Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 00:43
Static task
static1
Behavioral task
behavioral1
Sample
3caf0f237ee60a64d3e6d7da62589cadb6dbd22fcf37677c70c865225894a30b.exe
Resource
win10v2004-20241007-en
General
-
Target
3caf0f237ee60a64d3e6d7da62589cadb6dbd22fcf37677c70c865225894a30b.exe
-
Size
704KB
-
MD5
eec562423dca90c4de4815e5d888d5df
-
SHA1
0b57a6f3c19939ba20f5fcdc9f4fc25145029670
-
SHA256
3caf0f237ee60a64d3e6d7da62589cadb6dbd22fcf37677c70c865225894a30b
-
SHA512
4eb9101250f605b1c94398caaa0536484cd54658749256512eb3fdd0b22b7da3d0c5a90da07efc88852d1bee0a0074b6c98d7f3107b72f713cafc926b44ca24f
-
SSDEEP
12288:qy907xNg4N1AmBC67iMLS0YmRCYjgMWC0ixKg+aB2h5w:qyinx17BBWxEEAgpqxKSB2k
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/4704-18-0x0000000004BC0000-0x0000000004BDA000-memory.dmp healer behavioral1/memory/4704-20-0x0000000004DF0000-0x0000000004E08000-memory.dmp healer behavioral1/memory/4704-46-0x0000000004DF0000-0x0000000004E02000-memory.dmp healer behavioral1/memory/4704-45-0x0000000004DF0000-0x0000000004E02000-memory.dmp healer behavioral1/memory/4704-42-0x0000000004DF0000-0x0000000004E02000-memory.dmp healer behavioral1/memory/4704-40-0x0000000004DF0000-0x0000000004E02000-memory.dmp healer behavioral1/memory/4704-38-0x0000000004DF0000-0x0000000004E02000-memory.dmp healer behavioral1/memory/4704-36-0x0000000004DF0000-0x0000000004E02000-memory.dmp healer behavioral1/memory/4704-34-0x0000000004DF0000-0x0000000004E02000-memory.dmp healer behavioral1/memory/4704-32-0x0000000004DF0000-0x0000000004E02000-memory.dmp healer behavioral1/memory/4704-30-0x0000000004DF0000-0x0000000004E02000-memory.dmp healer behavioral1/memory/4704-28-0x0000000004DF0000-0x0000000004E02000-memory.dmp healer behavioral1/memory/4704-26-0x0000000004DF0000-0x0000000004E02000-memory.dmp healer behavioral1/memory/4704-24-0x0000000004DF0000-0x0000000004E02000-memory.dmp healer behavioral1/memory/4704-48-0x0000000004DF0000-0x0000000004E02000-memory.dmp healer behavioral1/memory/4704-22-0x0000000004DF0000-0x0000000004E02000-memory.dmp healer behavioral1/memory/4704-21-0x0000000004DF0000-0x0000000004E02000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr076136.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr076136.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr076136.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr076136.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr076136.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr076136.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3584-60-0x0000000004A10000-0x0000000004A4C000-memory.dmp family_redline behavioral1/memory/3584-61-0x0000000004BB0000-0x0000000004BEA000-memory.dmp family_redline behavioral1/memory/3584-67-0x0000000004BB0000-0x0000000004BE5000-memory.dmp family_redline behavioral1/memory/3584-65-0x0000000004BB0000-0x0000000004BE5000-memory.dmp family_redline behavioral1/memory/3584-63-0x0000000004BB0000-0x0000000004BE5000-memory.dmp family_redline behavioral1/memory/3584-62-0x0000000004BB0000-0x0000000004BE5000-memory.dmp family_redline behavioral1/memory/3584-77-0x0000000004BB0000-0x0000000004BE5000-memory.dmp family_redline behavioral1/memory/3584-95-0x0000000004BB0000-0x0000000004BE5000-memory.dmp family_redline behavioral1/memory/3584-93-0x0000000004BB0000-0x0000000004BE5000-memory.dmp family_redline behavioral1/memory/3584-91-0x0000000004BB0000-0x0000000004BE5000-memory.dmp family_redline behavioral1/memory/3584-87-0x0000000004BB0000-0x0000000004BE5000-memory.dmp family_redline behavioral1/memory/3584-85-0x0000000004BB0000-0x0000000004BE5000-memory.dmp family_redline behavioral1/memory/3584-83-0x0000000004BB0000-0x0000000004BE5000-memory.dmp family_redline behavioral1/memory/3584-81-0x0000000004BB0000-0x0000000004BE5000-memory.dmp family_redline behavioral1/memory/3584-75-0x0000000004BB0000-0x0000000004BE5000-memory.dmp family_redline behavioral1/memory/3584-73-0x0000000004BB0000-0x0000000004BE5000-memory.dmp family_redline behavioral1/memory/3584-71-0x0000000004BB0000-0x0000000004BE5000-memory.dmp family_redline behavioral1/memory/3584-69-0x0000000004BB0000-0x0000000004BE5000-memory.dmp family_redline behavioral1/memory/3584-90-0x0000000004BB0000-0x0000000004BE5000-memory.dmp family_redline behavioral1/memory/3584-79-0x0000000004BB0000-0x0000000004BE5000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 2392 un502815.exe 4704 pr076136.exe 3584 qu381044.