Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 22:02
Static task
static1
Behavioral task
behavioral1
Sample
c010a07c3b5e632481978bb15f844b3323e3a5318683ad2bf2fd7a5a095d30a2.exe
Resource
win10v2004-20241007-en
General
-
Target
c010a07c3b5e632481978bb15f844b3323e3a5318683ad2bf2fd7a5a095d30a2.exe
-
Size
703KB
-
MD5
763bb681734156c87b3aac278f42a02d
-
SHA1
e5f6b80e4fc38680aba07c1f873b16d35096d12d
-
SHA256
c010a07c3b5e632481978bb15f844b3323e3a5318683ad2bf2fd7a5a095d30a2
-
SHA512
2d302cc725188e3665ecf17f664359049100d5250c255aebcad6b5e17687661531c786407ffdca402df1f348d3b3ff63f13c65aa6c32c8db7c44340f02f9b707
-
SSDEEP
12288:Jy90UnDAfzEKSPP82co51dXpKeaRyIWZmFYo7/7:JyjAI/PP2oTdZrkWZ27L7
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/4796-15-0x00000000048C0000-0x00000000048DA000-memory.dmp healer behavioral1/memory/4796-18-0x0000000004F40000-0x0000000004F58000-memory.dmp healer behavioral1/memory/4796-46-0x0000000004F40000-0x0000000004F53000-memory.dmp healer behavioral1/memory/4796-44-0x0000000004F40000-0x0000000004F53000-memory.dmp healer behavioral1/memory/4796-42-0x0000000004F40000-0x0000000004F53000-memory.dmp healer behavioral1/memory/4796-40-0x0000000004F40000-0x0000000004F53000-memory.dmp healer behavioral1/memory/4796-38-0x0000000004F40000-0x0000000004F53000-memory.dmp healer behavioral1/memory/4796-36-0x0000000004F40000-0x0000000004F53000-memory.dmp healer behavioral1/memory/4796-34-0x0000000004F40000-0x0000000004F53000-memory.dmp healer behavioral1/memory/4796-32-0x0000000004F40000-0x0000000004F53000-memory.dmp healer behavioral1/memory/4796-30-0x0000000004F40000-0x0000000004F53000-memory.dmp healer behavioral1/memory/4796-28-0x0000000004F40000-0x0000000004F53000-memory.dmp healer behavioral1/memory/4796-26-0x0000000004F40000-0x0000000004F53000-memory.dmp healer behavioral1/memory/4796-24-0x0000000004F40000-0x0000000004F53000-memory.dmp healer behavioral1/memory/4796-22-0x0000000004F40000-0x0000000004F53000-memory.dmp healer behavioral1/memory/4796-20-0x0000000004F40000-0x0000000004F53000-memory.dmp healer behavioral1/memory/4796-19-0x0000000004F40000-0x0000000004F53000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 01522703.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 01522703.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 01522703.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 01522703.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 01522703.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 01522703.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/1140-56-0x00000000026F0000-0x000000000272C000-memory.dmp family_redline behavioral1/memory/1140-57-0x00000000029A0000-0x00000000029DA000-memory.dmp family_redline behavioral1/memory/1140-79-0x00000000029A0000-0x00000000029D5000-memory.dmp family_redline behavioral1/memory/1140-81-0x00000000029A0000-0x00000000029D5000-memory.dmp family_redline behavioral1/memory/1140-93-0x00000000029A0000-0x00000000029D5000-memory.dmp family_redline behavioral1/memory/1140-89-0x00000000029A0000-0x00000000029D5000-memory.dmp family_redline behavioral1/memory/1140-87-0x00000000029A0000-0x00000000029D5000-memory.dmp family_redline behavioral1/memory/1140-85-0x00000000029A0000-0x00000000029D5000-memory.dmp family_redline behavioral1/memory/1140-83-0x00000000029A0000-0x00000000029D5000-memory.dmp family_redline behavioral1/memory/1140-77-0x00000000029A0000-0x00000000029D5000-memory.dmp family_redline behavioral1/memory/1140-75-0x00000000029A0000-0x00000000029D5000-memory.dmp family_redline behavioral1/memory/1140-71-0x00000000029A0000-0x00000000029D5000-memory.dmp family_redline behavioral1/memory/1140-69-0x00000000029A0000-0x00000000029D5000-memory.dmp family_redline behavioral1/memory/1140-67-0x00000000029A0000-0x00000000029D5000-memory.dmp family_redline behavioral1/memory/1140-65-0x00000000029A0000-0x00000000029D5000-memory.dmp family_redline