Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 21:47
Static task
static1
Behavioral task
behavioral1
Sample
2ee7107aff37141a2fbe78fb64d34b0a883167758cce55224adf096d81d88413.exe
Resource
win10v2004-20241007-en
General
-
Target
2ee7107aff37141a2fbe78fb64d34b0a883167758cce55224adf096d81d88413.exe
-
Size
1.1MB
-
MD5
4364200a145a155b9c71e6789bd55970
-
SHA1
ad7da9f765b39ef8b48815166ab2bf7f660129c5
-
SHA256
2ee7107aff37141a2fbe78fb64d34b0a883167758cce55224adf096d81d88413
-
SHA512
ce05db9a2ded9d42ecf6d6a2f982222a35f1f0a1fabe1cf655ba505f7f0233870da450df3be9dc13409b9733d6416f22e47f49e6d72462cf9d896a4a811efe23
-
SSDEEP
24576:DyAGs2XWBoA8b2oMiBmzyWiCGHkFyzlyfwicD4soZME443:WASazyYMP318
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/1120-23-0x0000000000AC0000-0x0000000000ADA000-memory.dmp healer behavioral1/memory/1120-25-0x0000000002940000-0x0000000002958000-memory.dmp healer behavioral1/memory/1120-53-0x0000000002940000-0x0000000002952000-memory.dmp healer behavioral1/memory/1120-51-0x0000000002940000-0x0000000002952000-memory.dmp healer behavioral1/memory/1120-49-0x0000000002940000-0x0000000002952000-memory.dmp healer behavioral1/memory/1120-47-0x0000000002940000-0x0000000002952000-memory.dmp healer behavioral1/memory/1120-45-0x0000000002940000-0x0000000002952000-memory.dmp healer behavioral1/memory/1120-43-0x0000000002940000-0x0000000002952000-memory.dmp healer behavioral1/memory/1120-41-0x0000000002940000-0x0000000002952000-memory.dmp healer behavioral1/memory/1120-39-0x0000000002940000-0x0000000002952000-memory.dmp healer behavioral1/memory/1120-37-0x0000000002940000-0x0000000002952000-memory.dmp healer behavioral1/memory/1120-35-0x0000000002940000-0x0000000002952000-memory.dmp healer behavioral1/memory/1120-33-0x0000000002940000-0x0000000002952000-memory.dmp healer behavioral1/memory/1120-31-0x0000000002940000-0x0000000002952000-memory.dmp healer behavioral1/memory/1120-29-0x0000000002940000-0x0000000002952000-memory.dmp healer behavioral1/memory/1120-27-0x0000000002940000-0x0000000002952000-memory.dmp healer behavioral1/memory/1120-26-0x0000000002940000-0x0000000002952000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr028579.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr028579.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr028579.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr028579.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr028579.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr028579.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4520-62-0x00000000027E0000-0x000000000281C000-memory.dmp family_redline behavioral1/memory/4520-63-0x0000000004E20000-0x0000000004E5A000-memory.dmp family_redline behavioral1/memory/4520-67-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/4520-75-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/4520-97-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/4520-96-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/4520-93-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/4520-91-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/4520-89-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/4520-87-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/4520-85-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/4520-83-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/4520-81-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/4520-79-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/4520-73-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/4520-71-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/4520-69-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/4520-77-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/4520-65-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/4520-64-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 3968 un537641.exe 4864 un487965.exe 1120 pr028579.exe 4520 qu103479.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr028579.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr028579.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2ee7107aff37141a2fbe78fb64d34b0a883167758cce55224adf096d81d88413.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un537641.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un487965.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4400 1120 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un537641.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un487965.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr028579.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu103479.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2ee7107aff37141a2fbe78fb64d34b0a883167758cce55224adf096d81d88413.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1120 pr028579.exe 1120 pr028579.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1120 pr028579.exe Token: SeDebugPrivilege 4520 qu103479.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1752 wrote to memory of 3968 1752 2ee7107aff37141a2fbe78fb64d34b0a883167758cce55224adf096d81d88413.exe 83 PID 1752 wrote to memory of 3968 1752 2ee7107aff37141a2fbe78fb64d34b0a883167758cce55224adf096d81d88413.exe 83 PID 1752 wrote to memory of 3968 1752 2ee7107aff37141a2fbe78fb64d34b0a883167758cce55224adf096d81d88413.exe 83 PID 3968 wrote to memory of 4864 3968 un537641.exe 84 PID 3968 wrote to memory of 4864 3968 un537641.exe 84 PID 3968 wrote to memory of 4864 3968 un537641.exe 84 PID 4864 wrote to memory of 1120 4864 un487965.exe 85 PID 4864 wrote to memory of 1120 4864 un487965.exe 85 PID 4864 wrote to memory of 1120 4864 un487965.exe 85 PID 4864 wrote to memory of 4520 4864 un487965.exe 101 PID 4864 wrote to memory of 4520 4864 un487965.exe 101 PID 4864 wrote to memory of 4520 4864 un487965.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ee7107aff37141a2fbe78fb64d34b0a883167758cce55224adf096d81d88413.exe"C:\Users\Admin\AppData\Local\Temp\2ee7107aff37141a2fbe78fb64d34b0a883167758cce55224adf096d81d88413.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un537641.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un537641.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un487965.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un487965.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr028579.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr028579.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1120 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 10885⤵
- Program crash
PID:4400
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu103479.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu103479.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4520
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1120 -ip 11201⤵PID:2648
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
765KB
MD5f89552c0e806f8b4345fcb645f5c13cb
SHA1d0e6a2a521eeab24bd7402bb4f4e863a633efa34
SHA256a785289ecb7be86294d8bcd80a31032e46320ac0b0c9aa878104621283eac015
SHA512a9afa64456c08c8616381058d68e01176e93d207a826edc65f47fb86a2ff9329bc07c97ad95a1ea4b3196bfb118ea4842ed04e17e30c7202d642c7ca626a9b69
-
Filesize
610KB
MD5faacd7a98efca55ba108803e4c6c16f1
SHA1f4b66e43d8a2b7ec7f42671a7b7c50cd65301eae
SHA256ba7bee835bc649feed356f788358db0526410d73623fbfab4a7b6eb4ecc5d8e5
SHA512e401a4eb6754aa764647e68e382128bdd636e50a83aa1b35f7c1ae36ebb06ef546bc56ea630277348ba77db361a7e8372c8a2e9713512b7aae94a70fd5d7710e
-
Filesize
405KB
MD585b0e798edbc19d61e60d8d850ca02cb
SHA12678f669e20fdd299f24d1880a87abcc625a9c87
SHA256c18131d1f581e9d4512b7555b8edf865399f4219c88d67aa532bd79d46fd807c
SHA512f043f2d69bfaf45c0d5bd53b53962ac4275c84432b13dae74728cadb9649ca1dac149619c049153cadb27a83ad3f8af43787636e0888f71a1aba42ac4189f9bf
-
Filesize
488KB
MD53245b428d52161b0b2224823686f0cc0
SHA1d72d955ceef96f19341534f6e4ab51fc27defb0d
SHA256f54210c4d769a39847ff73ff068bbc22098b843dde51ac20f5f6dae53a0d0802
SHA512746f0dc11479826c53afedb5083333c2159e8a5bbacf3531383ad05571ac218a187394e5ed06018fbe2a2352b4cd5fc51e620d0aa5a3f48a9977ba059e3f0570