Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 22:14
Static task
static1
Behavioral task
behavioral1
Sample
a164baa4ed040fd897cfa3258dccfb6a350d95f07760eb1237e9a75bfd7d227c.exe
Resource
win10v2004-20241007-en
General
-
Target
a164baa4ed040fd897cfa3258dccfb6a350d95f07760eb1237e9a75bfd7d227c.exe
-
Size
691KB
-
MD5
fe3cbc00a4587c42e9758269bf0e0422
-
SHA1
7640d8435158e3ec99266163d79fe9729d6eb2da
-
SHA256
a164baa4ed040fd897cfa3258dccfb6a350d95f07760eb1237e9a75bfd7d227c
-
SHA512
716cb4a970eb7e31d458ef5e8688abc00ff6b370e114b1d0a53596c3aab03b758c2235fd64b8d092d9a0cab4e1769f825d3afc4d45d7dce21136786d4c41ef9d
-
SSDEEP
12288:Cy90eOIOMliXYuGOG4izdMkfRkZd2XGtniNnmA1AQa12HF7RD8:CydMMlG3G4KdMGRbNLe14Rg
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/468-19-0x0000000002260000-0x000000000227A000-memory.dmp healer behavioral1/memory/468-21-0x0000000002600000-0x0000000002618000-memory.dmp healer behavioral1/memory/468-23-0x0000000002600000-0x0000000002613000-memory.dmp healer behavioral1/memory/468-49-0x0000000002600000-0x0000000002613000-memory.dmp healer behavioral1/memory/468-47-0x0000000002600000-0x0000000002613000-memory.dmp healer behavioral1/memory/468-45-0x0000000002600000-0x0000000002613000-memory.dmp healer behavioral1/memory/468-43-0x0000000002600000-0x0000000002613000-memory.dmp healer behavioral1/memory/468-41-0x0000000002600000-0x0000000002613000-memory.dmp healer behavioral1/memory/468-39-0x0000000002600000-0x0000000002613000-memory.dmp healer behavioral1/memory/468-37-0x0000000002600000-0x0000000002613000-memory.dmp healer behavioral1/memory/468-36-0x0000000002600000-0x0000000002613000-memory.dmp healer behavioral1/memory/468-33-0x0000000002600000-0x0000000002613000-memory.dmp healer behavioral1/memory/468-31-0x0000000002600000-0x0000000002613000-memory.dmp healer behavioral1/memory/468-29-0x0000000002600000-0x0000000002613000-memory.dmp healer behavioral1/memory/468-27-0x0000000002600000-0x0000000002613000-memory.dmp healer behavioral1/memory/468-25-0x0000000002600000-0x0000000002613000-memory.dmp healer behavioral1/memory/468-22-0x0000000002600000-0x0000000002613000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 26101701.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 26101701.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 26101701.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 26101701.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 26101701.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 26101701.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4980-61-0x00000000049F0000-0x0000000004A2C000-memory.dmp family_redline behavioral1/memory/4980-62-0x0000000004A70000-0x0000000004AAA000-memory.dmp family_redline behavioral1/memory/4980-88-0x0000000004A70000-0x0000000004AA5000-memory.dmp family_redline behavioral1/memory/4980-86-0x0000000004A70000-0x0000000004AA5000-memory.dmp family_redline behavioral1/memory/4980-96-0x0000000004A70000-0x0000000004AA5000-memory.dmp family_redline behavioral1/memory/4980-94-0x0000000004A70000-0x0000000004AA5000-memory.dmp family_redline behavioral1/memory/4980-92-0x0000000004A70000-0x0000000004AA5000-memory.dmp family_redline behavioral1/memory/4980-90-0x0000000004A70000-0x0000000004AA5000-memory.dmp family_redline behavioral1/memory/4980-84-0x0000000004A70000-0x0000000004AA5000-memory.dmp family_redline behavioral1/memory/4980-82-0x0000000004A70000-0x0000000004AA5000-memory.dmp family_redline behavioral1/memory/4980-81-0x0000000004A70000-0x0000000004AA5000-memory.dmp family_redline behavioral1/memory/4980-78-0x0000000004A70000-0x0000000004AA5000-memory.dmp family_redline behavioral1/memory/4980-76-0x0000000004A70000-0x0000000004AA5000-memory.dmp family_redline behavioral1/memory/4980-74-0x0000000004A70000-0x0000000004AA5000-memory.dmp family_redline behavioral1/memory/4980-72-0x0000000004A70000-0x0000000004AA5000-memory.dmp family_redline behavioral1/memory/4980-70-0x0000000004A70000-0x0000000004AA5000-memory.dmp family_redline behavioral1/memory/4980-68-0x0000000004A70000-0x0000000004AA5000-memory.dmp family_redline behavioral1/memory/4980-66-0x0000000004A70000-0x0000000004AA5000-memory.dmp family_redline behavioral1/memory/4980-64-0x0000000004A70000-0x0000000004AA5000-memory.dmp family_redline behavioral1/memory/4980-63-0x0000000004A70000-0x0000000004AA5000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 1144 un333610.exe 468 26101701.exe 4980 rk011981.