Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:39
Static task
static1
Behavioral task
behavioral1
Sample
d1f915c0aaf39cbdfb0610104b9cf11b9b126014b747bc7c7849c32e5c3b3310.exe
Resource
win10v2004-20241007-en
General
-
Target
d1f915c0aaf39cbdfb0610104b9cf11b9b126014b747bc7c7849c32e5c3b3310.exe
-
Size
1.0MB
-
MD5
f11b6d16cdd06a1a77ed63959da413a4
-
SHA1
908351531e48f2f5ed64bd6f2037d078a7e2535f
-
SHA256
d1f915c0aaf39cbdfb0610104b9cf11b9b126014b747bc7c7849c32e5c3b3310
-
SHA512
51f7cd46f8ab453815a34ceffb161990e7bf7b8474442739fe6ec1eb55e41e2d954d8401fa78230180c99a53c61604e24bba8b54593b64ca949d12a92daa5e8b
-
SSDEEP
24576:6yNU1w1NtOpWbSOy6EnOptn/EfP2EgabKdNwqfh3uF4rfzUWvmoxACPwqh:BNU1QYOEOzn/vCi7VuF4rzxJxfwq
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/4696-23-0x0000000002550000-0x000000000256A000-memory.dmp healer behavioral1/memory/4696-25-0x0000000002860000-0x0000000002878000-memory.dmp healer behavioral1/memory/4696-41-0x0000000002860000-0x0000000002872000-memory.dmp healer behavioral1/memory/4696-51-0x0000000002860000-0x0000000002872000-memory.dmp healer behavioral1/memory/4696-49-0x0000000002860000-0x0000000002872000-memory.dmp healer behavioral1/memory/4696-47-0x0000000002860000-0x0000000002872000-memory.dmp healer behavioral1/memory/4696-53-0x0000000002860000-0x0000000002872000-memory.dmp healer behavioral1/memory/4696-46-0x0000000002860000-0x0000000002872000-memory.dmp healer behavioral1/memory/4696-43-0x0000000002860000-0x0000000002872000-memory.dmp healer behavioral1/memory/4696-39-0x0000000002860000-0x0000000002872000-memory.dmp healer behavioral1/memory/4696-37-0x0000000002860000-0x0000000002872000-memory.dmp healer behavioral1/memory/4696-35-0x0000000002860000-0x0000000002872000-memory.dmp healer behavioral1/memory/4696-33-0x0000000002860000-0x0000000002872000-memory.dmp healer behavioral1/memory/4696-31-0x0000000002860000-0x0000000002872000-memory.dmp healer behavioral1/memory/4696-29-0x0000000002860000-0x0000000002872000-memory.dmp healer behavioral1/memory/4696-27-0x0000000002860000-0x0000000002872000-memory.dmp healer behavioral1/memory/4696-26-0x0000000002860000-0x0000000002872000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr641918.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr641918.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr641918.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr641918.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr641918.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr641918.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4344-62-0x00000000025D0000-0x000000000260C000-memory.dmp family_redline behavioral1/memory/4344-63-0x00000000027F0000-0x000000000282A000-memory.dmp family_redline behavioral1/memory/4344-65-0x00000000027F0000-0x0000000002825000-memory.dmp family_redline behavioral1/memory/4344-85-0x00000000027F0000-0x0000000002825000-memory.dmp family_redline behavioral1/memory/4344-83-0x00000000027F0000-0x0000000002825000-memory.dmp family_redline behavioral1/memory/4344-97-0x00000000027F0000-0x0000000002825000-memory.dmp family_redline behavioral1/memory/4344-95-0x00000000027F0000-0x0000000002825000-memory.dmp family_redline behavioral1/memory/4344-93-0x00000000027F0000-0x0000000002825000-memory.dmp family_redline behavioral1/memory/4344-91-0x00000000027F0000-0x0000000002825000-memory.dmp family_redline behavioral1/memory/4344-89-0x00000000027F0000-0x0000000002825000-memory.dmp family_redline behavioral1/memory/4344-81-0x00000000027F0000-0x0000000002825000-memory.dmp family_redline behavioral1/memory/4344-79-0x00000000027F0000-0x0000000002825000-memory.dmp family_redline behavioral1/memory/4344-77-0x00000000027F0000-0x0000000002825000-memory.dmp family_redline behavioral1/memory/4344-75-0x00000000027F0000-0x0000000002825000-memory.dmp family_redline behavioral1/memory/4344-73-0x00000000027F0000-0x0000000002825000-memory.dmp family_redline behavioral1/memory/4344-71-0x00000000027F0000-0x0000000002825000-memory.dmp family_redline behavioral1/memory/4344-69-0x00000000027F0000-0x0000000002825000-memory.dmp family_redline behavioral1/memory/4344-67-0x00000000027F0000-0x0000000002825000-memory.dmp family_redline behavioral1/memory/4344-87-0x00000000027F0000-0x0000000002825000-memory.dmp family_redline behavioral1/memory/4344-64-0x00000000027F0000-0x0000000002825000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 5032 un141172.exe 4616 un173634.exe 4696 pr641918.exe 4344 qu522522.