Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/11/2024, 01:18
Static task
static1
Behavioral task
behavioral1
Sample
e2845e26341a96672d8f47f3cbdd4bf9b0e2267d11b58af9d5f8e17028127976.exe
Resource
win10v2004-20241007-en
General
-
Target
e2845e26341a96672d8f47f3cbdd4bf9b0e2267d11b58af9d5f8e17028127976.exe
-
Size
746KB
-
MD5
1fee0f7b533ee66bd71dd39e41ebbb8e
-
SHA1
17f13bf225bf3d4fdfb1958c7ef904bd5885f222
-
SHA256
e2845e26341a96672d8f47f3cbdd4bf9b0e2267d11b58af9d5f8e17028127976
-
SHA512
d8d838c06b1afb71ecf0fbf83298a2f168e0c712294f21893786c67725d3035cff77be98552402c264bdd28e3005b14decef20dc5300cdb1ed66b1b3c7f86a83
-
SSDEEP
12288:6y90kxDahz4bgBvOci1Jex6PCd5A9R2392gBtFlseS8iA3WJp58amgL:6yTDadCgVO1wEPCd4IgAFlVIA3aRL
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/2176-19-0x0000000002490000-0x00000000024AA000-memory.dmp healer behavioral1/memory/2176-21-0x0000000002560000-0x0000000002578000-memory.dmp healer behavioral1/memory/2176-22-0x0000000002560000-0x0000000002572000-memory.dmp healer behavioral1/memory/2176-49-0x0000000002560000-0x0000000002572000-memory.dmp healer behavioral1/memory/2176-47-0x0000000002560000-0x0000000002572000-memory.dmp healer behavioral1/memory/2176-46-0x0000000002560000-0x0000000002572000-memory.dmp healer behavioral1/memory/2176-44-0x0000000002560000-0x0000000002572000-memory.dmp healer behavioral1/memory/2176-42-0x0000000002560000-0x0000000002572000-memory.dmp healer behavioral1/memory/2176-39-0x0000000002560000-0x0000000002572000-memory.dmp healer behavioral1/memory/2176-37-0x0000000002560000-0x0000000002572000-memory.dmp healer behavioral1/memory/2176-35-0x0000000002560000-0x0000000002572000-memory.dmp healer behavioral1/memory/2176-33-0x0000000002560000-0x0000000002572000-memory.dmp healer behavioral1/memory/2176-31-0x0000000002560000-0x0000000002572000-memory.dmp healer behavioral1/memory/2176-29-0x0000000002560000-0x0000000002572000-memory.dmp healer behavioral1/memory/2176-27-0x0000000002560000-0x0000000002572000-memory.dmp healer behavioral1/memory/2176-25-0x0000000002560000-0x0000000002572000-memory.dmp healer behavioral1/memory/2176-23-0x0000000002560000-0x0000000002572000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 26296634.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 26296634.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 26296634.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 26296634.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 26296634.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 26296634.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4464-61-0x0000000002720000-0x000000000275C000-memory.dmp family_redline behavioral1/memory/4464-62-0x00000000029A0000-0x00000000029DA000-memory.dmp family_redline behavioral1/memory/4464-70-0x00000000029A0000-0x00000000029D5000-memory.dmp family_redline behavioral1/memory/4464-68-0x00000000029A0000-0x00000000029D5000-memory.dmp family_redline behavioral1/memory/4464-88-0x00000000029A0000-0x00000000029D5000-memory.dmp family_redline behavioral1/memory/4464-96-0x00000000029A0000-0x00000000029D5000-memory.dmp family_redline behavioral1/memory/4464-94-0x00000000029A0000-0x00000000029D5000-memory.dmp family_redline behavioral1/memory/4464-90-0x00000000029A0000-0x00000000029D5000-memory.dmp family_redline behavioral1/memory/4464-87-0x00000000029A0000-0x00000000029D5000-memory.dmp family_redline behavioral1/memory/4464-84-0x00000000029A0000-0x00000000029D5000-memory.dmp family_redline behavioral1/memory/4464-82-0x00000000029A0000-0x00000000029D5000-memory.dmp family_redline behavioral1/memory/4464-80-0x00000000029A0000-0x00000000029D5000-memory.dmp family_redline behavioral1/memory/4464-78-0x00000000029A0000-0x00000000029D5000-memory.dmp family_redline behavioral1/memory/4464-76-0x00000000029A0000-0x00000000029D5000-memory.dmp family_redline behavioral1/memory/4464-74-0x00000000029A0000-0x00000000029D5000-memory.dmp family_redline behavioral1/memory/4464-72-0x00000000029A0000-0x00000000029D5000-memory.dmp family_redline behavioral1/memory/4464-92-0x00000000029A0000-0x00000000029D5000-memory.dmp family_redline behavioral1/memory/4464-66-0x00000000029A0000-0x00000000029D5000-memory.dmp family_redline behavioral1/memory/4464-64-0x00000000029A0000-0x00000000029D5000-memory.dmp family_redline behavioral1/memory/4464-63-0x00000000029A0000-0x00000000029D5000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 2976 un689605.exe 2176 26296634.exe 4464 rk383194.