Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/11/2024, 00:11
Static task
static1
Behavioral task
behavioral1
Sample
fe2fec6cbc39ed8d5326d5a28e799909abb2efae1e28f4d303d3cb6f0a8c3e13.exe
Resource
win10v2004-20241007-en
General
-
Target
fe2fec6cbc39ed8d5326d5a28e799909abb2efae1e28f4d303d3cb6f0a8c3e13.exe
-
Size
695KB
-
MD5
c18efaddb3d1f2d93e14b54e2d6507e9
-
SHA1
dc93a3917795efe9cfd7f2da40e2632c12733fcd
-
SHA256
fe2fec6cbc39ed8d5326d5a28e799909abb2efae1e28f4d303d3cb6f0a8c3e13
-
SHA512
cf971d8bc49456ab0c7eca6dcfc522f9843002c732771973e5dc21537324a199dbd98f02b47e816b4ef5dd2dee04cb840be6957be8b5ed232576d82c504852f8
-
SSDEEP
12288:5y909Yd6ImNeVEQFDs+jx11jnhiNePEFvfBxFR7pcZBbyU5x:5yBtm8D5xvQ4PUvpDR7pyBbb
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/1060-18-0x00000000049B0000-0x00000000049CA000-memory.dmp healer behavioral1/memory/1060-20-0x0000000007720000-0x0000000007738000-memory.dmp healer behavioral1/memory/1060-24-0x0000000007720000-0x0000000007732000-memory.dmp healer behavioral1/memory/1060-48-0x0000000007720000-0x0000000007732000-memory.dmp healer behavioral1/memory/1060-46-0x0000000007720000-0x0000000007732000-memory.dmp healer behavioral1/memory/1060-45-0x0000000007720000-0x0000000007732000-memory.dmp healer behavioral1/memory/1060-42-0x0000000007720000-0x0000000007732000-memory.dmp healer behavioral1/memory/1060-40-0x0000000007720000-0x0000000007732000-memory.dmp healer behavioral1/memory/1060-38-0x0000000007720000-0x0000000007732000-memory.dmp healer behavioral1/memory/1060-36-0x0000000007720000-0x0000000007732000-memory.dmp healer behavioral1/memory/1060-34-0x0000000007720000-0x0000000007732000-memory.dmp healer behavioral1/memory/1060-32-0x0000000007720000-0x0000000007732000-memory.dmp healer behavioral1/memory/1060-30-0x0000000007720000-0x0000000007732000-memory.dmp healer behavioral1/memory/1060-28-0x0000000007720000-0x0000000007732000-memory.dmp healer behavioral1/memory/1060-26-0x0000000007720000-0x0000000007732000-memory.dmp healer behavioral1/memory/1060-22-0x0000000007720000-0x0000000007732000-memory.dmp healer behavioral1/memory/1060-21-0x0000000007720000-0x0000000007732000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr631886.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr631886.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr631886.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr631886.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr631886.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr631886.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/864-60-0x0000000007120000-0x000000000715C000-memory.dmp family_redline behavioral1/memory/864-61-0x00000000071A0000-0x00000000071DA000-memory.dmp family_redline behavioral1/memory/864-63-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/864-62-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/864-81-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/864-95-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/864-93-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/864-91-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/864-89-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/864-87-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/864-85-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/864-83-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/864-79-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/864-77-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/864-75-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/864-73-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/864-71-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/864-69-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/864-67-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/864-65-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4064 un955703.exe 1060 pr631886.exe 864 qu320824.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr631886.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr631886.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fe2fec6cbc39ed8d5326d5a28e799909abb2efae1e28f4d303d3cb6f0a8c3e13.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un955703.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1192 1060 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fe2fec6cbc39ed8d5326d5a28e799909abb2efae1e28f4d303d3cb6f0a8c3e13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un955703.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr631886.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu320824.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1060 pr631886.exe 1060 pr631886.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1060 pr631886.exe Token: SeDebugPrivilege 864 qu320824.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 512 wrote to memory of 4064 512 fe2fec6cbc39ed8d5326d5a28e799909abb2efae1e28f4d303d3cb6f0a8c3e13.exe 83 PID 512 wrote to memory of 4064 512 fe2fec6cbc39ed8d5326d5a28e799909abb2efae1e28f4d303d3cb6f0a8c3e13.exe 83 PID 512 wrote to memory of 4064 512 fe2fec6cbc39ed8d5326d5a28e799909abb2efae1e28f4d303d3cb6f0a8c3e13.exe 83 PID 4064 wrote to memory of 1060 4064 un955703.exe 86 PID 4064 wrote to memory of 1060 4064 un955703.exe 86 PID 4064 wrote to memory of 1060 4064 un955703.exe 86 PID 4064 wrote to memory of 864 4064 un955703.exe 95 PID 4064 wrote to memory of 864 4064 un955703.exe 95 PID 4064 wrote to memory of 864 4064 un955703.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe2fec6cbc39ed8d5326d5a28e799909abb2efae1e28f4d303d3cb6f0a8c3e13.exe"C:\Users\Admin\AppData\Local\Temp\fe2fec6cbc39ed8d5326d5a28e799909abb2efae1e28f4d303d3cb6f0a8c3e13.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un955703.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un955703.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr631886.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr631886.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1060 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1060 -s 10764⤵
- Program crash
PID:1192
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu320824.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu320824.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:864
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1060 -ip 10601⤵PID:1788
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
541KB
MD5aa9e34444761eb4cd3630850f7de375d
SHA17f337bb223153c6f99d7642bf2b51901355a87f9
SHA2560d7173af7a3d1301ebb935d399a238b4bd1d4edcde7fd58658e4d4629ce805a8
SHA512d92ababc1230bab46d3e9e87148ed85639288af496acb6064f6f9f1f6c662af8f7b4e29514e59feaba9c72e58e66d82a42ce7e559f2d21f07597a0496e38d393
-
Filesize
277KB
MD57d5ad6cf611f25d7633e7d76c1d0362e
SHA1eb18f2c8261f39986bd98dd2ec73ff2ff49701be
SHA256fa15e11529f8e6459f15b56befcd45271ff6ca5f9d518658a66427798157bc9e
SHA512549ef45e5115a3224d5004c4ab339bbc826feda84d390fc2028e5d36cb29cacf7534a00c879772e6cd669e6505aab2fc85a1207687cce8d8405251a6b3c3f162
-
Filesize
360KB
MD5f17ddf48b835b7a452f8a919f6c943d3
SHA17aae3d6337a7e31ea3a6a517f5bfe5c99e7e3b94
SHA25627319de6717899e31b3fe1f313f65529eb0113a50ae468a02d55cf5b0d95dc02
SHA5123ebf3eaa435ee90363e97ec150d0329c8eccf69c9ff38cc4bae1ce75d24b9ee84b3518dab59bebc6108306af103d2f38c663f29bd71362b20ac17f4b0d9e466b