Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 01:37
Static task
static1
Behavioral task
behavioral1
Sample
8e8b7ff198bce09c3fd79bfc9d566f9bfc6b93b7e8f90383569841e19a2c5596.exe
Resource
win10v2004-20241007-en
General
-
Target
8e8b7ff198bce09c3fd79bfc9d566f9bfc6b93b7e8f90383569841e19a2c5596.exe
-
Size
690KB
-
MD5
6b0a2f191bb6f447e445b8b969d95736
-
SHA1
cebdc6e989cf28854e20f5b520e0471959232a7e
-
SHA256
8e8b7ff198bce09c3fd79bfc9d566f9bfc6b93b7e8f90383569841e19a2c5596
-
SHA512
4fd78b0d7d498710e28b3644cfd284e443c9be2682b8064b53db58c917bb42ce87d459b1b7be29c72ba9c3aed5b53c3461bfd05e662a294f6ca8e0b2dd4d330e
-
SSDEEP
12288:xy90zv6uDmb34SsKr2ALxUDkqMc++b0Y8X2XmDeB5m6b:xyUvHCk42EqAHmG2XS0vb
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/3652-19-0x00000000023F0000-0x000000000240A000-memory.dmp healer behavioral1/memory/3652-21-0x00000000026A0000-0x00000000026B8000-memory.dmp healer behavioral1/memory/3652-49-0x00000000026A0000-0x00000000026B3000-memory.dmp healer behavioral1/memory/3652-47-0x00000000026A0000-0x00000000026B3000-memory.dmp healer behavioral1/memory/3652-45-0x00000000026A0000-0x00000000026B3000-memory.dmp healer behavioral1/memory/3652-43-0x00000000026A0000-0x00000000026B3000-memory.dmp healer behavioral1/memory/3652-42-0x00000000026A0000-0x00000000026B3000-memory.dmp healer behavioral1/memory/3652-39-0x00000000026A0000-0x00000000026B3000-memory.dmp healer behavioral1/memory/3652-37-0x00000000026A0000-0x00000000026B3000-memory.dmp healer behavioral1/memory/3652-35-0x00000000026A0000-0x00000000026B3000-memory.dmp healer behavioral1/memory/3652-33-0x00000000026A0000-0x00000000026B3000-memory.dmp healer behavioral1/memory/3652-31-0x00000000026A0000-0x00000000026B3000-memory.dmp healer behavioral1/memory/3652-29-0x00000000026A0000-0x00000000026B3000-memory.dmp healer behavioral1/memory/3652-27-0x00000000026A0000-0x00000000026B3000-memory.dmp healer behavioral1/memory/3652-25-0x00000000026A0000-0x00000000026B3000-memory.dmp healer behavioral1/memory/3652-23-0x00000000026A0000-0x00000000026B3000-memory.dmp healer behavioral1/memory/3652-22-0x00000000026A0000-0x00000000026B3000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 03343336.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 03343336.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 03343336.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 03343336.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 03343336.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 03343336.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3984-61-0x0000000002390000-0x00000000023CC000-memory.dmp family_redline behavioral1/memory/3984-62-0x0000000004A80000-0x0000000004ABA000-memory.dmp family_redline behavioral1/memory/3984-66-0x0000000004A80000-0x0000000004AB5000-memory.dmp family_redline behavioral1/memory/3984-64-0x0000000004A80000-0x0000000004AB5000-memory.dmp family_redline behavioral1/memory/3984-63-0x0000000004A80000-0x0000000004AB5000-memory.dmp family_redline behavioral1/memory/3984-80-0x0000000004A80000-0x0000000004AB5000-memory.dmp family_redline behavioral1/memory/3984-96-0x0000000004A80000-0x0000000004AB5000-memory.dmp family_redline behavioral1/memory/3984-94-0x0000000004A80000-0x0000000004AB5000-memory.dmp family_redline behavioral1/memory/3984-92-0x0000000004A80000-0x0000000004AB5000-memory.dmp family_redline behavioral1/memory/3984-90-0x0000000004A80000-0x0000000004AB5000-memory.dmp family_redline behavioral1/memory/3984-88-0x0000000004A80000-0x0000000004AB5000-memory.dmp family_redline behavioral1/memory/3984-84-0x0000000004A80000-0x0000000004AB5000-memory.dmp family_redline behavioral1/memory/3984-82-0x0000000004A80000-0x0000000004AB5000-memory.dmp family_redline behavioral1/memory/3984-78-0x0000000004A80000-0x0000000004AB5000-memory.dmp family_redline behavioral1/memory/3984-76-0x0000000004A80000-0x0000000004AB5000-memory.dmp family_redline behavioral1/memory/3984-74-0x0000000004A80000-0x0000000004AB5000-memory.dmp family_redline behavioral1/memory/3984-72-0x0000000004A80000-0x0000000004AB5000-memory.dmp family_redline behavioral1/memory/3984-70-0x0000000004A80000-0x0000000004AB5000-memory.dmp family_redline behavioral1/memory/3984-68-0x0000000004A80000-0x0000000004AB5000-memory.dmp family_redline behavioral1/memory/3984-86-0x0000000004A80000-0x0000000004AB5000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 2532 un125515.exe 3652 03343336.exe 3984 rk267704.