Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/11/2024, 00:04
Static task
static1
Behavioral task
behavioral1
Sample
05281ef68bf4850380f98ffa689f65a875e2385f300e5848434e82322e9e77b5.exe
Resource
win10v2004-20241007-en
General
-
Target
05281ef68bf4850380f98ffa689f65a875e2385f300e5848434e82322e9e77b5.exe
-
Size
690KB
-
MD5
93b417625445f64d3600f466ddfb574b
-
SHA1
c2ce5d0eadcb20de66a1d73c430717ea9e81ee3b
-
SHA256
05281ef68bf4850380f98ffa689f65a875e2385f300e5848434e82322e9e77b5
-
SHA512
53d5411d492fd84725f17b313ca4f03a8c5fcd1cfd7b295f6ce0f688cbb2aa6927357eb4829aa02a6a2f4bee0739e076be98063ef44ccc8bb2a360e1c157f137
-
SSDEEP
12288:fy90iI90oRn5vVrgrMOx0sNW2Um1hLkz:fy1wFvZ5YA2UwhLg
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/3712-19-0x0000000004980000-0x000000000499A000-memory.dmp healer behavioral1/memory/3712-21-0x00000000049F0000-0x0000000004A08000-memory.dmp healer behavioral1/memory/3712-49-0x00000000049F0000-0x0000000004A03000-memory.dmp healer behavioral1/memory/3712-47-0x00000000049F0000-0x0000000004A03000-memory.dmp healer behavioral1/memory/3712-45-0x00000000049F0000-0x0000000004A03000-memory.dmp healer behavioral1/memory/3712-43-0x00000000049F0000-0x0000000004A03000-memory.dmp healer behavioral1/memory/3712-41-0x00000000049F0000-0x0000000004A03000-memory.dmp healer behavioral1/memory/3712-39-0x00000000049F0000-0x0000000004A03000-memory.dmp healer behavioral1/memory/3712-37-0x00000000049F0000-0x0000000004A03000-memory.dmp healer behavioral1/memory/3712-35-0x00000000049F0000-0x0000000004A03000-memory.dmp healer behavioral1/memory/3712-33-0x00000000049F0000-0x0000000004A03000-memory.dmp healer behavioral1/memory/3712-31-0x00000000049F0000-0x0000000004A03000-memory.dmp healer behavioral1/memory/3712-29-0x00000000049F0000-0x0000000004A03000-memory.dmp healer behavioral1/memory/3712-27-0x00000000049F0000-0x0000000004A03000-memory.dmp healer behavioral1/memory/3712-25-0x00000000049F0000-0x0000000004A03000-memory.dmp healer behavioral1/memory/3712-23-0x00000000049F0000-0x0000000004A03000-memory.dmp healer behavioral1/memory/3712-22-0x00000000049F0000-0x0000000004A03000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 18619693.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 18619693.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 18619693.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 18619693.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 18619693.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 18619693.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/972-60-0x0000000002410000-0x000000000244C000-memory.dmp family_redline behavioral1/memory/972-61-0x0000000002700000-0x000000000273A000-memory.dmp family_redline behavioral1/memory/972-67-0x0000000002700000-0x0000000002735000-memory.dmp family_redline behavioral1/memory/972-71-0x0000000002700000-0x0000000002735000-memory.dmp family_redline behavioral1/memory/972-69-0x0000000002700000-0x0000000002735000-memory.dmp family_redline behavioral1/memory/972-83-0x0000000002700000-0x0000000002735000-memory.dmp family_redline behavioral1/memory/972-65-0x0000000002700000-0x0000000002735000-memory.dmp family_redline behavioral1/memory/972-63-0x0000000002700000-0x0000000002735000-memory.dmp family_redline behavioral1/memory/972-62-0x0000000002700000-0x0000000002735000-memory.dmp family_redline behavioral1/memory/972-95-0x0000000002700000-0x0000000002735000-memory.dmp family_redline behavioral1/memory/972-93-0x0000000002700000-0x0000000002735000-memory.dmp family_redline behavioral1/memory/972-91-0x0000000002700000-0x0000000002735000-memory.dmp family_redline behavioral1/memory/972-89-0x0000000002700000-0x0000000002735000-memory.dmp family_redline behavioral1/memory/972-87-0x0000000002700000-0x0000000002735000-memory.dmp family_redline behavioral1/memory/972-85-0x0000000002700000-0x0000000002735000-memory.dmp family_redline behavioral1/memory/972-81-0x0000000002700000-0x0000000002735000-memory.dmp family_redline behavioral1/memory/972-79-0x0000000002700000-0x0000000002735000-memory.dmp family_redline behavioral1/memory/972-77-0x0000000002700000-0x0000000002735000-memory.dmp family_redline behavioral1/memory/972-75-0x0000000002700000-0x0000000002735000-memory.dmp family_redline behavioral1/memory/972-73-0x0000000002700000-0x0000000002735000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3592 un850738.exe 3712 18619693.exe 972 rk899340.