Analysis
-
max time kernel
150s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 21:54
Static task
static1
Behavioral task
behavioral1
Sample
83526c4a5f8d1282ea06fd9c54649a0f4db21b7cd7bbb8f97382f388ceee89b3.exe
Resource
win10v2004-20241007-en
General
-
Target
83526c4a5f8d1282ea06fd9c54649a0f4db21b7cd7bbb8f97382f388ceee89b3.exe
-
Size
694KB
-
MD5
a7a4faa8f2b696d19ea37dd954bbc451
-
SHA1
feff24c71a365a1954b93063e03bab235d667927
-
SHA256
83526c4a5f8d1282ea06fd9c54649a0f4db21b7cd7bbb8f97382f388ceee89b3
-
SHA512
e259e9caf0ab8e0a87a14dda1ac203737329496cd1a113bcc6667fc58de1fc3738ed7eaa32a50748b30fe15db569f466e6a2bdf5e3c12b269de3fa3fc82b6015
-
SSDEEP
12288:4y90fjL29Y1Oc6X5RJXR2IS64whFTpV6EVXR/MoxWQ6F518byKMA+3Qo8fmBUyA:4yxCeXhRXS64KFT64XZMoJ6F518byr+F
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/4056-17-0x0000000004930000-0x000000000494A000-memory.dmp healer behavioral1/memory/4056-19-0x0000000004C20000-0x0000000004C38000-memory.dmp healer behavioral1/memory/4056-46-0x0000000004C20000-0x0000000004C33000-memory.dmp healer behavioral1/memory/4056-44-0x0000000004C20000-0x0000000004C33000-memory.dmp healer behavioral1/memory/4056-42-0x0000000004C20000-0x0000000004C33000-memory.dmp healer behavioral1/memory/4056-40-0x0000000004C20000-0x0000000004C33000-memory.dmp healer behavioral1/memory/4056-38-0x0000000004C20000-0x0000000004C33000-memory.dmp healer behavioral1/memory/4056-48-0x0000000004C20000-0x0000000004C33000-memory.dmp healer behavioral1/memory/4056-36-0x0000000004C20000-0x0000000004C33000-memory.dmp healer behavioral1/memory/4056-34-0x0000000004C20000-0x0000000004C33000-memory.dmp healer behavioral1/memory/4056-32-0x0000000004C20000-0x0000000004C33000-memory.dmp healer behavioral1/memory/4056-30-0x0000000004C20000-0x0000000004C33000-memory.dmp healer behavioral1/memory/4056-28-0x0000000004C20000-0x0000000004C33000-memory.dmp healer behavioral1/memory/4056-26-0x0000000004C20000-0x0000000004C33000-memory.dmp healer behavioral1/memory/4056-24-0x0000000004C20000-0x0000000004C33000-memory.dmp healer behavioral1/memory/4056-22-0x0000000004C20000-0x0000000004C33000-memory.dmp healer behavioral1/memory/4056-21-0x0000000004C20000-0x0000000004C33000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 47337924.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 47337924.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 47337924.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 47337924.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 47337924.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 47337924.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3420-59-0x0000000004970000-0x00000000049AC000-memory.dmp family_redline behavioral1/memory/3420-60-0x0000000004B40000-0x0000000004B7A000-memory.dmp family_redline behavioral1/memory/3420-76-0x0000000004B40000-0x0000000004B75000-memory.dmp family_redline behavioral1/memory/3420-66-0x0000000004B40000-0x0000000004B75000-memory.dmp family_redline behavioral1/memory/3420-64-0x0000000004B40000-0x0000000004B75000-memory.dmp family_redline behavioral1/memory/3420-62-0x0000000004B40000-0x0000000004B75000-memory.dmp family_redline behavioral1/memory/3420-61-0x0000000004B40000-0x0000000004B75000-memory.dmp family_redline behavioral1/memory/3420-94-0x0000000004B40000-0x0000000004B75000-memory.dmp family_redline behavioral1/memory/3420-92-0x0000000004B40000-0x0000000004B75000-memory.dmp family_redline behavioral1/memory/3420-90-0x0000000004B40000-0x0000000004B75000-memory.dmp family_redline behavioral1/memory/3420-88-0x0000000004B40000-0x0000000004B75000-memory.dmp family_redline behavioral1/memory/3420-86-0x0000000004B40000-0x0000000004B75000-memory.dmp family_redline behavioral1/memory/3420-84-0x0000000004B40000-0x0000000004B75000-memory.dmp family_redline behavioral1/memory/3420-82-0x0000000004B40000-0x0000000004B75000-memory.dmp family_redline behavioral1/memory/3420-80-0x0000000004B40000-0x0000000004B75000-memory.dmp family_redline behavioral1/memory/3420-78-0x0000000004B40000-0x0000000004B75000-memory.dmp family_redline behavioral1/memory/3420-74-0x0000000004B40000-0x0000000004B75000-memory.dmp family_redline behavioral1/memory/3420-73-0x0000000004B40000-0x0000000004B75000-memory.dmp family_redline behavioral1/memory/3420-70-0x0000000004B40000-0x0000000004B75000-memory.dmp family_redline behavioral1/memory/3420-68-0x0000000004B40000-0x0000000004B75000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 1936 un602474.exe 4056 47337924.exe 3420 rk998779.