Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:09
Static task
static1
Behavioral task
behavioral1
Sample
6d46c2ae325a0e05b7e7bfcbf8b3569931818346fe446ac6a36d0feb1d4be7e8.exe
Resource
win10v2004-20241007-en
General
-
Target
6d46c2ae325a0e05b7e7bfcbf8b3569931818346fe446ac6a36d0feb1d4be7e8.exe
-
Size
704KB
-
MD5
baaef720234f2b6d61f28361503a7ced
-
SHA1
e346a588cd4931806a2627bb2d1314c7fa22f6bf
-
SHA256
6d46c2ae325a0e05b7e7bfcbf8b3569931818346fe446ac6a36d0feb1d4be7e8
-
SHA512
a197aa413651a2372df3c3f6fc4999a3ba14cd7620279aa0de0c0149424d7c9a49988c55e7bae08b80bc4f1f97a4d51f2f3e71e5bcdfc8f5bffe3d6cb60bf669
-
SSDEEP
12288:By90Qug4dfFmyisxZOaR1lX6lthUqPt2xQT+rMTd5g++BVRjknTj1CEt+Zm:ByJ7sfFmDsxZZlKHhrV2lrK+Tg31CE3
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/4464-19-0x00000000023F0000-0x000000000240A000-memory.dmp healer behavioral1/memory/4464-21-0x00000000025A0000-0x00000000025B8000-memory.dmp healer behavioral1/memory/4464-35-0x00000000025A0000-0x00000000025B3000-memory.dmp healer behavioral1/memory/4464-49-0x00000000025A0000-0x00000000025B3000-memory.dmp healer behavioral1/memory/4464-47-0x00000000025A0000-0x00000000025B3000-memory.dmp healer behavioral1/memory/4464-45-0x00000000025A0000-0x00000000025B3000-memory.dmp healer behavioral1/memory/4464-43-0x00000000025A0000-0x00000000025B3000-memory.dmp healer behavioral1/memory/4464-41-0x00000000025A0000-0x00000000025B3000-memory.dmp healer behavioral1/memory/4464-39-0x00000000025A0000-0x00000000025B3000-memory.dmp healer behavioral1/memory/4464-37-0x00000000025A0000-0x00000000025B3000-memory.dmp healer behavioral1/memory/4464-33-0x00000000025A0000-0x00000000025B3000-memory.dmp healer behavioral1/memory/4464-31-0x00000000025A0000-0x00000000025B3000-memory.dmp healer behavioral1/memory/4464-29-0x00000000025A0000-0x00000000025B3000-memory.dmp healer behavioral1/memory/4464-27-0x00000000025A0000-0x00000000025B3000-memory.dmp healer behavioral1/memory/4464-25-0x00000000025A0000-0x00000000025B3000-memory.dmp healer behavioral1/memory/4464-23-0x00000000025A0000-0x00000000025B3000-memory.dmp healer behavioral1/memory/4464-22-0x00000000025A0000-0x00000000025B3000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 06616747.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 06616747.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 06616747.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 06616747.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 06616747.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 06616747.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1292-61-0x00000000049B0000-0x00000000049EC000-memory.dmp family_redline behavioral1/memory/1292-62-0x0000000005000000-0x000000000503A000-memory.dmp family_redline behavioral1/memory/1292-72-0x0000000005000000-0x0000000005035000-memory.dmp family_redline behavioral1/memory/1292-76-0x0000000005000000-0x0000000005035000-memory.dmp family_redline behavioral1/memory/1292-74-0x0000000005000000-0x0000000005035000-memory.dmp family_redline behavioral1/memory/1292-90-0x0000000005000000-0x0000000005035000-memory.dmp family_redline behavioral1/memory/1292-80-0x0000000005000000-0x0000000005035000-memory.dmp family_redline behavioral1/memory/1292-70-0x0000000005000000-0x0000000005035000-memory.dmp family_redline behavioral1/memory/1292-68-0x0000000005000000-0x0000000005035000-memory.dmp family_redline behavioral1/memory/1292-66-0x0000000005000000-0x0000000005035000-memory.dmp family_redline behavioral1/memory/1292-64-0x0000000005000000-0x0000000005035000-memory.dmp family_redline behavioral1/memory/1292-63-0x0000000005000000-0x0000000005035000-memory.dmp family_redline behavioral1/memory/1292-96-0x0000000005000000-0x0000000005035000-memory.dmp family_redline behavioral1/memory/1292-94-0x0000000005000000-0x0000000005035000-memory.dmp family_redline behavioral1/memory/1292-92-0x0000000005000000-0x0000000005035000-memory.dmp family_redline behavioral1/memory/1292-88-0x0000000005000000-0x0000000005035000-memory.dmp family_redline behavioral1/memory/1292-86-0x0000000005000000-0x0000000005035000-memory.dmp family_redline behavioral1/memory/1292-84-0x0000000005000000-0x0000000005035000-memory.dmp family_redline behavioral1/memory/1292-82-0x0000000005000000-0x0000000005035000-memory.dmp family_redline behavioral1/memory/1292-78-0x0000000005000000-0x0000000005035000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4812 un236234.exe 4464 06616747.exe 1292 rk977664.