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 26101701.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 26101701.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a164baa4ed040fd897cfa3258dccfb6a350d95f07760eb1237e9a75bfd7d227c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un333610.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 392 468 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a164baa4ed040fd897cfa3258dccfb6a350d95f07760eb1237e9a75bfd7d227c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un333610.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 26101701.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rk011981.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 468 26101701.exe 468 26101701.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 468 26101701.exe Token: SeDebugPrivilege 4980 rk011981.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1160 wrote to memory of 1144 1160 a164baa4ed040fd897cfa3258dccfb6a350d95f07760eb1237e9a75bfd7d227c.exe 85 PID 1160 wrote to memory of 1144 1160 a164baa4ed040fd897cfa3258dccfb6a350d95f07760eb1237e9a75bfd7d227c.exe 85 PID 1160 wrote to memory of 1144 1160 a164baa4ed040fd897cfa3258dccfb6a350d95f07760eb1237e9a75bfd7d227c.exe 85 PID 1144 wrote to memory of 468 1144 un333610.exe 86 PID 1144 wrote to memory of 468 1144 un333610.exe 86 PID 1144 wrote to memory of 468 1144 un333610.exe 86 PID 1144 wrote to memory of 4980 1144 un333610.exe 96 PID 1144 wrote to memory of 4980 1144 un333610.exe 96 PID 1144 wrote to memory of 4980 1144 un333610.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\a164baa4ed040fd897cfa3258dccfb6a350d95f07760eb1237e9a75bfd7d227c.exe"C:\Users\Admin\AppData\Local\Temp\a164baa4ed040fd897cfa3258dccfb6a350d95f07760eb1237e9a75bfd7d227c.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un333610.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un333610.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\26101701.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\26101701.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:468 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 468 -s 10804⤵
- Program crash
PID:392
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk011981.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk011981.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4980
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 468 -ip 4681⤵PID:792
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
536KB
MD5a927debbdc95b18219c0a8f8e01e89b9
SHA12a64a8e797a64d36091fc0585d279e761df0247a
SHA256e4370a1d76867b702a961cd55dd95abc65de6863344aecba854f3478663d277c
SHA5122c5207d59b6d4f8b43c3d64f0a8b9c97b2e2255e131c59515257fd420432b7c8a43849229460b06ba2f512357d6fcec1db046e313423c87f6d34110145cd43e4
-
Filesize
258KB
MD564ae2b6f52c2e5bab74634af65db9aad
SHA122e1bf8b4db3402c7cac6dc37e6e0566ef2b15b2
SHA2565c25f3cee73b931a60427e4339beab39faa98b4329376aa89273dceb19c7b013
SHA512b95a6b6416cb90cfaa6e6b885a487be05fe6e786f84ebf1c44f771b25b0e9996e38578508090e3da23c16e185fffc9da8f2fe8f3ab3642b67c9a1c9976519912
-
Filesize
341KB
MD5216b10720dc41c8ef13818fea515509c
SHA177c8abae205e319bf7cb227669f674a20d7e3595
SHA2566a0a8f7c45a7dc237acfad1535074627a2f7323db65297c190a210a7b70178a3
SHA5124d03d89b0880c09bd2ef295c4f3786d0a69c15d5772807b4ea01144aadb47ed9a8902170e394c7fad6eff1698a5a5ac64bf0feb05121db9cd25acc48a1b2a13e