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr641918.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr641918.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un141172.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un173634.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d1f915c0aaf39cbdfb0610104b9cf11b9b126014b747bc7c7849c32e5c3b3310.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3116 4696 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d1f915c0aaf39cbdfb0610104b9cf11b9b126014b747bc7c7849c32e5c3b3310.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un141172.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un173634.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr641918.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu522522.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4696 pr641918.exe 4696 pr641918.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4696 pr641918.exe Token: SeDebugPrivilege 4344 qu522522.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2072 wrote to memory of 5032 2072 d1f915c0aaf39cbdfb0610104b9cf11b9b126014b747bc7c7849c32e5c3b3310.exe 84 PID 2072 wrote to memory of 5032 2072 d1f915c0aaf39cbdfb0610104b9cf11b9b126014b747bc7c7849c32e5c3b3310.exe 84 PID 2072 wrote to memory of 5032 2072 d1f915c0aaf39cbdfb0610104b9cf11b9b126014b747bc7c7849c32e5c3b3310.exe 84 PID 5032 wrote to memory of 4616 5032 un141172.exe 86 PID 5032 wrote to memory of 4616 5032 un141172.exe 86 PID 5032 wrote to memory of 4616 5032 un141172.exe 86 PID 4616 wrote to memory of 4696 4616 un173634.exe 87 PID 4616 wrote to memory of 4696 4616 un173634.exe 87 PID 4616 wrote to memory of 4696 4616 un173634.exe 87 PID 4616 wrote to memory of 4344 4616 un173634.exe 96 PID 4616 wrote to memory of 4344 4616 un173634.exe 96 PID 4616 wrote to memory of 4344 4616 un173634.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1f915c0aaf39cbdfb0610104b9cf11b9b126014b747bc7c7849c32e5c3b3310.exe"C:\Users\Admin\AppData\Local\Temp\d1f915c0aaf39cbdfb0610104b9cf11b9b126014b747bc7c7849c32e5c3b3310.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un141172.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un141172.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un173634.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un173634.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr641918.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr641918.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4696 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4696 -s 10805⤵
- Program crash
PID:3116
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu522522.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu522522.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4344
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4696 -ip 46961⤵PID:1264
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
750KB
MD579b03a2fee71e953f3b1428c5402c7ea
SHA1e0109acee475229d90de632f48925701eaf3ffa2
SHA2562f39817fceaeddc7317fe132262b722d0a876ab4f96ed3a79e96a0be5d94c9da
SHA512dafa313c6c2801c101a4d0242dc60348b715fe0b64d819779302fb537b22896d1af31fdf28bd84559bc27537132d0dc509f0129d2b18612669c794f5647875c1
-
Filesize
596KB
MD593e8061ba390b20434f814d878425882
SHA17b1b05e2451adacf4ca5afa13b839d7fe3d9a524
SHA2563d0f1b23e50463b7fe5436f881fa19118b01effb1c0bd15ed29505550b29a030
SHA512e7fd66bb7a0d4f19de04c846fd1fb3610f39be69824c29094e2a7e0ece9559fc6dc9ffa7facb43de1f530fc18b68f0e8ff290e342daf43580ca4dd83a096b848
-
Filesize
389KB
MD5bbe09ad8ef672ee09b0bb4d6ce5a2124
SHA18e0273cf5e9134a4447909a1f17b30497442e247
SHA2564d85e97a0fec06f7e9d911f523bba6467160c68413beecad17d7c9d0c5fe66fe
SHA512546673abe55602ba126ebcfe3e451880e5f6a5d7bb4504649849cb9861ee3e54c4376bead025efafe731c02c61e5dbc5e8595aa5ee2b9b52b6b7d8a7e74eaab9
-
Filesize
472KB
MD5b89a53b5b45360dc03dba5db0df9469f
SHA17088e7e0fdf2da2cb22c04eea4f246b9ebb40c2d
SHA25644a65b1bb8307501b02026638cea7aacf44d719097e5567ddcd353e609c037c7
SHA512158caea9997d3b5a2b29ab22b7db25878b650f79da8adf396d80bf2a892344717919d41cf2a02f7dbc23692efc762ba3b20200fd680bf13232e3ebd7cb212f5c