Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 01:50
Static task
static1
Behavioral task
behavioral1
Sample
466299982a9984517043bb2d025e563c2e85f98d05e99d0bad225625105e7579N.exe
Resource
win10v2004-20241007-en
General
-
Target
466299982a9984517043bb2d025e563c2e85f98d05e99d0bad225625105e7579N.exe
-
Size
746KB
-
MD5
60fb08489bf0af085b1ad1e4eb09f600
-
SHA1
f1d12c5ca5ceaccc361b332a61e7959fed239116
-
SHA256
466299982a9984517043bb2d025e563c2e85f98d05e99d0bad225625105e7579
-
SHA512
a33cc84622cdb2aeb4b7020e6d763d9866350469baf291e1de39f1953ba0ae2ab42346e2a63b58b50344d64a22e1f7b5ddc0d699f8495a97f66fea757c984f7f
-
SSDEEP
12288:cy90cfXKcCVwvhD3f9S9uPvyDL4HtZhbEX7UUK5oroyYfpw1X/TUH:cyjfXF3fg9uPvYL4HNbcQ5nvxmG
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/1856-19-0x00000000023B0000-0x00000000023CA000-memory.dmp healer behavioral1/memory/1856-21-0x0000000002950000-0x0000000002968000-memory.dmp healer behavioral1/memory/1856-35-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/1856-33-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/1856-31-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/1856-29-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/1856-47-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/1856-45-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/1856-43-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/1856-41-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/1856-39-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/1856-37-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/1856-49-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/1856-27-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/1856-25-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/1856-23-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/1856-22-0x0000000002950000-0x0000000002962000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 48345142.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 48345142.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 48345142.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 48345142.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 48345142.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 48345142.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2972-61-0x0000000004D50000-0x0000000004D8C000-memory.dmp family_redline behavioral1/memory/2972-62-0x00000000053D0000-0x000000000540A000-memory.dmp family_redline behavioral1/memory/2972-64-0x00000000053D0000-0x0000000005405000-memory.dmp family_redline behavioral1/memory/2972-82-0x00000000053D0000-0x0000000005405000-memory.dmp family_redline behavioral1/memory/2972-97-0x00000000053D0000-0x0000000005405000-memory.dmp family_redline behavioral1/memory/2972-94-0x00000000053D0000-0x0000000005405000-memory.dmp family_redline behavioral1/memory/2972-93-0x00000000053D0000-0x0000000005405000-memory.dmp family_redline behavioral1/memory/2972-90-0x00000000053D0000-0x0000000005405000-memory.dmp family_redline behavioral1/memory/2972-89-0x00000000053D0000-0x0000000005405000-memory.dmp family_redline behavioral1/memory/2972-86-0x00000000053D0000-0x0000000005405000-memory.dmp family_redline behavioral1/memory/2972-85-0x00000000053D0000-0x0000000005405000-memory.dmp family_redline behavioral1/memory/2972-80-0x00000000053D0000-0x0000000005405000-memory.dmp family_redline behavioral1/memory/2972-78-0x00000000053D0000-0x0000000005405000-memory.dmp family_redline behavioral1/memory/2972-76-0x00000000053D0000-0x0000000005405000-memory.dmp family_redline behavioral1/memory/2972-74-0x00000000053D0000-0x0000000005405000-memory.dmp family_redline behavioral1/memory/2972-72-0x00000000053D0000-0x0000000005405000-memory.dmp family_redline behavioral1/memory/2972-70-0x00000000053D0000-0x0000000005405000-memory.dmp family_redline behavioral1/memory/2972-68-0x00000000053D0000-0x0000000005405000-memory.dmp family_redline behavioral1/memory/2972-66-0x00000000053D0000-0x0000000005405000-memory.dmp family_redline behavioral1/memory/2972-63-0x00000000053D0000-0x0000000005405000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 1292 un890095.exe 1856 48345142.exe 2972 rk046870.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 48345142.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 48345142.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 466299982a9984517043bb2d025e563c2e85f98d05e99d0bad225625105e7579N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un890095.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1996 1856 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 48345142.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rk046870.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 466299982a9984517043bb2d025e563c2e85f98d05e99d0bad225625105e7579N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un890095.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1856 48345142.exe 1856 48345142.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1856 48345142.exe Token: SeDebugPrivilege 2972 rk046870.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5080 wrote to memory of 1292 5080 466299982a9984517043bb2d025e563c2e85f98d05e99d0bad225625105e7579N.exe 83 PID 5080 wrote to memory of 1292 5080 466299982a9984517043bb2d025e563c2e85f98d05e99d0bad225625105e7579N.exe 83 PID 5080 wrote to memory of 1292 5080 466299982a9984517043bb2d025e563c2e85f98d05e99d0bad225625105e7579N.exe 83 PID 1292 wrote to memory of 1856 1292 un890095.exe 84 PID 1292 wrote to memory of 1856 1292 un890095.exe 84 PID 1292 wrote to memory of 1856 1292 un890095.exe 84 PID 1292 wrote to memory of 2972 1292 un890095.exe 99 PID 1292 wrote to memory of 2972 1292 un890095.exe 99 PID 1292 wrote to memory of 2972 1292 un890095.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\466299982a9984517043bb2d025e563c2e85f98d05e99d0bad225625105e7579N.exe"C:\Users\Admin\AppData\Local\Temp\466299982a9984517043bb2d025e563c2e85f98d05e99d0bad225625105e7579N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un890095.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un890095.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\48345142.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\48345142.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1856 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1856 -s 10804⤵
- Program crash
PID:1996
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk046870.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk046870.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2972
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1856 -ip 18561⤵PID:624
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
592KB
MD5174328767e103069e94c2846ed891bc5
SHA1d63bc1eed736f693f1643123add85c354baa1b14
SHA2565de3dea40bef3b9d7e4f8a38b4735986f78bb420446a8904a363243fec09bc52
SHA512c7f91004bae25468095e92288a9732ae77b7fe95044aa42daa63d98fe40f38f51abb1913877fdf0e50feddf221fe338726dd8c40d109905a4c34f79d639afe63
-
Filesize
376KB
MD5eb2e948c12422c76aa819e4a510b6beb
SHA154f83b8f8b288edaec9111197fd953f3835e9eae
SHA25635196e27bc6b6f56f4660f32e9bd7e1e2f8c8d817d248cb5362b1607e194b77d
SHA51259c5d5a7c8f68c8b92806ba48b67270e09e99ae6799b02126d951baddea6987446014146658cd1f39139cc3eac48436ccc9267aa63edb1c32044d7aeb6157f1a
-
Filesize
459KB
MD56110c2c21817e5b125f401fe5a7c6fc8
SHA1e8cffad0449a25a3144795d9e00aa08134b09032
SHA2569e9a5e87351593221923f9d5473ba679ac445e4d11d41dd84779c89d0ef2b880
SHA5127ba26ec5296879c7f2f70495a2de1483b48d439fc2042ba93d6bbbae249c250a107beb2caf126885f598118e6a78a3b58131a49d23faef47342d545fdfe4db5d