Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 01:24
Static task
static1
Behavioral task
behavioral1
Sample
3f22dbd4c167bec6b507820204e686bea3e7baae7b25313ca6e3d8e4f3734c8d.exe
Resource
win10v2004-20241007-en
General
-
Target
3f22dbd4c167bec6b507820204e686bea3e7baae7b25313ca6e3d8e4f3734c8d.exe
-
Size
690KB
-
MD5
38f5ffd83070f581346a4299bcb8836e
-
SHA1
0b05617de1cd83de384c71d674a65138ffdc12cd
-
SHA256
3f22dbd4c167bec6b507820204e686bea3e7baae7b25313ca6e3d8e4f3734c8d
-
SHA512
b8c1bbf9f1348c55048f13bae014552e7f90ae470089892a702c330ce32b14b4c3ef097674ad935ce16e84b4aa28c03f602e1af331040f128b8e19da616cd460
-
SSDEEP
12288:ay90D6NgUNUxwvDv1lwvtEwZ/Sw40WTp2rmYcENmLvmrqx:ayuUy6vDw1EsqvF2rJcEsjmru
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/536-19-0x0000000002350000-0x000000000236A000-memory.dmp healer behavioral1/memory/536-21-0x00000000025A0000-0x00000000025B8000-memory.dmp healer behavioral1/memory/536-49-0x00000000025A0000-0x00000000025B3000-memory.dmp healer behavioral1/memory/536-47-0x00000000025A0000-0x00000000025B3000-memory.dmp healer behavioral1/memory/536-45-0x00000000025A0000-0x00000000025B3000-memory.dmp healer behavioral1/memory/536-43-0x00000000025A0000-0x00000000025B3000-memory.dmp healer behavioral1/memory/536-41-0x00000000025A0000-0x00000000025B3000-memory.dmp healer behavioral1/memory/536-39-0x00000000025A0000-0x00000000025B3000-memory.dmp healer behavioral1/memory/536-37-0x00000000025A0000-0x00000000025B3000-memory.dmp healer behavioral1/memory/536-35-0x00000000025A0000-0x00000000025B3000-memory.dmp healer behavioral1/memory/536-33-0x00000000025A0000-0x00000000025B3000-memory.dmp healer behavioral1/memory/536-31-0x00000000025A0000-0x00000000025B3000-memory.dmp healer behavioral1/memory/536-29-0x00000000025A0000-0x00000000025B3000-memory.dmp healer behavioral1/memory/536-27-0x00000000025A0000-0x00000000025B3000-memory.dmp healer behavioral1/memory/536-25-0x00000000025A0000-0x00000000025B3000-memory.dmp healer behavioral1/memory/536-23-0x00000000025A0000-0x00000000025B3000-memory.dmp healer behavioral1/memory/536-22-0x00000000025A0000-0x00000000025B3000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 39843420.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 39843420.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 39843420.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 39843420.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 39843420.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 39843420.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4308-61-0x0000000004A50000-0x0000000004A8C000-memory.dmp family_redline behavioral1/memory/4308-62-0x0000000004AD0000-0x0000000004B0A000-memory.dmp family_redline behavioral1/memory/4308-72-0x0000000004AD0000-0x0000000004B05000-memory.dmp family_redline behavioral1/memory/4308-76-0x0000000004AD0000-0x0000000004B05000-memory.dmp family_redline behavioral1/memory/4308-96-0x0000000004AD0000-0x0000000004B05000-memory.dmp family_redline behavioral1/memory/4308-94-0x0000000004AD0000-0x0000000004B05000-memory.dmp family_redline behavioral1/memory/4308-92-0x0000000004AD0000-0x0000000004B05000-memory.dmp family_redline behavioral1/memory/4308-90-0x0000000004AD0000-0x0000000004B05000-memory.dmp family_redline behavioral1/memory/4308-88-0x0000000004AD0000-0x0000000004B05000-memory.dmp family_redline behavioral1/memory/4308-84-0x0000000004AD0000-0x0000000004B05000-memory.dmp family_redline behavioral1/memory/4308-82-0x0000000004AD0000-0x0000000004B05000-memory.dmp family_redline behavioral1/memory/4308-81-0x0000000004AD0000-0x0000000004B05000-memory.dmp family_redline behavioral1/memory/4308-78-0x0000000004AD0000-0x0000000004B05000-memory.dmp family_redline behavioral1/memory/4308-75-0x0000000004AD0000-0x0000000004B05000-memory.dmp family_redline behavioral1/memory/4308-70-0x0000000004AD0000-0x0000000004B05000-memory.dmp family_redline behavioral1/memory/4308-68-0x0000000004AD0000-0x0000000004B05000-memory.dmp family_redline behavioral1/memory/4308-86-0x0000000004AD0000-0x0000000004B05000-memory.dmp family_redline behavioral1/memory/4308-66-0x0000000004AD0000-0x0000000004B05000-memory.dmp family_redline behavioral1/memory/4308-64-0x0000000004AD0000-0x0000000004B05000-memory.dmp family_redline behavioral1/memory/4308-63-0x0000000004AD0000-0x0000000004B05000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4532 un389283.exe 536 39843420.exe 4308 rk812845.