Analysis
-
max time kernel
113s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 21:19
Static task
static1
Behavioral task
behavioral1
Sample
561d703d3d761c1b27d967746069043443c5973a82032b41e38f7f132369fa9d.exe
Resource
win10v2004-20241007-en
General
-
Target
561d703d3d761c1b27d967746069043443c5973a82032b41e38f7f132369fa9d.exe
-
Size
696KB
-
MD5
c5e42bafbca6d049f4cd99ef0f027541
-
SHA1
ee172b08ab3ce627f7e2167f042ee2a1312a5276
-
SHA256
561d703d3d761c1b27d967746069043443c5973a82032b41e38f7f132369fa9d
-
SHA512
1050e69d91f23d67d5004f23642df4d1b79ccaaa96bfa01b85a46e854b5ed35257bcd899ef251cfa9e89858e3d6785e5846334f68a21314200cd8f8a76543fb7
-
SSDEEP
12288:+y90igmVA5zd1fzi/4l+NfLGeeFH2+Xm7INtHLlMqdcpAboPE:+ylgyodJWaQDBell28dyACE
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/1576-18-0x00000000048F0000-0x000000000490A000-memory.dmp healer behavioral1/memory/1576-20-0x0000000004CF0000-0x0000000004D08000-memory.dmp healer behavioral1/memory/1576-21-0x0000000004CF0000-0x0000000004D03000-memory.dmp healer behavioral1/memory/1576-48-0x0000000004CF0000-0x0000000004D03000-memory.dmp healer behavioral1/memory/1576-46-0x0000000004CF0000-0x0000000004D03000-memory.dmp healer behavioral1/memory/1576-44-0x0000000004CF0000-0x0000000004D03000-memory.dmp healer behavioral1/memory/1576-42-0x0000000004CF0000-0x0000000004D03000-memory.dmp healer behavioral1/memory/1576-40-0x0000000004CF0000-0x0000000004D03000-memory.dmp healer behavioral1/memory/1576-39-0x0000000004CF0000-0x0000000004D03000-memory.dmp healer behavioral1/memory/1576-36-0x0000000004CF0000-0x0000000004D03000-memory.dmp healer behavioral1/memory/1576-34-0x0000000004CF0000-0x0000000004D03000-memory.dmp healer behavioral1/memory/1576-32-0x0000000004CF0000-0x0000000004D03000-memory.dmp healer behavioral1/memory/1576-30-0x0000000004CF0000-0x0000000004D03000-memory.dmp healer behavioral1/memory/1576-28-0x0000000004CF0000-0x0000000004D03000-memory.dmp healer behavioral1/memory/1576-26-0x0000000004CF0000-0x0000000004D03000-memory.dmp healer behavioral1/memory/1576-24-0x0000000004CF0000-0x0000000004D03000-memory.dmp healer behavioral1/memory/1576-22-0x0000000004CF0000-0x0000000004D03000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 11534139.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 11534139.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 11534139.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 11534139.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 11534139.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 11534139.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4924-60-0x00000000070E0000-0x000000000711C000-memory.dmp family_redline behavioral1/memory/4924-61-0x0000000007170000-0x00000000071AA000-memory.dmp family_redline behavioral1/memory/4924-77-0x0000000007170000-0x00000000071A5000-memory.dmp family_redline behavioral1/memory/4924-81-0x0000000007170000-0x00000000071A5000-memory.dmp family_redline behavioral1/memory/4924-95-0x0000000007170000-0x00000000071A5000-memory.dmp family_redline behavioral1/memory/4924-93-0x0000000007170000-0x00000000071A5000-memory.dmp family_redline behavioral1/memory/4924-91-0x0000000007170000-0x00000000071A5000-memory.dmp family_redline behavioral1/memory/4924-89-0x0000000007170000-0x00000000071A5000-memory.dmp family_redline behavioral1/memory/4924-87-0x0000000007170000-0x00000000071A5000-memory.dmp family_redline behavioral1/memory/4924-85-0x0000000007170000-0x00000000071A5000-memory.dmp family_redline behavioral1/memory/4924-83-0x0000000007170000-0x00000000071A5000-memory.dmp family_redline behavioral1/memory/4924-79-0x0000000007170000-0x00000000071A5000-memory.dmp family_redline behavioral1/memory/4924-75-0x0000000007170000-0x00000000071A5000-memory.dmp family_redline behavioral1/memory/4924-74-0x0000000007170000-0x00000000071A5000-memory.dmp family_redline behavioral1/memory/4924-71-0x0000000007170000-0x00000000071A5000-memory.dmp family_redline behavioral1/memory/4924-69-0x0000000007170000-0x00000000071A5000-memory.dmp family_redline behavioral1/memory/4924-67-0x0000000007170000-0x00000000071A5000-memory.dmp family_redline behavioral1/memory/4924-65-0x0000000007170000-0x00000000071A5000-memory.dmp family_redline behavioral1/memory/4924-63-0x0000000007170000-0x00000000071A5000-memory.dmp family_redline behavioral1/memory/4924-62-0x0000000007170000-0x00000000071A5000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4840 un020344.exe 1576 11534139.exe 4924 rk659125.