Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 01:35
Static task
static1
Behavioral task
behavioral1
Sample
54604b98e3006c4e902e2441eee991b9780fdfdcaaf11de172fda5a4eefabb2e.exe
Resource
win10v2004-20241007-en
General
-
Target
54604b98e3006c4e902e2441eee991b9780fdfdcaaf11de172fda5a4eefabb2e.exe
-
Size
702KB
-
MD5
ef1ba6eca6fa7f5c2ae91a0099798d9f
-
SHA1
99c41114968863a0d59213d8a00d121a6453812a
-
SHA256
54604b98e3006c4e902e2441eee991b9780fdfdcaaf11de172fda5a4eefabb2e
-
SHA512
60b62b2b95ed9abfdaddeccc4b3b40a3ea67f0f4b9043e15a280a78c338258756862881f1ecec42a8b33aab78713350cfa94ef94afbd7013e46b14233da7230a
-
SSDEEP
12288:5y901USmH9Ydjl/Pzz6ABHpnm0EuDJWzhwirbmqCXO9:5yTSiyx/Pzz6WHpnlEL5bmqN9
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/2332-18-0x0000000004BC0000-0x0000000004BDA000-memory.dmp healer behavioral1/memory/2332-20-0x0000000007150000-0x0000000007168000-memory.dmp healer behavioral1/memory/2332-48-0x0000000007150000-0x0000000007162000-memory.dmp healer behavioral1/memory/2332-46-0x0000000007150000-0x0000000007162000-memory.dmp healer behavioral1/memory/2332-44-0x0000000007150000-0x0000000007162000-memory.dmp healer behavioral1/memory/2332-42-0x0000000007150000-0x0000000007162000-memory.dmp healer behavioral1/memory/2332-40-0x0000000007150000-0x0000000007162000-memory.dmp healer behavioral1/memory/2332-38-0x0000000007150000-0x0000000007162000-memory.dmp healer behavioral1/memory/2332-36-0x0000000007150000-0x0000000007162000-memory.dmp healer behavioral1/memory/2332-34-0x0000000007150000-0x0000000007162000-memory.dmp healer behavioral1/memory/2332-32-0x0000000007150000-0x0000000007162000-memory.dmp healer behavioral1/memory/2332-30-0x0000000007150000-0x0000000007162000-memory.dmp healer behavioral1/memory/2332-28-0x0000000007150000-0x0000000007162000-memory.dmp healer behavioral1/memory/2332-26-0x0000000007150000-0x0000000007162000-memory.dmp healer behavioral1/memory/2332-24-0x0000000007150000-0x0000000007162000-memory.dmp healer behavioral1/memory/2332-22-0x0000000007150000-0x0000000007162000-memory.dmp healer behavioral1/memory/2332-21-0x0000000007150000-0x0000000007162000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr479134.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr479134.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr479134.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr479134.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr479134.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr479134.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2888-60-0x0000000004B30000-0x0000000004B6C000-memory.dmp family_redline behavioral1/memory/2888-61-0x00000000071C0000-0x00000000071FA000-memory.dmp family_redline behavioral1/memory/2888-71-0x00000000071C0000-0x00000000071F5000-memory.dmp family_redline behavioral1/memory/2888-79-0x00000000071C0000-0x00000000071F5000-memory.dmp family_redline behavioral1/memory/2888-93-0x00000000071C0000-0x00000000071F5000-memory.dmp family_redline behavioral1/memory/2888-91-0x00000000071C0000-0x00000000071F5000-memory.dmp family_redline behavioral1/memory/2888-89-0x00000000071C0000-0x00000000071F5000-memory.dmp family_redline behavioral1/memory/2888-87-0x00000000071C0000-0x00000000071F5000-memory.dmp family_redline behavioral1/memory/2888-85-0x00000000071C0000-0x00000000071F5000-memory.dmp family_redline behavioral1/memory/2888-83-0x00000000071C0000-0x00000000071F5000-memory.dmp family_redline behavioral1/memory/2888-77-0x00000000071C0000-0x00000000071F5000-memory.dmp family_redline behavioral1/memory/2888-75-0x00000000071C0000-0x00000000071F5000-memory.dmp family_redline behavioral1/memory/2888-73-0x00000000071C0000-0x00000000071F5000-memory.dmp family_redline behavioral1/memory/2888-69-0x00000000071C0000-0x00000000071F5000-memory.dmp family_redline behavioral1/memory/2888-95-0x00000000071C0000-0x00000000071F5000-memory.dmp family_redline behavioral1/memory/2888-81-0x00000000071C0000-0x00000000071F5000-memory.dmp family_redline behavioral1/memory/2888-67-0x00000000071C0000-0x00000000071F5000-memory.dmp family_redline behavioral1/memory/2888-65-0x00000000071C0000-0x00000000071F5000-memory.dmp family_redline behavioral1/memory/2888-63-0x00000000071C0000-0x00000000071F5000-memory.dmp family_redline behavioral1/memory/2888-62-0x00000000071C0000-0x00000000071F5000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3936 un725702.exe 2332 pr479134.exe 2888 qu675271.