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 06616747.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 06616747.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6d46c2ae325a0e05b7e7bfcbf8b3569931818346fe446ac6a36d0feb1d4be7e8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un236234.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2196 sc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1676 4464 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6d46c2ae325a0e05b7e7bfcbf8b3569931818346fe446ac6a36d0feb1d4be7e8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un236234.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06616747.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rk977664.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4464 06616747.exe 4464 06616747.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4464 06616747.exe Token: SeDebugPrivilege 1292 rk977664.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1516 wrote to memory of 4812 1516 6d46c2ae325a0e05b7e7bfcbf8b3569931818346fe446ac6a36d0feb1d4be7e8.exe 83 PID 1516 wrote to memory of 4812 1516 6d46c2ae325a0e05b7e7bfcbf8b3569931818346fe446ac6a36d0feb1d4be7e8.exe 83 PID 1516 wrote to memory of 4812 1516 6d46c2ae325a0e05b7e7bfcbf8b3569931818346fe446ac6a36d0feb1d4be7e8.exe 83 PID 4812 wrote to memory of 4464 4812 un236234.exe 84 PID 4812 wrote to memory of 4464 4812 un236234.exe 84 PID 4812 wrote to memory of 4464 4812 un236234.exe 84 PID 4812 wrote to memory of 1292 4812 un236234.exe 99 PID 4812 wrote to memory of 1292 4812 un236234.exe 99 PID 4812 wrote to memory of 1292 4812 un236234.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d46c2ae325a0e05b7e7bfcbf8b3569931818346fe446ac6a36d0feb1d4be7e8.exe"C:\Users\Admin\AppData\Local\Temp\6d46c2ae325a0e05b7e7bfcbf8b3569931818346fe446ac6a36d0feb1d4be7e8.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un236234.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un236234.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\06616747.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\06616747.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4464 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 10884⤵
- Program crash
PID:1676
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk977664.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk977664.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1292
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4464 -ip 44641⤵PID:1912
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2196
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
549KB
MD524c8c733cf3cde29a63d02ecf4e93171
SHA14f5b55ee72c5f913d701069e0f095c502725cd23
SHA256144d750e798e32e3f7eb7d18e09b735e7a77a22ef4ae080c911b33edb4327427
SHA51296a958af28e6eaa144e8f19f096c94994f013cea99b26df4219cc4d6f737849f0993a7ca97b6ce202f97eeb09baf1372ba4762b3b5f1d4f971eea6ebd146f3aa
-
Filesize
282KB
MD57c006c31749ebaee42cc4393bc2d6b32
SHA18d282d0b6ec8f58a6074354f6b53b59fdfdc4963
SHA25601567bf34f7a755ae677825a150700289efc44ed58b3fa4e4a056c43c6d6be32
SHA512fd34584bb1c0772f5a030018cfbe67d5e5a966230cd89563865710eb1d8c38de07ebb675570204776a7afa4f79a33d2c24fa3baf7c5b77c05e313a27259daad9
-
Filesize
365KB
MD5f1ada15cfdb390f9e72604660aa04b93
SHA1f03e68de8e6e7f71a09af9267520ee7d240568d8
SHA256c4c688fc1a77fb4fe2c5abb7e75270b232137224a2a2e23a00c7b9de2e55d83e
SHA5124d9defc40a0c9b7870b1ef5eb2d5de09008af1283e510d963d242016ed5f5aaa6f3fac8e9adad50c0b2e4dae837948cf3c5d27c2a543586d12b0b598061d67f6