Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 01:35
Static task
static1
Behavioral task
behavioral1
Sample
d7a1b4ec019ee95903260b73c23d663d73fdc009af063126f1430db8868efe0f.exe
Resource
win10v2004-20241007-en
General
-
Target
d7a1b4ec019ee95903260b73c23d663d73fdc009af063126f1430db8868efe0f.exe
-
Size
693KB
-
MD5
780b8faa978049b3e5e599a21e7e9430
-
SHA1
6374c46a7b8d8c14bf705d2769341ff366b59c52
-
SHA256
d7a1b4ec019ee95903260b73c23d663d73fdc009af063126f1430db8868efe0f
-
SHA512
66caf553a9d1c1e4488c92edc1564c0a447477009e4ff51bcb3efde2b67073a8b20eb3cbe385836cfe52ebd1d5a11ed51d8246bce674c3a02b8395f763e5d7ec
-
SSDEEP
12288:fy9073NdcAxUwgzpzLhfo7l8jEz7w69HY2apt7n:fyc9HUw2p9iGjs7+2aTz
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/3948-18-0x0000000004B60000-0x0000000004B7A000-memory.dmp healer behavioral1/memory/3948-20-0x0000000007130000-0x0000000007148000-memory.dmp healer behavioral1/memory/3948-26-0x0000000007130000-0x0000000007143000-memory.dmp healer behavioral1/memory/3948-30-0x0000000007130000-0x0000000007143000-memory.dmp healer behavioral1/memory/3948-48-0x0000000007130000-0x0000000007143000-memory.dmp healer behavioral1/memory/3948-46-0x0000000007130000-0x0000000007143000-memory.dmp healer behavioral1/memory/3948-44-0x0000000007130000-0x0000000007143000-memory.dmp healer behavioral1/memory/3948-42-0x0000000007130000-0x0000000007143000-memory.dmp healer behavioral1/memory/3948-40-0x0000000007130000-0x0000000007143000-memory.dmp healer behavioral1/memory/3948-39-0x0000000007130000-0x0000000007143000-memory.dmp healer behavioral1/memory/3948-36-0x0000000007130000-0x0000000007143000-memory.dmp healer behavioral1/memory/3948-34-0x0000000007130000-0x0000000007143000-memory.dmp healer behavioral1/memory/3948-32-0x0000000007130000-0x0000000007143000-memory.dmp healer behavioral1/memory/3948-28-0x0000000007130000-0x0000000007143000-memory.dmp healer behavioral1/memory/3948-24-0x0000000007130000-0x0000000007143000-memory.dmp healer behavioral1/memory/3948-22-0x0000000007130000-0x0000000007143000-memory.dmp healer behavioral1/memory/3948-21-0x0000000007130000-0x0000000007143000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 73383514.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 73383514.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 73383514.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 73383514.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 73383514.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 73383514.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1928-60-0x0000000004B90000-0x0000000004BCC000-memory.dmp family_redline behavioral1/memory/1928-61-0x0000000004C20000-0x0000000004C5A000-memory.dmp family_redline behavioral1/memory/1928-73-0x0000000004C20000-0x0000000004C55000-memory.dmp family_redline behavioral1/memory/1928-91-0x0000000004C20000-0x0000000004C55000-memory.dmp family_redline behavioral1/memory/1928-93-0x0000000004C20000-0x0000000004C55000-memory.dmp family_redline behavioral1/memory/1928-89-0x0000000004C20000-0x0000000004C55000-memory.dmp family_redline behavioral1/memory/1928-87-0x0000000004C20000-0x0000000004C55000-memory.dmp family_redline behavioral1/memory/1928-85-0x0000000004C20000-0x0000000004C55000-memory.dmp family_redline behavioral1/memory/1928-83-0x0000000004C20000-0x0000000004C55000-memory.dmp family_redline behavioral1/memory/1928-81-0x0000000004C20000-0x0000000004C55000-memory.dmp family_redline behavioral1/memory/1928-79-0x0000000004C20000-0x0000000004C55000-memory.dmp family_redline behavioral1/memory/1928-77-0x0000000004C20000-0x0000000004C55000-memory.dmp family_redline behavioral1/memory/1928-75-0x0000000004C20000-0x0000000004C55000-memory.dmp family_redline behavioral1/memory/1928-71-0x0000000004C20000-0x0000000004C55000-memory.dmp family_redline behavioral1/memory/1928-95-0x0000000004C20000-0x0000000004C55000-memory.dmp family_redline behavioral1/memory/1928-69-0x0000000004C20000-0x0000000004C55000-memory.dmp family_redline behavioral1/memory/1928-67-0x0000000004C20000-0x0000000004C55000-memory.dmp family_redline behavioral1/memory/1928-65-0x0000000004C20000-0x0000000004C55000-memory.dmp family_redline behavioral1/memory/1928-63-0x0000000004C20000-0x0000000004C55000-memory.dmp family_redline behavioral1/memory/1928-62-0x0000000004C20000-0x0000000004C55000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4312 un726069.exe 3948 73383514.exe 1928 rk829478.