Analysis
-
max time kernel
113s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 21:41
Static task
static1
Behavioral task
behavioral1
Sample
f1aaa0b0b7ef842a9b58188c884ce7702775a1200ac76666f558102247d966b4.exe
Resource
win10v2004-20241007-en
General
-
Target
f1aaa0b0b7ef842a9b58188c884ce7702775a1200ac76666f558102247d966b4.exe
-
Size
706KB
-
MD5
d149cc082d49c345b09da8e5d8de6865
-
SHA1
ff7c7081802f8388f6f512c503f055f95e4ba075
-
SHA256
f1aaa0b0b7ef842a9b58188c884ce7702775a1200ac76666f558102247d966b4
-
SHA512
7fe9f25c4bb35fb04dff2de34e9293213787c8d7edfcf18ba3d182af87358d0462a0be1e572c7c737fc8727d66aff53fb107436657dfb194b59e0d01009c92f9
-
SSDEEP
12288:ey90uQXWwRNr/kjXAhngB5p0g+CjZsgrciU9ODN2th6V:eyihR1cQwh7lU9UDV
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/4596-18-0x0000000004B50000-0x0000000004B6A000-memory.dmp healer behavioral1/memory/4596-20-0x0000000004E00000-0x0000000004E18000-memory.dmp healer behavioral1/memory/4596-21-0x0000000004E00000-0x0000000004E12000-memory.dmp healer behavioral1/memory/4596-28-0x0000000004E00000-0x0000000004E12000-memory.dmp healer behavioral1/memory/4596-48-0x0000000004E00000-0x0000000004E12000-memory.dmp healer behavioral1/memory/4596-46-0x0000000004E00000-0x0000000004E12000-memory.dmp healer behavioral1/memory/4596-43-0x0000000004E00000-0x0000000004E12000-memory.dmp healer behavioral1/memory/4596-40-0x0000000004E00000-0x0000000004E12000-memory.dmp healer behavioral1/memory/4596-38-0x0000000004E00000-0x0000000004E12000-memory.dmp healer behavioral1/memory/4596-36-0x0000000004E00000-0x0000000004E12000-memory.dmp healer behavioral1/memory/4596-34-0x0000000004E00000-0x0000000004E12000-memory.dmp healer behavioral1/memory/4596-33-0x0000000004E00000-0x0000000004E12000-memory.dmp healer behavioral1/memory/4596-30-0x0000000004E00000-0x0000000004E12000-memory.dmp healer behavioral1/memory/4596-26-0x0000000004E00000-0x0000000004E12000-memory.dmp healer behavioral1/memory/4596-24-0x0000000004E00000-0x0000000004E12000-memory.dmp healer behavioral1/memory/4596-22-0x0000000004E00000-0x0000000004E12000-memory.dmp healer behavioral1/memory/4596-44-0x0000000004E00000-0x0000000004E12000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr885696.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr885696.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr885696.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr885696.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr885696.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr885696.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2928-60-0x0000000004B10000-0x0000000004B4C000-memory.dmp family_redline behavioral1/memory/2928-61-0x0000000007760000-0x000000000779A000-memory.dmp family_redline behavioral1/memory/2928-67-0x0000000007760000-0x0000000007795000-memory.dmp family_redline behavioral1/memory/2928-80-0x0000000007760000-0x0000000007795000-memory.dmp family_redline behavioral1/memory/2928-95-0x0000000007760000-0x0000000007795000-memory.dmp family_redline behavioral1/memory/2928-93-0x0000000007760000-0x0000000007795000-memory.dmp family_redline behavioral1/memory/2928-91-0x0000000007760000-0x0000000007795000-memory.dmp family_redline behavioral1/memory/2928-89-0x0000000007760000-0x0000000007795000-memory.dmp family_redline behavioral1/memory/2928-88-0x0000000007760000-0x0000000007795000-memory.dmp family_redline behavioral1/memory/2928-85-0x0000000007760000-0x0000000007795000-memory.dmp family_redline behavioral1/memory/2928-84-0x0000000007760000-0x0000000007795000-memory.dmp family_redline behavioral1/memory/2928-81-0x0000000007760000-0x0000000007795000-memory.dmp family_redline behavioral1/memory/2928-77-0x0000000007760000-0x0000000007795000-memory.dmp family_redline behavioral1/memory/2928-75-0x0000000007760000-0x0000000007795000-memory.dmp family_redline behavioral1/memory/2928-73-0x0000000007760000-0x0000000007795000-memory.dmp family_redline behavioral1/memory/2928-71-0x0000000007760000-0x0000000007795000-memory.dmp family_redline behavioral1/memory/2928-69-0x0000000007760000-0x0000000007795000-memory.dmp family_redline behavioral1/memory/2928-65-0x0000000007760000-0x0000000007795000-memory.dmp family_redline behavioral1/memory/2928-63-0x0000000007760000-0x0000000007795000-memory.dmp family_redline behavioral1/memory/2928-62-0x0000000007760000-0x0000000007795000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3984 un097457.exe 4596 pr885696.exe 2928 qu004249.