behavioral1/memory/1140-91-0x00000000029A0000-0x00000000029D5000-memory.dmp family_redline behavioral1/memory/1140-73-0x00000000029A0000-0x00000000029D5000-memory.dmp family_redline behavioral1/memory/1140-63-0x00000000029A0000-0x00000000029D5000-memory.dmp family_redline behavioral1/memory/1140-61-0x00000000029A0000-0x00000000029D5000-memory.dmp family_redline behavioral1/memory/1140-59-0x00000000029A0000-0x00000000029D5000-memory.dmp family_redline behavioral1/memory/1140-58-0x00000000029A0000-0x00000000029D5000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 2356 st891924.exe 4796 01522703.exe 1140 kp454419.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 01522703.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 01522703.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c010a07c3b5e632481978bb15f844b3323e3a5318683ad2bf2fd7a5a095d30a2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st891924.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5148 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c010a07c3b5e632481978bb15f844b3323e3a5318683ad2bf2fd7a5a095d30a2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language st891924.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 01522703.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kp454419.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4796 01522703.exe 4796 01522703.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4796 01522703.exe Token: SeDebugPrivilege 1140 kp454419.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4380 wrote to memory of 2356 4380 c010a07c3b5e632481978bb15f844b3323e3a5318683ad2bf2fd7a5a095d30a2.exe 83 PID 4380 wrote to memory of 2356 4380 c010a07c3b5e632481978bb15f844b3323e3a5318683ad2bf2fd7a5a095d30a2.exe 83 PID 4380 wrote to memory of 2356 4380 c010a07c3b5e632481978bb15f844b3323e3a5318683ad2bf2fd7a5a095d30a2.exe 83 PID 2356 wrote to memory of 4796 2356 st891924.exe 84 PID 2356 wrote to memory of 4796 2356 st891924.exe 84 PID 2356 wrote to memory of 4796 2356 st891924.exe 84 PID 2356 wrote to memory of 1140 2356 st891924.exe 95 PID 2356 wrote to memory of 1140 2356 st891924.exe 95 PID 2356 wrote to memory of 1140 2356 st891924.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\c010a07c3b5e632481978bb15f844b3323e3a5318683ad2bf2fd7a5a095d30a2.exe"C:\Users\Admin\AppData\Local\Temp\c010a07c3b5e632481978bb15f844b3323e3a5318683ad2bf2fd7a5a095d30a2.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st891924.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st891924.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\01522703.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\01522703.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4796
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp454419.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp454419.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1140
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:5148
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
548KB
MD58154d0450c7654a15161e607d260bfbc
SHA13edb34306b83d03e6c54231656780a1dcb18cf27
SHA256648325394b3cfd72ff65a7324f507a21f32c353757aa2fd0f80f4ad5a0c3d542
SHA51254999fe3c6989961063dea59e7c02aec04fbb3964b7860336a419212b630bec4dec7f1df5aeebb35fc9c50b3f58e5c58d2aa9cca218efa85c9b2c7991add4d67
-
Filesize
176KB
MD57044aad3a2eb663fbf8b0f293a1dbba2
SHA1944c4cd44890e6c1eb55a0818e9655cd13ac63c5
SHA256cff7afcd994e642a8a0ab833dd6f34cc60a9d8051a37f28209587c6c938d2778
SHA5124dcca5e89764cb4312e3ea13c65ebbdace914ee2d5b6e0564748da645d98cade58771b83add7adc7001da69f1a546a0ca4c6f4d0472739fafe5bf035d11de206
-
Filesize
460KB
MD5edb9e5b907416d60af6f5df878b70900
SHA109744394b46eac4bae020cf73283f2c5be07ad2c
SHA2568a3537f7481496e36735d9384b4883020cbe88afa8fd8d1f2d0cdb77fc129357
SHA512fdb427a11365f8e504525b76f8c75fb87ddee8fab567260f700c25543fd8b718a2ff7faac8dc515cec2d8e21f1cd22876e168bdfd12174066468d572291ba82c