Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:45
Static task
static1
Behavioral task
behavioral1
Sample
bba3b6cba295fb13d47ed0c5ee1b072d4750fcd5eb0cd5c0472ad66e54655d0a.exe
Resource
win10v2004-20241007-en
General
-
Target
bba3b6cba295fb13d47ed0c5ee1b072d4750fcd5eb0cd5c0472ad66e54655d0a.exe
-
Size
1.0MB
-
MD5
6fa3a2fe2b29209c8ea65dcd2af10278
-
SHA1
c88158b64f7ccf6cdba8bed565d69969593fb0aa
-
SHA256
bba3b6cba295fb13d47ed0c5ee1b072d4750fcd5eb0cd5c0472ad66e54655d0a
-
SHA512
850ee92bbcdecfce2e4a5f9f47bf1f8225787c16d3ff2893fa6be5811493b53d13ff5683ba200c18f76593cb5e2d0b057eac350c2544dd249503a401c9abf9cc
-
SSDEEP
24576:Kyie9IKrPre6cF40BWOWjI8uLHaqKSFtN76wdPPOPxSHT:Rie9IKoVBWOWjI84/tl6aWP8
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/4528-23-0x00000000027F0000-0x000000000280A000-memory.dmp healer behavioral1/memory/4528-25-0x00000000028E0000-0x00000000028F8000-memory.dmp healer behavioral1/memory/4528-33-0x00000000028E0000-0x00000000028F2000-memory.dmp healer behavioral1/memory/4528-49-0x00000000028E0000-0x00000000028F2000-memory.dmp healer behavioral1/memory/4528-53-0x00000000028E0000-0x00000000028F2000-memory.dmp healer behavioral1/memory/4528-51-0x00000000028E0000-0x00000000028F2000-memory.dmp healer behavioral1/memory/4528-47-0x00000000028E0000-0x00000000028F2000-memory.dmp healer behavioral1/memory/4528-45-0x00000000028E0000-0x00000000028F2000-memory.dmp healer behavioral1/memory/4528-43-0x00000000028E0000-0x00000000028F2000-memory.dmp healer behavioral1/memory/4528-41-0x00000000028E0000-0x00000000028F2000-memory.dmp healer behavioral1/memory/4528-40-0x00000000028E0000-0x00000000028F2000-memory.dmp healer behavioral1/memory/4528-37-0x00000000028E0000-0x00000000028F2000-memory.dmp healer behavioral1/memory/4528-35-0x00000000028E0000-0x00000000028F2000-memory.dmp healer behavioral1/memory/4528-31-0x00000000028E0000-0x00000000028F2000-memory.dmp healer behavioral1/memory/4528-29-0x00000000028E0000-0x00000000028F2000-memory.dmp healer behavioral1/memory/4528-27-0x00000000028E0000-0x00000000028F2000-memory.dmp healer behavioral1/memory/4528-26-0x00000000028E0000-0x00000000028F2000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr442032.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr442032.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr442032.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr442032.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr442032.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr442032.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3084-62-0x00000000026F0000-0x000000000272C000-memory.dmp family_redline behavioral1/memory/3084-63-0x0000000004DF0000-0x0000000004E2A000-memory.dmp family_redline behavioral1/memory/3084-69-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/3084-77-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/3084-97-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/3084-95-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/3084-93-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/3084-91-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/3084-89-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/3084-87-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/3084-83-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/3084-81-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/3084-79-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/3084-75-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/3084-73-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/3084-71-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/3084-85-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/3084-67-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/3084-65-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/3084-64-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 1080 un926992.exe 4576 un531356.exe 4528 pr442032.exe 3084 qu586804.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr442032.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr442032.