Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 23:43
Static task
static1
Behavioral task
behavioral1
Sample
406fb3b59f61b94bfd3a0d75e5a83db811dcfc9368408a707758e1e44a79d90c.exe
Resource
win10v2004-20241007-en
General
-
Target
406fb3b59f61b94bfd3a0d75e5a83db811dcfc9368408a707758e1e44a79d90c.exe
-
Size
698KB
-
MD5
5bea3e6068d9445a669b02cd9836d512
-
SHA1
c2817c078e99c8ae308eda2c8eb899b6bdf55a11
-
SHA256
406fb3b59f61b94bfd3a0d75e5a83db811dcfc9368408a707758e1e44a79d90c
-
SHA512
29a01095d948cf69844de0fdd53c147b3eb6de8a63d960dca55fea1cb9f236d0e6f52689d2870c22e0f701087a06b8e8f3c8c0aa020bc7e14848c252d1977b83
-
SSDEEP
12288:Ny90sYWTiqn/hnZGDBGYU7XxCy3CdCd7u91nc8HHNuYlEcYdU1uV0sAb:Ny4Wmq/V+BGYqbydCd7u/TNuYa6uCB
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/208-18-0x0000000004A40000-0x0000000004A5A000-memory.dmp healer behavioral1/memory/208-20-0x0000000004CE0000-0x0000000004CF8000-memory.dmp healer behavioral1/memory/208-22-0x0000000004CE0000-0x0000000004CF2000-memory.dmp healer behavioral1/memory/208-48-0x0000000004CE0000-0x0000000004CF2000-memory.dmp healer behavioral1/memory/208-46-0x0000000004CE0000-0x0000000004CF2000-memory.dmp healer behavioral1/memory/208-44-0x0000000004CE0000-0x0000000004CF2000-memory.dmp healer behavioral1/memory/208-42-0x0000000004CE0000-0x0000000004CF2000-memory.dmp healer behavioral1/memory/208-40-0x0000000004CE0000-0x0000000004CF2000-memory.dmp healer behavioral1/memory/208-38-0x0000000004CE0000-0x0000000004CF2000-memory.dmp healer behavioral1/memory/208-37-0x0000000004CE0000-0x0000000004CF2000-memory.dmp healer behavioral1/memory/208-34-0x0000000004CE0000-0x0000000004CF2000-memory.dmp healer behavioral1/memory/208-32-0x0000000004CE0000-0x0000000004CF2000-memory.dmp healer behavioral1/memory/208-30-0x0000000004CE0000-0x0000000004CF2000-memory.dmp healer behavioral1/memory/208-28-0x0000000004CE0000-0x0000000004CF2000-memory.dmp healer behavioral1/memory/208-26-0x0000000004CE0000-0x0000000004CF2000-memory.dmp healer behavioral1/memory/208-24-0x0000000004CE0000-0x0000000004CF2000-memory.dmp healer behavioral1/memory/208-21-0x0000000004CE0000-0x0000000004CF2000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr863995.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr863995.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr863995.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr863995.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr863995.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr863995.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1600-60-0x0000000004B10000-0x0000000004B4C000-memory.dmp family_redline behavioral1/memory/1600-61-0x00000000071A0000-0x00000000071DA000-memory.dmp family_redline behavioral1/memory/1600-71-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/1600-78-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/1600-95-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/1600-93-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/1600-89-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/1600-87-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/1600-85-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/1600-83-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/1600-81-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/1600-79-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/1600-75-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/1600-73-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/1600-69-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/1600-67-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/1600-91-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/1600-65-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/1600-63-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/1600-62-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3968 un435756.exe 208 pr863995.exe 1600 qu997233.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr863995.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr863995.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 406fb3b59f61b94bfd3a0d75e5a83db811dcfc9368408a707758e1e44a79d90c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un435756.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3144 208 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 406fb3b59f61b94bfd3a0d75e5a83db811dcfc9368408a707758e1e44a79d90c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un435756.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr863995.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu997233.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 208 pr863995.exe 208 pr863995.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 208 pr863995.exe Token: SeDebugPrivilege 1600 qu997233.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1232 wrote to memory of 3968 1232 406fb3b59f61b94bfd3a0d75e5a83db811dcfc9368408a707758e1e44a79d90c.exe 83 PID 1232 wrote to memory of 3968 1232 406fb3b59f61b94bfd3a0d75e5a83db811dcfc9368408a707758e1e44a79d90c.exe 83 PID 1232 wrote to memory of 3968 1232 406fb3b59f61b94bfd3a0d75e5a83db811dcfc9368408a707758e1e44a79d90c.exe 83 PID 3968 wrote to memory of 208 3968 un435756.exe 84 PID 3968 wrote to memory of 208 3968 un435756.exe 84 PID 3968 wrote to memory of 208 3968 un435756.exe 84 PID 3968 wrote to memory of 1600 3968 un435756.exe 100 PID 3968 wrote to memory of 1600 3968 un435756.exe 100 PID 3968 wrote to memory of 1600 3968 un435756.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\406fb3b59f61b94bfd3a0d75e5a83db811dcfc9368408a707758e1e44a79d90c.exe"C:\Users\Admin\AppData\Local\Temp\406fb3b59f61b94bfd3a0d75e5a83db811dcfc9368408a707758e1e44a79d90c.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un435756.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un435756.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr863995.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr863995.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:208 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 208 -s 10844⤵
- Program crash
PID:3144
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu997233.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu997233.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1600
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 208 -ip 2081⤵PID:4492
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
543KB
MD5a8b9d742b90f24cdb93578d1672d6859
SHA1870d598cd5e91f3b534af8a5ba4cd30b8b3ba099
SHA256c5474352741420213ca7a6e1e9cfa20afe60c67994d69f309a123f71bc603fa8
SHA51278e939c336788786b1bc5e3f112c14eb5b2481c5fbdd7d57e04e97af8f3cf4b4f7d8a117b6e6ff2c1f002b8b2785e35d52dbf794c7d76b70c81a445cea884778
-
Filesize
269KB
MD58c08a492c06917e83dfc8a496e2aa5f2
SHA1c0f5c8ab2a3860160a3cdaa9b1b64d9ce587dbf6
SHA256902755b831b7fce1a4c0a26c2175a3070949de26ea526f7cae955abb0ec07023
SHA5124a5faeebb5d253845a68829bc73c990d9819413dcb937d67d1f73b26a529bebcb656d529c9e8befb642e2bbad6f59171a197210dd0690b8e9d77604bf95cf5c4
-
Filesize
351KB
MD5a26d4a56cb10e3543a5a23f773d5f4ce
SHA1c3618baee323c09c6f6deca22f6df4e8a0bc4412
SHA25674b709618a2a9e304e8f1f114dbb0ed8bc32b519e4f13e7d73bc8c9f59fe9b37
SHA512dd6d9b21e13708b26f43b7c31886581fcb0e09d296aafd1f6d8ef50491d2c56efb462e093af71ffd83634627ed982fc775f5e4973088954a9c0c17d4a14bc05b