Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 01:32
Static task
static1
Behavioral task
behavioral1
Sample
79ac44b9f977eb61b03717dd0dcedb7051461361ad74cf128c903171765a7478.exe
Resource
win10v2004-20241007-en
General
-
Target
79ac44b9f977eb61b03717dd0dcedb7051461361ad74cf128c903171765a7478.exe
-
Size
727KB
-
MD5
332ce294791a9087724ad71d205d0301
-
SHA1
bffc2e69db0342d9f690dd313533162f23501241
-
SHA256
79ac44b9f977eb61b03717dd0dcedb7051461361ad74cf128c903171765a7478
-
SHA512
a7e9797ff248feef93a2abf2f7cb1c05742779e45dde98cc03fbee5e23d162e7d517257d1dbed576fac3245947f76f8c52d1a2ce14c95c4821871eadb39ea67e
-
SSDEEP
12288:by90uPy9s0V7t75N8vkI0j/FCBMBFlunUu2jDFw/lq+N:bygfVt7iKPXunv2j54lq+N
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/4216-19-0x0000000002320000-0x000000000233A000-memory.dmp healer behavioral1/memory/4216-21-0x0000000002640000-0x0000000002658000-memory.dmp healer behavioral1/memory/4216-49-0x0000000002640000-0x0000000002652000-memory.dmp healer behavioral1/memory/4216-47-0x0000000002640000-0x0000000002652000-memory.dmp healer behavioral1/memory/4216-46-0x0000000002640000-0x0000000002652000-memory.dmp healer behavioral1/memory/4216-44-0x0000000002640000-0x0000000002652000-memory.dmp healer behavioral1/memory/4216-41-0x0000000002640000-0x0000000002652000-memory.dmp healer behavioral1/memory/4216-39-0x0000000002640000-0x0000000002652000-memory.dmp healer behavioral1/memory/4216-37-0x0000000002640000-0x0000000002652000-memory.dmp healer behavioral1/memory/4216-35-0x0000000002640000-0x0000000002652000-memory.dmp healer behavioral1/memory/4216-33-0x0000000002640000-0x0000000002652000-memory.dmp healer behavioral1/memory/4216-31-0x0000000002640000-0x0000000002652000-memory.dmp healer behavioral1/memory/4216-29-0x0000000002640000-0x0000000002652000-memory.dmp healer behavioral1/memory/4216-27-0x0000000002640000-0x0000000002652000-memory.dmp healer behavioral1/memory/4216-25-0x0000000002640000-0x0000000002652000-memory.dmp healer behavioral1/memory/4216-23-0x0000000002640000-0x0000000002652000-memory.dmp healer behavioral1/memory/4216-22-0x0000000002640000-0x0000000002652000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 92683468.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 92683468.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 92683468.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 92683468.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 92683468.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 92683468.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3120-60-0x00000000026C0000-0x00000000026FC000-memory.dmp family_redline behavioral1/memory/3120-61-0x0000000004AC0000-0x0000000004AFA000-memory.dmp family_redline behavioral1/memory/3120-67-0x0000000004AC0000-0x0000000004AF5000-memory.dmp family_redline behavioral1/memory/3120-77-0x0000000004AC0000-0x0000000004AF5000-memory.dmp family_redline behavioral1/memory/3120-95-0x0000000004AC0000-0x0000000004AF5000-memory.dmp family_redline behavioral1/memory/3120-93-0x0000000004AC0000-0x0000000004AF5000-memory.dmp family_redline behavioral1/memory/3120-91-0x0000000004AC0000-0x0000000004AF5000-memory.dmp family_redline behavioral1/memory/3120-89-0x0000000004AC0000-0x0000000004AF5000-memory.dmp family_redline behavioral1/memory/3120-85-0x0000000004AC0000-0x0000000004AF5000-memory.dmp family_redline behavioral1/memory/3120-83-0x0000000004AC0000-0x0000000004AF5000-memory.dmp family_redline behavioral1/memory/3120-81-0x0000000004AC0000-0x0000000004AF5000-memory.dmp family_redline behavioral1/memory/3120-79-0x0000000004AC0000-0x0000000004AF5000-memory.dmp family_redline behavioral1/memory/3120-75-0x0000000004AC0000-0x0000000004AF5000-memory.dmp family_redline behavioral1/memory/3120-73-0x0000000004AC0000-0x0000000004AF5000-memory.dmp family_redline behavioral1/memory/3120-71-0x0000000004AC0000-0x0000000004AF5000-memory.dmp family_redline behavioral1/memory/3120-69-0x0000000004AC0000-0x0000000004AF5000-memory.dmp family_redline behavioral1/memory/3120-87-0x0000000004AC0000-0x0000000004AF5000-memory.dmp family_redline behavioral1/memory/3120-65-0x0000000004AC0000-0x0000000004AF5000-memory.dmp family_redline behavioral1/memory/3120-63-0x0000000004AC0000-0x0000000004AF5000-memory.dmp family_redline behavioral1/memory/3120-62-0x0000000004AC0000-0x0000000004AF5000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 2428 un661811.exe 4216 92683468.exe 3120 rk793922.