Analysis Overview
SHA256
e345b7468c940e397bb9105abd46885c50d020a375850365befb9ccf9fb94b0a
Threat Level: Known bad
The file e345b7468c940e397bb9105abd46885c50d020a375850365befb9ccf9fb94b0a was found to be: Known bad.
Malicious Activity Summary
Healer family
Redline family
RedLine payload
Detects Healer an antivirus disabler dropper
Modifies Windows Defender Real-time Protection settings
Healer
RedLine
Executes dropped EXE
Checks computer location settings
Windows security modification
Adds Run key to start application
Unsigned PE
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Program crash
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-11-07 02:57
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-11-07 02:57
Reported
2024-11-07 03:00
Platform
win10v2004-20241007-en
Max time kernel
150s
Max time network
151s
Command Line
Signatures
Detects Healer an antivirus disabler dropper
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Healer
Healer family
Modifies Windows Defender Real-time Protection settings
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" | C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr581028.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" | C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr581028.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" | C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr581028.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection | C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr581028.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" | C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr581028.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" | C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr581028.exe | N/A |
RedLine
RedLine payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Redline family
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku913689.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zidt0748.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr581028.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku913689.exe | N/A |
| N/A | N/A | C:\Windows\Temp\1.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr576034.exe | N/A |
Windows security modification
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" | C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr581028.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" | C:\Users\Admin\AppData\Local\Temp\e345b7468c940e397bb9105abd46885c50d020a375850365befb9ccf9fb94b0a.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" | C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zidt0748.exe | N/A |
Enumerates physical storage devices
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku913689.exe |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\Temp\1.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr576034.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\e345b7468c940e397bb9105abd46885c50d020a375850365befb9ccf9fb94b0a.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zidt0748.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku913689.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr581028.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr581028.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr581028.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku913689.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\e345b7468c940e397bb9105abd46885c50d020a375850365befb9ccf9fb94b0a.exe
"C:\Users\Admin\AppData\Local\Temp\e345b7468c940e397bb9105abd46885c50d020a375850365befb9ccf9fb94b0a.exe"
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zidt0748.exe
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zidt0748.exe
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr581028.exe
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr581028.exe
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku913689.exe
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku913689.exe
C:\Windows\Temp\1.exe
"C:\Windows\Temp\1.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 796 -ip 796
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 796 -s 1068
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr576034.exe
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr576034.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 97.17.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 83.210.23.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 75.159.190.20.in-addr.arpa | udp |
| FI | 77.91.124.145:4125 | tcp | |
| FI | 77.91.124.145:4125 | tcp | |
| US | 8.8.8.8:53 | 196.249.167.52.in-addr.arpa | udp |
| FI | 77.91.124.145:4125 | tcp | |
| FI | 77.91.124.145:4125 | tcp | |
| US | 8.8.8.8:53 | 101.209.201.84.in-addr.arpa | udp |
| FI | 77.91.124.145:4125 | tcp | |
| FI | 77.91.124.145:4125 | tcp | |
| FI | 77.91.124.145:4125 | tcp | |
| FI | 77.91.124.145:4125 | tcp | |
| US | 8.8.8.8:53 | 23.236.111.52.in-addr.arpa | udp |
| FI | 77.91.124.145:4125 | tcp | |
| FI | 77.91.124.145:4125 | tcp | |
