Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 01:53
Static task
static1
Behavioral task
behavioral1
Sample
f466928f67d7a69dee3b8804af32a3097a375e8d0abddd01f725e48dd41094ae.exe
Resource
win10v2004-20241007-en
General
-
Target
f466928f67d7a69dee3b8804af32a3097a375e8d0abddd01f725e48dd41094ae.exe
-
Size
1.0MB
-
MD5
85e2f92ebf28922761a78f55eda03ba4
-
SHA1
04a67a0c8caa13fe0e2593a40fa7829a10e7beed
-
SHA256
f466928f67d7a69dee3b8804af32a3097a375e8d0abddd01f725e48dd41094ae
-
SHA512
26a70301af9d4eb3032f4b3459ddc61d2ccc28a57aaf5cde36fae490d09f3bb5688ac94d8cec0a5bbe66547cffe6e81ce352772902a538cf4e78822dbea6d971
-
SSDEEP
24576:HyfRsXEzMxJ7Jd31awPvYz2gsYo7C+StpZDmAT3kEAu3B:SAEI77JdLYz2gym+StLB3
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/3796-23-0x00000000025C0000-0x00000000025DA000-memory.dmp healer behavioral1/memory/3796-25-0x0000000002840000-0x0000000002858000-memory.dmp healer behavioral1/memory/3796-43-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/3796-51-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/3796-49-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/3796-47-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/3796-45-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/3796-53-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/3796-31-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/3796-29-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/3796-27-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/3796-26-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/3796-41-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/3796-39-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/3796-37-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/3796-35-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/3796-33-0x0000000002840000-0x0000000002852000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr429898.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr429898.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr429898.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr429898.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr429898.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr429898.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4320-62-0x00000000026B0000-0x00000000026EC000-memory.dmp family_redline behavioral1/memory/4320-63-0x0000000002B20000-0x0000000002B5A000-memory.dmp family_redline behavioral1/memory/4320-79-0x0000000002B20000-0x0000000002B55000-memory.dmp family_redline behavioral1/memory/4320-83-0x0000000002B20000-0x0000000002B55000-memory.dmp family_redline behavioral1/memory/4320-97-0x0000000002B20000-0x0000000002B55000-memory.dmp family_redline behavioral1/memory/4320-95-0x0000000002B20000-0x0000000002B55000-memory.dmp family_redline behavioral1/memory/4320-93-0x0000000002B20000-0x0000000002B55000-memory.dmp family_redline behavioral1/memory/4320-91-0x0000000002B20000-0x0000000002B55000-memory.dmp family_redline behavioral1/memory/4320-89-0x0000000002B20000-0x0000000002B55000-memory.dmp family_redline behavioral1/memory/4320-87-0x0000000002B20000-0x0000000002B55000-memory.dmp family_redline behavioral1/memory/4320-85-0x0000000002B20000-0x0000000002B55000-memory.dmp family_redline behavioral1/memory/4320-81-0x0000000002B20000-0x0000000002B55000-memory.dmp family_redline behavioral1/memory/4320-77-0x0000000002B20000-0x0000000002B55000-memory.dmp family_redline behavioral1/memory/4320-75-0x0000000002B20000-0x0000000002B55000-memory.dmp family_redline behavioral1/memory/4320-73-0x0000000002B20000-0x0000000002B55000-memory.dmp family_redline behavioral1/memory/4320-71-0x0000000002B20000-0x0000000002B55000-memory.dmp family_redline behavioral1/memory/4320-69-0x0000000002B20000-0x0000000002B55000-memory.dmp family_redline behavioral1/memory/4320-67-0x0000000002B20000-0x0000000002B55000-memory.dmp family_redline behavioral1/memory/4320-65-0x0000000002B20000-0x0000000002B55000-memory.dmp family_redline behavioral1/memory/4320-64-0x0000000002B20000-0x0000000002B55000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 4344 un620763.exe 512 un503876.exe 3796 pr429898.exe 4320 qu770099.