Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:45
Static task
static1
Behavioral task
behavioral1
Sample
1a05a59c35d14ce7deb31e2cfb2e5f95c2a260cf9aae700ed6c111021806eebc.exe
Resource
win10v2004-20241007-en
General
-
Target
1a05a59c35d14ce7deb31e2cfb2e5f95c2a260cf9aae700ed6c111021806eebc.exe
-
Size
1.1MB
-
MD5
ab4ff5bffbe8239555c6d1e67fa764a9
-
SHA1
b1b3627b5bd20c9d91ac6c9b68f5e74283fb867f
-
SHA256
1a05a59c35d14ce7deb31e2cfb2e5f95c2a260cf9aae700ed6c111021806eebc
-
SHA512
351fb6f2c6dfe45fe64600885115302afdaa8269472d4366ec65c268e9a660bff4f4baf697fec782774377827f9eecc4114bf9304185af0507719775522fedb5
-
SSDEEP
24576:2yyq+sd2m3VY0Bm6SpcLF48A7EMymgQfuYpdIOdm:Fm+2m3VYSm6SpcLW8Al1gGRd
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/2576-23-0x0000000004CF0000-0x0000000004D0A000-memory.dmp healer behavioral1/memory/2576-25-0x0000000005360000-0x0000000005378000-memory.dmp healer behavioral1/memory/2576-26-0x0000000005360000-0x0000000005372000-memory.dmp healer behavioral1/memory/2576-53-0x0000000005360000-0x0000000005372000-memory.dmp healer behavioral1/memory/2576-51-0x0000000005360000-0x0000000005372000-memory.dmp healer behavioral1/memory/2576-49-0x0000000005360000-0x0000000005372000-memory.dmp healer behavioral1/memory/2576-47-0x0000000005360000-0x0000000005372000-memory.dmp healer behavioral1/memory/2576-46-0x0000000005360000-0x0000000005372000-memory.dmp healer behavioral1/memory/2576-44-0x0000000005360000-0x0000000005372000-memory.dmp healer behavioral1/memory/2576-42-0x0000000005360000-0x0000000005372000-memory.dmp healer behavioral1/memory/2576-39-0x0000000005360000-0x0000000005372000-memory.dmp healer behavioral1/memory/2576-37-0x0000000005360000-0x0000000005372000-memory.dmp healer behavioral1/memory/2576-35-0x0000000005360000-0x0000000005372000-memory.dmp healer behavioral1/memory/2576-33-0x0000000005360000-0x0000000005372000-memory.dmp healer behavioral1/memory/2576-31-0x0000000005360000-0x0000000005372000-memory.dmp healer behavioral1/memory/2576-29-0x0000000005360000-0x0000000005372000-memory.dmp healer behavioral1/memory/2576-27-0x0000000005360000-0x0000000005372000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr711612.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr711612.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr711612.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr711612.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr711612.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr711612.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3704-62-0x0000000002730000-0x000000000276C000-memory.dmp family_redline behavioral1/memory/3704-63-0x0000000004E00000-0x0000000004E3A000-memory.dmp family_redline behavioral1/memory/3704-71-0x0000000004E00000-0x0000000004E35000-memory.dmp family_redline behavioral1/memory/3704-77-0x0000000004E00000-0x0000000004E35000-memory.dmp family_redline behavioral1/memory/3704-75-0x0000000004E00000-0x0000000004E35000-memory.dmp family_redline behavioral1/memory/3704-73-0x0000000004E00000-0x0000000004E35000-memory.dmp family_redline behavioral1/memory/3704-97-0x0000000004E00000-0x0000000004E35000-memory.dmp family_redline behavioral1/memory/3704-85-0x0000000004E00000-0x0000000004E35000-memory.dmp family_redline behavioral1/memory/3704-69-0x0000000004E00000-0x0000000004E35000-memory.dmp family_redline behavioral1/memory/3704-67-0x0000000004E00000-0x0000000004E35000-memory.dmp family_redline behavioral1/memory/3704-65-0x0000000004E00000-0x0000000004E35000-memory.dmp family_redline behavioral1/memory/3704-64-0x0000000004E00000-0x0000000004E35000-memory.dmp family_redline behavioral1/memory/3704-95-0x0000000004E00000-0x0000000004E35000-memory.dmp family_redline behavioral1/memory/3704-93-0x0000000004E00000-0x0000000004E35000-memory.dmp family_redline behavioral1/memory/3704-91-0x0000000004E00000-0x0000000004E35000-memory.dmp family_redline behavioral1/memory/3704-89-0x0000000004E00000-0x0000000004E35000-memory.dmp family_redline behavioral1/memory/3704-87-0x0000000004E00000-0x0000000004E35000-memory.dmp family_redline behavioral1/memory/3704-83-0x0000000004E00000-0x0000000004E35000-memory.dmp family_redline behavioral1/memory/3704-81-0x0000000004E00000-0x0000000004E35000-memory.dmp family_redline behavioral1/memory/3704-79-0x0000000004E00000-0x0000000004E35000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 4060 un014145.exe 3084 un328849.exe 2576 pr711612.exe 3704 qu194662.