Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:47
Static task
static1
Behavioral task
behavioral1
Sample
35119711b6d9c6dc6f2e81ea22f30694f4159affcf82dc8dacd8814789ccd09b.exe
Resource
win10v2004-20241007-en
General
-
Target
35119711b6d9c6dc6f2e81ea22f30694f4159affcf82dc8dacd8814789ccd09b.exe
-
Size
705KB
-
MD5
23441cc20ece3b1c75a725168040c8d5
-
SHA1
ff08b63ef53e1d0762f970df97eb366bc35cfa50
-
SHA256
35119711b6d9c6dc6f2e81ea22f30694f4159affcf82dc8dacd8814789ccd09b
-
SHA512
0002c0b3e2eb1db5d79e2ee14a0fdfe019d65147d6203f236457024192c573d713f1a4398524577a9fb33d8bc54424dbf41903cb7915be02a95dc599c4a8c91c
-
SSDEEP
12288:ry90iWsjrrlb/g1Dtuscw0z3pkf31irn9Y8c0r4Zbf4uYcGRV:ryqetgD+wi6vYrnfc8uZGX
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/4728-18-0x0000000004B10000-0x0000000004B2A000-memory.dmp healer behavioral1/memory/4728-20-0x0000000007850000-0x0000000007868000-memory.dmp healer behavioral1/memory/4728-21-0x0000000007850000-0x0000000007862000-memory.dmp healer behavioral1/memory/4728-30-0x0000000007850000-0x0000000007862000-memory.dmp healer behavioral1/memory/4728-48-0x0000000007850000-0x0000000007862000-memory.dmp healer behavioral1/memory/4728-46-0x0000000007850000-0x0000000007862000-memory.dmp healer behavioral1/memory/4728-44-0x0000000007850000-0x0000000007862000-memory.dmp healer behavioral1/memory/4728-42-0x0000000007850000-0x0000000007862000-memory.dmp healer behavioral1/memory/4728-40-0x0000000007850000-0x0000000007862000-memory.dmp healer behavioral1/memory/4728-39-0x0000000007850000-0x0000000007862000-memory.dmp healer behavioral1/memory/4728-36-0x0000000007850000-0x0000000007862000-memory.dmp healer behavioral1/memory/4728-34-0x0000000007850000-0x0000000007862000-memory.dmp healer behavioral1/memory/4728-32-0x0000000007850000-0x0000000007862000-memory.dmp healer behavioral1/memory/4728-28-0x0000000007850000-0x0000000007862000-memory.dmp healer behavioral1/memory/4728-26-0x0000000007850000-0x0000000007862000-memory.dmp healer behavioral1/memory/4728-24-0x0000000007850000-0x0000000007862000-memory.dmp healer behavioral1/memory/4728-22-0x0000000007850000-0x0000000007862000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr688500.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr688500.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr688500.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr688500.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr688500.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr688500.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3300-60-0x0000000004B20000-0x0000000004B5C000-memory.dmp family_redline behavioral1/memory/3300-61-0x00000000077F0000-0x000000000782A000-memory.dmp family_redline behavioral1/memory/3300-71-0x00000000077F0000-0x0000000007825000-memory.dmp family_redline behavioral1/memory/3300-81-0x00000000077F0000-0x0000000007825000-memory.dmp family_redline behavioral1/memory/3300-95-0x00000000077F0000-0x0000000007825000-memory.dmp family_redline behavioral1/memory/3300-93-0x00000000077F0000-0x0000000007825000-memory.dmp family_redline behavioral1/memory/3300-89-0x00000000077F0000-0x0000000007825000-memory.dmp family_redline behavioral1/memory/3300-87-0x00000000077F0000-0x0000000007825000-memory.dmp family_redline behavioral1/memory/3300-85-0x00000000077F0000-0x0000000007825000-memory.dmp family_redline behavioral1/memory/3300-83-0x00000000077F0000-0x0000000007825000-memory.dmp family_redline behavioral1/memory/3300-79-0x00000000077F0000-0x0000000007825000-memory.dmp family_redline behavioral1/memory/3300-77-0x00000000077F0000-0x0000000007825000-memory.dmp family_redline behavioral1/memory/3300-75-0x00000000077F0000-0x0000000007825000-memory.dmp family_redline behavioral1/memory/3300-73-0x00000000077F0000-0x0000000007825000-memory.dmp family_redline behavioral1/memory/3300-69-0x00000000077F0000-0x0000000007825000-memory.dmp family_redline behavioral1/memory/3300-91-0x00000000077F0000-0x0000000007825000-memory.dmp family_redline behavioral1/memory/3300-67-0x00000000077F0000-0x0000000007825000-memory.dmp family_redline behavioral1/memory/3300-65-0x00000000077F0000-0x0000000007825000-memory.dmp family_redline behavioral1/memory/3300-63-0x00000000077F0000-0x0000000007825000-memory.dmp family_redline behavioral1/memory/3300-62-0x00000000077F0000-0x0000000007825000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 1236 un104057.exe 4728 pr688500.exe 3300 qu329644.