| FI | 77.91.124.145:4125 | tcp | |
| FI | 77.91.124.145:4125 | tcp | |
| US | 8.8.8.8:53 | 16.173.189.20.in-addr.arpa | udp |
Files
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zidt0748.exe
| MD5 | 41c5efe5b16dec19535dede861dda653 |
| SHA1 | 7d751a7c5c7a47fe949006f95580e785f6c644f6 |
| SHA256 | 09a53ad21b7bfabc44de11d92897b4e294918522d520b304a7e17ab78e88c495 |
| SHA512 | fcdabc05f854109efd98ef223bd610dd42c4ab5267bae16e68c20217d2439f38703873d77c2e35555c3de76ac92ce535ac43d2d31b1766050b32f2073ac3bd69 |
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr581028.exe
| MD5 | 96e1e52a06795852497399d49b95a866 |
| SHA1 | a15c9d2dbab6a4e36da35e75883b0c8affb79f65 |
| SHA256 | 1f8dfd710a8a50fb136aec89fbea0e68ea2da43623aae65aaf0c2e2caad066ea |
| SHA512 | da49a41364b5a42eeab6b32b6f696b9d66d20129d95d6473ec2b963a0d768b0b98ec4ed19502553048ae3d68922899bb77547ec70abf99bee61d3e2a29f387c8 |
memory/2952-14-0x00007FFC03C23000-0x00007FFC03C25000-memory.dmp
memory/2952-15-0x0000000000E80000-0x0000000000E8A000-memory.dmp
memory/2952-16-0x00007FFC03C23000-0x00007FFC03C25000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku913689.exe
| MD5 | 9b585e05f4bb8a3bad4028ce1d0c8727 |
| SHA1 | 986358d57f581aa526062bcbdb51b930dda619d2 |
| SHA256 | 506fe9a4bcb56d3e7b8fb0a83f4fc5b19d1a26f45c328db3213937835f73b857 |
| SHA512 | 275d8423cca2977943e633ff8965a5a2c666e48e850a098159ae45b47bcf65d03117f16d80b8d83828af562ac3bf43d14cafab09be471aae8f6db51c6b004f54 |
memory/796-22-0x0000000004C60000-0x0000000004CC6000-memory.dmp
memory/796-23-0x0000000004D50000-0x00000000052F4000-memory.dmp
memory/796-24-0x0000000005300000-0x0000000005366000-memory.dmp
memory/796-28-0x0000000005300000-0x000000000535F000-memory.dmp
memory/796-40-0x0000000005300000-0x000000000535F000-memory.dmp
memory/796-86-0x0000000005300000-0x000000000535F000-memory.dmp
memory/796-84-0x0000000005300000-0x000000000535F000-memory.dmp
memory/796-82-0x0000000005300000-0x000000000535F000-memory.dmp
memory/796-80-0x0000000005300000-0x000000000535F000-memory.dmp
memory/796-78-0x0000000005300000-0x000000000535F000-memory.dmp
memory/796-76-0x0000000005300000-0x000000000535F000-memory.dmp
memory/796-74-0x0000000005300000-0x000000000535F000-memory.dmp
memory/796-72-0x0000000005300000-0x000000000535F000-memory.dmp
memory/796-70-0x0000000005300000-0x000000000535F000-memory.dmp
memory/796-68-0x0000000005300000-0x000000000535F000-memory.dmp
memory/796-64-0x0000000005300000-0x000000000535F000-memory.dmp
memory/796-62-0x0000000005300000-0x000000000535F000-memory.dmp
memory/796-60-0x0000000005300000-0x000000000535F000-memory.dmp
memory/796-58-0x0000000005300000-0x000000000535F000-memory.dmp
memory/796-56-0x0000000005300000-0x000000000535F000-memory.dmp
memory/796-54-0x0000000005300000-0x000000000535F000-memory.dmp
memory/796-52-0x0000000005300000-0x000000000535F000-memory.dmp
memory/796-48-0x0000000005300000-0x000000000535F000-memory.dmp
memory/796-46-0x0000000005300000-0x000000000535F000-memory.dmp
memory/796-44-0x0000000005300000-0x000000000535F000-memory.dmp
memory/796-42-0x0000000005300000-0x000000000535F000-memory.dmp
memory/796-38-0x0000000005300000-0x000000000535F000-memory.dmp
memory/796-36-0x0000000005300000-0x000000000535F000-memory.dmp
memory/796-34-0x0000000005300000-0x000000000535F000-memory.dmp
memory/796-32-0x0000000005300000-0x000000000535F000-memory.dmp
memory/796-30-0x0000000005300000-0x000000000535F000-memory.dmp
memory/796-88-0x0000000005300000-0x000000000535F000-memory.dmp
memory/796-66-0x0000000005300000-0x000000000535F000-memory.dmp
memory/796-50-0x0000000005300000-0x000000000535F000-memory.dmp
memory/796-26-0x0000000005300000-0x000000000535F000-memory.dmp
memory/796-25-0x0000000005300000-0x000000000535F000-memory.dmp
memory/796-2105-0x0000000005540000-0x0000000005572000-memory.dmp
C:\Windows\Temp\1.exe
| MD5 | 1073b2e7f778788852d3f7bb79929882 |
| SHA1 | 7f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4 |
| SHA256 | c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb |
| SHA512 | 90cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0 |
memory/6060-2118-0x0000000000570000-0x00000000005A0000-memory.dmp
memory/6060-2119-0x0000000004D10000-0x0000000004D16000-memory.dmp
memory/6060-2120-0x00000000054A0000-0x0000000005AB8000-memory.dmp
memory/6060-2121-0x0000000004FC0000-0x00000000050CA000-memory.dmp
memory/6060-2122-0x0000000004EF0000-0x0000000004F02000-memory.dmp
memory/6060-2123-0x0000000004F50000-0x0000000004F8C000-memory.dmp
memory/6060-2124-0x00000000050D0000-0x000000000511C000-memory.dmp
memory/5584-2129-0x0000000000CB0000-0x0000000000CE0000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr576034.exe
| MD5 | 9ac173b6775de8e659df06165d5d1c7b |
| SHA1 | 0d15f33daf8b8ef6213a6539e4b9adea7e3ace96 |
| SHA256 | ab9c4616f58c3a0950fa05faedb8b3b5f511f43a39971c2cc2852df7403e7051 |
| SHA512 | c4478fef7a7d13ab149e9f3b24b02416c7bd29be3c2af6767aa2ca37aeda88781bae1a2226ef2f2c20704942c4eef2854117944752414cef8f993ddc416e7089 |
memory/5584-2130-0x0000000002D20000-0x0000000002D26000-memory.dmp