Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 22:27
Static task
static1
Behavioral task
behavioral1
Sample
5eab63cceca3b2d92296a62612b220299c7be8113e034c9e8777efb442924743.exe
Resource
win10v2004-20241007-en
General
-
Target
5eab63cceca3b2d92296a62612b220299c7be8113e034c9e8777efb442924743.exe
-
Size
702KB
-
MD5
e3f6f62af5261e22f9cbaa7f6065f11f
-
SHA1
ab732e4d1f5ac5a4677537dd21a22b5d93721afb
-
SHA256
5eab63cceca3b2d92296a62612b220299c7be8113e034c9e8777efb442924743
-
SHA512
b0f2f5799c3f8dced577ffaf1e8637c202017e5335fc8754a4478409fa6e08279e12b4350eaa410828a587eb30a7109437a070e26aeb486148a76ef220b70cb7
-
SSDEEP
12288:py90hQjI6MQcFlkA4ouslk46fAnyghkYEG2Po9wx87kY0bqwvEtF:pyGuY9yAkZGzweo/hvEtF
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/2188-18-0x0000000004AE0000-0x0000000004AFA000-memory.dmp healer behavioral1/memory/2188-20-0x0000000007270000-0x0000000007288000-memory.dmp healer behavioral1/memory/2188-22-0x0000000007270000-0x0000000007282000-memory.dmp healer behavioral1/memory/2188-48-0x0000000007270000-0x0000000007282000-memory.dmp healer behavioral1/memory/2188-46-0x0000000007270000-0x0000000007282000-memory.dmp healer behavioral1/memory/2188-44-0x0000000007270000-0x0000000007282000-memory.dmp healer behavioral1/memory/2188-42-0x0000000007270000-0x0000000007282000-memory.dmp healer behavioral1/memory/2188-34-0x0000000007270000-0x0000000007282000-memory.dmp healer behavioral1/memory/2188-32-0x0000000007270000-0x0000000007282000-memory.dmp healer behavioral1/memory/2188-30-0x0000000007270000-0x0000000007282000-memory.dmp healer behavioral1/memory/2188-29-0x0000000007270000-0x0000000007282000-memory.dmp healer behavioral1/memory/2188-26-0x0000000007270000-0x0000000007282000-memory.dmp healer behavioral1/memory/2188-24-0x0000000007270000-0x0000000007282000-memory.dmp healer behavioral1/memory/2188-40-0x0000000007270000-0x0000000007282000-memory.dmp healer behavioral1/memory/2188-38-0x0000000007270000-0x0000000007282000-memory.dmp healer behavioral1/memory/2188-36-0x0000000007270000-0x0000000007282000-memory.dmp healer behavioral1/memory/2188-21-0x0000000007270000-0x0000000007282000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 78587285.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 78587285.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 78587285.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 78587285.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 78587285.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 78587285.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4508-60-0x0000000007120000-0x000000000715C000-memory.dmp family_redline behavioral1/memory/4508-61-0x0000000007790000-0x00000000077CA000-memory.dmp family_redline behavioral1/memory/4508-87-0x0000000007790000-0x00000000077C5000-memory.dmp family_redline behavioral1/memory/4508-95-0x0000000007790000-0x00000000077C5000-memory.dmp family_redline behavioral1/memory/4508-94-0x0000000007790000-0x00000000077C5000-memory.dmp family_redline behavioral1/memory/4508-92-0x0000000007790000-0x00000000077C5000-memory.dmp family_redline behavioral1/memory/4508-89-0x0000000007790000-0x00000000077C5000-memory.dmp family_redline behavioral1/memory/4508-85-0x0000000007790000-0x00000000077C5000-memory.dmp family_redline behavioral1/memory/4508-83-0x0000000007790000-0x00000000077C5000-memory.dmp family_redline behavioral1/memory/4508-81-0x0000000007790000-0x00000000077C5000-memory.dmp family_redline behavioral1/memory/4508-79-0x0000000007790000-0x00000000077C5000-memory.dmp family_redline behavioral1/memory/4508-77-0x0000000007790000-0x00000000077C5000-memory.dmp family_redline behavioral1/memory/4508-75-0x0000000007790000-0x00000000077C5000-memory.dmp family_redline behavioral1/memory/4508-73-0x0000000007790000-0x00000000077C5000-memory.dmp family_redline behavioral1/memory/4508-71-0x0000000007790000-0x00000000077C5000-memory.dmp family_redline behavioral1/memory/4508-69-0x0000000007790000-0x00000000077C5000-memory.dmp family_redline behavioral1/memory/4508-67-0x0000000007790000-0x00000000077C5000-memory.dmp family_redline behavioral1/memory/4508-65-0x0000000007790000-0x00000000077C5000-memory.dmp family_redline behavioral1/memory/4508-63-0x0000000007790000-0x00000000077C5000-memory.dmp family_redline behavioral1/memory/4508-62-0x0000000007790000-0x00000000077C5000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 5096 un067629.exe 2188 78587285.exe 4508 rk098018.