Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 00:31
Static task
static1
Behavioral task
behavioral1
Sample
6fbfefe15a8a892591997c3d4066191bbaa4a74df851c8ede1ac4a48e590fab2.exe
Resource
win10v2004-20241007-en
General
-
Target
6fbfefe15a8a892591997c3d4066191bbaa4a74df851c8ede1ac4a48e590fab2.exe
-
Size
695KB
-
MD5
2ddbc33cd37cd72473306998349c4fe1
-
SHA1
5cafc3fa7bd1c1837759817b40b37be8d2a5c237
-
SHA256
6fbfefe15a8a892591997c3d4066191bbaa4a74df851c8ede1ac4a48e590fab2
-
SHA512
0f79ef65a2d81b7a083e0025578dc9f30cc35e9a3ef7553f1d8d03380407b60dc986df3630cdfd791274ed9506d05a52c3111b24df51c38bf4e584c2517e34af
-
SSDEEP
12288:ky90LvEdNqQRIGg1SoM9js6dOTUG6UBPRHvU/5vleu2Kx5FUw7Bmz:ky1dkxv1SoM9jmvhRHvU/WKnDFQ
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/1524-18-0x0000000004C80000-0x0000000004C9A000-memory.dmp healer behavioral1/memory/1524-20-0x0000000007830000-0x0000000007848000-memory.dmp healer behavioral1/memory/1524-36-0x0000000007830000-0x0000000007843000-memory.dmp healer behavioral1/memory/1524-46-0x0000000007830000-0x0000000007843000-memory.dmp healer behavioral1/memory/1524-44-0x0000000007830000-0x0000000007843000-memory.dmp healer behavioral1/memory/1524-42-0x0000000007830000-0x0000000007843000-memory.dmp healer behavioral1/memory/1524-40-0x0000000007830000-0x0000000007843000-memory.dmp healer behavioral1/memory/1524-39-0x0000000007830000-0x0000000007843000-memory.dmp healer behavioral1/memory/1524-34-0x0000000007830000-0x0000000007843000-memory.dmp healer behavioral1/memory/1524-32-0x0000000007830000-0x0000000007843000-memory.dmp healer behavioral1/memory/1524-30-0x0000000007830000-0x0000000007843000-memory.dmp healer behavioral1/memory/1524-28-0x0000000007830000-0x0000000007843000-memory.dmp healer behavioral1/memory/1524-26-0x0000000007830000-0x0000000007843000-memory.dmp healer behavioral1/memory/1524-24-0x0000000007830000-0x0000000007843000-memory.dmp healer behavioral1/memory/1524-22-0x0000000007830000-0x0000000007843000-memory.dmp healer behavioral1/memory/1524-21-0x0000000007830000-0x0000000007843000-memory.dmp healer behavioral1/memory/1524-48-0x0000000007830000-0x0000000007843000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 68927530.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 68927530.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 68927530.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 68927530.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 68927530.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 68927530.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4832-59-0x00000000070F0000-0x000000000712C000-memory.dmp family_redline behavioral1/memory/4832-60-0x0000000007170000-0x00000000071AA000-memory.dmp family_redline behavioral1/memory/4832-66-0x0000000007170000-0x00000000071A5000-memory.dmp family_redline behavioral1/memory/4832-76-0x0000000007170000-0x00000000071A5000-memory.dmp family_redline behavioral1/memory/4832-92-0x0000000007170000-0x00000000071A5000-memory.dmp family_redline behavioral1/memory/4832-90-0x0000000007170000-0x00000000071A5000-memory.dmp family_redline behavioral1/memory/4832-88-0x0000000007170000-0x00000000071A5000-memory.dmp family_redline behavioral1/memory/4832-87-0x0000000007170000-0x00000000071A5000-memory.dmp family_redline behavioral1/memory/4832-82-0x0000000007170000-0x00000000071A5000-memory.dmp family_redline behavioral1/memory/4832-80-0x0000000007170000-0x00000000071A5000-memory.dmp family_redline behavioral1/memory/4832-78-0x0000000007170000-0x00000000071A5000-memory.dmp family_redline behavioral1/memory/4832-74-0x0000000007170000-0x00000000071A5000-memory.dmp family_redline behavioral1/memory/4832-72-0x0000000007170000-0x00000000071A5000-memory.dmp family_redline behavioral1/memory/4832-70-0x0000000007170000-0x00000000071A5000-memory.dmp family_redline behavioral1/memory/4832-68-0x0000000007170000-0x00000000071A5000-memory.dmp family_redline behavioral1/memory/4832-94-0x0000000007170000-0x00000000071A5000-memory.dmp family_redline behavioral1/memory/4832-84-0x0000000007170000-0x00000000071A5000-memory.dmp family_redline behavioral1/memory/4832-64-0x0000000007170000-0x00000000071A5000-memory.dmp family_redline behavioral1/memory/4832-62-0x0000000007170000-0x00000000071A5000-memory.dmp family_redline behavioral1/memory/4832-61-0x0000000007170000-0x00000000071A5000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 1236 un219329.exe 1524 68927530.exe 4832 rk557766.