Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 01:32
Static task
static1
Behavioral task
behavioral1
Sample
0f882309cc6577179329f14ba96098f3e0d8ec72cf057b9d8c818b56f44cc0e7.exe
Resource
win10v2004-20241007-en
General
-
Target
0f882309cc6577179329f14ba96098f3e0d8ec72cf057b9d8c818b56f44cc0e7.exe
-
Size
702KB
-
MD5
2367d0281180f0ffd8ee6e2194a061b4
-
SHA1
bd97d59d9e13ca351201b02460bb2ac621ad0321
-
SHA256
0f882309cc6577179329f14ba96098f3e0d8ec72cf057b9d8c818b56f44cc0e7
-
SHA512
3304a8e352bdd1f635fef36c51b3cb223a9c4eca3ee2fa41974c80a59654df704d9bd3aaf3df2c5213d64deb73ef63f8c0a4526ab0ccb736a7557650b7324b14
-
SSDEEP
12288:ty90dNb6N70KhzkrICol/D9sF389s72x/rXPXDtCD0rSea2iA70+iA+ap9+:tyGe778WbeFMi72x/rXPzt79WB3A+y+
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/4752-18-0x0000000004890000-0x00000000048AA000-memory.dmp healer behavioral1/memory/4752-20-0x0000000004A90000-0x0000000004AA8000-memory.dmp healer behavioral1/memory/4752-42-0x0000000004A90000-0x0000000004AA2000-memory.dmp healer behavioral1/memory/4752-48-0x0000000004A90000-0x0000000004AA2000-memory.dmp healer behavioral1/memory/4752-46-0x0000000004A90000-0x0000000004AA2000-memory.dmp healer behavioral1/memory/4752-44-0x0000000004A90000-0x0000000004AA2000-memory.dmp healer behavioral1/memory/4752-38-0x0000000004A90000-0x0000000004AA2000-memory.dmp healer behavioral1/memory/4752-36-0x0000000004A90000-0x0000000004AA2000-memory.dmp healer behavioral1/memory/4752-32-0x0000000004A90000-0x0000000004AA2000-memory.dmp healer behavioral1/memory/4752-30-0x0000000004A90000-0x0000000004AA2000-memory.dmp healer behavioral1/memory/4752-26-0x0000000004A90000-0x0000000004AA2000-memory.dmp healer behavioral1/memory/4752-24-0x0000000004A90000-0x0000000004AA2000-memory.dmp healer behavioral1/memory/4752-22-0x0000000004A90000-0x0000000004AA2000-memory.dmp healer behavioral1/memory/4752-21-0x0000000004A90000-0x0000000004AA2000-memory.dmp healer behavioral1/memory/4752-40-0x0000000004A90000-0x0000000004AA2000-memory.dmp healer behavioral1/memory/4752-34-0x0000000004A90000-0x0000000004AA2000-memory.dmp healer behavioral1/memory/4752-28-0x0000000004A90000-0x0000000004AA2000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr327386.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr327386.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr327386.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr327386.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr327386.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr327386.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2144-59-0x00000000048B0000-0x00000000048EC000-memory.dmp family_redline behavioral1/memory/2144-60-0x0000000004A80000-0x0000000004ABA000-memory.dmp family_redline behavioral1/memory/2144-70-0x0000000004A80000-0x0000000004AB5000-memory.dmp family_redline behavioral1/memory/2144-68-0x0000000004A80000-0x0000000004AB5000-memory.dmp family_redline behavioral1/memory/2144-66-0x0000000004A80000-0x0000000004AB5000-memory.dmp family_redline behavioral1/memory/2144-94-0x0000000004A80000-0x0000000004AB5000-memory.dmp family_redline behavioral1/memory/2144-90-0x0000000004A80000-0x0000000004AB5000-memory.dmp family_redline behavioral1/memory/2144-64-0x0000000004A80000-0x0000000004AB5000-memory.dmp family_redline behavioral1/memory/2144-62-0x0000000004A80000-0x0000000004AB5000-memory.dmp family_redline behavioral1/memory/2144-61-0x0000000004A80000-0x0000000004AB5000-memory.dmp family_redline behavioral1/memory/2144-92-0x0000000004A80000-0x0000000004AB5000-memory.dmp family_redline behavioral1/memory/2144-88-0x0000000004A80000-0x0000000004AB5000-memory.dmp family_redline behavioral1/memory/2144-86-0x0000000004A80000-0x0000000004AB5000-memory.dmp family_redline behavioral1/memory/2144-84-0x0000000004A80000-0x0000000004AB5000-memory.dmp family_redline behavioral1/memory/2144-82-0x0000000004A80000-0x0000000004AB5000-memory.dmp family_redline behavioral1/memory/2144-80-0x0000000004A80000-0x0000000004AB5000-memory.dmp family_redline behavioral1/memory/2144-78-0x0000000004A80000-0x0000000004AB5000-memory.dmp family_redline behavioral1/memory/2144-76-0x0000000004A80000-0x0000000004AB5000-memory.dmp family_redline behavioral1/memory/2144-74-0x0000000004A80000-0x0000000004AB5000-memory.dmp family_redline behavioral1/memory/2144-72-0x0000000004A80000-0x0000000004AB5000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 552 un425301.exe 4752 pr327386.exe 2144 qu171691.