Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 22:24
Static task
static1
Behavioral task
behavioral1
Sample
4d992d4ccbc8d7941e324be9808eb457a00b9a2177865b2c0b1b202357baeaab.exe
Resource
win10v2004-20241007-en
General
-
Target
4d992d4ccbc8d7941e324be9808eb457a00b9a2177865b2c0b1b202357baeaab.exe
-
Size
749KB
-
MD5
3298baaf2b9ae3bc15362680f299c37d
-
SHA1
8473b98efd5777751448fc13b297411a6c5b1213
-
SHA256
4d992d4ccbc8d7941e324be9808eb457a00b9a2177865b2c0b1b202357baeaab
-
SHA512
76bc987ca60d41ec20cfe75bd3da5896a7ac8490bedf586a3d51a452efe9e5f8f96920ee88e13fea42f81439c63b0ae5b432bb1748f505c3a4b7814010c7a5b3
-
SSDEEP
12288:Zy900NvPMCzuqaW2bopu4DMntPMEG5deo9Jmau1BxtNokemBa3KPaaJ2kLzm0:ZyxtECB2spu04kBrJAXza3KPaS2kLzT
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/2804-19-0x0000000002710000-0x000000000272A000-memory.dmp healer behavioral1/memory/2804-21-0x0000000004EE0000-0x0000000004EF8000-memory.dmp healer behavioral1/memory/2804-42-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/2804-49-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/2804-47-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/2804-45-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/2804-43-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/2804-25-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/2804-23-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/2804-22-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/2804-39-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/2804-37-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/2804-35-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/2804-33-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/2804-31-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/2804-29-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/2804-27-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr620784.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr620784.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr620784.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr620784.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr620784.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr620784.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1560-61-0x0000000004D80000-0x0000000004DBC000-memory.dmp family_redline behavioral1/memory/1560-62-0x0000000005400000-0x000000000543A000-memory.dmp family_redline behavioral1/memory/1560-64-0x0000000005400000-0x0000000005435000-memory.dmp family_redline behavioral1/memory/1560-78-0x0000000005400000-0x0000000005435000-memory.dmp family_redline behavioral1/memory/1560-96-0x0000000005400000-0x0000000005435000-memory.dmp family_redline behavioral1/memory/1560-94-0x0000000005400000-0x0000000005435000-memory.dmp family_redline behavioral1/memory/1560-92-0x0000000005400000-0x0000000005435000-memory.dmp family_redline behavioral1/memory/1560-90-0x0000000005400000-0x0000000005435000-memory.dmp family_redline behavioral1/memory/1560-86-0x0000000005400000-0x0000000005435000-memory.dmp family_redline behavioral1/memory/1560-84-0x0000000005400000-0x0000000005435000-memory.dmp family_redline behavioral1/memory/1560-82-0x0000000005400000-0x0000000005435000-memory.dmp family_redline behavioral1/memory/1560-80-0x0000000005400000-0x0000000005435000-memory.dmp family_redline behavioral1/memory/1560-76-0x0000000005400000-0x0000000005435000-memory.dmp family_redline behavioral1/memory/1560-74-0x0000000005400000-0x0000000005435000-memory.dmp family_redline behavioral1/memory/1560-72-0x0000000005400000-0x0000000005435000-memory.dmp family_redline behavioral1/memory/1560-70-0x0000000005400000-0x0000000005435000-memory.dmp family_redline behavioral1/memory/1560-68-0x0000000005400000-0x0000000005435000-memory.dmp family_redline behavioral1/memory/1560-66-0x0000000005400000-0x0000000005435000-memory.dmp family_redline behavioral1/memory/1560-88-0x0000000005400000-0x0000000005435000-memory.dmp family_redline behavioral1/memory/1560-63-0x0000000005400000-0x0000000005435000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 2916 un370342.exe 2804 pr620784.exe 1560 qu088921.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr620784.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr620784.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4d992d4ccbc8d7941e324be9808eb457a00b9a2177865b2c0b1b202357baeaab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un370342.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3604 2804 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr620784.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu088921.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4d992d4ccbc8d7941e324be9808eb457a00b9a2177865b2c0b1b202357baeaab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un370342.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2804 pr620784.exe 2804 pr620784.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2804 pr620784.exe Token: SeDebugPrivilege 1560 qu088921.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 628 wrote to memory of 2916 628 4d992d4ccbc8d7941e324be9808eb457a00b9a2177865b2c0b1b202357baeaab.exe 84 PID 628 wrote to memory of 2916 628 4d992d4ccbc8d7941e324be9808eb457a00b9a2177865b2c0b1b202357baeaab.exe 84 PID 628 wrote to memory of 2916 628 4d992d4ccbc8d7941e324be9808eb457a00b9a2177865b2c0b1b202357baeaab.exe 84 PID 2916 wrote to memory of 2804 2916 un370342.exe 86 PID 2916 wrote to memory of 2804 2916 un370342.exe 86 PID 2916 wrote to memory of 2804 2916 un370342.exe 86 PID 2916 wrote to memory of 1560 2916 un370342.exe 99 PID 2916 wrote to memory of 1560 2916 un370342.exe 99 PID 2916 wrote to memory of 1560 2916 un370342.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d992d4ccbc8d7941e324be9808eb457a00b9a2177865b2c0b1b202357baeaab.exe"C:\Users\Admin\AppData\Local\Temp\4d992d4ccbc8d7941e324be9808eb457a00b9a2177865b2c0b1b202357baeaab.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un370342.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un370342.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr620784.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr620784.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2804 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2804 -s 10844⤵
- Program crash
PID:3604
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu088921.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu088921.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1560
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2804 -ip 28041⤵PID:3188
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
595KB
MD5d9b822a6de242b21d6eb61015a4db8ca
SHA14fc6cfc381c9b86b343eaaa8a1f7545027b13497
SHA2568a1f8ff3bfad438230a503e2bacc0bd4036d7ad7e9cdc9032efc26b6edb0f8f7
SHA5125e500b28c346cb7991bce4cef131cd52045398111e06b2b3547cbdb0edfded8735ad31df4a2cc322e620fa9504da92fecef200721652b146dce26b4f46346351
-
Filesize
389KB
MD51bf4d7b16eaefd65d9b6ed7516be36b5
SHA12cc3bf9f2aedb8b9f6ccc69aa937154aaa67fdc0
SHA2566a60ee8266107f33bdd24f59b2e4862446b9b2bd952090c5eebbb11313d4387c
SHA512eb2c43a391ca16e0631f1b386ddb8d23137a836f79509f14c1c05a792e193f2932beecc77e611eca7b65120ae6571589ac5c2f2fdda43e3817e9c1d05f96a65a
-
Filesize
472KB
MD5b3b7d4dda5ef705e30dcd6c773800119
SHA1f811484b7939ed4f827191e08b61bc25899f0421
SHA2560713f84fa33136433ad2ec08ae9455298b7e12917550a2aa92d575fd4796c7a7
SHA5126f7398eca2e72998e9c513a9aa7a9226e49cd479b8b869ec87b3064591418047f33c40c9b88030f39895acf297bbbbd676fa5f21ba1e2b7b92e85d073a6e03ea