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 73383514.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 73383514.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d7a1b4ec019ee95903260b73c23d663d73fdc009af063126f1430db8868efe0f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un726069.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1500 3948 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d7a1b4ec019ee95903260b73c23d663d73fdc009af063126f1430db8868efe0f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un726069.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 73383514.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rk829478.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3948 73383514.exe 3948 73383514.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3948 73383514.exe Token: SeDebugPrivilege 1928 rk829478.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3024 wrote to memory of 4312 3024 d7a1b4ec019ee95903260b73c23d663d73fdc009af063126f1430db8868efe0f.exe 84 PID 3024 wrote to memory of 4312 3024 d7a1b4ec019ee95903260b73c23d663d73fdc009af063126f1430db8868efe0f.exe 84 PID 3024 wrote to memory of 4312 3024 d7a1b4ec019ee95903260b73c23d663d73fdc009af063126f1430db8868efe0f.exe 84 PID 4312 wrote to memory of 3948 4312 un726069.exe 85 PID 4312 wrote to memory of 3948 4312 un726069.exe 85 PID 4312 wrote to memory of 3948 4312 un726069.exe 85 PID 4312 wrote to memory of 1928 4312 un726069.exe 99 PID 4312 wrote to memory of 1928 4312 un726069.exe 99 PID 4312 wrote to memory of 1928 4312 un726069.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\d7a1b4ec019ee95903260b73c23d663d73fdc009af063126f1430db8868efe0f.exe"C:\Users\Admin\AppData\Local\Temp\d7a1b4ec019ee95903260b73c23d663d73fdc009af063126f1430db8868efe0f.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un726069.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un726069.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\73383514.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\73383514.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3948 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3948 -s 10644⤵
- Program crash
PID:1500
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk829478.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk829478.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1928
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3948 -ip 39481⤵PID:2444
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
540KB
MD5e030fbb551a38a44d34de67a94b84230
SHA16c2ad342c85d530051e07a2949fb0232eb61a320
SHA256bcab7241f90da84d5ac7f0bd5164916d777c69288ee1716b93da9e05810ccb0c
SHA512eb47e2bca2f332f738324591853b1e9043e3775a7c80058f63d2a270f1cdc95999fe49b96ae2ab0dff45aebb1bf0e40bfed9c061a7ac17b216d58b1bdd1f2dc8
-
Filesize
258KB
MD5851c992765697de10082e3edc2b4e326
SHA1e37cb387dd0a36155eb19e9306eba91a090832b2
SHA256301a9df784563e2e87cb7a5303781db02e5aed19069d15bb17260f9019e4eb4f
SHA5121dc86d6c222a7e303956959165ef3a85520df5c33499304ca85f65987cc04c5cc22b37a6bbc295489b9e4a3e6570753528cd5a3bdba8290d52b065bfbe5c57c7
-
Filesize
340KB
MD5b4268d5e80843f2d97812159d59c8767
SHA118aa79b3f494a7a9d6b427b12c2156b117ba9678
SHA256f611ab09ce9afcced8528bef12d3a6c475999c97157e7c73b43357c9b498afaf
SHA512e6e332e09da799386540ddbfebc59fd21e1fe946dc2c86c554d13bf02790ac1e94c8c1f7302d4077da2790752e355e2267245fd830d0bf24ccf5620affb71508