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr688500.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr688500.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un104057.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 35119711b6d9c6dc6f2e81ea22f30694f4159affcf82dc8dacd8814789ccd09b.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 372 4728 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un104057.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr688500.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu329644.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 35119711b6d9c6dc6f2e81ea22f30694f4159affcf82dc8dacd8814789ccd09b.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4728 pr688500.exe 4728 pr688500.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4728 pr688500.exe Token: SeDebugPrivilege 3300 qu329644.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3584 wrote to memory of 1236 3584 35119711b6d9c6dc6f2e81ea22f30694f4159affcf82dc8dacd8814789ccd09b.exe 84 PID 3584 wrote to memory of 1236 3584 35119711b6d9c6dc6f2e81ea22f30694f4159affcf82dc8dacd8814789ccd09b.exe 84 PID 3584 wrote to memory of 1236 3584 35119711b6d9c6dc6f2e81ea22f30694f4159affcf82dc8dacd8814789ccd09b.exe 84 PID 1236 wrote to memory of 4728 1236 un104057.exe 86 PID 1236 wrote to memory of 4728 1236 un104057.exe 86 PID 1236 wrote to memory of 4728 1236 un104057.exe 86 PID 1236 wrote to memory of 3300 1236 un104057.exe 96 PID 1236 wrote to memory of 3300 1236 un104057.exe 96 PID 1236 wrote to memory of 3300 1236 un104057.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\35119711b6d9c6dc6f2e81ea22f30694f4159affcf82dc8dacd8814789ccd09b.exe"C:\Users\Admin\AppData\Local\Temp\35119711b6d9c6dc6f2e81ea22f30694f4159affcf82dc8dacd8814789ccd09b.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un104057.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un104057.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr688500.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr688500.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4728 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4728 -s 10364⤵
- Program crash
PID:372
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu329644.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu329644.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3300
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4728 -ip 47281⤵PID:4872
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
550KB
MD5a1714de3a8fb6ec135b1f8047258bbd1
SHA124b70653e5b6dd05e218057d1b6d4fe7ded8c2c1
SHA256ff590cd84ff34bee0c4fa2f130176d30f9468a6bb811d1df41375d9151e24cc7
SHA512697c95628c14572896ca80ae1b168a31d7aeec0364f80da6791c05701e4e7900269af866a64b6cd1574b7604af5a281ea4b7f7cffe0d8cb132346060616e6fc0
-
Filesize
299KB
MD5e421d6b1d3f6ef43b500600449b5b0fd
SHA1b38462bdc5be7eed5cbb25d1534da730696dd853
SHA25631122770bf7bc2225bb6eb2522d426fec3477e79098411ae19bb8b3468532c4b
SHA5129cdcd4b3c995f45aa1294a8738932e0f73aa439b7797c74280f94bcde3c6c93315a9cfc93cf076d5e382e7235d96c32c627c6425051e8ecd324428dc2659d454
-
Filesize
382KB
MD5d7465c5706e237d1ff34ca1b16d70bbb
SHA1337945c4c8bdb7ed5f99b95e5b4a0cafd8a27351
SHA2566307f86605ad9a06a238b5b64cac7f47b8cc6483a320dd3de8d78d3825cc98e6
SHA512f336edd11d39b50d5178affd497f0a9e12339dedc7cba41e3fd4bf1437d37b0e652b31b02d3831b7593446c3931fd356fd290091b225f4f277a8d4ffa49140ec