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 39843420.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 39843420.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3f22dbd4c167bec6b507820204e686bea3e7baae7b25313ca6e3d8e4f3734c8d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un389283.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3156 536 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3f22dbd4c167bec6b507820204e686bea3e7baae7b25313ca6e3d8e4f3734c8d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un389283.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 39843420.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rk812845.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 536 39843420.exe 536 39843420.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 536 39843420.exe Token: SeDebugPrivilege 4308 rk812845.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4968 wrote to memory of 4532 4968 3f22dbd4c167bec6b507820204e686bea3e7baae7b25313ca6e3d8e4f3734c8d.exe 83 PID 4968 wrote to memory of 4532 4968 3f22dbd4c167bec6b507820204e686bea3e7baae7b25313ca6e3d8e4f3734c8d.exe 83 PID 4968 wrote to memory of 4532 4968 3f22dbd4c167bec6b507820204e686bea3e7baae7b25313ca6e3d8e4f3734c8d.exe 83 PID 4532 wrote to memory of 536 4532 un389283.exe 85 PID 4532 wrote to memory of 536 4532 un389283.exe 85 PID 4532 wrote to memory of 536 4532 un389283.exe 85 PID 4532 wrote to memory of 4308 4532 un389283.exe 100 PID 4532 wrote to memory of 4308 4532 un389283.exe 100 PID 4532 wrote to memory of 4308 4532 un389283.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f22dbd4c167bec6b507820204e686bea3e7baae7b25313ca6e3d8e4f3734c8d.exe"C:\Users\Admin\AppData\Local\Temp\3f22dbd4c167bec6b507820204e686bea3e7baae7b25313ca6e3d8e4f3734c8d.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un389283.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un389283.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\39843420.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\39843420.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:536 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 536 -s 10844⤵
- Program crash
PID:3156
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk812845.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk812845.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4308
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 536 -ip 5361⤵PID:972
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
536KB
MD53f58a5efbccffbf0a1b05069212ce0fe
SHA191bae9d39b69dcd5e527f7360e6a82d207454649
SHA2567831e6af4510e5f412a44ecb4000a6f39a049f34ace966e288f1bbb11aad00d0
SHA512b06e60d795bd1c6a41bac3f7db2c2dfb19487080ced4354329ef9a78878236eb9f957234eaea3338e9c30ad40fc5e8623ca617bf876fdb4444ecb7a056a41c58
-
Filesize
259KB
MD5aa8f02683536ff5aedfbc83ad2937cfe
SHA1edaee1d4a9d3b1be8185ed370146f9e9b285e51a
SHA256bd86665e9a561de43c9cc714b6ba1c71f104f6ec20a7a940fda2c9c105700d22
SHA5128deb2e7cf80ce3b68a25fa50d8180f45953b3c5de30cc8142091d29f12557a756a993ed7ef99dc71167118f0fa9539b42f078f657ef9ab79f5e6f6bf99c953e1
-
Filesize
341KB
MD54812cf2eb05d1c70748a9f7a91c0a5c1
SHA1c320f438e1c857afb71a6a8536ec531ca653c91c
SHA25636b185bb9a80f155f953ae647ccf02553f427d9029aeacd3a8e0e4ab7ed204bf
SHA5125dd1d8b0bc227ef0e401b751eacf9541c152bc256d59d877f1935f6c18caf8ffe61ceb883f2155ac00931fdc8782bf4669a7429faba13dc501d2b7dc417b26d6