Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/11/2024, 02:37
Static task
static1
Behavioral task
behavioral1
Sample
2a286b5636b83346d0330ec3db01d4c5b7cbf08f26eb83755ed68d8ff36290e1.exe
Resource
win10v2004-20241007-en
General
-
Target
2a286b5636b83346d0330ec3db01d4c5b7cbf08f26eb83755ed68d8ff36290e1.exe
-
Size
965KB
-
MD5
50f39440525dc1eb7fc72385c7b3fc70
-
SHA1
2aa52b4f491c5a05a1e1a6522b894d610fa8631c
-
SHA256
2a286b5636b83346d0330ec3db01d4c5b7cbf08f26eb83755ed68d8ff36290e1
-
SHA512
a92802bc367f0b4844e22dc02ca6c2813844cc6570b1391be3a3eea62c4112f08acb0ee73c50efaddf7d221ec7845c35f4ebb760c4fbddbd368059404629d6e5
-
SSDEEP
12288:+y90lxesi8fzbRJtwGDaHX5ScBK1c3Aig8sgrofUTOQxe1EJ7VmO7wbtcoEuVM7W:+yCesiUzXtrn1c7uUTbj7v7KZrM7xFO
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/4040-22-0x0000000004800000-0x000000000481A000-memory.dmp healer behavioral1/memory/4040-24-0x00000000049D0000-0x00000000049E8000-memory.dmp healer behavioral1/memory/4040-25-0x00000000049D0000-0x00000000049E2000-memory.dmp healer behavioral1/memory/4040-52-0x00000000049D0000-0x00000000049E2000-memory.dmp healer behavioral1/memory/4040-50-0x00000000049D0000-0x00000000049E2000-memory.dmp healer behavioral1/memory/4040-48-0x00000000049D0000-0x00000000049E2000-memory.dmp healer behavioral1/memory/4040-46-0x00000000049D0000-0x00000000049E2000-memory.dmp healer behavioral1/memory/4040-44-0x00000000049D0000-0x00000000049E2000-memory.dmp healer behavioral1/memory/4040-42-0x00000000049D0000-0x00000000049E2000-memory.dmp healer behavioral1/memory/4040-40-0x00000000049D0000-0x00000000049E2000-memory.dmp healer behavioral1/memory/4040-38-0x00000000049D0000-0x00000000049E2000-memory.dmp healer behavioral1/memory/4040-36-0x00000000049D0000-0x00000000049E2000-memory.dmp healer behavioral1/memory/4040-34-0x00000000049D0000-0x00000000049E2000-memory.dmp healer behavioral1/memory/4040-32-0x00000000049D0000-0x00000000049E2000-memory.dmp healer behavioral1/memory/4040-30-0x00000000049D0000-0x00000000049E2000-memory.dmp healer behavioral1/memory/4040-28-0x00000000049D0000-0x00000000049E2000-memory.dmp healer behavioral1/memory/4040-26-0x00000000049D0000-0x00000000049E2000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr092108.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr092108.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr092108.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr092108.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr092108.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr092108.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4516-60-0x00000000048C0000-0x00000000048FC000-memory.dmp family_redline behavioral1/memory/4516-61-0x00000000077C0000-0x00000000077FA000-memory.dmp family_redline behavioral1/memory/4516-73-0x00000000077C0000-0x00000000077F5000-memory.dmp family_redline behavioral1/memory/4516-75-0x00000000077C0000-0x00000000077F5000-memory.dmp family_redline behavioral1/memory/4516-95-0x00000000077C0000-0x00000000077F5000-memory.dmp family_redline behavioral1/memory/4516-93-0x00000000077C0000-0x00000000077F5000-memory.dmp family_redline behavioral1/memory/4516-89-0x00000000077C0000-0x00000000077F5000-memory.dmp family_redline behavioral1/memory/4516-87-0x00000000077C0000-0x00000000077F5000-memory.dmp family_redline behavioral1/memory/4516-85-0x00000000077C0000-0x00000000077F5000-memory.dmp family_redline behavioral1/memory/4516-83-0x00000000077C0000-0x00000000077F5000-memory.dmp family_redline behavioral1/memory/4516-81-0x00000000077C0000-0x00000000077F5000-memory.dmp family_redline behavioral1/memory/4516-79-0x00000000077C0000-0x00000000077F5000-memory.dmp family_redline behavioral1/memory/4516-77-0x00000000077C0000-0x00000000077F5000-memory.dmp family_redline behavioral1/memory/4516-71-0x00000000077C0000-0x00000000077F5000-memory.dmp family_redline behavioral1/memory/4516-69-0x00000000077C0000-0x00000000077F5000-memory.dmp family_redline behavioral1/memory/4516-91-0x00000000077C0000-0x00000000077F5000-memory.dmp family_redline behavioral1/memory/4516-67-0x00000000077C0000-0x00000000077F5000-memory.dmp family_redline behavioral1/memory/4516-65-0x00000000077C0000-0x00000000077F5000-memory.dmp family_redline behavioral1/memory/4516-63-0x00000000077C0000-0x00000000077F5000-memory.dmp family_redline behavioral1/memory/4516-62-0x00000000077C0000-0x00000000077F5000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 2552 un936706.exe 3440 un742475.exe 4040 pr092108.exe 4516 qu593066.