Analysis
-
max time kernel
144s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 00:16
Static task
static1
Behavioral task
behavioral1
Sample
9cdbe7c5cd62aa1ac0129b74f69c159acefbdf6809ec3edef7e9629f14d1ac6f.exe
Resource
win10v2004-20241007-en
General
-
Target
9cdbe7c5cd62aa1ac0129b74f69c159acefbdf6809ec3edef7e9629f14d1ac6f.exe
-
Size
695KB
-
MD5
5853fcf0ee1ac3bd51b139cb3c55ed51
-
SHA1
68753e6f47a896b27209985f155719c041f484da
-
SHA256
9cdbe7c5cd62aa1ac0129b74f69c159acefbdf6809ec3edef7e9629f14d1ac6f
-
SHA512
a7bbec8441b510625c660660aaa1c02313e893f1d065903426e3053993eb5561a291d1c478fe9a81ab3c654aa83a6d7873bd29c1353de6bda0b5a90a774b6a18
-
SSDEEP
12288:vdy90xhXDv1KJf3aJmxmrSEvYJwVGraRyndXBcppCQVogH:FyKDvoJf3xcOEAqErau8pNVoc
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/4028-17-0x0000000004C50000-0x0000000004C6A000-memory.dmp healer behavioral1/memory/4028-20-0x0000000004DF0000-0x0000000004E08000-memory.dmp healer behavioral1/memory/4028-26-0x0000000004DF0000-0x0000000004E02000-memory.dmp healer behavioral1/memory/4028-48-0x0000000004DF0000-0x0000000004E02000-memory.dmp healer behavioral1/memory/4028-46-0x0000000004DF0000-0x0000000004E02000-memory.dmp healer behavioral1/memory/4028-44-0x0000000004DF0000-0x0000000004E02000-memory.dmp healer behavioral1/memory/4028-43-0x0000000004DF0000-0x0000000004E02000-memory.dmp healer behavioral1/memory/4028-40-0x0000000004DF0000-0x0000000004E02000-memory.dmp healer behavioral1/memory/4028-38-0x0000000004DF0000-0x0000000004E02000-memory.dmp healer behavioral1/memory/4028-36-0x0000000004DF0000-0x0000000004E02000-memory.dmp healer behavioral1/memory/4028-34-0x0000000004DF0000-0x0000000004E02000-memory.dmp healer behavioral1/memory/4028-32-0x0000000004DF0000-0x0000000004E02000-memory.dmp healer behavioral1/memory/4028-30-0x0000000004DF0000-0x0000000004E02000-memory.dmp healer behavioral1/memory/4028-28-0x0000000004DF0000-0x0000000004E02000-memory.dmp healer behavioral1/memory/4028-24-0x0000000004DF0000-0x0000000004E02000-memory.dmp healer behavioral1/memory/4028-22-0x0000000004DF0000-0x0000000004E02000-memory.dmp healer behavioral1/memory/4028-21-0x0000000004DF0000-0x0000000004E02000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr872676.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr872676.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr872676.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr872676.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr872676.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr872676.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4736-59-0x0000000004B20000-0x0000000004B5C000-memory.dmp family_redline behavioral1/memory/4736-60-0x00000000071A0000-0x00000000071DA000-memory.dmp family_redline behavioral1/memory/4736-64-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4736-74-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4736-94-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4736-92-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4736-88-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4736-86-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4736-84-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4736-82-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4736-80-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4736-78-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4736-72-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4736-70-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4736-68-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4736-66-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4736-90-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4736-76-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4736-62-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4736-61-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 2024 un300004.exe 4028 pr872676.exe 4736 qu856367.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr872676.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr872676.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9cdbe7c5cd62aa1ac0129b74f69c159acefbdf6809ec3edef7e9629f14d1ac6f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un300004.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2692 4028 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9cdbe7c5cd62aa1ac0129b74f69c159acefbdf6809ec3edef7e9629f14d1ac6f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un300004.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr872676.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu856367.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4028 pr872676.exe 4028 pr872676.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4028 pr872676.exe Token: SeDebugPrivilege 4736 qu856367.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1464 wrote to memory of 2024 1464 9cdbe7c5cd62aa1ac0129b74f69c159acefbdf6809ec3edef7e9629f14d1ac6f.exe 83 PID 1464 wrote to memory of 2024 1464 9cdbe7c5cd62aa1ac0129b74f69c159acefbdf6809ec3edef7e9629f14d1ac6f.exe 83 PID 1464 wrote to memory of 2024 1464 9cdbe7c5cd62aa1ac0129b74f69c159acefbdf6809ec3edef7e9629f14d1ac6f.exe 83 PID 2024 wrote to memory of 4028 2024 un300004.exe 84 PID 2024 wrote to memory of 4028 2024 un300004.exe 84 PID 2024 wrote to memory of 4028 2024 un300004.exe 84 PID 2024 wrote to memory of 4736 2024 un300004.exe 97 PID 2024 wrote to memory of 4736 2024 un300004.exe 97 PID 2024 wrote to memory of 4736 2024 un300004.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\9cdbe7c5cd62aa1ac0129b74f69c159acefbdf6809ec3edef7e9629f14d1ac6f.exe"C:\Users\Admin\AppData\Local\Temp\9cdbe7c5cd62aa1ac0129b74f69c159acefbdf6809ec3edef7e9629f14d1ac6f.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un300004.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un300004.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr872676.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr872676.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4028 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4028 -s 10884⤵
- Program crash
PID:2692
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu856367.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu856367.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4736
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4028 -ip 40281⤵PID:2368
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
541KB
MD5973d6336ad75331cc126c139f12f8c34
SHA1ab5bf160d355098879b4d2c3dabc9752c04e0a8d
SHA2567949889b24e6560c5520b907535190beed96b69a5736e5b4fdb0012fcc19c1d9
SHA512c3e15f32d30baac3bca1e4482c5c16678f8057349496bd4df39b6aaa9cc53894566529e3f4b2b9d527acfaa1a4f846bb8c7609a64bfa83f8dddaf07e69dcdb8a
-
Filesize
269KB
MD53c016f8a9cdbaa53de561700393c8ed6
SHA1c94dfc11411e0d75869faeff440fe38e426ae9d3
SHA256c09f5929adb51d715fef916172a27327575075ba2aa3e56747c068207fcd0e0c
SHA51297caf716c9e2d6030c2283cdaef9f2ad25c1972467316f084189be9f0a25fb6b4d9f20b8118012a7c2e7b226f91d4db9c7713dac746d36a6edb929dfc1c2a877
-
Filesize
352KB
MD59fa99c615e2f02d7d18a06ea2c5b3b0f
SHA17bd54544b29e6e64de4d511bb42ac348d48de56a
SHA25602ef2bacec9be2248bd4073f2d9ce6a1fa8a44ca7d19e47c19bb0b0b36c97b29
SHA512e9b8cec235cdc58f7f33912975856491d6199a39af0a39154ab0eb8e0dfdac90c3dea16d30bb944c1689acfb17fcb7a98c0e4f8481790a975f434aa3e2f9d7d3