Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 01:32
Static task
static1
Behavioral task
behavioral1
Sample
0ebd8673174e96dc064cfb896ae8470b1f985f020403aa0032e36ee6529a807a.exe
Resource
win10v2004-20241007-en
General
-
Target
0ebd8673174e96dc064cfb896ae8470b1f985f020403aa0032e36ee6529a807a.exe
-
Size
746KB
-
MD5
051691e70dc83d1db539e3e0b132c078
-
SHA1
8713979cce86db6b29061be679b49f39dafd3421
-
SHA256
0ebd8673174e96dc064cfb896ae8470b1f985f020403aa0032e36ee6529a807a
-
SHA512
0754005e7eebbabb82fe96f24f1b7bfcddbb35ff55106a8670e67e45b420c21acfe706f047c5717ed0536edd51428365efc5c98a50bd6ad858f68c519ab2c5d0
-
SSDEEP
12288:+y90ZjiWJR0x1rkk50FtU3lIQ+E2Q/459pyBtXCT9+FAUg+BUQ:+yaox550E3KQ+E282CXCTYFAU32Q
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/1724-19-0x0000000002510000-0x000000000252A000-memory.dmp healer behavioral1/memory/1724-21-0x0000000002830000-0x0000000002848000-memory.dmp healer behavioral1/memory/1724-33-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/1724-39-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/1724-49-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/1724-47-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/1724-45-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/1724-43-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/1724-41-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/1724-37-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/1724-35-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/1724-27-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/1724-25-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/1724-23-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/1724-22-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/1724-31-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/1724-29-0x0000000002830000-0x0000000002842000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 73387070.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 73387070.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 73387070.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 73387070.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 73387070.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 73387070.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4600-60-0x0000000002730000-0x000000000276C000-memory.dmp family_redline behavioral1/memory/4600-61-0x0000000004E20000-0x0000000004E5A000-memory.dmp family_redline behavioral1/memory/4600-71-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/4600-91-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/4600-95-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/4600-93-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/4600-89-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/4600-87-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/4600-85-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/4600-83-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/4600-81-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/4600-79-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/4600-77-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/4600-75-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/4600-73-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/4600-69-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/4600-67-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/4600-65-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/4600-63-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/4600-62-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4052 un814522.exe 1724 73387070.exe 4600 rk363978.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 73387070.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 73387070.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0ebd8673174e96dc064cfb896ae8470b1f985f020403aa0032e36ee6529a807a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un814522.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 5088 1724 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0ebd8673174e96dc064cfb896ae8470b1f985f020403aa0032e36ee6529a807a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un814522.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 73387070.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rk363978.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1724 73387070.exe 1724 73387070.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1724 73387070.exe Token: SeDebugPrivilege 4600 rk363978.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1200 wrote to memory of 4052 1200 0ebd8673174e96dc064cfb896ae8470b1f985f020403aa0032e36ee6529a807a.exe 83 PID 1200 wrote to memory of 4052 1200 0ebd8673174e96dc064cfb896ae8470b1f985f020403aa0032e36ee6529a807a.exe 83 PID 1200 wrote to memory of 4052 1200 0ebd8673174e96dc064cfb896ae8470b1f985f020403aa0032e36ee6529a807a.exe 83 PID 4052 wrote to memory of 1724 4052 un814522.exe 84 PID 4052 wrote to memory of 1724 4052 un814522.exe 84 PID 4052 wrote to memory of 1724 4052 un814522.exe 84 PID 4052 wrote to memory of 4600 4052 un814522.exe 99 PID 4052 wrote to memory of 4600 4052 un814522.exe 99 PID 4052 wrote to memory of 4600 4052 un814522.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ebd8673174e96dc064cfb896ae8470b1f985f020403aa0032e36ee6529a807a.exe"C:\Users\Admin\AppData\Local\Temp\0ebd8673174e96dc064cfb896ae8470b1f985f020403aa0032e36ee6529a807a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un814522.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un814522.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\73387070.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\73387070.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1724 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1724 -s 10484⤵
- Program crash
PID:5088
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk363978.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk363978.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4600
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1724 -ip 17241⤵PID:4120
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
592KB
MD5021b9a9c33517f8ea3ab1b69da529b38
SHA1b06cc095cd7a235813f15f7726e51da82bbe3903
SHA256f74ce3a04c490d034929ef9e6530fe7112f77e31a2af1af8040428c4f19862a8
SHA512bfaa3d7e55bd6f0d2370b6f09f3d03f892e06ec4acac84c7ded15851c7dd6757e081b01d5c81eed1dcb9c0ee504e577bc30221e102c9690547160a361d93c8d5
-
Filesize
376KB
MD5e58aa474d2962dd2d1776d916005dd05
SHA1195c71c8489807439652b140f46e0eb4cb0dcbbd
SHA25619510e4af16a280719cd7dac17b303a1b6c27194bc057f9099fb7aa068b68bf9
SHA5128eca3d2d6502798708ffcf417a243c6b56f9247d15d54f4f30739299f1e0553e16195dd12d6e46f738540df96ea08c7001bc5ce9dfd19aa6977cd7c9c86dea9e
-
Filesize
459KB
MD5c6ea4fc3006123c72d0a4503c1b5ab85
SHA1243222883237cf788a31b16b49847b842f3b690d
SHA256853cf5b8b71c0a1a9faba38ab85401ddf7e67aae9b48a3b2f1a7cafff76bb650
SHA512a9d6951a2b1818b9800cb8a4ba8c21222874d0a339e36cdbb93ce730d4db183917e3c5b320f1d9cbf815264cda7f527bb90d228d796ae0221bcd7541637abacb