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 03343336.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 03343336.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un125515.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8e8b7ff198bce09c3fd79bfc9d566f9bfc6b93b7e8f90383569841e19a2c5596.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2412 3652 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rk267704.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8e8b7ff198bce09c3fd79bfc9d566f9bfc6b93b7e8f90383569841e19a2c5596.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un125515.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 03343336.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3652 03343336.exe 3652 03343336.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3652 03343336.exe Token: SeDebugPrivilege 3984 rk267704.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4760 wrote to memory of 2532 4760 8e8b7ff198bce09c3fd79bfc9d566f9bfc6b93b7e8f90383569841e19a2c5596.exe 83 PID 4760 wrote to memory of 2532 4760 8e8b7ff198bce09c3fd79bfc9d566f9bfc6b93b7e8f90383569841e19a2c5596.exe 83 PID 4760 wrote to memory of 2532 4760 8e8b7ff198bce09c3fd79bfc9d566f9bfc6b93b7e8f90383569841e19a2c5596.exe 83 PID 2532 wrote to memory of 3652 2532 un125515.exe 85 PID 2532 wrote to memory of 3652 2532 un125515.exe 85 PID 2532 wrote to memory of 3652 2532 un125515.exe 85 PID 2532 wrote to memory of 3984 2532 un125515.exe 97 PID 2532 wrote to memory of 3984 2532 un125515.exe 97 PID 2532 wrote to memory of 3984 2532 un125515.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e8b7ff198bce09c3fd79bfc9d566f9bfc6b93b7e8f90383569841e19a2c5596.exe"C:\Users\Admin\AppData\Local\Temp\8e8b7ff198bce09c3fd79bfc9d566f9bfc6b93b7e8f90383569841e19a2c5596.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un125515.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un125515.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\03343336.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\03343336.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3652 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3652 -s 10844⤵
- Program crash
PID:2412
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk267704.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk267704.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3984
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3652 -ip 36521⤵PID:1132
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
536KB
MD5dae469bdb79a8018d248f5a2747a79ae
SHA12152d5d4bb81256884bd33ec3c4f00f8d4b9a142
SHA2567e11792c68084382e1a6efcf2f49e96723d8bc47f014b6fb363e65901593c9f0
SHA51295964c4d61111056b9b9491c084287713b09480d1f79a1e0fe9695b1b9cfa47d1723295eb1775c3cda79d3f308e342bf91d71908fc68d531b14f2bd2a84f7479
-
Filesize
259KB
MD5e55f5d400505716b67d197d73748b72d
SHA18cd887d4b8a303f3b158d2dafcc3f221feae597e
SHA2562d7fac7d58b2fa1293df61850dae3af8957e3c738b5facce0cd0aa7c329186e9
SHA512b93f1851d78ce60ea224359043d78db88c9fbe21e38755a9cbbd296e84519db588ce9b9ec157a0e01460f18a434b57e6bfcd36e61b381f6a7a4c422df8579703
-
Filesize
341KB
MD53ba04e9c92361872fb84c4aec72fad4c
SHA175c57575f3daaff2b54dc16b132c25e779cdbc75
SHA256b027061d1086f9a2db6363ac8eb9610950f0cac0de65c582e52ac42d80c7d90a
SHA512cec7cca6dca60bc7ea719a42338a6df91b20261d51c5f8004512695b4cc4b53bead9fb66b1610775f41853b532f66b40e39065d00f40a7a5c341d786563d349c