Analysis
-
max time kernel
113s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 21:49
Static task
static1
Behavioral task
behavioral1
Sample
c375fe2388d57a533c75ebbdb955a305f6965b42ddd0605857562eb8115bba36.exe
Resource
win10v2004-20241007-en
General
-
Target
c375fe2388d57a533c75ebbdb955a305f6965b42ddd0605857562eb8115bba36.exe
-
Size
548KB
-
MD5
422165c26877fde9e5f0ad64b258d52b
-
SHA1
f61357faa2cc9df88fe7b5fc009ff0126479c372
-
SHA256
c375fe2388d57a533c75ebbdb955a305f6965b42ddd0605857562eb8115bba36
-
SHA512
86a17cc7c630a36d9e272c95ab18049c6f248c94a509c0b7a300dcc29efe157a63f96f7099bc49074ca8dfda2bc10098f737d0413e6f5716ba0af8809a37d1e6
-
SSDEEP
12288:dy90mB3nQylD15zzZc2x/SRZX0WFS0rheabiG70f7:dyZ3hBPzZc2x/SRZkWvQXLf7
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/3264-11-0x00000000048E0000-0x00000000048FA000-memory.dmp healer behavioral1/memory/3264-14-0x0000000004AC0000-0x0000000004AD8000-memory.dmp healer behavioral1/memory/3264-42-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/3264-40-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/3264-39-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/3264-36-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/3264-34-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/3264-32-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/3264-30-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/3264-28-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/3264-27-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/3264-24-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/3264-22-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/3264-20-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/3264-18-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/3264-16-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/3264-15-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr146262.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr146262.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr146262.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr146262.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr146262.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr146262.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1588-54-0x0000000004870000-0x00000000048AC000-memory.dmp family_redline behavioral1/memory/1588-55-0x0000000004C30000-0x0000000004C6A000-memory.dmp family_redline behavioral1/memory/1588-63-0x0000000004C30000-0x0000000004C65000-memory.dmp family_redline behavioral1/memory/1588-73-0x0000000004C30000-0x0000000004C65000-memory.dmp family_redline behavioral1/memory/1588-89-0x0000000004C30000-0x0000000004C65000-memory.dmp family_redline behavioral1/memory/1588-87-0x0000000004C30000-0x0000000004C65000-memory.dmp family_redline behavioral1/memory/1588-85-0x0000000004C30000-0x0000000004C65000-memory.dmp family_redline behavioral1/memory/1588-83-0x0000000004C30000-0x0000000004C65000-memory.dmp family_redline behavioral1/memory/1588-81-0x0000000004C30000-0x0000000004C65000-memory.dmp family_redline behavioral1/memory/1588-77-0x0000000004C30000-0x0000000004C65000-memory.dmp family_redline behavioral1/memory/1588-75-0x0000000004C30000-0x0000000004C65000-memory.dmp family_redline behavioral1/memory/1588-71-0x0000000004C30000-0x0000000004C65000-memory.dmp family_redline behavioral1/memory/1588-69-0x0000000004C30000-0x0000000004C65000-memory.dmp family_redline behavioral1/memory/1588-67-0x0000000004C30000-0x0000000004C65000-memory.dmp family_redline behavioral1/memory/1588-65-0x0000000004C30000-0x0000000004C65000-memory.dmp family_redline behavioral1/memory/1588-61-0x0000000004C30000-0x0000000004C65000-memory.dmp family_redline behavioral1/memory/1588-79-0x0000000004C30000-0x0000000004C65000-memory.dmp family_redline behavioral1/memory/1588-59-0x0000000004C30000-0x0000000004C65000-memory.dmp family_redline behavioral1/memory/1588-57-0x0000000004C30000-0x0000000004C65000-memory.dmp family_redline behavioral1/memory/1588-56-0x0000000004C30000-0x0000000004C65000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 2 IoCs
pid Process 3264 pr146262.exe 1588 qu946865.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr146262.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr146262.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c375fe2388d57a533c75ebbdb955a305f6965b42ddd0605857562eb8115bba36.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4032 3264 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr146262.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu946865.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c375fe2388d57a533c75ebbdb955a305f6965b42ddd0605857562eb8115bba36.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3264 pr146262.exe 3264 pr146262.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3264 pr146262.exe Token: SeDebugPrivilege 1588 qu946865.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4796 wrote to memory of 3264 4796 c375fe2388d57a533c75ebbdb955a305f6965b42ddd0605857562eb8115bba36.exe 84 PID 4796 wrote to memory of 3264 4796 c375fe2388d57a533c75ebbdb955a305f6965b42ddd0605857562eb8115bba36.exe 84 PID 4796 wrote to memory of 3264 4796 c375fe2388d57a533c75ebbdb955a305f6965b42ddd0605857562eb8115bba36.exe 84 PID 4796 wrote to memory of 1588 4796 c375fe2388d57a533c75ebbdb955a305f6965b42ddd0605857562eb8115bba36.exe 95 PID 4796 wrote to memory of 1588 4796 c375fe2388d57a533c75ebbdb955a305f6965b42ddd0605857562eb8115bba36.exe 95 PID 4796 wrote to memory of 1588 4796 c375fe2388d57a533c75ebbdb955a305f6965b42ddd0605857562eb8115bba36.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\c375fe2388d57a533c75ebbdb955a305f6965b42ddd0605857562eb8115bba36.exe"C:\Users\Admin\AppData\Local\Temp\c375fe2388d57a533c75ebbdb955a305f6965b42ddd0605857562eb8115bba36.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pr146262.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pr146262.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3264 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3264 -s 10843⤵
- Program crash
PID:4032
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\qu946865.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\qu946865.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1588
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3264 -ip 32641⤵PID:1140
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
278KB
MD58e7cce2107975925baa923d0b8a99966
SHA10653ea33107cc4a6a0ce907f36e12070284750f7
SHA256739eb24031cb8fa4ba8b65081f6128b900ec23c7b5e76b268e4d6c7764a57fac
SHA51271d544c8627c2f23744e269d3b8975494d0b6f3d7b21aae38fa21c8a4a04ce50e75afca5842bc8b4e4b2616529b151a1c809101a03920ffadf0ad2c84fe29038
-
Filesize
360KB
MD5d1662bea3cec470c14f893ecc83f40ec
SHA1ec8eaff0347fd93345cda42d7c93d0e2e16c6811
SHA25624cd8bd9d87b634360d4a3d3ba8c421fb9a49095ac5165ad6ddee85e1b911276
SHA512fd29efcf3b41b4f1a34d5b8bec15ff5e5d40c65c468400b849b04da55b097795305dbd51c7ff380294a65c79317c67525b58f0b29a39faa15997e5891910b222