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 78587285.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 78587285.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un067629.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5eab63cceca3b2d92296a62612b220299c7be8113e034c9e8777efb442924743.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2408 2188 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5eab63cceca3b2d92296a62612b220299c7be8113e034c9e8777efb442924743.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un067629.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 78587285.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rk098018.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2188 78587285.exe 2188 78587285.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2188 78587285.exe Token: SeDebugPrivilege 4508 rk098018.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1696 wrote to memory of 5096 1696 5eab63cceca3b2d92296a62612b220299c7be8113e034c9e8777efb442924743.exe 83 PID 1696 wrote to memory of 5096 1696 5eab63cceca3b2d92296a62612b220299c7be8113e034c9e8777efb442924743.exe 83 PID 1696 wrote to memory of 5096 1696 5eab63cceca3b2d92296a62612b220299c7be8113e034c9e8777efb442924743.exe 83 PID 5096 wrote to memory of 2188 5096 un067629.exe 84 PID 5096 wrote to memory of 2188 5096 un067629.exe 84 PID 5096 wrote to memory of 2188 5096 un067629.exe 84 PID 5096 wrote to memory of 4508 5096 un067629.exe 100 PID 5096 wrote to memory of 4508 5096 un067629.exe 100 PID 5096 wrote to memory of 4508 5096 un067629.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\5eab63cceca3b2d92296a62612b220299c7be8113e034c9e8777efb442924743.exe"C:\Users\Admin\AppData\Local\Temp\5eab63cceca3b2d92296a62612b220299c7be8113e034c9e8777efb442924743.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un067629.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un067629.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\78587285.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\78587285.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2188 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2188 -s 10484⤵
- Program crash
PID:2408
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk098018.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk098018.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4508
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2188 -ip 21881⤵PID:3844
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
547KB
MD5e65c204cc370916d5c0c9a286ae6ca7d
SHA16f1461888ccbec4640ef6d13271e4c84f4dca589
SHA256279777de8b6e9a4990f9525d31ab9c28a9ce6101b38596bd6c5c9ce7565a3797
SHA512a22e92c35cf76b89c379f18e6e20c2e51a10f823bc4c4552aa32f622786b8ade15fdbdf6210b7a98a7052ded1e2f1e04ae24996233221ef31e878a94568baaa6
-
Filesize
269KB
MD5012427f096f3122209a3f4cff9613a95
SHA1a550eb5bc3e5c865040d99b11fb8260add79ecf0
SHA256cf95dab464982e5b8f2921f295e60cec84c08242f9b17302c2666c1848a75eaa
SHA512c34a4520c07a82597f3b67e46873e47794d471044f78878c0dfa639f8d457f3683f4662dd44dda6e75135fca6336551e831282240cd8e09ef6f3f3afe8bf76f0
-
Filesize
353KB
MD50b960b64772d803f8e213bf6c0c4fa48
SHA14dfe9516362f36b39a478b21f8cd319d4470d0f5
SHA25678b49a983a39e27333a856351dfaa172aead25cdeccfa57d14dbd436dab603fb
SHA512c54bb8f1c05f6a4cb3a0d8af22beec6e98c8a053d42edd6bf68e487f871d02303de87dc730e81a7d153db5e9109927d5e25c89574b0b7fe88fd6d439cafe2446