Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 21:46
Static task
static1
Behavioral task
behavioral1
Sample
d7ffda5a10b05ed1c7a031e971cc178c7c572120d385252adb84c68bfe44bf46.exe
Resource
win10v2004-20241007-en
General
-
Target
d7ffda5a10b05ed1c7a031e971cc178c7c572120d385252adb84c68bfe44bf46.exe
-
Size
706KB
-
MD5
57974201e32e9063f4a9691b0f86a62c
-
SHA1
00417f075256c4fc244e3cea0bf963e3c3b52b0e
-
SHA256
d7ffda5a10b05ed1c7a031e971cc178c7c572120d385252adb84c68bfe44bf46
-
SHA512
21c8416c11b803a7027b316e29c8665b3256c0e7c196e47d53b4d02fb3fc4ea61ae99a63610aafa0c2be3919f0a8f63d7b52fb27ea50bb4bd7ea8dbf579dce5d
-
SSDEEP
12288:jy90rozfxbH47bnmRmuGtx6tfgFfi2TjItshrsdg212oyzP/u9F6EMO6:jyoKxkbnmrf1UjI0gZ1hyK9gE+
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/4996-18-0x00000000030F0000-0x000000000310A000-memory.dmp healer behavioral1/memory/4996-20-0x0000000004B00000-0x0000000004B18000-memory.dmp healer behavioral1/memory/4996-36-0x0000000004B00000-0x0000000004B12000-memory.dmp healer behavioral1/memory/4996-48-0x0000000004B00000-0x0000000004B12000-memory.dmp healer behavioral1/memory/4996-46-0x0000000004B00000-0x0000000004B12000-memory.dmp healer behavioral1/memory/4996-44-0x0000000004B00000-0x0000000004B12000-memory.dmp healer behavioral1/memory/4996-42-0x0000000004B00000-0x0000000004B12000-memory.dmp healer behavioral1/memory/4996-40-0x0000000004B00000-0x0000000004B12000-memory.dmp healer behavioral1/memory/4996-38-0x0000000004B00000-0x0000000004B12000-memory.dmp healer behavioral1/memory/4996-32-0x0000000004B00000-0x0000000004B12000-memory.dmp healer behavioral1/memory/4996-30-0x0000000004B00000-0x0000000004B12000-memory.dmp healer behavioral1/memory/4996-28-0x0000000004B00000-0x0000000004B12000-memory.dmp healer behavioral1/memory/4996-26-0x0000000004B00000-0x0000000004B12000-memory.dmp healer behavioral1/memory/4996-24-0x0000000004B00000-0x0000000004B12000-memory.dmp healer behavioral1/memory/4996-22-0x0000000004B00000-0x0000000004B12000-memory.dmp healer behavioral1/memory/4996-21-0x0000000004B00000-0x0000000004B12000-memory.dmp healer behavioral1/memory/4996-34-0x0000000004B00000-0x0000000004B12000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr036887.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr036887.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr036887.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr036887.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr036887.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr036887.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3440-60-0x0000000004890000-0x00000000048CC000-memory.dmp family_redline behavioral1/memory/3440-61-0x0000000007780000-0x00000000077BA000-memory.dmp family_redline behavioral1/memory/3440-75-0x0000000007780000-0x00000000077B5000-memory.dmp family_redline behavioral1/memory/3440-83-0x0000000007780000-0x00000000077B5000-memory.dmp family_redline behavioral1/memory/3440-93-0x0000000007780000-0x00000000077B5000-memory.dmp family_redline behavioral1/memory/3440-91-0x0000000007780000-0x00000000077B5000-memory.dmp family_redline behavioral1/memory/3440-89-0x0000000007780000-0x00000000077B5000-memory.dmp family_redline behavioral1/memory/3440-87-0x0000000007780000-0x00000000077B5000-memory.dmp family_redline behavioral1/memory/3440-81-0x0000000007780000-0x00000000077B5000-memory.dmp family_redline behavioral1/memory/3440-79-0x0000000007780000-0x00000000077B5000-memory.dmp family_redline behavioral1/memory/3440-77-0x0000000007780000-0x00000000077B5000-memory.dmp family_redline behavioral1/memory/3440-73-0x0000000007780000-0x00000000077B5000-memory.dmp family_redline behavioral1/memory/3440-71-0x0000000007780000-0x00000000077B5000-memory.dmp family_redline behavioral1/memory/3440-69-0x0000000007780000-0x00000000077B5000-memory.dmp family_redline behavioral1/memory/3440-67-0x0000000007780000-0x00000000077B5000-memory.dmp family_redline behavioral1/memory/3440-95-0x0000000007780000-0x00000000077B5000-memory.dmp family_redline behavioral1/memory/3440-85-0x0000000007780000-0x00000000077B5000-memory.dmp family_redline behavioral1/memory/3440-65-0x0000000007780000-0x00000000077B5000-memory.dmp family_redline behavioral1/memory/3440-63-0x0000000007780000-0x00000000077B5000-memory.dmp family_redline behavioral1/memory/3440-62-0x0000000007780000-0x00000000077B5000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4948 un277750.exe 4996 pr036887.exe 3440 qu983213.