Analysis
-
max time kernel
138s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 21:29
Static task
static1
Behavioral task
behavioral1
Sample
c31aee2854129ab49066eb567b13f68f3088d9e930c81285ca490a2905c66ab0.exe
Resource
win10v2004-20241007-en
General
-
Target
c31aee2854129ab49066eb567b13f68f3088d9e930c81285ca490a2905c66ab0.exe
-
Size
479KB
-
MD5
b3f890cfef98402584a109c25e6feb2c
-
SHA1
89ffbf3403612b542fc3eab9daea6dc46e442d80
-
SHA256
c31aee2854129ab49066eb567b13f68f3088d9e930c81285ca490a2905c66ab0
-
SHA512
8c40d7702ca3f69e80a52813cd65c9ca09986299cf256e1cdee332f8f5f7eede7c5088ff002b8107cd39661419349414a36feff73026b87a2696529cfebeb29b
-
SSDEEP
12288:lMrCy90X4OATRVrU5c1u31tT0/zYbGtID+QCx+HbC:bySmoXnTNz+n+Hm
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/1068-15-0x00000000022B0000-0x00000000022CA000-memory.dmp healer behavioral1/memory/1068-19-0x0000000002410000-0x0000000002428000-memory.dmp healer behavioral1/memory/1068-27-0x0000000002410000-0x0000000002422000-memory.dmp healer behavioral1/memory/1068-47-0x0000000002410000-0x0000000002422000-memory.dmp healer behavioral1/memory/1068-45-0x0000000002410000-0x0000000002422000-memory.dmp healer behavioral1/memory/1068-43-0x0000000002410000-0x0000000002422000-memory.dmp healer behavioral1/memory/1068-41-0x0000000002410000-0x0000000002422000-memory.dmp healer behavioral1/memory/1068-39-0x0000000002410000-0x0000000002422000-memory.dmp healer behavioral1/memory/1068-37-0x0000000002410000-0x0000000002422000-memory.dmp healer behavioral1/memory/1068-35-0x0000000002410000-0x0000000002422000-memory.dmp healer behavioral1/memory/1068-33-0x0000000002410000-0x0000000002422000-memory.dmp healer behavioral1/memory/1068-31-0x0000000002410000-0x0000000002422000-memory.dmp healer behavioral1/memory/1068-29-0x0000000002410000-0x0000000002422000-memory.dmp healer behavioral1/memory/1068-23-0x0000000002410000-0x0000000002422000-memory.dmp healer behavioral1/memory/1068-21-0x0000000002410000-0x0000000002422000-memory.dmp healer behavioral1/memory/1068-20-0x0000000002410000-0x0000000002422000-memory.dmp healer behavioral1/memory/1068-25-0x0000000002410000-0x0000000002422000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k9044539.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k9044539.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k9044539.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k9044539.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k9044539.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k9044539.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023c8a-55.dat family_redline behavioral1/memory/3968-56-0x0000000000050000-0x0000000000078000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 808 y4587637.exe 1068 k9044539.exe 3968 l4419345.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k9044539.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k9044539.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c31aee2854129ab49066eb567b13f68f3088d9e930c81285ca490a2905c66ab0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y4587637.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c31aee2854129ab49066eb567b13f68f3088d9e930c81285ca490a2905c66ab0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y4587637.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k9044539.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l4419345.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1068 k9044539.exe 1068 k9044539.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1068 k9044539.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1940 wrote to memory of 808 1940 c31aee2854129ab49066eb567b13f68f3088d9e930c81285ca490a2905c66ab0.exe 83 PID 1940 wrote to memory of 808 1940 c31aee2854129ab49066eb567b13f68f3088d9e930c81285ca490a2905c66ab0.exe 83 PID 1940 wrote to memory of 808 1940 c31aee2854129ab49066eb567b13f68f3088d9e930c81285ca490a2905c66ab0.exe 83 PID 808 wrote to memory of 1068 808 y4587637.exe 84 PID 808 wrote to memory of 1068 808 y4587637.exe 84 PID 808 wrote to memory of 1068 808 y4587637.exe 84 PID 808 wrote to memory of 3968 808 y4587637.exe 100 PID 808 wrote to memory of 3968 808 y4587637.exe 100 PID 808 wrote to memory of 3968 808 y4587637.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\c31aee2854129ab49066eb567b13f68f3088d9e930c81285ca490a2905c66ab0.exe"C:\Users\Admin\AppData\Local\Temp\c31aee2854129ab49066eb567b13f68f3088d9e930c81285ca490a2905c66ab0.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4587637.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4587637.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k9044539.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k9044539.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1068
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l4419345.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l4419345.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3968
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD580c0a4af7c05f2567b6810c65c0d70dd
SHA165e8da25e0ea2f7031ac58ae00f518ec4157806c
SHA256ccbead29a1e461d4984227024948529d26f7b1571138d40d2eda39d48b14f631
SHA512fc5b47fdc35a5c9d2fdf59d6bd7b8a6d2c828afdc60b438b262685375ede760a07756a0e6b01c0a9cf8597bfdcf7bca5105b4c3b993df0ba03fef09077310f63
-
Filesize
175KB
MD5232eade416b4996f22dfae09204bbf17
SHA14a9ea2daff6ac758b788028602dc9e91b61bcc42
SHA256f9f6bace38b0664d809fc6e04bcb7d6771d8cb6a0a687d2778fb7e79579227cb
SHA512ce578d1a99af608d01a6fc4886a2fe50bbedc922ef72f191f358e81d4d310849aeefcadb5f86d501624644e2bc28bf2281894fe5db4b4703eca5f0c260adce32
-
Filesize
136KB
MD519cadb7418df673617ea4db6774ce644
SHA1dc453470fe7ea5b0f0f634e544df1114bd067714
SHA2565d9db38d284fde4f32c7b4ce42faa068f6f09b9d6ebbbe7f3e3db4374a4bb18b
SHA512b054fbb69d0aefb3d8a7a6368efb284a6f7a1c8f930cf8782e4282f6b2a71c5f45de62f7d1894b913bec95d374e63c02b99992f9a8e65d9b92e3d996322d3b01