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr092108.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr092108.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un936706.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un742475.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2a286b5636b83346d0330ec3db01d4c5b7cbf08f26eb83755ed68d8ff36290e1.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3084 4040 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a286b5636b83346d0330ec3db01d4c5b7cbf08f26eb83755ed68d8ff36290e1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un936706.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un742475.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr092108.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu593066.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4040 pr092108.exe 4040 pr092108.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4040 pr092108.exe Token: SeDebugPrivilege 4516 qu593066.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 916 wrote to memory of 2552 916 2a286b5636b83346d0330ec3db01d4c5b7cbf08f26eb83755ed68d8ff36290e1.exe 83 PID 916 wrote to memory of 2552 916 2a286b5636b83346d0330ec3db01d4c5b7cbf08f26eb83755ed68d8ff36290e1.exe 83 PID 916 wrote to memory of 2552 916 2a286b5636b83346d0330ec3db01d4c5b7cbf08f26eb83755ed68d8ff36290e1.exe 83 PID 2552 wrote to memory of 3440 2552 un936706.exe 85 PID 2552 wrote to memory of 3440 2552 un936706.exe 85 PID 2552 wrote to memory of 3440 2552 un936706.exe 85 PID 3440 wrote to memory of 4040 3440 un742475.exe 86 PID 3440 wrote to memory of 4040 3440 un742475.exe 86 PID 3440 wrote to memory of 4040 3440 un742475.exe 86 PID 3440 wrote to memory of 4516 3440 un742475.exe 101 PID 3440 wrote to memory of 4516 3440 un742475.exe 101 PID 3440 wrote to memory of 4516 3440 un742475.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a286b5636b83346d0330ec3db01d4c5b7cbf08f26eb83755ed68d8ff36290e1.exe"C:\Users\Admin\AppData\Local\Temp\2a286b5636b83346d0330ec3db01d4c5b7cbf08f26eb83755ed68d8ff36290e1.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un936706.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un936706.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un742475.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un742475.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr092108.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr092108.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4040 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4040 -s 10365⤵
- Program crash
PID:3084
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu593066.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu593066.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4516
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4040 -ip 40401⤵PID:2724
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
706KB
MD578d0482d377fcc798ee17c22c23b2ce4
SHA1f776ebcf2f2d2751cc1b5ace488d4d0dcfc5643a
SHA25659a63703e3d41755c1025156382c7d1ad168d0ca9088121f13c81468c6914467
SHA512bb2fc11a87afc7d233abb33a247d831744209f8b0a17aae628bcad3411460aca1bdd08cfe7e7a842befe294837d6c844baed0d058eb6de883b6ab68d5067dcfd
-
Filesize
552KB
MD5c71390da113992e37d036e5e1f0c095d
SHA168fbac5aba438c7706bcc7c0a8637986caa93f86
SHA256a4ee99468fdef4fe0418814cac7cedf789e1ac9eb458a4108d95b17f35a43c2f
SHA512bd389970124a01e8797a9c93630e8d58bf41cb330e74cdbcba5f8146922586353cd835da0275cd1d29538ef6b88d2a5bbfb4f44f8089da0771e02771d0db8fcb
-
Filesize
299KB
MD5ba90206440a1c6478e0bd41bf4088f4a
SHA1f9bff7854790b24e0ec25068fd6a780ad43c0136
SHA25678f3a055cb2991da63417eb8f3f6703f5297c79369bd0c0b2e732f0a682fcf47
SHA512c17a6db5d2d003a957245bd087f06b9b04b6afe33e4ed5822d015e227caec1e76b8c245a8c2a266f85e6eadb8ac40a5e0ec5f6bc990542b1c112160426c8836f
-
Filesize
381KB
MD5089ed7f82369b121949e3bad3cf1bb79
SHA1d8e87495dd3a3059029354f45c5913bc71f9203d
SHA2560214a4a5b97ffc7acae654852c0e0eedcc1540b6d1ac504a9aa7a9e7acdf9a15
SHA5123c3bbfe0d95e940c3be3d43c33dede83432719cfd8addc24979d803a16c007e590efe23a4769b3ae4893f8298c74e0cf8abe55fa62607c5e488f1af8c3034fa8