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 11534139.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 11534139.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 561d703d3d761c1b27d967746069043443c5973a82032b41e38f7f132369fa9d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un020344.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4036 1576 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 11534139.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rk659125.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 561d703d3d761c1b27d967746069043443c5973a82032b41e38f7f132369fa9d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un020344.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1576 11534139.exe 1576 11534139.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1576 11534139.exe Token: SeDebugPrivilege 4924 rk659125.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4692 wrote to memory of 4840 4692 561d703d3d761c1b27d967746069043443c5973a82032b41e38f7f132369fa9d.exe 84 PID 4692 wrote to memory of 4840 4692 561d703d3d761c1b27d967746069043443c5973a82032b41e38f7f132369fa9d.exe 84 PID 4692 wrote to memory of 4840 4692 561d703d3d761c1b27d967746069043443c5973a82032b41e38f7f132369fa9d.exe 84 PID 4840 wrote to memory of 1576 4840 un020344.exe 86 PID 4840 wrote to memory of 1576 4840 un020344.exe 86 PID 4840 wrote to memory of 1576 4840 un020344.exe 86 PID 4840 wrote to memory of 4924 4840 un020344.exe 95 PID 4840 wrote to memory of 4924 4840 un020344.exe 95 PID 4840 wrote to memory of 4924 4840 un020344.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\561d703d3d761c1b27d967746069043443c5973a82032b41e38f7f132369fa9d.exe"C:\Users\Admin\AppData\Local\Temp\561d703d3d761c1b27d967746069043443c5973a82032b41e38f7f132369fa9d.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un020344.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un020344.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\11534139.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\11534139.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1576 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1576 -s 10884⤵
- Program crash
PID:4036
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk659125.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk659125.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4924
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1576 -ip 15761⤵PID:1092
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
542KB
MD56d141a719f22314710ab249cc4932d0f
SHA15e5b252a52c1208ea4ad36a208fad3975aaba721
SHA25630b32a8dd17c611a47e77cd1d65e233b7656c56083abbc7797e1e730759b496c
SHA512f818e4cd146954e2ef16a54a8de8858fc7c82416177a7c416a0088b6c3a2b7a11a2c778a92be39b1fff8612be36193fc93d3e4ebd2741a5945c9622f502305cf
-
Filesize
263KB
MD56c4b537048ca04bd226e0b13c370c798
SHA155a4ff712a3dea3ad758d4353237a2af8d839f19
SHA256fb901f4fa28cb74cd84949fb4fa592068bd928fe2ad6ea0d80bb922f48cac973
SHA5127271919501cf513531e14008617b7971e14bc6fb49095cba34989d9d7f9dde8ce6a1068e214a6997edadcd8b936e9b31ccb354b7b6f3d4f8f76acbe7f727584a
-
Filesize
328KB
MD530d260b1458f9ed744ed768b16281df0
SHA17f5c9b26cdef7849eb679b78cb09c93594134c06
SHA2567b0ec51174277512366d00f113640924e9e628974f9da5ae8e88aa490be3b51b
SHA512ce10050289e816198a75557ae5dc3ea7ddf0d633b4279f7cb0e2dce02884c46835760b66802c512ceba7634b0b2fb021b282a08a6926ade082859ca935167537