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr429898.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr429898.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f466928f67d7a69dee3b8804af32a3097a375e8d0abddd01f725e48dd41094ae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un620763.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un503876.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3704 3796 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f466928f67d7a69dee3b8804af32a3097a375e8d0abddd01f725e48dd41094ae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un620763.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un503876.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr429898.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu770099.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3796 pr429898.exe 3796 pr429898.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3796 pr429898.exe Token: SeDebugPrivilege 4320 qu770099.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3140 wrote to memory of 4344 3140 f466928f67d7a69dee3b8804af32a3097a375e8d0abddd01f725e48dd41094ae.exe 83 PID 3140 wrote to memory of 4344 3140 f466928f67d7a69dee3b8804af32a3097a375e8d0abddd01f725e48dd41094ae.exe 83 PID 3140 wrote to memory of 4344 3140 f466928f67d7a69dee3b8804af32a3097a375e8d0abddd01f725e48dd41094ae.exe 83 PID 4344 wrote to memory of 512 4344 un620763.exe 84 PID 4344 wrote to memory of 512 4344 un620763.exe 84 PID 4344 wrote to memory of 512 4344 un620763.exe 84 PID 512 wrote to memory of 3796 512 un503876.exe 85 PID 512 wrote to memory of 3796 512 un503876.exe 85 PID 512 wrote to memory of 3796 512 un503876.exe 85 PID 512 wrote to memory of 4320 512 un503876.exe 100 PID 512 wrote to memory of 4320 512 un503876.exe 100 PID 512 wrote to memory of 4320 512 un503876.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\f466928f67d7a69dee3b8804af32a3097a375e8d0abddd01f725e48dd41094ae.exe"C:\Users\Admin\AppData\Local\Temp\f466928f67d7a69dee3b8804af32a3097a375e8d0abddd01f725e48dd41094ae.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un620763.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un620763.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un503876.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un503876.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr429898.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr429898.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3796 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3796 -s 10805⤵
- Program crash
PID:3704
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu770099.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu770099.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4320
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3796 -ip 37961⤵PID:2624
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
751KB
MD518aed745a55ca5c3b1ffbc547a8b2e5a
SHA123c34fe5a04be07a723d9e69d27802eceb4d2c3f
SHA256b8bae87744f953afa711e7679d0c0b25a2716f96841176fc1be87714d77d87c6
SHA512ce996c54dedeeec15490a216b68e90fe01aea5c7b94f26f59b81745d5685f454e9d5112f3b6018a90507c34d87de1e26077a3411764f54e595854fb79123b48e
-
Filesize
597KB
MD58b62a01fe4cb8404215d14ad626d67b8
SHA11f19bd315132e6c062e85e9c23152bedfecbdcbc
SHA2568f25c37e18cae99c6cd03f833c9b20fec7570f0548920ac95c2fc0dea8eaaf3a
SHA512dcb737299fff027a284caba50e1809833b7fa859cccaddcb0b6077e7eb991a834e0a8cf77740d0c762ae9a8389f54b586b5e26e16933b974144661e6de4d4f01
-
Filesize
391KB
MD5fd238a8f45d744e8ff4645753965af45
SHA1c6973d53c15ee021c96bb89ab98f4e4d4f38f505
SHA256ee09238596e64a9311e94795f8699fbda99512c3452758506d2bb034fd98f5f2
SHA512aea6a7b0c65e7caf09e81baddfc8d05f6a8db863793bd5a975fb7227f4c265a67643f18a92efe7a58c4c5599f7f1406f2555c90292282a3e9411dca566775b3c
-
Filesize
474KB
MD5888afd8e210a0f3c731485f8424a6adf
SHA1738cde276eb95173521890b0a5e7c78ee018a210
SHA2564500762850fed43cb49788fbeb50839b4cb971b1956d1f149f2f21e21db9b02b
SHA5129d0a6a72f9458c0a6029772d150b0dc9da21c7b36d8eaec6190b9db4b4f195af1711bb98e5a3621cf7adde0bb0677aa6dc91d4b8a4eeee5c83b5e9e6b3ad5277