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 47337924.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 47337924.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 83526c4a5f8d1282ea06fd9c54649a0f4db21b7cd7bbb8f97382f388ceee89b3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un602474.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4860 4056 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rk998779.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 83526c4a5f8d1282ea06fd9c54649a0f4db21b7cd7bbb8f97382f388ceee89b3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un602474.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 47337924.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4056 47337924.exe 4056 47337924.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4056 47337924.exe Token: SeDebugPrivilege 3420 rk998779.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1568 wrote to memory of 1936 1568 83526c4a5f8d1282ea06fd9c54649a0f4db21b7cd7bbb8f97382f388ceee89b3.exe 83 PID 1568 wrote to memory of 1936 1568 83526c4a5f8d1282ea06fd9c54649a0f4db21b7cd7bbb8f97382f388ceee89b3.exe 83 PID 1568 wrote to memory of 1936 1568 83526c4a5f8d1282ea06fd9c54649a0f4db21b7cd7bbb8f97382f388ceee89b3.exe 83 PID 1936 wrote to memory of 4056 1936 un602474.exe 84 PID 1936 wrote to memory of 4056 1936 un602474.exe 84 PID 1936 wrote to memory of 4056 1936 un602474.exe 84 PID 1936 wrote to memory of 3420 1936 un602474.exe 95 PID 1936 wrote to memory of 3420 1936 un602474.exe 95 PID 1936 wrote to memory of 3420 1936 un602474.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\83526c4a5f8d1282ea06fd9c54649a0f4db21b7cd7bbb8f97382f388ceee89b3.exe"C:\Users\Admin\AppData\Local\Temp\83526c4a5f8d1282ea06fd9c54649a0f4db21b7cd7bbb8f97382f388ceee89b3.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un602474.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un602474.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\47337924.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\47337924.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4056 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4056 -s 10804⤵
- Program crash
PID:4860
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk998779.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk998779.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3420
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4056 -ip 40561⤵PID:1632
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
540KB
MD522d5c0a7fc5ce7bfda5f17153860f0a7
SHA1d767b250c434c9c172ad9102ce5f8a29ce43a307
SHA256759d07630a6fa253b18ec94f00f6ba22936601df921cc9dcec0f21bbeac631c9
SHA5124b1c67f2831e7dfb5a7596e38fa6f738f6fb5d37952833919b6a9c9c715445d5283f4e49c68b1e9cbc7e30eebd52dd31d161078bd942ebb07a4f06f24726a4ce
-
Filesize
258KB
MD5aa7f596b8a7dbcedd3e80cdf0d591eb2
SHA12c51375d5a24e0b17e305588e9e0d0de5ad91d88
SHA256c18d8e290242234edeca99f8d56939bdba13708006261d10ac7648dabf02b85d
SHA5126666857b63614ed1a8942f48f46fc3ebca43fc6b3146bff5a2adc747a662c2232cb319aef14646b8359fbcf2d9b46e482a45724fb31aa723cbedc815c02b5ecd
-
Filesize
340KB
MD54d387dabac957eff2e30a22417047344
SHA1876b86acb5a83e50583d4646f282bd47e43ce80f
SHA256514320bbe1fad631a5dd0ec3a45293249e49962d9c9e54f8050d9f3a13f96e42
SHA5122c48695e52dfb357cd5d700f1238df49e8dc10e34e00586ac476940e20f1c7030ba5812ae01bb53f0346286d1a2d932f2943697f8706902e1ba9d85753f1b38c