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bba3b6cba295fb13d47ed0c5ee1b072d4750fcd5eb0cd5c0472ad66e54655d0a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un926992.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un531356.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2340 4528 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bba3b6cba295fb13d47ed0c5ee1b072d4750fcd5eb0cd5c0472ad66e54655d0a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un926992.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un531356.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr442032.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu586804.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4528 pr442032.exe 4528 pr442032.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4528 pr442032.exe Token: SeDebugPrivilege 3084 qu586804.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3252 wrote to memory of 1080 3252 bba3b6cba295fb13d47ed0c5ee1b072d4750fcd5eb0cd5c0472ad66e54655d0a.exe 83 PID 3252 wrote to memory of 1080 3252 bba3b6cba295fb13d47ed0c5ee1b072d4750fcd5eb0cd5c0472ad66e54655d0a.exe 83 PID 3252 wrote to memory of 1080 3252 bba3b6cba295fb13d47ed0c5ee1b072d4750fcd5eb0cd5c0472ad66e54655d0a.exe 83 PID 1080 wrote to memory of 4576 1080 un926992.exe 84 PID 1080 wrote to memory of 4576 1080 un926992.exe 84 PID 1080 wrote to memory of 4576 1080 un926992.exe 84 PID 4576 wrote to memory of 4528 4576 un531356.exe 85 PID 4576 wrote to memory of 4528 4576 un531356.exe 85 PID 4576 wrote to memory of 4528 4576 un531356.exe 85 PID 4576 wrote to memory of 3084 4576 un531356.exe 96 PID 4576 wrote to memory of 3084 4576 un531356.exe 96 PID 4576 wrote to memory of 3084 4576 un531356.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\bba3b6cba295fb13d47ed0c5ee1b072d4750fcd5eb0cd5c0472ad66e54655d0a.exe"C:\Users\Admin\AppData\Local\Temp\bba3b6cba295fb13d47ed0c5ee1b072d4750fcd5eb0cd5c0472ad66e54655d0a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un926992.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un926992.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un531356.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un531356.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr442032.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr442032.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4528 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4528 -s 10765⤵
- Program crash
PID:2340
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu586804.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu586804.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3084
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4528 -ip 45281⤵PID:1976
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
749KB
MD5777a526f9f4feefe331b148e4aa4b70e
SHA1b3b43e0dd098dfcda1c78ba912ac80d87dcfab03
SHA256ce7088d69f39b93d8a1097d5dd29a92ef26f6a4650bc28ac26fbfd42ea51d0d0
SHA5124e4383f9d492ba732055dd468ee447724a82a2e8dbe637ac8c4b8fa5a1ee3c696f8c34daeba4c9cba55e65172b6cd6609b93709eab2f6209c947d8b13ff81864
-
Filesize
595KB
MD511568565affa5cd6b725172f8d365fb0
SHA198080e96dd203fc0dc0effd88e9a33d58dbc2885
SHA256475a4af0e290de1d7f4419e656bb8330db5d3db668864856b0ff755a18b9a58f
SHA512672de43683da4613cfe0e8c725c4de941486486d486e10e29545f57b83b9ad8aa1da0da00a14351109f135b33822ae8472b25aeb24adcc7c49ba058d70e15497
-
Filesize
389KB
MD59a9d114f09f4335007feac346fdbbc1e
SHA1d3dd3cb280325b37c167cb817c12d878a734d5d7
SHA256d5669a7495422a4ea0eb2fa6d53a69a8c3d5e826059850833ecb3465eccba6f9
SHA51297bae0b01e74baf5a28dbd7b885b45af141649a828a4984d07fafce19b634df234021cee0188fe3d7019cf98d96e1d64e9ade2bed1e464e4ba2175fe386d07da
-
Filesize
472KB
MD580df49d9b61c91ddd015f14cd76911f4
SHA1a19b7d27880fdcb27c9de867bc17e53aa111e2a4
SHA256cc74fd6693e9747388be0a434f705d610d3c767d8c2f594a4cdbc9f033a37515
SHA5121ad9ed8acfdcfd917bfaf408598e9aabf63dc2b8b79ab5eb15eb5896b962bb340258982aae2dc0db91c7a63445340f5c3ccef110b8a9f8e837a1a9dbb22ea441