Analysis
-
max time kernel
142s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 21:43
Static task
static1
Behavioral task
behavioral1
Sample
af109b789c55ae3c9c9998755948a22d547ac94765dedbdc976579af189b7a82.exe
Resource
win10v2004-20241007-en
General
-
Target
af109b789c55ae3c9c9998755948a22d547ac94765dedbdc976579af189b7a82.exe
-
Size
1.1MB
-
MD5
a8446fac67bc2374d99c3b4182e0734f
-
SHA1
ada9613d83468165293f94e8b63ffbfa273077a7
-
SHA256
af109b789c55ae3c9c9998755948a22d547ac94765dedbdc976579af189b7a82
-
SHA512
352d5942f98d0a96bdd91539fff0a35b9c1d0515569601e1f5e666a365a4d23923e1876b1c1187e5893829035f490ce240e7966d0c4323cc24ae7a6670786dd9
-
SSDEEP
24576:IyQEYta8sjh/1OI0tY8/p08uKcXku2c09GaHGD:P0ajhvwPuiu9sG
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/4964-23-0x00000000025A0000-0x00000000025BA000-memory.dmp healer behavioral1/memory/4964-25-0x00000000028B0000-0x00000000028C8000-memory.dmp healer behavioral1/memory/4964-49-0x00000000028B0000-0x00000000028C2000-memory.dmp healer behavioral1/memory/4964-51-0x00000000028B0000-0x00000000028C2000-memory.dmp healer behavioral1/memory/4964-53-0x00000000028B0000-0x00000000028C2000-memory.dmp healer behavioral1/memory/4964-47-0x00000000028B0000-0x00000000028C2000-memory.dmp healer behavioral1/memory/4964-45-0x00000000028B0000-0x00000000028C2000-memory.dmp healer behavioral1/memory/4964-43-0x00000000028B0000-0x00000000028C2000-memory.dmp healer behavioral1/memory/4964-41-0x00000000028B0000-0x00000000028C2000-memory.dmp healer behavioral1/memory/4964-39-0x00000000028B0000-0x00000000028C2000-memory.dmp healer behavioral1/memory/4964-37-0x00000000028B0000-0x00000000028C2000-memory.dmp healer behavioral1/memory/4964-35-0x00000000028B0000-0x00000000028C2000-memory.dmp healer behavioral1/memory/4964-33-0x00000000028B0000-0x00000000028C2000-memory.dmp healer behavioral1/memory/4964-31-0x00000000028B0000-0x00000000028C2000-memory.dmp healer behavioral1/memory/4964-29-0x00000000028B0000-0x00000000028C2000-memory.dmp healer behavioral1/memory/4964-27-0x00000000028B0000-0x00000000028C2000-memory.dmp healer behavioral1/memory/4964-26-0x00000000028B0000-0x00000000028C2000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr883946.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr883946.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr883946.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr883946.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr883946.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr883946.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3744-62-0x0000000004DC0000-0x0000000004DFC000-memory.dmp family_redline behavioral1/memory/3744-63-0x0000000004E80000-0x0000000004EBA000-memory.dmp family_redline behavioral1/memory/3744-67-0x0000000004E80000-0x0000000004EB5000-memory.dmp family_redline behavioral1/memory/3744-71-0x0000000004E80000-0x0000000004EB5000-memory.dmp family_redline behavioral1/memory/3744-69-0x0000000004E80000-0x0000000004EB5000-memory.dmp family_redline behavioral1/memory/3744-81-0x0000000004E80000-0x0000000004EB5000-memory.dmp family_redline behavioral1/memory/3744-65-0x0000000004E80000-0x0000000004EB5000-memory.dmp family_redline behavioral1/memory/3744-64-0x0000000004E80000-0x0000000004EB5000-memory.dmp family_redline behavioral1/memory/3744-97-0x0000000004E80000-0x0000000004EB5000-memory.dmp family_redline behavioral1/memory/3744-95-0x0000000004E80000-0x0000000004EB5000-memory.dmp family_redline behavioral1/memory/3744-93-0x0000000004E80000-0x0000000004EB5000-memory.dmp family_redline behavioral1/memory/3744-91-0x0000000004E80000-0x0000000004EB5000-memory.dmp family_redline behavioral1/memory/3744-89-0x0000000004E80000-0x0000000004EB5000-memory.dmp family_redline behavioral1/memory/3744-87-0x0000000004E80000-0x0000000004EB5000-memory.dmp family_redline behavioral1/memory/3744-85-0x0000000004E80000-0x0000000004EB5000-memory.dmp family_redline behavioral1/memory/3744-83-0x0000000004E80000-0x0000000004EB5000-memory.dmp family_redline behavioral1/memory/3744-79-0x0000000004E80000-0x0000000004EB5000-memory.dmp family_redline behavioral1/memory/3744-77-0x0000000004E80000-0x0000000004EB5000-memory.dmp family_redline behavioral1/memory/3744-75-0x0000000004E80000-0x0000000004EB5000-memory.dmp family_redline behavioral1/memory/3744-73-0x0000000004E80000-0x0000000004EB5000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 1204 un850785.exe 4020 un777697.exe 4964 pr883946.exe 3744 qu914349.