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr076136.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr076136.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3caf0f237ee60a64d3e6d7da62589cadb6dbd22fcf37677c70c865225894a30b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un502815.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3180 4704 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr076136.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu381044.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3caf0f237ee60a64d3e6d7da62589cadb6dbd22fcf37677c70c865225894a30b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un502815.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4704 pr076136.exe 4704 pr076136.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4704 pr076136.exe Token: SeDebugPrivilege 3584 qu381044.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4208 wrote to memory of 2392 4208 3caf0f237ee60a64d3e6d7da62589cadb6dbd22fcf37677c70c865225894a30b.exe 83 PID 4208 wrote to memory of 2392 4208 3caf0f237ee60a64d3e6d7da62589cadb6dbd22fcf37677c70c865225894a30b.exe 83 PID 4208 wrote to memory of 2392 4208 3caf0f237ee60a64d3e6d7da62589cadb6dbd22fcf37677c70c865225894a30b.exe 83 PID 2392 wrote to memory of 4704 2392 un502815.exe 84 PID 2392 wrote to memory of 4704 2392 un502815.exe 84 PID 2392 wrote to memory of 4704 2392 un502815.exe 84 PID 2392 wrote to memory of 3584 2392 un502815.exe 99 PID 2392 wrote to memory of 3584 2392 un502815.exe 99 PID 2392 wrote to memory of 3584 2392 un502815.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\3caf0f237ee60a64d3e6d7da62589cadb6dbd22fcf37677c70c865225894a30b.exe"C:\Users\Admin\AppData\Local\Temp\3caf0f237ee60a64d3e6d7da62589cadb6dbd22fcf37677c70c865225894a30b.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un502815.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un502815.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr076136.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr076136.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4704 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4704 -s 10804⤵
- Program crash
PID:3180
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu381044.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu381044.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3584
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4704 -ip 47041⤵PID:1440
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
550KB
MD5050d9060860d2e8e7a4eb289b627479e
SHA1757e45fb08cd03dae96cff055d79f6e6fdf14c6b
SHA256a24dcf0c4d18f67292b65c9b65cabc1796d6c1205fa7c52891c856e9ff0bb53d
SHA51276ea86ff8b9ee1f4320c14816d111c69ee9d9c3c949142b54be893d18fe22d59d1c2e38c3f8f1a5e4a4479eb4f1ff9f116c18efc6dc1679f6dd07198666f6f85
-
Filesize
277KB
MD574053d1416690bccb7a7f1be6dad5d3c
SHA1e2573a12a39c24c2ddcf917d7ce055f7c9fb17f7
SHA25658a840dab9859dcc875aeabd42defc0a3c4bdb95c80ef65b4be4f4b068a46c71
SHA512b13100dcc9584b965e7c4d8b6e811bca128919908246f4195bda63fc9a66948e22ad618579579fe20c797acf1423e3ad1453ed7909434b2c0f72000cc169529d
-
Filesize
361KB
MD514d33f6609b1257a63dc1ae0b34f6a25
SHA1568fec38983bd7697a139cd609cc8a2e029760ad
SHA256417603778236b838a2daf5e1f17caf829f0d0e5894b9d18f3e2e8b1584d96973
SHA5128fffd02cd608218e9b327db1eaf3de19467873741ca13296ef6cd49819b6e73bd605d2c3708a50a20727c2f9a3dc279d9e03849fa08a79daa4e32d05919c2c23