Analysis
-
max time kernel
148s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 14:21
Static task
static1
Behavioral task
behavioral1
Sample
7046a8f88f2627d5ad69dfe079b89f25245168b1fc059fe01c82fb8d36d32546.exe
Resource
win10v2004-20241007-en
General
-
Target
7046a8f88f2627d5ad69dfe079b89f25245168b1fc059fe01c82fb8d36d32546.exe
-
Size
704KB
-
MD5
f861e6a5d0d6a54374c88ec7fd26233a
-
SHA1
85b9bbae9fcf5cebfe5d5e1c89aed8dcf4f74681
-
SHA256
7046a8f88f2627d5ad69dfe079b89f25245168b1fc059fe01c82fb8d36d32546
-
SHA512
337b840ed2b8357609a5024114b173091cb304dfe7962d01ebaec19470ff713ebcc0cf7665694835d25e727e9a894b30e3f8701cdf499eccf7c99cbe392c2ada
-
SSDEEP
12288:ty90IzK6kJATleqwh42IhJS1HqIO6uutJoVCDPdin2Y8c0o9Zv7aDMk:tyPzrkJ6zwFGE1H68i0DFinGcfqf
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/2428-18-0x00000000047E0000-0x00000000047FA000-memory.dmp healer behavioral1/memory/2428-20-0x0000000004DA0000-0x0000000004DB8000-memory.dmp healer behavioral1/memory/2428-38-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer behavioral1/memory/2428-42-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer behavioral1/memory/2428-48-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer behavioral1/memory/2428-46-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer behavioral1/memory/2428-44-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer behavioral1/memory/2428-40-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer behavioral1/memory/2428-36-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer behavioral1/memory/2428-34-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer behavioral1/memory/2428-32-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer behavioral1/memory/2428-30-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer behavioral1/memory/2428-26-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer behavioral1/memory/2428-24-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer behavioral1/memory/2428-23-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer behavioral1/memory/2428-29-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer behavioral1/memory/2428-21-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr481129.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr481129.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr481129.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr481129.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr481129.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr481129.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4336-60-0x0000000004AA0000-0x0000000004ADC000-memory.dmp family_redline behavioral1/memory/4336-61-0x0000000007200000-0x000000000723A000-memory.dmp family_redline behavioral1/memory/4336-63-0x0000000007200000-0x0000000007235000-memory.dmp family_redline behavioral1/memory/4336-77-0x0000000007200000-0x0000000007235000-memory.dmp family_redline behavioral1/memory/4336-93-0x0000000007200000-0x0000000007235000-memory.dmp family_redline behavioral1/memory/4336-95-0x0000000007200000-0x0000000007235000-memory.dmp family_redline behavioral1/memory/4336-91-0x0000000007200000-0x0000000007235000-memory.dmp family_redline behavioral1/memory/4336-89-0x0000000007200000-0x0000000007235000-memory.dmp family_redline behavioral1/memory/4336-87-0x0000000007200000-0x0000000007235000-memory.dmp family_redline behavioral1/memory/4336-86-0x0000000007200000-0x0000000007235000-memory.dmp family_redline behavioral1/memory/4336-83-0x0000000007200000-0x0000000007235000-memory.dmp family_redline behavioral1/memory/4336-81-0x0000000007200000-0x0000000007235000-memory.dmp family_redline behavioral1/memory/4336-79-0x0000000007200000-0x0000000007235000-memory.dmp family_redline behavioral1/memory/4336-75-0x0000000007200000-0x0000000007235000-memory.dmp family_redline behavioral1/memory/4336-73-0x0000000007200000-0x0000000007235000-memory.dmp family_redline behavioral1/memory/4336-70-0x0000000007200000-0x0000000007235000-memory.dmp family_redline behavioral1/memory/4336-67-0x0000000007200000-0x0000000007235000-memory.dmp family_redline behavioral1/memory/4336-65-0x0000000007200000-0x0000000007235000-memory.dmp family_redline behavioral1/memory/4336-72-0x0000000007200000-0x0000000007235000-memory.dmp family_redline behavioral1/memory/4336-62-0x0000000007200000-0x0000000007235000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4892 un063243.exe 2428 pr481129.exe 4336 qu777556.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr481129.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr481129.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7046a8f88f2627d5ad69dfe079b89f25245168b1fc059fe01c82fb8d36d32546.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un063243.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4536 2428 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7046a8f88f2627d5ad69dfe079b89f25245168b1fc059fe01c82fb8d36d32546.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un063243.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr481129.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu777556.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2428 pr481129.exe 2428 pr481129.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2428 pr481129.exe Token: SeDebugPrivilege 4336 qu777556.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1248 wrote to memory of 4892 1248 7046a8f88f2627d5ad69dfe079b89f25245168b1fc059fe01c82fb8d36d32546.exe 86 PID 1248 wrote to memory of 4892 1248 7046a8f88f2627d5ad69dfe079b89f25245168b1fc059fe01c82fb8d36d32546.exe 86 PID 1248 wrote to memory of 4892 1248 7046a8f88f2627d5ad69dfe079b89f25245168b1fc059fe01c82fb8d36d32546.exe 86 PID 4892 wrote to memory of 2428 4892 un063243.exe 88 PID 4892 wrote to memory of 2428 4892 un063243.exe 88 PID 4892 wrote to memory of 2428 4892 un063243.exe 88 PID 4892 wrote to memory of 4336 4892 un063243.exe 101 PID 4892 wrote to memory of 4336 4892 un063243.exe 101 PID 4892 wrote to memory of 4336 4892 un063243.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\7046a8f88f2627d5ad69dfe079b89f25245168b1fc059fe01c82fb8d36d32546.exe"C:\Users\Admin\AppData\Local\Temp\7046a8f88f2627d5ad69dfe079b89f25245168b1fc059fe01c82fb8d36d32546.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un063243.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un063243.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr481129.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr481129.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2428 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 10804⤵
- Program crash
PID:4536
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu777556.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu777556.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4336
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2428 -ip 24281⤵PID:2536
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
550KB
MD5b9923c6ed64d5572cb5710c49dc4d4ea
SHA138c94b151d6b490cee8e7164ab6b4ab74917e82c
SHA256db82e725af565364917f6914b7fcade80d9bf32416c9e90f86d47e941124ea42
SHA512ada8d7e911be8e00cb965144ce4e72c65c732fc9100b191a2655784b92b2377eedbef88e682c57cba68554019741a03a9843aaa16ec6cf2aff360963762ae9e3
-
Filesize
299KB
MD58d4be682b3c233e1240c7d909c97c1b3
SHA14dda18d86cd0477674f11779b875e1a37102c1c5
SHA2562a65cc161f76ba3c0fd60bad3ef91b156d20056be129733f3cd202ed0b0cb0f2
SHA5121369cdd1e8f441487d6ba6a4b0fce8ff9ba48026620f1e9673acd62c31119e5b94ed7829b3f0d26887de8b61745faf5c08b75e2c7ade7290da47c05049a3534a
-
Filesize
382KB
MD5351486e795d445df8d41ab0ecff5a0c6
SHA1fb406eb41d226220ec8dcaaf7b4dd4382c7f2b99
SHA256650e6668ded220b2bafa44b9088afb745c4ec1cbcb1442a035bd5812c31be33a
SHA512d746d856f52ac9fac8a818c9f382ec3171fd0664293def2dcf4f0e59f69dc17690e3b296f266ea54b16c6317e3a0c6387423c3ca2e0397bf8abfeca585dd99ac