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr883946.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr883946.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un777697.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" af109b789c55ae3c9c9998755948a22d547ac94765dedbdc976579af189b7a82.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un850785.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3432 4964 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un850785.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un777697.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr883946.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu914349.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language af109b789c55ae3c9c9998755948a22d547ac94765dedbdc976579af189b7a82.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4964 pr883946.exe 4964 pr883946.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4964 pr883946.exe Token: SeDebugPrivilege 3744 qu914349.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 5092 wrote to memory of 1204 5092 af109b789c55ae3c9c9998755948a22d547ac94765dedbdc976579af189b7a82.exe 83 PID 5092 wrote to memory of 1204 5092 af109b789c55ae3c9c9998755948a22d547ac94765dedbdc976579af189b7a82.exe 83 PID 5092 wrote to memory of 1204 5092 af109b789c55ae3c9c9998755948a22d547ac94765dedbdc976579af189b7a82.exe 83 PID 1204 wrote to memory of 4020 1204 un850785.exe 84 PID 1204 wrote to memory of 4020 1204 un850785.exe 84 PID 1204 wrote to memory of 4020 1204 un850785.exe 84 PID 4020 wrote to memory of 4964 4020 un777697.exe 85 PID 4020 wrote to memory of 4964 4020 un777697.exe 85 PID 4020 wrote to memory of 4964 4020 un777697.exe 85 PID 4020 wrote to memory of 3744 4020 un777697.exe 97 PID 4020 wrote to memory of 3744 4020 un777697.exe 97 PID 4020 wrote to memory of 3744 4020 un777697.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\af109b789c55ae3c9c9998755948a22d547ac94765dedbdc976579af189b7a82.exe"C:\Users\Admin\AppData\Local\Temp\af109b789c55ae3c9c9998755948a22d547ac94765dedbdc976579af189b7a82.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un850785.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un850785.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un777697.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un777697.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr883946.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr883946.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4964 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4964 -s 10805⤵
- Program crash
PID:3432
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu914349.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu914349.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3744
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4964 -ip 49641⤵PID:5088
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
763KB
MD56bb4aa704bcc67a94826ef40c9a5b183
SHA146caf9c46fa53d8b93ff31a36eb05fe8cf1753b5
SHA25692e3918d05651e02574f69bce2dca8d2295b29446ddbb4efca1985b04a7ccabb
SHA51293a6768445f53dcdaa8d402c7f7c6b3ee60b66f3475b11579c6adae62547559eef4215b59e495eca054e78970f685ff0eb92858811546b3f0d236f14d2c61dac
-
Filesize
609KB
MD5d158984b20e8575b87ebe750b30a5c8a
SHA1ec2a0874e2e5426e679d03c6169fab4e501a785e
SHA2560f6898c696118581004e6cdf90a223ef50a66c6923b610375e5ff8cc3f529b60
SHA51280d4119f9a789fd5d6f2d9579d9f7b26000188325cae50396609d046ccf95b210b1e2de5304bb5d7e22935f92108790cb59f429fc7f0ee8f35c61dcd86bccf17
-
Filesize
403KB
MD526dcde02cfe6e97812df69d3cc7a4204
SHA19ff9b03aa577e4181dfce4b73e1b288385d6dffd
SHA256dad3d9766bfa4df49426f13440eeca4d63667d6ae441081c012ff91676d04af2
SHA512c25ef5bfe97f7df6b1d886980d6394a2435abc4061e73ee8f02a35b1f9a3e24c7e8035f8322964de5f8f238b52c2258ebc7e82d9c7e209ff6d8240a98d62e310
-
Filesize
485KB
MD50f8dddec069c8c2dc6b434822463df83
SHA1220c2cfbfce3007412b82c09da3740c1e560a245
SHA2563058e2754cd146742418e2dd01d05225ef82fd5a144c3d8a5d738ca85972b6f3
SHA5122d5bca82427febae6af756946eb5a251f3a9b4b5c9239f28406ac3fb19cad2d65931bcda18584b70ac0becabff59a3127db76b44699ae24d17098c5bead535d0