Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:44
Static task
static1
Behavioral task
behavioral1
Sample
a539659ba0979326edc70a68fa1ac2ebca24faa34c2af8de0f4dc7dbf859d238.exe
Resource
win10v2004-20241007-en
General
-
Target
a539659ba0979326edc70a68fa1ac2ebca24faa34c2af8de0f4dc7dbf859d238.exe
-
Size
703KB
-
MD5
e66dd052c470d06f691205300dad2145
-
SHA1
46728a63ff4e003506c035731a99de212ad8421f
-
SHA256
a539659ba0979326edc70a68fa1ac2ebca24faa34c2af8de0f4dc7dbf859d238
-
SHA512
14fa3cb466044be8b09e5de86a7f3d17aa42f6b525b90368047cf687731464417fb9affa4ee355ee7e30f0de376cf87e5d16af099a5f54efc7625b6a7019565a
-
SSDEEP
12288:cy90kkLb0EtOAn6pqICZV7hc1TBdVqjP1uDv+zZwlrVFZVq:cy7kLbp76orZV7hsldVqD1HOVFZg
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/1032-17-0x00000000048E0000-0x00000000048FA000-memory.dmp healer behavioral1/memory/1032-19-0x0000000004B80000-0x0000000004B98000-memory.dmp healer behavioral1/memory/1032-34-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/1032-40-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/1032-48-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/1032-46-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/1032-44-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/1032-42-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/1032-38-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/1032-36-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/1032-32-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/1032-30-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/1032-28-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/1032-26-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/1032-24-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/1032-22-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/1032-21-0x0000000004B80000-0x0000000004B92000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr910663.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr910663.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr910663.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr910663.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr910663.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr910663.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4180-59-0x0000000004B50000-0x0000000004B8C000-memory.dmp family_redline behavioral1/memory/4180-60-0x0000000004DC0000-0x0000000004DFA000-memory.dmp family_redline behavioral1/memory/4180-78-0x0000000004DC0000-0x0000000004DF5000-memory.dmp family_redline behavioral1/memory/4180-94-0x0000000004DC0000-0x0000000004DF5000-memory.dmp family_redline behavioral1/memory/4180-92-0x0000000004DC0000-0x0000000004DF5000-memory.dmp family_redline behavioral1/memory/4180-90-0x0000000004DC0000-0x0000000004DF5000-memory.dmp family_redline behavioral1/memory/4180-88-0x0000000004DC0000-0x0000000004DF5000-memory.dmp family_redline behavioral1/memory/4180-86-0x0000000004DC0000-0x0000000004DF5000-memory.dmp family_redline behavioral1/memory/4180-84-0x0000000004DC0000-0x0000000004DF5000-memory.dmp family_redline behavioral1/memory/4180-82-0x0000000004DC0000-0x0000000004DF5000-memory.dmp family_redline behavioral1/memory/4180-80-0x0000000004DC0000-0x0000000004DF5000-memory.dmp family_redline behavioral1/memory/4180-76-0x0000000004DC0000-0x0000000004DF5000-memory.dmp family_redline behavioral1/memory/4180-74-0x0000000004DC0000-0x0000000004DF5000-memory.dmp family_redline behavioral1/memory/4180-72-0x0000000004DC0000-0x0000000004DF5000-memory.dmp family_redline behavioral1/memory/4180-70-0x0000000004DC0000-0x0000000004DF5000-memory.dmp family_redline behavioral1/memory/4180-68-0x0000000004DC0000-0x0000000004DF5000-memory.dmp family_redline behavioral1/memory/4180-66-0x0000000004DC0000-0x0000000004DF5000-memory.dmp family_redline behavioral1/memory/4180-64-0x0000000004DC0000-0x0000000004DF5000-memory.dmp family_redline behavioral1/memory/4180-62-0x0000000004DC0000-0x0000000004DF5000-memory.dmp family_redline behavioral1/memory/4180-61-0x0000000004DC0000-0x0000000004DF5000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 632 un618685.exe 1032 pr910663.exe 4180 qu291435.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr910663.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr910663.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a539659ba0979326edc70a68fa1ac2ebca24faa34c2af8de0f4dc7dbf859d238.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un618685.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2888 1032 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr910663.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu291435.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a539659ba0979326edc70a68fa1ac2ebca24faa34c2af8de0f4dc7dbf859d238.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un618685.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1032 pr910663.exe 1032 pr910663.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1032 pr910663.exe Token: SeDebugPrivilege 4180 qu291435.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1676 wrote to memory of 632 1676 a539659ba0979326edc70a68fa1ac2ebca24faa34c2af8de0f4dc7dbf859d238.exe 83 PID 1676 wrote to memory of 632 1676 a539659ba0979326edc70a68fa1ac2ebca24faa34c2af8de0f4dc7dbf859d238.exe 83 PID 1676 wrote to memory of 632 1676 a539659ba0979326edc70a68fa1ac2ebca24faa34c2af8de0f4dc7dbf859d238.exe 83 PID 632 wrote to memory of 1032 632 un618685.exe 84 PID 632 wrote to memory of 1032 632 un618685.exe 84 PID 632 wrote to memory of 1032 632 un618685.exe 84 PID 632 wrote to memory of 4180 632 un618685.exe 97 PID 632 wrote to memory of 4180 632 un618685.exe 97 PID 632 wrote to memory of 4180 632 un618685.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\a539659ba0979326edc70a68fa1ac2ebca24faa34c2af8de0f4dc7dbf859d238.exe"C:\Users\Admin\AppData\Local\Temp\a539659ba0979326edc70a68fa1ac2ebca24faa34c2af8de0f4dc7dbf859d238.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un618685.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un618685.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr910663.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr910663.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1032 -s 10964⤵
- Program crash
PID:2888
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu291435.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu291435.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4180
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1032 -ip 10321⤵PID:1692
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
549KB
MD59ecc85a966c3a501844ee2434fc3b244
SHA1127d1f71bc0f8c84dbb1bb627fb647bde75df925
SHA256cedcb4f00295414293e7b2ffa5943182c87d99c7e90013e66b90952a9bfa2fc4
SHA512ec9931c568c37fefb4726e8566ec4d49e110ec0951b4cfd0e7434c868db99a97639f04595e3aadfdd136b295770bfb90dd603419117869fcf1cb1aa2d72b8df7
-
Filesize
286KB
MD5bbaed882b7d39f6ec340aa72c235d4c3
SHA1503280814294b1fd73691675386f9ecfdb444e4c
SHA256b74d9da46ff88755056ac5c6cfaffc6fc35a58dee3b9b4a7efd3e2d5b2821382
SHA512ab1fe19cfcd01a277f3e554d2f7430a2c25f7934ff5b8fc5b6a99fc2e0532ae7fcd3cd247941ffa7e67cdc7256033da6aa0948831b5f16cf8034ca4e18fea28c
-
Filesize
359KB
MD5d997e4219dec73341deef3bd55f04036
SHA11c3e2a4124df561e0e60cd57a55c2c358a2c4087
SHA2563ceb2813fdfd2410c91f243517a1ac10cd87065b141606d39a482c0524224223
SHA512556fdc47d299e23b3ee31da664b493ac512f81946875ffe6c38a864b07f22d5b62ef2d654aeb7ca5eee3959f0eac6ca246ea57a6fefe3d118a072c223f63072b