Analysis Overview
SHA256
27cf3cf0d1d34cc9df5c5dd63eb8a0e4dd48b60f39b9ba33b4cb4a0c6fb9d0ca
Threat Level: Known bad
The file 27cf3cf0d1d34cc9df5c5dd63eb8a0e4dd48b60f39b9ba33b4cb4a0c6fb9d0ca was found to be: Known bad.
Malicious Activity Summary
Healer
RedLine
Healer family
Redline family
Modifies Windows Defender Real-time Protection settings
RedLine payload
Detects Healer an antivirus disabler dropper
Windows security modification
Executes dropped EXE
Adds Run key to start application
Unsigned PE
System Location Discovery: System Language Discovery
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-11-09 19:16
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-11-09 19:16
Reported
2024-11-09 19:18
Platform
win10v2004-20241007-en
Max time kernel
148s
Max time network
150s
Command Line
Signatures
Detects Healer an antivirus disabler dropper
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Healer
Healer family
Modifies Windows Defender Real-time Protection settings
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection | C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a7464081.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" | C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a7464081.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" | C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a7464081.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" | C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a7464081.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" | C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a7464081.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" | C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a7464081.exe | N/A |
RedLine
RedLine payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Redline family
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9829224.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a7464081.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b7349453.exe | N/A |
Windows security modification
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features | C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a7464081.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" | C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a7464081.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" | C:\Users\Admin\AppData\Local\Temp\27cf3cf0d1d34cc9df5c5dd63eb8a0e4dd48b60f39b9ba33b4cb4a0c6fb9d0ca.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" | C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9829224.exe | N/A |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\27cf3cf0d1d34cc9df5c5dd63eb8a0e4dd48b60f39b9ba33b4cb4a0c6fb9d0ca.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9829224.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a7464081.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b7349453.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a7464081.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a7464081.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a7464081.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\27cf3cf0d1d34cc9df5c5dd63eb8a0e4dd48b60f39b9ba33b4cb4a0c6fb9d0ca.exe
"C:\Users\Admin\AppData\Local\Temp\27cf3cf0d1d34cc9df5c5dd63eb8a0e4dd48b60f39b9ba33b4cb4a0c6fb9d0ca.exe"
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9829224.exe
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9829224.exe
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a7464081.exe
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a7464081.exe
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b7349453.exe
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b7349453.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 104.219.191.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 68.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| CY | 217.196.96.101:4132 | tcp | |
| US | 8.8.8.8:53 | 228.249.119.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 53.210.109.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.31.95.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 98.117.19.2.in-addr.arpa | udp |
| CY | 217.196.96.101:4132 | tcp | |
| US | 8.8.8.8:53 | 83.210.23.2.in-addr.arpa | udp |
| CY | 217.196.96.101:4132 | tcp | |
| CY | 217.196.96.101:4132 | tcp | |
| US | 8.8.8.8:53 | 22.236.111.52.in-addr.arpa | udp |
| CY | 217.196.96.101:4132 | tcp | |
| CY | 217.196.96.101:4132 | tcp |
Files
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9829224.exe
| MD5 | fee75afe7ae5e52c69896233b4253eef |
| SHA1 | f9c74f84ceef0b467d91018db4261dd0f35a98a7 |
| SHA256 | 86a2465e3b850731242d53feeadfbf775a16daa46d5d1b59ad86c452dfa4295a |
| SHA512 | 155e899e579676e9ac4ed70f048cf61caf042ddd409fa11d14141c982b12a4a6a1b2a91b5469fa838b9093c70edb93a2c97dda6d8adb2de42c50f6e9975a9e9c |
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a7464081.exe
| MD5 | 85fce7e808f9f4d0cace7537f3990d8a |
| SHA1 | 5c0a66e370e473beca270a60fcb4a64e7c7af483 |
| SHA256 | c53c6d6b01452a36410b0b5a65419c03700898fb0076981656a7934c0c167ac6 |
| SHA512 | 0dd8457ff53e99be5deaba6d75f8601595e8fc6f42ca08055daf8bf152c13d9e75328cd676490678bf995f164a7693996e6f12871511e1ffddab686e2a8f8b95 |
memory/2948-14-0x000000007421E000-0x000000007421F000-memory.dmp
memory/2948-15-0x00000000022B0000-0x00000000022CA000-memory.dmp
memory/2948-17-0x00000000049A0000-0x0000000004F44000-memory.dmp
memory/2948-16-0x0000000074210000-0x00000000749C0000-memory.dmp
memory/2948-19-0x0000000074210000-0x00000000749C0000-memory.dmp
memory/2948-18-0x00000000024B0000-0x00000000024C8000-memory.dmp
memory/2948-20-0x0000000074210000-0x00000000749C0000-memory.dmp
memory/2948-30-0x00000000024B0000-0x00000000024C2000-memory.dmp
memory/2948-38-0x00000000024B0000-0x00000000024C2000-memory.dmp
memory/2948-48-0x00000000024B0000-0x00000000024C2000-memory.dmp
memory/2948-46-0x00000000024B0000-0x00000000024C2000-memory.dmp
memory/2948-44-0x00000000024B0000-0x00000000024C2000-memory.dmp
memory/2948-42-0x00000000024B0000-0x00000000024C2000-memory.dmp
memory/2948-40-0x00000000024B0000-0x00000000024C2000-memory.dmp
memory/2948-36-0x00000000024B0000-0x00000000024C2000-memory.dmp
memory/2948-34-0x00000000024B0000-0x00000000024C2000-memory.dmp
memory/2948-32-0x00000000024B0000-0x00000000024C2000-memory.dmp
memory/2948-28-0x00000000024B0000-0x00000000024C2000-memory.dmp
memory/2948-26-0x00000000024B0000-0x00000000024C2000-memory.dmp
memory/2948-24-0x00000000024B0000-0x00000000024C2000-memory.dmp
memory/2948-21-0x00000000024B0000-0x00000000024C2000-memory.dmp
memory/2948-22-0x00000000024B0000-0x00000000024C2000-memory.dmp
memory/2948-49-0x000000007421E000-0x000000007421F000-memory.dmp
memory/2948-50-0x0000000074210000-0x00000000749C0000-memory.dmp
memory/2948-52-0x0000000074210000-0x00000000749C0000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b7349453.exe
| MD5 | 91f424ee7e05e87d57a7dcd83e1a9358 |
| SHA1 | e45b6e0fc5b51020fb1ddf14121e11c643478b4e |
| SHA256 | d0fb1780f8072834a6d223e44b84c683c7543642bf1ba47cde4c5e9f1690438b |
| SHA512 | d11e231e4a25edc1889e3662cf66651e018424cb30bb37fc5db1b8ed457a4150d5108d38160d4c6b544964232e9f4fd8c9c30fba7281cdc0ebb175fba008f628 |
memory/2876-56-0x00000000002D0000-0x0000000000300000-memory.dmp
memory/2876-57-0x00000000023D0000-0x00000000023D6000-memory.dmp
memory/2876-58-0x00000000052E0000-0x00000000058F8000-memory.dmp
memory/2876-59-0x0000000004DD0000-0x0000000004EDA000-memory.dmp
memory/2876-60-0x0000000004C40000-0x0000000004C52000-memory.dmp
memory/2876-61-0x0000000004CC0000-0x0000000004CFC000-memory.dmp
memory/2876-62-0x0000000004D00000-0x0000000004D4C000-memory.dmp