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr327386.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr327386.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0f882309cc6577179329f14ba96098f3e0d8ec72cf057b9d8c818b56f44cc0e7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un425301.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1080 4752 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu171691.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0f882309cc6577179329f14ba96098f3e0d8ec72cf057b9d8c818b56f44cc0e7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un425301.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr327386.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4752 pr327386.exe 4752 pr327386.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4752 pr327386.exe Token: SeDebugPrivilege 2144 qu171691.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4528 wrote to memory of 552 4528 0f882309cc6577179329f14ba96098f3e0d8ec72cf057b9d8c818b56f44cc0e7.exe 83 PID 4528 wrote to memory of 552 4528 0f882309cc6577179329f14ba96098f3e0d8ec72cf057b9d8c818b56f44cc0e7.exe 83 PID 4528 wrote to memory of 552 4528 0f882309cc6577179329f14ba96098f3e0d8ec72cf057b9d8c818b56f44cc0e7.exe 83 PID 552 wrote to memory of 4752 552 un425301.exe 84 PID 552 wrote to memory of 4752 552 un425301.exe 84 PID 552 wrote to memory of 4752 552 un425301.exe 84 PID 552 wrote to memory of 2144 552 un425301.exe 96 PID 552 wrote to memory of 2144 552 un425301.exe 96 PID 552 wrote to memory of 2144 552 un425301.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f882309cc6577179329f14ba96098f3e0d8ec72cf057b9d8c818b56f44cc0e7.exe"C:\Users\Admin\AppData\Local\Temp\0f882309cc6577179329f14ba96098f3e0d8ec72cf057b9d8c818b56f44cc0e7.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un425301.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un425301.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr327386.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr327386.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4752 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4752 -s 10804⤵
- Program crash
PID:1080
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu171691.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu171691.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2144
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4752 -ip 47521⤵PID:1228
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
548KB
MD59274c37ffb4fd9ac86954e83de9ea4d7
SHA10cd564c608cb11dd8ba3c7be9ecd4960eb1ffcf8
SHA2564de396246c9edef704385d323df716b052de4e37fd46bb1be688ad2cd80eb56e
SHA51204a806471bc6f2ef2f11482ef2e37b659d245fc4a20d261ec3c3a561cabaf5258cf3943c592468b0bfb67e26b37b3c25058755b39ba4b2f059d51b9a9b8ad71a
-
Filesize
278KB
MD5a2b027ef673cc4a87b9d6b79b560e544
SHA1e93acbab43d07c1d333a130f1ed58e72b36b7661
SHA25682012104d45ee337a2d27e2c58a21b899006aa865a50efcb4929e9807da070c7
SHA5124ed11a28da9a0c7ed6d4c25de123cb8fea7c0ebf9b0f263fa2788c2150deb85d15dd2def1483199edb177a0a8c78254cc96c179a58a885eefa8d356f6506f847
-
Filesize
360KB
MD52880f2a48152e469bbd985782aad69ea
SHA17c4d103c14f8e9f64cce64f83076669dde9af1e3
SHA256ecf5021deec47fe10371952bbdc8d0c9b8be5f2fc1115cf1694cae75c096726b
SHA512be0c1ed3072de02334e7d19c5ef434bec5ef491ee48e9b42f59342a5558f1f0593f3382e315ce3b37ae0ea4c92bcac5bd4a969a632a5e886f70e89bbc3d72070