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr036887.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr036887.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d7ffda5a10b05ed1c7a031e971cc178c7c572120d385252adb84c68bfe44bf46.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un277750.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4136 4996 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d7ffda5a10b05ed1c7a031e971cc178c7c572120d385252adb84c68bfe44bf46.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un277750.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr036887.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu983213.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4996 pr036887.exe 4996 pr036887.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4996 pr036887.exe Token: SeDebugPrivilege 3440 qu983213.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3792 wrote to memory of 4948 3792 d7ffda5a10b05ed1c7a031e971cc178c7c572120d385252adb84c68bfe44bf46.exe 83 PID 3792 wrote to memory of 4948 3792 d7ffda5a10b05ed1c7a031e971cc178c7c572120d385252adb84c68bfe44bf46.exe 83 PID 3792 wrote to memory of 4948 3792 d7ffda5a10b05ed1c7a031e971cc178c7c572120d385252adb84c68bfe44bf46.exe 83 PID 4948 wrote to memory of 4996 4948 un277750.exe 84 PID 4948 wrote to memory of 4996 4948 un277750.exe 84 PID 4948 wrote to memory of 4996 4948 un277750.exe 84 PID 4948 wrote to memory of 3440 4948 un277750.exe 100 PID 4948 wrote to memory of 3440 4948 un277750.exe 100 PID 4948 wrote to memory of 3440 4948 un277750.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\d7ffda5a10b05ed1c7a031e971cc178c7c572120d385252adb84c68bfe44bf46.exe"C:\Users\Admin\AppData\Local\Temp\d7ffda5a10b05ed1c7a031e971cc178c7c572120d385252adb84c68bfe44bf46.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un277750.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un277750.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr036887.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr036887.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4996 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4996 -s 10924⤵
- Program crash
PID:4136
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu983213.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu983213.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3440
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4996 -ip 49961⤵PID:1064
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
551KB
MD53a7c2e7a089436e40df35bf6787b1685
SHA1d59675fdce13f9c02258411d5eefd3af955f6f4b
SHA256659887f28a31e14a5ade1a4ea881862487ddd80fa7845e222a8689b353a1a1cd
SHA5121f179f4091798c8640c1a8004dacd6b669e01abb71f02af3190c0e5891fd76da9608a413ee72fc78eb6a96e5fa68bcaaa6728468f680b9e2778c34a4df3aa848
-
Filesize
286KB
MD5afafb733cf7045ae764dc5d62456624c
SHA115b2f806e681ac96b207638c4eb163f9bc9b1946
SHA256bad12e3fcc63aab6238ff655f0749ee08b619ee137be31b6c715312552f5f724
SHA512943ed213e68d7b14c042da9e4cc81d5ac1b65ca0d45fe04ceaa08f6b4d7031bb84f8109248d1b1928adf435ce7b0874aef86a37a700adb5e297ef6d05d8d7a22
-
Filesize
369KB
MD58379a94e1e2ce6c528e0328793151a19
SHA12bc83cf0b513308ab6add42abd83944c2f9305b3
SHA25671c46ceb68ec53e599811adadd706c48b38ab7fa221e7182dc4fd2e372724fda
SHA51283a699cfaa94e82d51de079bdeef2cd3120426f93cc69f94489cb4642ad7e690d43b758515fff0e4c9e681db98da1864ca7109b8135c3f7825e0a475a7123e9d