Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 23:38
Static task
static1
Behavioral task
behavioral1
Sample
f63ab618040f232da926b1c06b22415136bb66af3c9b9042095f932c59906efd.exe
Resource
win10v2004-20241007-en
General
-
Target
f63ab618040f232da926b1c06b22415136bb66af3c9b9042095f932c59906efd.exe
-
Size
1.0MB
-
MD5
9be94c7b975e556cd5300b423427a3eb
-
SHA1
bb8a5d00597bbbd0da4e8fbf821c5d8e44a533ae
-
SHA256
f63ab618040f232da926b1c06b22415136bb66af3c9b9042095f932c59906efd
-
SHA512
3c18e322d50fba1cabd957f3a971025f727da979ffb9f2a38122c9b5caa63be1bb6cdb5b1b6f8ee5ef92d68e9fbad77d53fff865efcabdce9a071845eadc7b61
-
SSDEEP
24576:kyeR2fg+hg1m+Rvp4jSPPw1iCLFeG8pZKUOyfoIYlPw:zRfS1m+B2jSCiSgpwBFlP
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/2812-23-0x0000000002770000-0x000000000278A000-memory.dmp healer behavioral1/memory/2812-25-0x0000000002840000-0x0000000002858000-memory.dmp healer behavioral1/memory/2812-53-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/2812-51-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/2812-49-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/2812-47-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/2812-45-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/2812-43-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/2812-41-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/2812-39-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/2812-37-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/2812-35-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/2812-33-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/2812-31-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/2812-29-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/2812-27-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/2812-26-0x0000000002840000-0x0000000002852000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr289462.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr289462.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr289462.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr289462.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr289462.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr289462.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/5116-62-0x00000000025F0000-0x000000000262C000-memory.dmp family_redline behavioral1/memory/5116-63-0x0000000002890000-0x00000000028CA000-memory.dmp family_redline behavioral1/memory/5116-75-0x0000000002890000-0x00000000028C5000-memory.dmp family_redline behavioral1/memory/5116-79-0x0000000002890000-0x00000000028C5000-memory.dmp family_redline behavioral1/memory/5116-77-0x0000000002890000-0x00000000028C5000-memory.dmp family_redline behavioral1/memory/5116-73-0x0000000002890000-0x00000000028C5000-memory.dmp family_redline behavioral1/memory/5116-71-0x0000000002890000-0x00000000028C5000-memory.dmp family_redline behavioral1/memory/5116-91-0x0000000002890000-0x00000000028C5000-memory.dmp family_redline behavioral1/memory/5116-69-0x0000000002890000-0x00000000028C5000-memory.dmp family_redline behavioral1/memory/5116-89-0x0000000002890000-0x00000000028C5000-memory.dmp family_redline behavioral1/memory/5116-97-0x0000000002890000-0x00000000028C5000-memory.dmp family_redline behavioral1/memory/5116-95-0x0000000002890000-0x00000000028C5000-memory.dmp family_redline behavioral1/memory/5116-93-0x0000000002890000-0x00000000028C5000-memory.dmp family_redline behavioral1/memory/5116-87-0x0000000002890000-0x00000000028C5000-memory.dmp family_redline behavioral1/memory/5116-85-0x0000000002890000-0x00000000028C5000-memory.dmp family_redline behavioral1/memory/5116-83-0x0000000002890000-0x00000000028C5000-memory.dmp family_redline behavioral1/memory/5116-81-0x0000000002890000-0x00000000028C5000-memory.dmp family_redline behavioral1/memory/5116-67-0x0000000002890000-0x00000000028C5000-memory.dmp family_redline behavioral1/memory/5116-65-0x0000000002890000-0x00000000028C5000-memory.dmp family_redline behavioral1/memory/5116-64-0x0000000002890000-0x00000000028C5000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 1668 un006643.exe 3584 un744613.exe 2812 pr289462.exe 5116 qu074767.