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 18619693.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 18619693.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 05281ef68bf4850380f98ffa689f65a875e2385f300e5848434e82322e9e77b5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un850738.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2488 3712 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un850738.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 18619693.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rk899340.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 05281ef68bf4850380f98ffa689f65a875e2385f300e5848434e82322e9e77b5.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3712 18619693.exe 3712 18619693.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3712 18619693.exe Token: SeDebugPrivilege 972 rk899340.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3224 wrote to memory of 3592 3224 05281ef68bf4850380f98ffa689f65a875e2385f300e5848434e82322e9e77b5.exe 82 PID 3224 wrote to memory of 3592 3224 05281ef68bf4850380f98ffa689f65a875e2385f300e5848434e82322e9e77b5.exe 82 PID 3224 wrote to memory of 3592 3224 05281ef68bf4850380f98ffa689f65a875e2385f300e5848434e82322e9e77b5.exe 82 PID 3592 wrote to memory of 3712 3592 un850738.exe 83 PID 3592 wrote to memory of 3712 3592 un850738.exe 83 PID 3592 wrote to memory of 3712 3592 un850738.exe 83 PID 3592 wrote to memory of 972 3592 un850738.exe 99 PID 3592 wrote to memory of 972 3592 un850738.exe 99 PID 3592 wrote to memory of 972 3592 un850738.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\05281ef68bf4850380f98ffa689f65a875e2385f300e5848434e82322e9e77b5.exe"C:\Users\Admin\AppData\Local\Temp\05281ef68bf4850380f98ffa689f65a875e2385f300e5848434e82322e9e77b5.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un850738.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un850738.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\18619693.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\18619693.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3712 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3712 -s 10844⤵
- Program crash
PID:2488
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk899340.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk899340.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:972
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3712 -ip 37121⤵PID:2716
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
536KB
MD5fcd092b9654dafac4938fa9a772d1e41
SHA11cb1c106b921db297d0d909c94a1c1591ccda36a
SHA2565bd110ea861c7ebbc8fce439aa6f9dbf299d999c61e786e2aff1b306400c2c90
SHA5125aa0143af1817f7a141ec4f7591954d8ff176d54e23fbac05350d3bb5cfd65811f77e7fa8822c1dde0f3367fbe65c1751e219d1e5cbbb46fedfef90293e619ac
-
Filesize
259KB
MD5608ba1aaa1e7c1cefcb8001cf3a616f7
SHA120558566c55b217f35c89dd5ea2a6394cea62046
SHA256fe9cce0188922a27cb38f91d9b7f7a63241df33b5a6d61757e48724c78b752a0
SHA5120b55b0b6923a108c742657457f2400bc1db9da63c3448ed0a7909b454502f4c37021156af6e8fde665edada8d4680e75d3ee03f636d78cab285ac46595a39028
-
Filesize
341KB
MD504fd4f424a34069334e70adbbb39933b
SHA1ed6d53ed1a35e534610054a5e943ae867ed635f4
SHA2565f00aafda4a77ef86b48b9af3c30091700c1e39e1b7994893f85e77198a6d62f
SHA51204fff5d2b81297db4ddb02f5a5a32408907c0cee17ef4a79f2168e00d53548b72a5f1d266523b509cfe8c36ef4fc3917cfc36eff5dfc2b35aaddff7b690c4b2e