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr479134.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr479134.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un725702.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 54604b98e3006c4e902e2441eee991b9780fdfdcaaf11de172fda5a4eefabb2e.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3420 2332 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 54604b98e3006c4e902e2441eee991b9780fdfdcaaf11de172fda5a4eefabb2e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un725702.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr479134.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu675271.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2332 pr479134.exe 2332 pr479134.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2332 pr479134.exe Token: SeDebugPrivilege 2888 qu675271.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2296 wrote to memory of 3936 2296 54604b98e3006c4e902e2441eee991b9780fdfdcaaf11de172fda5a4eefabb2e.exe 83 PID 2296 wrote to memory of 3936 2296 54604b98e3006c4e902e2441eee991b9780fdfdcaaf11de172fda5a4eefabb2e.exe 83 PID 2296 wrote to memory of 3936 2296 54604b98e3006c4e902e2441eee991b9780fdfdcaaf11de172fda5a4eefabb2e.exe 83 PID 3936 wrote to memory of 2332 3936 un725702.exe 84 PID 3936 wrote to memory of 2332 3936 un725702.exe 84 PID 3936 wrote to memory of 2332 3936 un725702.exe 84 PID 3936 wrote to memory of 2888 3936 un725702.exe 96 PID 3936 wrote to memory of 2888 3936 un725702.exe 96 PID 3936 wrote to memory of 2888 3936 un725702.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\54604b98e3006c4e902e2441eee991b9780fdfdcaaf11de172fda5a4eefabb2e.exe"C:\Users\Admin\AppData\Local\Temp\54604b98e3006c4e902e2441eee991b9780fdfdcaaf11de172fda5a4eefabb2e.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un725702.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un725702.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr479134.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr479134.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2332 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2332 -s 10844⤵
- Program crash
PID:3420
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu675271.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu675271.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2888
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2332 -ip 23321⤵PID:3316
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
549KB
MD54accf73fe149d3cd9122b6a09a361ddc
SHA15d22f9fbcda27b0da274a0a364ff7b0c454d47cd
SHA256be03b05ef58d414cf324e1a68127fcf7618fdfc343b2b7b5aac09248010fc11b
SHA5127acdb9364a20fabddd9f4bf30c146d2204142742137218bcf61f3d7bd6d6909aef9a7da11a7dfe9567bce35935e4aa9dd3c23d65457a7a7dde0ae3b03f22bdac
-
Filesize
286KB
MD59ab01b9fa8fddc96c57f2b7ba709b54e
SHA1ff65957267f6f7402191835d744c99d9d2d513b4
SHA256e86fe3cd075ae25c903a0aa52a5565c0c9a5196e716425251b1d8bc5319b5fe4
SHA512e612ac8b6649b04042ba4cb79b4aa065b41d09ee5923b91bd1ec913495985a4bf087b9825063cb266f3e73a940508670fc9a51343e0ada9ce16cee63475c5915
-
Filesize
359KB
MD5bc1cfd00a50463fc668be9e69ca38e69
SHA1d5f6f221fada14085db14f366492c8c1e1a824a4
SHA256c96a4ba612916c71587d7e77c29710444cc400d21a78458722982438f602a38a
SHA512281862e361722ad42f7bdeaa3759d8783ceb317f7061576e988d8fea94afa8689a6735b4753ddbe4421266a399507a96830e4427b7e9323e46c244fe9077ab6b