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 26296634.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 26296634.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e2845e26341a96672d8f47f3cbdd4bf9b0e2267d11b58af9d5f8e17028127976.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un689605.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1176 2176 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rk383194.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2845e26341a96672d8f47f3cbdd4bf9b0e2267d11b58af9d5f8e17028127976.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un689605.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 26296634.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2176 26296634.exe 2176 26296634.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2176 26296634.exe Token: SeDebugPrivilege 4464 rk383194.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4632 wrote to memory of 2976 4632 e2845e26341a96672d8f47f3cbdd4bf9b0e2267d11b58af9d5f8e17028127976.exe 83 PID 4632 wrote to memory of 2976 4632 e2845e26341a96672d8f47f3cbdd4bf9b0e2267d11b58af9d5f8e17028127976.exe 83 PID 4632 wrote to memory of 2976 4632 e2845e26341a96672d8f47f3cbdd4bf9b0e2267d11b58af9d5f8e17028127976.exe 83 PID 2976 wrote to memory of 2176 2976 un689605.exe 84 PID 2976 wrote to memory of 2176 2976 un689605.exe 84 PID 2976 wrote to memory of 2176 2976 un689605.exe 84 PID 2976 wrote to memory of 4464 2976 un689605.exe 100 PID 2976 wrote to memory of 4464 2976 un689605.exe 100 PID 2976 wrote to memory of 4464 2976 un689605.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2845e26341a96672d8f47f3cbdd4bf9b0e2267d11b58af9d5f8e17028127976.exe"C:\Users\Admin\AppData\Local\Temp\e2845e26341a96672d8f47f3cbdd4bf9b0e2267d11b58af9d5f8e17028127976.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un689605.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un689605.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\26296634.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\26296634.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2176 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2176 -s 10884⤵
- Program crash
PID:1176
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk383194.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk383194.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4464
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2176 -ip 21761⤵PID:2628
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
592KB
MD5d79970db0c3ead814c186f25abfd1c07
SHA14fa7f2efc0109ed7494a3366ffb675204050d1f6
SHA256daf17cf944892b581ac40838256b97f5b4ab6660d0badfa9d506a9b9ec4bce7b
SHA512531baddcf8d5de35234457dba45894adea97b5eb6e512954c83d6f6e05f0e49bc5f44189d5bf5aa9e8f5f282c608b2f22b2e0f1b96d224ab523312cb0ac6133f
-
Filesize
376KB
MD57415a74e50bfc4d36c408a42fcaa547d
SHA16c95028306f28241aef49b50afc1a8a1e3aa0bfb
SHA256a172dfbcb6bb3667b4cdbb204ca8f62b14282ca303375f9d9b2a40553859b915
SHA5120954b333e97a272d526faf094d9d866cfc304e9c4c1428d4d657972ccf4b9f06bb6019ac6a4e98e1aff0ed1371fce34e6686592b308962bb138101397d726dbb
-
Filesize
459KB
MD5481ae74b82b66cb52dbf531b6adea9c7
SHA19518b1c74bee8e6ad5f148aeb5e2f84c72f14eac
SHA256fe99680b977dacc4288a31871875b91d0e7dc9f7868b56531932eef964085d39
SHA512a1351e8f66ea4781dae990bd0903242910acdd376908c572f1045eba82b7c19cbe97c19dc73aecc7905c4f25891688a1d6885802ce875e3698a6e1ef0d4217ad