Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 22:14
Static task
static1
Behavioral task
behavioral1
Sample
4e84d62ce1f70efefa89d2d2856c5c21741e14699a867480e136195d8b3f84a8.exe
Resource
win10v2004-20241007-en
General
-
Target
4e84d62ce1f70efefa89d2d2856c5c21741e14699a867480e136195d8b3f84a8.exe
-
Size
690KB
-
MD5
f82be58048092286b61b74ebd43a8ba2
-
SHA1
5917accdbc7e2c2f81d1581a817c5395846b2f23
-
SHA256
4e84d62ce1f70efefa89d2d2856c5c21741e14699a867480e136195d8b3f84a8
-
SHA512
29f6ce3052a02f7bf5a756e515895c80cdae83241293fa375bf2b9bd7004c47f00a08a09cadb061c75157e95fdef4e18149b1a235907eceab7af4f90ad69beb2
-
SSDEEP
12288:1y905aXVBRFB+HYARjOZ/czVAzI7O6HBuGDQ39dcdG:1yqalbFKFwcxBuGkSG
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/672-19-0x0000000002520000-0x000000000253A000-memory.dmp healer behavioral1/memory/672-21-0x0000000004A00000-0x0000000004A18000-memory.dmp healer behavioral1/memory/672-25-0x0000000004A00000-0x0000000004A13000-memory.dmp healer behavioral1/memory/672-23-0x0000000004A00000-0x0000000004A13000-memory.dmp healer behavioral1/memory/672-49-0x0000000004A00000-0x0000000004A13000-memory.dmp healer behavioral1/memory/672-47-0x0000000004A00000-0x0000000004A13000-memory.dmp healer behavioral1/memory/672-45-0x0000000004A00000-0x0000000004A13000-memory.dmp healer behavioral1/memory/672-43-0x0000000004A00000-0x0000000004A13000-memory.dmp healer behavioral1/memory/672-41-0x0000000004A00000-0x0000000004A13000-memory.dmp healer behavioral1/memory/672-37-0x0000000004A00000-0x0000000004A13000-memory.dmp healer behavioral1/memory/672-35-0x0000000004A00000-0x0000000004A13000-memory.dmp healer behavioral1/memory/672-33-0x0000000004A00000-0x0000000004A13000-memory.dmp healer behavioral1/memory/672-31-0x0000000004A00000-0x0000000004A13000-memory.dmp healer behavioral1/memory/672-29-0x0000000004A00000-0x0000000004A13000-memory.dmp healer behavioral1/memory/672-27-0x0000000004A00000-0x0000000004A13000-memory.dmp healer behavioral1/memory/672-22-0x0000000004A00000-0x0000000004A13000-memory.dmp healer behavioral1/memory/672-39-0x0000000004A00000-0x0000000004A13000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 51985361.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 51985361.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 51985361.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 51985361.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 51985361.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 51985361.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1256-61-0x00000000049E0000-0x0000000004A1C000-memory.dmp family_redline behavioral1/memory/1256-62-0x0000000004A60000-0x0000000004A9A000-memory.dmp family_redline behavioral1/memory/1256-82-0x0000000004A60000-0x0000000004A95000-memory.dmp family_redline behavioral1/memory/1256-84-0x0000000004A60000-0x0000000004A95000-memory.dmp family_redline behavioral1/memory/1256-96-0x0000000004A60000-0x0000000004A95000-memory.dmp family_redline behavioral1/memory/1256-94-0x0000000004A60000-0x0000000004A95000-memory.dmp family_redline behavioral1/memory/1256-92-0x0000000004A60000-0x0000000004A95000-memory.dmp family_redline behavioral1/memory/1256-90-0x0000000004A60000-0x0000000004A95000-memory.dmp family_redline behavioral1/memory/1256-88-0x0000000004A60000-0x0000000004A95000-memory.dmp family_redline behavioral1/memory/1256-86-0x0000000004A60000-0x0000000004A95000-memory.dmp family_redline behavioral1/memory/1256-80-0x0000000004A60000-0x0000000004A95000-memory.dmp family_redline behavioral1/memory/1256-78-0x0000000004A60000-0x0000000004A95000-memory.dmp family_redline behavioral1/memory/1256-76-0x0000000004A60000-0x0000000004A95000-memory.dmp family_redline behavioral1/memory/1256-74-0x0000000004A60000-0x0000000004A95000-memory.dmp family_redline behavioral1/memory/1256-72-0x0000000004A60000-0x0000000004A95000-memory.dmp family_redline behavioral1/memory/1256-70-0x0000000004A60000-0x0000000004A95000-memory.dmp family_redline behavioral1/memory/1256-68-0x0000000004A60000-0x0000000004A95000-memory.dmp family_redline behavioral1/memory/1256-66-0x0000000004A60000-0x0000000004A95000-memory.dmp family_redline behavioral1/memory/1256-64-0x0000000004A60000-0x0000000004A95000-memory.dmp family_redline behavioral1/memory/1256-63-0x0000000004A60000-0x0000000004A95000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 692 un569502.exe 672 51985361.exe 1256 rk910276.