Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 23:47
Static task
static1
Behavioral task
behavioral1
Sample
74d1ccd9b7c8431889388133b754a7923c201576922e978f156c312f746b9fa6.exe
Resource
win10v2004-20241007-en
General
-
Target
74d1ccd9b7c8431889388133b754a7923c201576922e978f156c312f746b9fa6.exe
-
Size
694KB
-
MD5
b9e3ec94ccef37ea4f41a8b2ce65a39b
-
SHA1
e742e4da4f2bf47de89761d7e67211ac0867f5b5
-
SHA256
74d1ccd9b7c8431889388133b754a7923c201576922e978f156c312f746b9fa6
-
SHA512
67825049258b69b0d8ad23f5b14324f1edf5fc5c6f9a637dc67a0ebb7a9606074ed91ae1d46b5b9f11fbbca5f1ab3dbe47341c4fd6bcfa76059d67e632341403
-
SSDEEP
12288:Yy905SgBOoS18XHwOFTCKSw9U0UCZWV6Fh18byKFA+2c3pFtp:YypoS10lFvS10Bm6Fh18byu93pjp
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/3952-18-0x00000000048B0000-0x00000000048CA000-memory.dmp healer behavioral1/memory/3952-20-0x0000000004AD0000-0x0000000004AE8000-memory.dmp healer behavioral1/memory/3952-21-0x0000000004AD0000-0x0000000004AE3000-memory.dmp healer behavioral1/memory/3952-28-0x0000000004AD0000-0x0000000004AE3000-memory.dmp healer behavioral1/memory/3952-48-0x0000000004AD0000-0x0000000004AE3000-memory.dmp healer behavioral1/memory/3952-47-0x0000000004AD0000-0x0000000004AE3000-memory.dmp healer behavioral1/memory/3952-44-0x0000000004AD0000-0x0000000004AE3000-memory.dmp healer behavioral1/memory/3952-42-0x0000000004AD0000-0x0000000004AE3000-memory.dmp healer behavioral1/memory/3952-40-0x0000000004AD0000-0x0000000004AE3000-memory.dmp healer behavioral1/memory/3952-38-0x0000000004AD0000-0x0000000004AE3000-memory.dmp healer behavioral1/memory/3952-36-0x0000000004AD0000-0x0000000004AE3000-memory.dmp healer behavioral1/memory/3952-34-0x0000000004AD0000-0x0000000004AE3000-memory.dmp healer behavioral1/memory/3952-32-0x0000000004AD0000-0x0000000004AE3000-memory.dmp healer behavioral1/memory/3952-30-0x0000000004AD0000-0x0000000004AE3000-memory.dmp healer behavioral1/memory/3952-26-0x0000000004AD0000-0x0000000004AE3000-memory.dmp healer behavioral1/memory/3952-24-0x0000000004AD0000-0x0000000004AE3000-memory.dmp healer behavioral1/memory/3952-22-0x0000000004AD0000-0x0000000004AE3000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 83787907.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 83787907.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 83787907.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 83787907.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 83787907.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 83787907.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4144-60-0x0000000004C80000-0x0000000004CBC000-memory.dmp family_redline behavioral1/memory/4144-61-0x0000000004E40000-0x0000000004E7A000-memory.dmp family_redline behavioral1/memory/4144-67-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/4144-79-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/4144-95-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/4144-93-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/4144-89-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/4144-87-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/4144-85-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/4144-83-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/4144-81-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/4144-77-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/4144-75-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/4144-73-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/4144-71-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/4144-69-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/4144-65-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/4144-91-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/4144-63-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/4144-62-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 2768 un127247.exe 3952 83787907.exe 4144 rk844124.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 83787907.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 83787907.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 74d1ccd9b7c8431889388133b754a7923c201576922e978f156c312f746b9fa6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un127247.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1016 3952 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 74d1ccd9b7c8431889388133b754a7923c201576922e978f156c312f746b9fa6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un127247.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 83787907.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rk844124.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3952 83787907.exe 3952 83787907.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3952 83787907.exe Token: SeDebugPrivilege 4144 rk844124.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4560 wrote to memory of 2768 4560 74d1ccd9b7c8431889388133b754a7923c201576922e978f156c312f746b9fa6.exe 83 PID 4560 wrote to memory of 2768 4560 74d1ccd9b7c8431889388133b754a7923c201576922e978f156c312f746b9fa6.exe 83 PID 4560 wrote to memory of 2768 4560 74d1ccd9b7c8431889388133b754a7923c201576922e978f156c312f746b9fa6.exe 83 PID 2768 wrote to memory of 3952 2768 un127247.exe 84 PID 2768 wrote to memory of 3952 2768 un127247.exe 84 PID 2768 wrote to memory of 3952 2768 un127247.exe 84 PID 2768 wrote to memory of 4144 2768 un127247.exe 100 PID 2768 wrote to memory of 4144 2768 un127247.exe 100 PID 2768 wrote to memory of 4144 2768 un127247.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\74d1ccd9b7c8431889388133b754a7923c201576922e978f156c312f746b9fa6.exe"C:\Users\Admin\AppData\Local\Temp\74d1ccd9b7c8431889388133b754a7923c201576922e978f156c312f746b9fa6.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un127247.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un127247.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\83787907.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\83787907.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3952 -s 10884⤵
- Program crash
PID:1016
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk844124.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk844124.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4144
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3952 -ip 39521⤵PID:4724
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
540KB
MD58132d278460997dbe151575d6a3c20ce
SHA1d1b904fd39cc4eb5f0d59be47c756e442053a309
SHA256674a94750cb008b11cd3d32fade9d75da1fae3cca13c099c0926c486ffafb1f3
SHA5125a3959b9cd367a3b5eb45ec091027bcfc83c2b845fb2d65377e0ba2c2a0c2db836ba3277a8e466e7e6384caa6111dd2c0d71ef24b100e65f86d09e6d8763f58b
-
Filesize
258KB
MD5a5c38a777dbfa93db1a7489c46c769b1
SHA19e37b42e9f0f0b15185e3499b1bbef6f54d3103f
SHA2560f3ed5bd903545fce05b21fd0b252b172f2063d9e34d7c989e543a495cf8a7b0
SHA512f559d262ea0e0bbef16c945363192adb358ae60d06305a5ccaa192f5968d2318482838881dfa90902d74a13da096e12a2e564b1b541bad6b1cfa883b3a6e8376
-
Filesize
340KB
MD5efb0d765a6133829cb796f0df33d8de3
SHA115ce6c874d6636f937ada5cc09eefd916f9507e5
SHA25641d164e9ccb2b689c56d228be7f94766f3060286d7e49ce3f6b98adb32b754d3
SHA512ad3d4c5d34ef78d4c9e5f7ce350d8f977da06353172905e86c940fb6b12cb327ae82bead04a44ee3e545d150237a78a161d19541b7f258c7e58491e7d84a97c3