Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 00:26
Static task
static1
Behavioral task
behavioral1
Sample
dcff21ef97fdb0091103d2c9f761b2efc46ce57cab499ec579aaee68e0d54539.exe
Resource
win10v2004-20241007-en
General
-
Target
dcff21ef97fdb0091103d2c9f761b2efc46ce57cab499ec579aaee68e0d54539.exe
-
Size
706KB
-
MD5
37e6f05d4f0595060c99cc4d85e516dc
-
SHA1
25f890f538fb5b3cc450e12fbb2bd1e2b9aca033
-
SHA256
dcff21ef97fdb0091103d2c9f761b2efc46ce57cab499ec579aaee68e0d54539
-
SHA512
fed1e07e2c9b8bb250119c22872faed527bcd2d6a26c7955420115795eee6b806735bf976041b63eb7bf8ec83925f3ebac9f6790e43d80de9bc79e330a8913df
-
SSDEEP
12288:yy90WePmP6w/hruRB+1/nKsK3+/EHoYdW4drbJY8c09lZihU6OX:yyOPmxhx/S3+/EHHdRrbTcKx6OX
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/2104-18-0x0000000004AB0000-0x0000000004ACA000-memory.dmp healer behavioral1/memory/2104-20-0x0000000004D00000-0x0000000004D18000-memory.dmp healer behavioral1/memory/2104-46-0x0000000004D00000-0x0000000004D12000-memory.dmp healer behavioral1/memory/2104-48-0x0000000004D00000-0x0000000004D12000-memory.dmp healer behavioral1/memory/2104-44-0x0000000004D00000-0x0000000004D12000-memory.dmp healer behavioral1/memory/2104-42-0x0000000004D00000-0x0000000004D12000-memory.dmp healer behavioral1/memory/2104-40-0x0000000004D00000-0x0000000004D12000-memory.dmp healer behavioral1/memory/2104-38-0x0000000004D00000-0x0000000004D12000-memory.dmp healer behavioral1/memory/2104-36-0x0000000004D00000-0x0000000004D12000-memory.dmp healer behavioral1/memory/2104-34-0x0000000004D00000-0x0000000004D12000-memory.dmp healer behavioral1/memory/2104-32-0x0000000004D00000-0x0000000004D12000-memory.dmp healer behavioral1/memory/2104-28-0x0000000004D00000-0x0000000004D12000-memory.dmp healer behavioral1/memory/2104-30-0x0000000004D00000-0x0000000004D12000-memory.dmp healer behavioral1/memory/2104-26-0x0000000004D00000-0x0000000004D12000-memory.dmp healer behavioral1/memory/2104-24-0x0000000004D00000-0x0000000004D12000-memory.dmp healer behavioral1/memory/2104-22-0x0000000004D00000-0x0000000004D12000-memory.dmp healer behavioral1/memory/2104-21-0x0000000004D00000-0x0000000004D12000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr438877.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr438877.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr438877.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr438877.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr438877.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr438877.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/728-60-0x0000000007130000-0x000000000716C000-memory.dmp family_redline behavioral1/memory/728-61-0x00000000071B0000-0x00000000071EA000-memory.dmp family_redline behavioral1/memory/728-63-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/728-75-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/728-95-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/728-94-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/728-89-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/728-87-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/728-85-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/728-81-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/728-79-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/728-77-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/728-73-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/728-71-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/728-69-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/728-67-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/728-65-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/728-91-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/728-83-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/728-62-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3700 un943050.exe 2104 pr438877.exe 728 qu851466.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr438877.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr438877.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" dcff21ef97fdb0091103d2c9f761b2efc46ce57cab499ec579aaee68e0d54539.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un943050.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2732 2104 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu851466.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dcff21ef97fdb0091103d2c9f761b2efc46ce57cab499ec579aaee68e0d54539.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un943050.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr438877.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2104 pr438877.exe 2104 pr438877.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2104 pr438877.exe Token: SeDebugPrivilege 728 qu851466.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1552 wrote to memory of 3700 1552 dcff21ef97fdb0091103d2c9f761b2efc46ce57cab499ec579aaee68e0d54539.exe 83 PID 1552 wrote to memory of 3700 1552 dcff21ef97fdb0091103d2c9f761b2efc46ce57cab499ec579aaee68e0d54539.exe 83 PID 1552 wrote to memory of 3700 1552 dcff21ef97fdb0091103d2c9f761b2efc46ce57cab499ec579aaee68e0d54539.exe 83 PID 3700 wrote to memory of 2104 3700 un943050.exe 84 PID 3700 wrote to memory of 2104 3700 un943050.exe 84 PID 3700 wrote to memory of 2104 3700 un943050.exe 84 PID 3700 wrote to memory of 728 3700 un943050.exe 98 PID 3700 wrote to memory of 728 3700 un943050.exe 98 PID 3700 wrote to memory of 728 3700 un943050.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\dcff21ef97fdb0091103d2c9f761b2efc46ce57cab499ec579aaee68e0d54539.exe"C:\Users\Admin\AppData\Local\Temp\dcff21ef97fdb0091103d2c9f761b2efc46ce57cab499ec579aaee68e0d54539.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un943050.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un943050.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr438877.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr438877.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2104 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2104 -s 10644⤵
- Program crash
PID:2732
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu851466.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu851466.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:728
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2104 -ip 21041⤵PID:856
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
552KB
MD598494bcd3b809a7a8e9f3f9c98509591
SHA14b7c22c0acc3ff7c8a564ab02d46ed1eb982ee7f
SHA256e9113b7d626a94afb3491929284360b707f9c31101011f487045ed1ed01c79d1
SHA51228f28d54efaab78b9e84f7bd00cb76721006a416612ba69006fff817993af5417749b231bea96722963aa93ff7318e9953bbc385c37e67e18a47edda3ee0bfe2
-
Filesize
299KB
MD5cb3304d97fdb9683d0663beaf0ace7d7
SHA129cc03cbba7d6fa73b97ca04d077f59a016f551b
SHA256e215ec1d1675c5982a8d51c3d67b64e0484646b531d04fc00387a42416260883
SHA5127861c6d257c36fabfbaa018591c2f7257ceb9f37b458ecd40ba036c1816836e525f208771992a6293c6766d19aceec8d8d40144ec2f0aafb4d93f727731f014e
-
Filesize
382KB
MD58c6689a37cd079f64a3e2ee9e1eff49d
SHA1757a2d8f77245527946fd9cf59536181451896f7
SHA2568922688665e2baef3f5080ae63096f5f5b6ead7b6d622bc4630c8ec39fdb31d7
SHA512ef81c6d0de7c3119fbda9c3218c08ed504eec5b2d43d2a43690ce6f1ddf4457faecc55d9621e11cbc5975272705f48408f6abf8891f0a4a945c2f2a20f9689fb