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr289462.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr289462.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f63ab618040f232da926b1c06b22415136bb66af3c9b9042095f932c59906efd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un006643.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un744613.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 5096 2812 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un744613.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr289462.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu074767.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f63ab618040f232da926b1c06b22415136bb66af3c9b9042095f932c59906efd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un006643.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2812 pr289462.exe 2812 pr289462.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2812 pr289462.exe Token: SeDebugPrivilege 5116 qu074767.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1536 wrote to memory of 1668 1536 f63ab618040f232da926b1c06b22415136bb66af3c9b9042095f932c59906efd.exe 83 PID 1536 wrote to memory of 1668 1536 f63ab618040f232da926b1c06b22415136bb66af3c9b9042095f932c59906efd.exe 83 PID 1536 wrote to memory of 1668 1536 f63ab618040f232da926b1c06b22415136bb66af3c9b9042095f932c59906efd.exe 83 PID 1668 wrote to memory of 3584 1668 un006643.exe 84 PID 1668 wrote to memory of 3584 1668 un006643.exe 84 PID 1668 wrote to memory of 3584 1668 un006643.exe 84 PID 3584 wrote to memory of 2812 3584 un744613.exe 86 PID 3584 wrote to memory of 2812 3584 un744613.exe 86 PID 3584 wrote to memory of 2812 3584 un744613.exe 86 PID 3584 wrote to memory of 5116 3584 un744613.exe 101 PID 3584 wrote to memory of 5116 3584 un744613.exe 101 PID 3584 wrote to memory of 5116 3584 un744613.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\f63ab618040f232da926b1c06b22415136bb66af3c9b9042095f932c59906efd.exe"C:\Users\Admin\AppData\Local\Temp\f63ab618040f232da926b1c06b22415136bb66af3c9b9042095f932c59906efd.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un006643.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un006643.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un744613.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un744613.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr289462.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr289462.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2812 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2812 -s 10805⤵
- Program crash
PID:5096
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu074767.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu074767.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5116
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2812 -ip 28121⤵PID:944
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
751KB
MD56cb0e0cbf32606ba031aaa5edbe0f711
SHA195177b5c0b76efc3b0b2da89f69ca3d19667ae11
SHA256c245aa58da2bdf3a1b22adc0559947e83cb0841c29584ac859b276635ef7cd62
SHA512210f854d5a7fb63a27bcc4c3b7c685cf9ee93013af798ffa68107a586b3a9a12b5318bba8a72a9fa2bf83855585a6dc4a51297d5b01c35a8067bbe0fc35e23a1
-
Filesize
597KB
MD515fe3fe834caa33c5fec4b22735cc483
SHA19afed722c03cc8506572ab41f3e0c42b42709c49
SHA2569186c2904b2008bafe7d8bc9963e769ed1ec11c8b343504941c47174136b7c40
SHA5124d91d8bbcff36603f15f39b56404ab5636bf65b8b4d0e91a0a4c790dcd3bd3703dd80811ea63c17e8ddfc56092f39c458a8b4ae46711067eaf32e53679bbf9cc
-
Filesize
391KB
MD5f08d990296a2cc3ee026909bf922e341
SHA162854a9311f14350fd37be99466f9c1a5aa17f72
SHA256d4ca91ab785753ebdd17219393f8d00440b143d833d4211c6f1ff5497144eff6
SHA5124894bc783865dd0f3fa8b6a2c9eca409084c9c4b4a140b15a1577220a18ad79c86da6fefca3eaff315c19ead9f87f688e55165cdbde25bd6ae1b32ad2f105d58
-
Filesize
474KB
MD5cc17173b57fcc04aed8207b75282af2b
SHA1d5c8878ba10323bfdd02ecc5436751b63a506099
SHA256d91f1c04f50a08cfdca3211cc84de57912921ef6e6bf10acf814977b4cf3bb51
SHA512c43fa9927a664eb6b202209d256d71356d9d55991150b036b96a16171b0077421d5fcb8b82a7ad9509eb0d9836638675dac9a86f1f1828f419ec8ff9299222f5