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 51985361.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 51985361.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un569502.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4e84d62ce1f70efefa89d2d2856c5c21741e14699a867480e136195d8b3f84a8.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2136 672 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4e84d62ce1f70efefa89d2d2856c5c21741e14699a867480e136195d8b3f84a8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un569502.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 51985361.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rk910276.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 672 51985361.exe 672 51985361.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 672 51985361.exe Token: SeDebugPrivilege 1256 rk910276.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1312 wrote to memory of 692 1312 4e84d62ce1f70efefa89d2d2856c5c21741e14699a867480e136195d8b3f84a8.exe 83 PID 1312 wrote to memory of 692 1312 4e84d62ce1f70efefa89d2d2856c5c21741e14699a867480e136195d8b3f84a8.exe 83 PID 1312 wrote to memory of 692 1312 4e84d62ce1f70efefa89d2d2856c5c21741e14699a867480e136195d8b3f84a8.exe 83 PID 692 wrote to memory of 672 692 un569502.exe 84 PID 692 wrote to memory of 672 692 un569502.exe 84 PID 692 wrote to memory of 672 692 un569502.exe 84 PID 692 wrote to memory of 1256 692 un569502.exe 100 PID 692 wrote to memory of 1256 692 un569502.exe 100 PID 692 wrote to memory of 1256 692 un569502.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e84d62ce1f70efefa89d2d2856c5c21741e14699a867480e136195d8b3f84a8.exe"C:\Users\Admin\AppData\Local\Temp\4e84d62ce1f70efefa89d2d2856c5c21741e14699a867480e136195d8b3f84a8.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un569502.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un569502.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\51985361.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\51985361.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:672 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 672 -s 10044⤵
- Program crash
PID:2136
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk910276.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk910276.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1256
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 672 -ip 6721⤵PID:636
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
536KB
MD5507315c640250d43d1a9e3489c18f966
SHA162baec854b2eda4281d51cf58eb4309755e1c773
SHA256131c332baa9a9f5d9b4f84d7ce9845a59f03e37bdf7d37a9567ce214cabe8f50
SHA5127b9c092bdf43f2e8a069a6934fa117eacb40fae584ddc3ecfad8d113d98345ceafbaa5c9c2ee52ad1cccad58e9404b277281560a7d5ad8b492963feaaadc66d2
-
Filesize
258KB
MD549578b8f879c8e5e055a5530e7fbaf4d
SHA107ec1d4416545b63b92b0c2b56d4be3ca8d48a1c
SHA256795c0f718c666f13780ae803e5c85fae1d5a6e8dff69eaf346c0dd9b181d6d6f
SHA5125928367c7845e61e5a84480d11bd066abaa9b15d9d6f26b7e5ad49340bc604f8ebadbb3a61ed78091d7a325d139c4faacf69d616ab68b1ec3f2ebedec53fca1f
-
Filesize
342KB
MD54b2451a5f5eadb135f465db40e38524b
SHA108da31eb34fe5aa40d32fa8fa7d6cee58b1314a3
SHA25617fd30c5e87632102f55f5d8fabb6cba6968c3c3f5edde5eb37f968dcf2ef060
SHA51261e8fcb1e6bfe2e62ea8d0f130ecc08fe2dd055e73e87671b8ee110a8a9090696574f8853c0330c7dc302acd21efd24a21754b844e57dba98f132996ab17379c