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr885696.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr885696.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f1aaa0b0b7ef842a9b58188c884ce7702775a1200ac76666f558102247d966b4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un097457.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3820 4596 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f1aaa0b0b7ef842a9b58188c884ce7702775a1200ac76666f558102247d966b4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un097457.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr885696.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu004249.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4596 pr885696.exe 4596 pr885696.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4596 pr885696.exe Token: SeDebugPrivilege 2928 qu004249.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3260 wrote to memory of 3984 3260 f1aaa0b0b7ef842a9b58188c884ce7702775a1200ac76666f558102247d966b4.exe 84 PID 3260 wrote to memory of 3984 3260 f1aaa0b0b7ef842a9b58188c884ce7702775a1200ac76666f558102247d966b4.exe 84 PID 3260 wrote to memory of 3984 3260 f1aaa0b0b7ef842a9b58188c884ce7702775a1200ac76666f558102247d966b4.exe 84 PID 3984 wrote to memory of 4596 3984 un097457.exe 86 PID 3984 wrote to memory of 4596 3984 un097457.exe 86 PID 3984 wrote to memory of 4596 3984 un097457.exe 86 PID 3984 wrote to memory of 2928 3984 un097457.exe 95 PID 3984 wrote to memory of 2928 3984 un097457.exe 95 PID 3984 wrote to memory of 2928 3984 un097457.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1aaa0b0b7ef842a9b58188c884ce7702775a1200ac76666f558102247d966b4.exe"C:\Users\Admin\AppData\Local\Temp\f1aaa0b0b7ef842a9b58188c884ce7702775a1200ac76666f558102247d966b4.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un097457.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un097457.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr885696.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr885696.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4596 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4596 -s 10844⤵
- Program crash
PID:3820
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu004249.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu004249.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2928
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4596 -ip 45961⤵PID:2888
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
552KB
MD59f7e40a91f78557e75aa792d161f3e68
SHA1d1aeb5a0e0d739765763d1a3ae4ed7db7983836e
SHA2565a970a5e8295c5377a2a1cf60944a7fcab881080924d8e03713175567e824945
SHA512fff18393e06d988c75356733455ea04e57ce9ec97559200b07ad0df8b9e36b3cf135e241abf06cbd4fd6f28631d1d1127c075c30d051d294b593eee186e22206
-
Filesize
299KB
MD59b1e3462266f5a3b1c7d77ef4d5637a8
SHA1429a8d98b4b3e239795281ce91e72411b5721e83
SHA2565ba4b3889e826648bf8c2130eb0118f6109691941b9cc5f34d457a21a94fd42c
SHA5121ddb87c3778024422a269ce1d9ab0f312d0eda9bed0461ddc0f958fc5aab187f17d65aeb570d5d2836f5e670410d26c66ed8703831e64155e8daf84e98065685
-
Filesize
381KB
MD5cf4e1ddda45075e7b5c560192885ec33
SHA1d1427f0036c39243c5c3a1ec103ec5be7553d580
SHA256e865919b8ca92b535e4ee40ddc7cd625ef9a73a81f8bb8ced8a364b11f1f6285
SHA512d504adb652d985b613c49cdab860fa99bdff29e75b832a567d5825234639a09a91f934509f26261ff6976ca0ed2ad014805b7618a65f465e4a6748992f6b3f27