46-0x0000000007160000-0x0000000007172000-memory.dmp healer behavioral1/memory/3476-44-0x0000000007160000-0x0000000007172000-memory.dmp healer behavioral1/memory/3476-42-0x0000000007160000-0x0000000007172000-memory.dmp healer behavioral1/memory/3476-40-0x0000000007160000-0x0000000007172000-memory.dmp healer behavioral1/memory/3476-38-0x0000000007160000-0x0000000007172000-memory.dmp healer behavioral1/memory/3476-36-0x0000000007160000-0x0000000007172000-memory.dmp healer behavioral1/memory/3476-34-0x0000000007160000-0x0000000007172000-memory.dmp healer behavioral1/memory/3476-32-0x0000000007160000-0x0000000007172000-memory.dmp healer behavioral1/memory/3476-30-0x0000000007160000-0x0000000007172000-memory.dmp healer behavioral1/memory/3476-28-0x0000000007160000-0x0000000007172000-memory.dmp healer behavioral1/memory/3476-26-0x0000000007160000-0x0000000007172000-memory.dmp healer behavioral1/memory/3476-25-0x0000000007160000-0x0000000007172000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr418073.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr418073.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr418073.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr418073.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr418073.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr418073.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3012-60-0x0000000004C00000-0x0000000004C3C000-memory.dmp family_redline behavioral1/memory/3012-61-0x0000000004C80000-0x0000000004CBA000-memory.dmp family_redline behavioral1/memory/3012-62-0x0000000004C80000-0x0000000004CB5000-memory.dmp family_redline behavioral1/memory/3012-69-0x0000000004C80000-0x0000000004CB5000-memory.dmp family_redline behavioral1/memory/3012-85-0x0000000004C80000-0x0000000004CB5000-memory.dmp family_redline behavioral1/memory/3012-93-0x0000000004C80000-0x0000000004CB5000-memory.dmp family_redline behavioral1/memory/3012-95-0x0000000004C80000-0x0000000004CB5000-memory.dmp family_redline behavioral1/memory/3012-91-0x0000000004C80000-0x0000000004CB5000-memory.dmp family_redline behavioral1/memory/3012-89-0x0000000004C80000-0x0000000004CB5000-memory.dmp family_redline behavioral1/memory/3012-87-0x0000000004C80000-0x0000000004CB5000-memory.dmp family_redline behavioral1/memory/3012-83-0x0000000004C80000-0x0000000004CB5000-memory.dmp family_redline behavioral1/memory/3012-82-0x0000000004C80000-0x0000000004CB5000-memory.dmp family_redline behavioral1/memory/3012-79-0x0000000004C80000-0x0000000004CB5000-memory.dmp family_redline behavioral1/memory/3012-77-0x0000000004C80000-0x0000000004CB5000-memory.dmp family_redline behavioral1/memory/3012-75-0x0000000004C80000-0x0000000004CB5000-memory.dmp family_redline behavioral1/memory/3012-73-0x0000000004C80000-0x0000000004CB5000-memory.dmp family_redline behavioral1/memory/3012-67-0x0000000004C80000-0x0000000004CB5000-memory.dmp family_redline behavioral1/memory/3012-65-0x0000000004C80000-0x0000000004CB5000-memory.dmp family_redline behavioral1/memory/3012-63-0x0000000004C80000-0x0000000004CB5000-memory.dmp family_redline behavioral1/memory/3012-71-0x0000000004C80000-0x0000000004CB5000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 1944 un385528.exe 3476 pr418073.exe 3012 qu335584.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr418073.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr418073.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5779ed5f12f033de6f86754e153c98eefece302f45237c5298ef785b05e35d04.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un385528.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4732 3476 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5779ed5f12f033de6f86754e153c98eefece302f45237c5298ef785b05e35d04.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un385528.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr418073.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu335584.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3476 pr418073.exe 3476 pr418073.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3476 pr418073.exe Token: SeDebugPrivilege 3012 qu335584.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2420 wrote to memory of 1944 2420 5779ed5f12f033de6f86754e153c98eefece302f45237c5298ef785b05e35d04.exe 87 PID 2420 wrote to memory of 1944 2420 5779ed5f12f033de6f86754e153c98eefece302f45237c5298ef785b05e35d04.exe 87 PID 2420 wrote to memory of 1944 2420 5779ed5f12f033de6f86754e153c98eefece302f45237c5298ef785b05e35d04.exe 87 PID 1944 wrote to memory of 3476 1944 un385528.exe 88 PID 1944 wrote to memory of 3476 1944 un385528.exe 88 PID 1944 wrote to memory of 3476 1944 un385528.exe 88 PID 1944 wrote to memory of 3012 1944 un385528.exe 96 PID 1944 wrote to memory of 3012 1944 un385528.exe 96 PID 1944 wrote to memory of 3012 1944 un385528.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\5779ed5f12f033de6f86754e153c98eefece302f45237c5298ef785b05e35d04.exe"C:\Users\Admin\AppData\Local\Temp\5779ed5f12f033de6f86754e153c98eefece302f45237c5298ef785b05e35d04.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un385528.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un385528.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr418073.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr418073.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3476 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3476 -s 10364⤵
- Program crash
PID:4732
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu335584.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu335584.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3012
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3476 -ip 34761⤵PID:2052
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
551KB
MD535f72ce7afa300c965498973f4c88ac8
SHA1e176dee98c50cffe2a1938d0c3c2efacbdd439b5
SHA2566994b9f383c3c82d677a63d224be3cbab8a9f12ea1bc20e5676ab97ec24bd3f8
SHA5128c89ee74703f2d6d616c26ac43e58ea66087b384dca7bbc3631096830a9aac7f3e1199552bf021cc116ddb779e92a3d9ff2c25773613581111c738ae6a941a3b
-
Filesize
286KB
MD551d022f6811bd6583707825c3efb6b04
SHA193a932f18605393231cb4488ecfc7a57b89838e0
SHA256594683e2687f9dd7cffad976957c78185ca0419b58ed320b4fcbc3e3c24a2885
SHA51251ffb870450d2a72e2dd5242329a3e9ed2ff7a8b44d108a3b114983478a55db7da347528520f97e2087d17d36f0b88e42bb2e5019981f318c1c9565e95844695
-
Filesize
368KB
MD530935d3055083a96e8c174f4f327ad15
SHA1d018cdf19e0fc3321e684e8a117e6f7a5b401f4d
SHA25604f090137d87c2d7b44069f6141ca29b51798e1357c47e0038ee6e50426a6995
SHA512a3ad00c7fab6233e1d68bae103a032b7a4c5051498b8cb8a325d84a1f8839bd50909f7c4ae9f3a576f946001002101a5784cf6c49704fd57fc745464a4114bb9