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 68927530.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 68927530.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6fbfefe15a8a892591997c3d4066191bbaa4a74df851c8ede1ac4a48e590fab2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un219329.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3980 1524 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6fbfefe15a8a892591997c3d4066191bbaa4a74df851c8ede1ac4a48e590fab2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un219329.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 68927530.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rk557766.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1524 68927530.exe 1524 68927530.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1524 68927530.exe Token: SeDebugPrivilege 4832 rk557766.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1984 wrote to memory of 1236 1984 6fbfefe15a8a892591997c3d4066191bbaa4a74df851c8ede1ac4a48e590fab2.exe 84 PID 1984 wrote to memory of 1236 1984 6fbfefe15a8a892591997c3d4066191bbaa4a74df851c8ede1ac4a48e590fab2.exe 84 PID 1984 wrote to memory of 1236 1984 6fbfefe15a8a892591997c3d4066191bbaa4a74df851c8ede1ac4a48e590fab2.exe 84 PID 1236 wrote to memory of 1524 1236 un219329.exe 85 PID 1236 wrote to memory of 1524 1236 un219329.exe 85 PID 1236 wrote to memory of 1524 1236 un219329.exe 85 PID 1236 wrote to memory of 4832 1236 un219329.exe 100 PID 1236 wrote to memory of 4832 1236 un219329.exe 100 PID 1236 wrote to memory of 4832 1236 un219329.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fbfefe15a8a892591997c3d4066191bbaa4a74df851c8ede1ac4a48e590fab2.exe"C:\Users\Admin\AppData\Local\Temp\6fbfefe15a8a892591997c3d4066191bbaa4a74df851c8ede1ac4a48e590fab2.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un219329.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un219329.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\68927530.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\68927530.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1524 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1524 -s 10284⤵
- Program crash
PID:3980
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk557766.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk557766.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4832
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1524 -ip 15241⤵PID:2124
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
541KB
MD5e54be8f1e1c5a3d767a3d1303a34d20b
SHA1a90eac641cfd881e9cf760a88760c1f2119f349a
SHA256526a22747fb404cee6ef0aa161667acff51c9f07c6fcc771565cc0b14a04e1c7
SHA512eef0e9b096b16e007bdc732bfe811a94ffec66ddf5c31f643386cdb7e132e5af35af9901e6c69dffd0ad2b8dd4300eaccdff6e83be70052d343a228101d3f7d7
-
Filesize
257KB
MD53399e4392487604b231763f15cec0f68
SHA19b16b909668585e2510b59b6e10678ba8056a14e
SHA2563a51d62f8bd12320f29cde049914056d4b4b61bc516157ebe059d69491a9b531
SHA512e4f1690bc760d8698f20317e0f6a1d6b4b0708c76f5eae89bdf45d5c0c7bdd362dd5a4c3c007f6917c823f0b054002e69a99ea3da937284520997d72dfb140a6
-
Filesize
340KB
MD58071d14b24d3e24c4ddf792eaf891ee4
SHA15c06953ff4ab981e1a516d4217dcae4b11c2a839
SHA256d471fdd7b11215299008dd43b73af18fc97249352e8a6ac17e1aa0fa47efb8e0
SHA512efd5e6986b845869508704df99e42089b269350acfc1b235af94d85904cc56ffed5af15c4ff6fd1740f9a71e3969d93022e1ae0f620639c8aa2a8b9ce718d7bd