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 92683468.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 92683468.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 79ac44b9f977eb61b03717dd0dcedb7051461361ad74cf128c903171765a7478.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un661811.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 5088 4216 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 79ac44b9f977eb61b03717dd0dcedb7051461361ad74cf128c903171765a7478.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un661811.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 92683468.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rk793922.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4216 92683468.exe 4216 92683468.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4216 92683468.exe Token: SeDebugPrivilege 3120 rk793922.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2428 1688 79ac44b9f977eb61b03717dd0dcedb7051461361ad74cf128c903171765a7478.exe 83 PID 1688 wrote to memory of 2428 1688 79ac44b9f977eb61b03717dd0dcedb7051461361ad74cf128c903171765a7478.exe 83 PID 1688 wrote to memory of 2428 1688 79ac44b9f977eb61b03717dd0dcedb7051461361ad74cf128c903171765a7478.exe 83 PID 2428 wrote to memory of 4216 2428 un661811.exe 84 PID 2428 wrote to memory of 4216 2428 un661811.exe 84 PID 2428 wrote to memory of 4216 2428 un661811.exe 84 PID 2428 wrote to memory of 3120 2428 un661811.exe 95 PID 2428 wrote to memory of 3120 2428 un661811.exe 95 PID 2428 wrote to memory of 3120 2428 un661811.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\79ac44b9f977eb61b03717dd0dcedb7051461361ad74cf128c903171765a7478.exe"C:\Users\Admin\AppData\Local\Temp\79ac44b9f977eb61b03717dd0dcedb7051461361ad74cf128c903171765a7478.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un661811.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un661811.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\92683468.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\92683468.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4216 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4216 -s 10844⤵
- Program crash
PID:5088
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk793922.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk793922.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3120
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4216 -ip 42161⤵PID:2644
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
573KB
MD5a001c8e0bd9706a074e89e1f252d368b
SHA18ed0ef602d5e41d6a7f1868bde249850e4e0925c
SHA25682bea6f29e04d581e312ccb53db75114acbd930833a427655c8a30b0ec941ff0
SHA512dc07b15241497c22297024c1234d93b3b6c3fcb495d9687e1fcd6d9bf2af2f576b0b95b204289caba810a02d017b04b8b80de5a9aff55d6412ca4fd3c8811a0d
-
Filesize
332KB
MD5bb3dff89584a0e5e209b9cfa080db01d
SHA18bfa9d035d4c723f2d094b7bfd92ec3642c7f989
SHA2561660053d05b48284abc0ea70df05eb50394971473f0b16acb960e1690f952590
SHA5121c2d07f0d7b5c3eb6ece3744ff5708164a644fa056c2e694a5f48256302bf367303ca9d1d947e736c5fa99608375b7871c9d650c90d6604e8fa3b1d4fb8a307d
-
Filesize
415KB
MD5c399d1c210c90c32c0a32a307bf84599
SHA1b0adfc469e04aaa59f31d27754362a3bacd4ea45
SHA2561234f45823d1193dacbaa787ea437ba7261e032d607792226820cfaf0848267e
SHA5129ad8aaef2b75bfc75f18539357315046de5b33f8006cbb12a7319c00a7c8b398137ae07435dbf053e62251c8f7e05c331921f2c752b316a0a3c22bb4ca23caba