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr711612.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr711612.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1a05a59c35d14ce7deb31e2cfb2e5f95c2a260cf9aae700ed6c111021806eebc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un014145.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un328849.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 696 2576 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un328849.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr711612.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu194662.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1a05a59c35d14ce7deb31e2cfb2e5f95c2a260cf9aae700ed6c111021806eebc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un014145.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2576 pr711612.exe 2576 pr711612.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2576 pr711612.exe Token: SeDebugPrivilege 3704 qu194662.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1852 wrote to memory of 4060 1852 1a05a59c35d14ce7deb31e2cfb2e5f95c2a260cf9aae700ed6c111021806eebc.exe 83 PID 1852 wrote to memory of 4060 1852 1a05a59c35d14ce7deb31e2cfb2e5f95c2a260cf9aae700ed6c111021806eebc.exe 83 PID 1852 wrote to memory of 4060 1852 1a05a59c35d14ce7deb31e2cfb2e5f95c2a260cf9aae700ed6c111021806eebc.exe 83 PID 4060 wrote to memory of 3084 4060 un014145.exe 84 PID 4060 wrote to memory of 3084 4060 un014145.exe 84 PID 4060 wrote to memory of 3084 4060 un014145.exe 84 PID 3084 wrote to memory of 2576 3084 un328849.exe 86 PID 3084 wrote to memory of 2576 3084 un328849.exe 86 PID 3084 wrote to memory of 2576 3084 un328849.exe 86 PID 3084 wrote to memory of 3704 3084 un328849.exe 100 PID 3084 wrote to memory of 3704 3084 un328849.exe 100 PID 3084 wrote to memory of 3704 3084 un328849.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a05a59c35d14ce7deb31e2cfb2e5f95c2a260cf9aae700ed6c111021806eebc.exe"C:\Users\Admin\AppData\Local\Temp\1a05a59c35d14ce7deb31e2cfb2e5f95c2a260cf9aae700ed6c111021806eebc.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un014145.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un014145.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un328849.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un328849.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr711612.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr711612.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2576 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2576 -s 10805⤵
- Program crash
PID:696
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu194662.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu194662.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3704
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2576 -ip 25761⤵PID:3920
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
763KB
MD5c5170706f08b1b520663a20b2d6e5ef2
SHA1d60a5815a4f77868510d79f25984ed86059315ae
SHA2561365324a4a79fff23b1dc38e9391488f958978fed8d0456ce9f9364419ddd793
SHA5124e64f841e25e021929a6e69348b38a2112116511ca351f2e6f5f70a2b286e0bf76112664fd0956b19739bd2454887f96ae8a71042b3d757bec32d9a6131e5a72
-
Filesize
609KB
MD58b2e524c75ed2361c136664d18188acf
SHA1e33de5cec8a525aaf4316d395804222f3b2d8760
SHA25691cf3e135f53e2217976a1ea9765a29f090faa02535a3b7a6d81ce1ae8d71801
SHA5121dec86bc4c8ac9e527e85afd7167e00e500a874f7ec53ea0312b28390e26e54deea0d00c007e0e527cecc153295795a303db4951a189c7a5d51edfaae5f75321
-
Filesize
403KB
MD5c1c815d9b6e81281ebe53610826faf25
SHA1da5291ff8ccdc98e5c62c0176615c958733db9ca
SHA256e8a7b8bdbeff508c564832286e5ba7e5aae87d65f97ebf4f27ffab0e5dff978b
SHA512a05f248949c298247808ed414f00dd056b423abff6eb4fe8f94f36980bf1bb38e3633f66e8f6a4fa428b2a546c11fa9917f8e8692ac0c3f1ae6b57f285def7fa
-
Filesize
485KB
MD501a13ee80c06b2932dbdc29422966c07
SHA1b6efe0b6ec96183927242f5e2ed18663e2b6370d
SHA2562930f8fdcf1407237a4fa28018eaa0bbd28acd47fa95ded46b7cd662f9f165b1
SHA51290c96676e7fd5f7c4bd98d2b4deef5840a094b1a5ab40200e1e977863fa1c5e21ba3c7a01896dcff26232ba53eca17c047d7310d611ebaed60e9c40e5e8738e9