Analysis
-
max time kernel
143s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 21:53
Static task
static1
Behavioral task
behavioral1
Sample
c11cff563448669680962ee7840dd3a99bc9dd235d581cfb268b956a04b20900.exe
Resource
win10v2004-20241007-en
General
-
Target
c11cff563448669680962ee7840dd3a99bc9dd235d581cfb268b956a04b20900.exe
-
Size
699KB
-
MD5
5a97dbbe3bd737b2a456d0be2cacf9bc
-
SHA1
c50cf60da4472a3fce364e462a1f3e509d975f7c
-
SHA256
c11cff563448669680962ee7840dd3a99bc9dd235d581cfb268b956a04b20900
-
SHA512
5c81c7796319f5792d35da64511466a20b551c3f9a930014bdf404bc935efcb898701fb0d325fb1562010a4a3111512b80c2005d2866bd9502c6183d13a51e24
-
SSDEEP
12288:6y905VDfUFAh4pRDZoA9ywrG962jGSRNd3jIJvCYrux:6y6tWyHpGSRNd3UKYrux
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/2536-17-0x0000000007090000-0x00000000070AA000-memory.dmp healer behavioral1/memory/2536-20-0x0000000007120000-0x0000000007138000-memory.dmp healer behavioral1/memory/2536-48-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/2536-46-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/2536-44-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/2536-42-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/2536-40-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/2536-38-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/2536-36-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/2536-34-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/2536-32-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/2536-30-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/2536-28-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/2536-26-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/2536-24-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/2536-22-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/2536-21-0x0000000007120000-0x0000000007132000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 99216992.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 99216992.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 99216992.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 99216992.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 99216992.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 99216992.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4808-59-0x0000000007110000-0x000000000714C000-memory.dmp family_redline behavioral1/memory/4808-60-0x0000000007190000-0x00000000071CA000-memory.dmp family_redline behavioral1/memory/4808-72-0x0000000007190000-0x00000000071C5000-memory.dmp family_redline behavioral1/memory/4808-78-0x0000000007190000-0x00000000071C5000-memory.dmp family_redline behavioral1/memory/4808-94-0x0000000007190000-0x00000000071C5000-memory.dmp family_redline behavioral1/memory/4808-92-0x0000000007190000-0x00000000071C5000-memory.dmp family_redline behavioral1/memory/4808-91-0x0000000007190000-0x00000000071C5000-memory.dmp family_redline behavioral1/memory/4808-89-0x0000000007190000-0x00000000071C5000-memory.dmp family_redline behavioral1/memory/4808-86-0x0000000007190000-0x00000000071C5000-memory.dmp family_redline behavioral1/memory/4808-84-0x0000000007190000-0x00000000071C5000-memory.dmp family_redline behavioral1/memory/4808-82-0x0000000007190000-0x00000000071C5000-memory.dmp family_redline behavioral1/memory/4808-80-0x0000000007190000-0x00000000071C5000-memory.dmp family_redline behavioral1/memory/4808-76-0x0000000007190000-0x00000000071C5000-memory.dmp family_redline behavioral1/memory/4808-74-0x0000000007190000-0x00000000071C5000-memory.dmp family_redline behavioral1/memory/4808-70-0x0000000007190000-0x00000000071C5000-memory.dmp family_redline behavioral1/memory/4808-68-0x0000000007190000-0x00000000071C5000-memory.dmp family_redline behavioral1/memory/4808-66-0x0000000007190000-0x00000000071C5000-memory.dmp family_redline behavioral1/memory/4808-64-0x0000000007190000-0x00000000071C5000-memory.dmp family_redline behavioral1/memory/4808-62-0x0000000007190000-0x00000000071C5000-memory.dmp family_redline behavioral1/memory/4808-61-0x0000000007190000-0x00000000071C5000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 2716 un087746.exe 2536 99216992.exe 4808 rk386012.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 99216992.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 99216992.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c11cff563448669680962ee7840dd3a99bc9dd235d581cfb268b956a04b20900.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un087746.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2288 2536 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rk386012.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c11cff563448669680962ee7840dd3a99bc9dd235d581cfb268b956a04b20900.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un087746.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 99216992.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2536 99216992.exe 2536 99216992.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2536 99216992.exe Token: SeDebugPrivilege 4808 rk386012.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3080 wrote to memory of 2716 3080 c11cff563448669680962ee7840dd3a99bc9dd235d581cfb268b956a04b20900.exe 85 PID 3080 wrote to memory of 2716 3080 c11cff563448669680962ee7840dd3a99bc9dd235d581cfb268b956a04b20900.exe 85 PID 3080 wrote to memory of 2716 3080 c11cff563448669680962ee7840dd3a99bc9dd235d581cfb268b956a04b20900.exe 85 PID 2716 wrote to memory of 2536 2716 un087746.exe 86 PID 2716 wrote to memory of 2536 2716 un087746.exe 86 PID 2716 wrote to memory of 2536 2716 un087746.exe 86 PID 2716 wrote to memory of 4808 2716 un087746.exe 96 PID 2716 wrote to memory of 4808 2716 un087746.exe 96 PID 2716 wrote to memory of 4808 2716 un087746.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\c11cff563448669680962ee7840dd3a99bc9dd235d581cfb268b956a04b20900.exe"C:\Users\Admin\AppData\Local\Temp\c11cff563448669680962ee7840dd3a99bc9dd235d581cfb268b956a04b20900.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un087746.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un087746.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\99216992.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\99216992.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2536 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2536 -s 10284⤵
- Program crash
PID:2288
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk386012.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk386012.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4808
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2536 -ip 25361⤵PID:2600
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
545KB
MD5ba11ec8b335a484ddca8d580a95af3ea
SHA1682e4bb72c38cfca65d5c81b8d09fd8149d6beb0
SHA2563cbf512ba589d7a7cb9aa0e3038e5c980f1f4dd91fbc62fc30bb8f6de86928d2
SHA51286be7d4a1b3dc29676b7b993fa06670f1fb03d4d34deb20682a060ff63084da753a43b44d6a3d7b4b6b65055ad6729b46bee845b5f2e9ae1af2335e9b5a8be8d
-
Filesize
269KB
MD5ea1b777b472c94528a0f7d883b79e64e
SHA1af94d393e07d26b3d996ba4a641bb16a863aa031
SHA256d08eb6b9d69e7306e04e046bf87ed2169de89db2b1f18d8f78d8e30c178d62e4
SHA51205bbf5f33b86db587f94d8442ca40e48ccaf65fb1fd8a11513f7080be76f8c2fefac427200c61da84e401bf2af7e8e77915a641237189bf17dd6f2f72d6f260b
-
Filesize
353KB
MD5277af4dd0deac64fba91c154b77beafa
SHA1566bd5b8e29fde661f7d09e693c4d0fb6e406531
SHA2562078b9fceea11f8c4c329711068e0751de945ae150d9496feaa1e8ed4d02f532
SHA51289c25834fec9e9784b68096ef56feda1ed70208cfa9d408580afdf2683e3b27b64c615779d9aead4dc96d42677619c027f4fd636ac85767b7a16babd857da5d6