Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 22:16
Static task
static1
Behavioral task
behavioral1
Sample
60789b8e53b339aa0c38a30d9d01f09a22e55f0a6b0381a8810683ef2cca36b9.exe
Resource
win10v2004-20241007-en
General
-
Target
60789b8e53b339aa0c38a30d9d01f09a22e55f0a6b0381a8810683ef2cca36b9.exe
-
Size
1.5MB
-
MD5
8bd3e45e5d756925df1cff21f98b458f
-
SHA1
7c01d8e7c80c88db90fa7064dd84aa2d9ce969a7
-
SHA256
60789b8e53b339aa0c38a30d9d01f09a22e55f0a6b0381a8810683ef2cca36b9
-
SHA512
e4083fc6884b56befb90096f41bbaa04b8b308db82ecc84261b0ef4433f84b9cd80a54904c53fb589361b248908c3db68cf6afe73405ee6e70434a7f087f7040
-
SSDEEP
49152:85vxHijNe9nIa0oQSgOQWDKskO+Dyomf9BQHiAEcbr:WvxCjEIa0QQmO7wBaHEcb
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/5040-36-0x00000000024A0000-0x00000000024BA000-memory.dmp healer behavioral1/memory/5040-38-0x0000000002950000-0x0000000002968000-memory.dmp healer behavioral1/memory/5040-56-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/5040-66-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/5040-64-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/5040-62-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/5040-60-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/5040-58-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/5040-54-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/5040-52-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/5040-50-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/5040-48-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/5040-42-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/5040-40-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/5040-46-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/5040-44-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/5040-39-0x0000000002950000-0x0000000002962000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a2667425.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a2667425.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a2667425.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a2667425.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a2667425.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a2667425.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023c92-71.dat family_redline behavioral1/memory/2836-73-0x0000000000910000-0x0000000000938000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 6 IoCs
pid Process 3596 v4563278.exe 3700 v4150712.exe 960 v4457369.exe 5076 v7614674.exe 5040 a2667425.exe 2836 b6861109.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a2667425.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a2667425.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 60789b8e53b339aa0c38a30d9d01f09a22e55f0a6b0381a8810683ef2cca36b9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v4563278.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v4150712.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v4457369.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v7614674.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2716 5040 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v7614674.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a2667425.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b6861109.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 60789b8e53b339aa0c38a30d9d01f09a22e55f0a6b0381a8810683ef2cca36b9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v4563278.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v4150712.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v4457369.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5040 a2667425.exe 5040 a2667425.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5040 a2667425.