Analysis
-
max time kernel
96s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 23:47
Static task
static1
Behavioral task
behavioral1
Sample
70688830c81efabee4ea50e39b6c1b6b475cd155ec77ad352dd8a7ebe268ecb9.exe
Resource
win10v2004-20241007-en
General
-
Target
70688830c81efabee4ea50e39b6c1b6b475cd155ec77ad352dd8a7ebe268ecb9.exe
-
Size
739KB
-
MD5
3196cd2bfaf754ba1e799cab8288e672
-
SHA1
fa5720443ea335158b7241a9a1497f566efd1305
-
SHA256
70688830c81efabee4ea50e39b6c1b6b475cd155ec77ad352dd8a7ebe268ecb9
-
SHA512
fd4649ca4a475b6739d02a2c8e636ca56c8cfca1164f65bcd52553bfc6bf8a5aa1fa8087e1cc4146e2247acfb54cdc93a323300ce60bc048fc06d7c420250381
-
SSDEEP
12288:ry90AmrpSmIwi/42zKWtTK3AFDXiBZX50el2/74RcZUVnMfw/gzJ29C1QOF:ryyrzidtPFiKeldMUZMfw/gt2ohF
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/2980-2141-0x00000000052F0000-0x00000000052FA000-memory.dmp healer behavioral1/files/0x000a000000023b9f-2147.dat healer behavioral1/memory/2496-2155-0x0000000000A30000-0x0000000000A3A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/1244-4310-0x0000000005760000-0x0000000005792000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 53795342.exe -
Executes dropped EXE 3 IoCs
pid Process 2980 53795342.exe 2496 1.exe 1244 kp562560.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 1.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 70688830c81efabee4ea50e39b6c1b6b475cd155ec77ad352dd8a7ebe268ecb9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5632 1244 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 70688830c81efabee4ea50e39b6c1b6b475cd155ec77ad352dd8a7ebe268ecb9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 53795342.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kp562560.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2496 1.exe 2496 1.exe 2496 1.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2980 53795342.exe Token: SeDebugPrivilege 1244 kp562560.exe Token: SeDebugPrivilege 2496 1.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 456 wrote to memory of 2980 456 70688830c81efabee4ea50e39b6c1b6b475cd155ec77ad352dd8a7ebe268ecb9.exe 83 PID 456 wrote to memory of 2980 456 70688830c81efabee4ea50e39b6c1b6b475cd155ec77ad352dd8a7ebe268ecb9.exe 83 PID 456 wrote to memory of 2980 456 70688830c81efabee4ea50e39b6c1b6b475cd155ec77ad352dd8a7ebe268ecb9.exe 83 PID 2980 wrote to memory of 2496 2980 53795342.exe 87 PID 2980 wrote to memory of 2496 2980 53795342.exe 87 PID 456 wrote to memory of 1244 456 70688830c81efabee4ea50e39b6c1b6b475cd155ec77ad352dd8a7ebe268ecb9.exe 88 PID 456 wrote to memory of 1244 456 70688830c81efabee4ea50e39b6c1b6b475cd155ec77ad352dd8a7ebe268ecb9.exe 88 PID 456 wrote to memory of 1244 456 70688830c81efabee4ea50e39b6c1b6b475cd155ec77ad352dd8a7ebe268ecb9.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\70688830c81efabee4ea50e39b6c1b6b475cd155ec77ad352dd8a7ebe268ecb9.exe"C:\Users\Admin\AppData\Local\Temp\70688830c81efabee4ea50e39b6c1b6b475cd155ec77ad352dd8a7ebe268ecb9.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\53795342.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\53795342.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2496
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kp562560.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kp562560.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1244 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1244 -s 12203⤵
- Program crash
PID:5632
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1244 -ip 12441⤵PID:5520
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
301KB
MD58379d92275b678dc873a2e934f384caf
SHA1c6c8787a1c7401fca40959a73a97a110f08bc2e8
SHA256c6720d8b69a92dd85dc59f5f3319ed47d47a86c4b90d093b95262de23f87f0df
SHA5123f2951539a612fa123196499d492a6e2dd2309ca8483dfcffdc7c6f4ce1dad8d9b5c81726af7751491b2b0516bc516b389b75ca1e46978074fe6af334ff6fef2
-
Filesize
581KB
MD52382e09aa5d3fcdb562c8beabdc462de
SHA1a3e3b6090a19985c5f3e253a77897114f51e147a
SHA256ab55e63ff125171d8aa9724205007e04f490d853be4756e13198e704946e8279
SHA51204b594a8380ef2624c000dea66f2d7d2b9a0d4dabbf32bf27117978cc0ad46b07cdcc2a675db2798365932aaa9138e5291231616a8444902204122851987ef46
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91