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4432 wrote to memory of 3596 4432 60789b8e53b339aa0c38a30d9d01f09a22e55f0a6b0381a8810683ef2cca36b9.exe 85 PID 4432 wrote to memory of 3596 4432 60789b8e53b339aa0c38a30d9d01f09a22e55f0a6b0381a8810683ef2cca36b9.exe 85 PID 4432 wrote to memory of 3596 4432 60789b8e53b339aa0c38a30d9d01f09a22e55f0a6b0381a8810683ef2cca36b9.exe 85 PID 3596 wrote to memory of 3700 3596 v4563278.exe 86 PID 3596 wrote to memory of 3700 3596 v4563278.exe 86 PID 3596 wrote to memory of 3700 3596 v4563278.exe 86 PID 3700 wrote to memory of 960 3700 v4150712.exe 87 PID 3700 wrote to memory of 960 3700 v4150712.exe 87 PID 3700 wrote to memory of 960 3700 v4150712.exe 87 PID 960 wrote to memory of 5076 960 v4457369.exe 88 PID 960 wrote to memory of 5076 960 v4457369.exe 88 PID 960 wrote to memory of 5076 960 v4457369.exe 88 PID 5076 wrote to memory of 5040 5076 v7614674.exe 90 PID 5076 wrote to memory of 5040 5076 v7614674.exe 90 PID 5076 wrote to memory of 5040 5076 v7614674.exe 90 PID 5076 wrote to memory of 2836 5076 v7614674.exe 101 PID 5076 wrote to memory of 2836 5076 v7614674.exe 101 PID 5076 wrote to memory of 2836 5076 v7614674.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\60789b8e53b339aa0c38a30d9d01f09a22e55f0a6b0381a8810683ef2cca36b9.exe"C:\Users\Admin\AppData\Local\Temp\60789b8e53b339aa0c38a30d9d01f09a22e55f0a6b0381a8810683ef2cca36b9.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4563278.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4563278.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4150712.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4150712.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4457369.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4457369.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7614674.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7614674.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a2667425.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a2667425.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5040 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5040 -s 10287⤵
- Program crash
PID:2716
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b6861109.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b6861109.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2836
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 5040 -ip 50401⤵PID:4984
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD56616f4aa58af65f4da7d2efedf0df329
SHA1e43cd2f0c45cd85268bcf693aa3dc5d5c1b356ee
SHA25695e8471394951496914a70ad9da076ccda558e521711b08cece73e93646f4a1f
SHA51225f073e7f226697f4c8fc6834118c1010c72a731b3adfac24d0572c28b1bada7ff234979b00ce728843604ba1d208b6f96b795416ae2c1fc3824fd171d4124d7
-
Filesize
914KB
MD5ff122de8d16d4647b348c83d18b3fc3f
SHA1fadeb739f2a11803ccfea745721ebb586f684d6a
SHA256432b5f32c78d7291f68b260b5ac735d27ac13b809126932365d37b4709dfde30
SHA5124e23f84b53f69e76c1de729727333026a2fb02877f11d9632595df2c5a81e80cc037716db3b9b795f10389e2e179665525e7be3fc25525fce3a027e7feafd7f0
-
Filesize
710KB
MD5a4ac8c42788cadbcbdcd52850d7f3565
SHA1d80be2dda0017abef73e28a99f47845802f50a40
SHA256212f1db4d658ef121bd94ed0770d2b59eb6a5b1ad7b2fbc10d7324e450f18a0c
SHA51276789cbd5c1e717d360f4f91f59bfaabcffc1c4a6b23ea67f1dc3504dfc97bb3b32d38a4f144198e2ec710e87ba58706d1f6aad1b1d9f431bf65f73496d63319
-
Filesize
418KB
MD5d81cf273f4239f7653b6b6d7e6b8ca96
SHA1fbcaec4b7b85627dc1b5ab3930346eea618b6989
SHA25602a4616b31b4bf2bccafd1232a6a6ac59198d6c4f445a2e8655a044417d82111
SHA512328aaf70655dc4194227447badee0f9ecc946046786293b6d8cd581c61b8ff1ffb237cd528b3923e084fad13036520b25f08786d40a2b70ae945913d5f48a1cb
-
Filesize
361KB
MD59c27e3ff7d4ded70db2764c632ce3182
SHA1730f15c692e13daea8273f7baf641ed41dc7baab
SHA25603b68e43345cacc394eb8112707d7d34fd9fb235d4099d5c5b6903cc67122dc7
SHA5124f7554c78b801b7e1d0dc9616e53c9040e1173d4dd8f745bc00c8c8f3b6153d9f51c2e41db9ea062d96817beeb76568182d00bfe61cf661d6fde9ba410d1ffea
-
Filesize
136KB
MD58da76b2435dac94e4bfd7bced4fe276e
SHA17787cfd666476ca3bddbe9c0c79b8a7fd04225b3
SHA2560daab5c8b229a335a5379adffb2668a1687da0e1d0d37d84dc994d308ebfc7f9
SHA512d95da55e11a5cb1a8107c6811f6612d953d2a668867266ee95f508561bb8f2888ddf0766361f33189caf603d585ea8aff380f5089a907eeea851ac87db39ef39