Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:18
Static task
static1
Behavioral task
behavioral1
Sample
6bfc906486e36b9db0a215399e93932b784d2cc4a5b9d5db3e1531259181c45a.exe
Resource
win10v2004-20241007-en
General
-
Target
6bfc906486e36b9db0a215399e93932b784d2cc4a5b9d5db3e1531259181c45a.exe
-
Size
745KB
-
MD5
92a4fcbdba9b8b5391149fc1aabb6751
-
SHA1
9738fe03a863ef96fa2d8a589739f3546c8f5a53
-
SHA256
6bfc906486e36b9db0a215399e93932b784d2cc4a5b9d5db3e1531259181c45a
-
SHA512
25746014abba44b33dda39159f08247d7a2bdb804bd3f3504e167a16401d23217eac8d9346bbe4de1cbabd86a44278160144466bae26336a2e69e8ef4ecc553a
-
SSDEEP
12288:Py90UisPkPxfwogr7DUZnElPOwvxKv5Smox8LQaiP9lwBtsXGaRiawVZ0:PyriscxwNr7D2EEwZ45SPkQ9QsXtia6W
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/3200-19-0x00000000026A0000-0x00000000026BA000-memory.dmp healer behavioral1/memory/3200-21-0x0000000004DA0000-0x0000000004DB8000-memory.dmp healer behavioral1/memory/3200-29-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer behavioral1/memory/3200-49-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer behavioral1/memory/3200-47-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer behavioral1/memory/3200-45-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer behavioral1/memory/3200-43-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer behavioral1/memory/3200-41-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer behavioral1/memory/3200-39-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer behavioral1/memory/3200-37-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer behavioral1/memory/3200-35-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer behavioral1/memory/3200-33-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer behavioral1/memory/3200-31-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer behavioral1/memory/3200-27-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer behavioral1/memory/3200-25-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer behavioral1/memory/3200-23-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer behavioral1/memory/3200-22-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 47130129.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 47130129.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 47130129.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 47130129.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 47130129.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 47130129.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2956-61-0x00000000026F0000-0x000000000272C000-memory.dmp family_redline behavioral1/memory/2956-62-0x0000000002AD0000-0x0000000002B0A000-memory.dmp family_redline behavioral1/memory/2956-82-0x0000000002AD0000-0x0000000002B05000-memory.dmp family_redline behavioral1/memory/2956-84-0x0000000002AD0000-0x0000000002B05000-memory.dmp family_redline behavioral1/memory/2956-80-0x0000000002AD0000-0x0000000002B05000-memory.dmp family_redline behavioral1/memory/2956-78-0x0000000002AD0000-0x0000000002B05000-memory.dmp family_redline behavioral1/memory/2956-76-0x0000000002AD0000-0x0000000002B05000-memory.dmp family_redline behavioral1/memory/2956-97-0x0000000002AD0000-0x0000000002B05000-memory.dmp family_redline behavioral1/memory/2956-94-0x0000000002AD0000-0x0000000002B05000-memory.dmp family_redline behavioral1/memory/2956-92-0x0000000002AD0000-0x0000000002B05000-memory.dmp family_redline behavioral1/memory/2956-90-0x0000000002AD0000-0x0000000002B05000-memory.dmp family_redline behavioral1/memory/2956-88-0x0000000002AD0000-0x0000000002B05000-memory.dmp family_redline behavioral1/memory/2956-86-0x0000000002AD0000-0x0000000002B05000-memory.dmp family_redline behavioral1/memory/2956-74-0x0000000002AD0000-0x0000000002B05000-memory.dmp family_redline behavioral1/memory/2956-72-0x0000000002AD0000-0x0000000002B05000-memory.dmp family_redline behavioral1/memory/2956-70-0x0000000002AD0000-0x0000000002B05000-memory.dmp family_redline behavioral1/memory/2956-68-0x0000000002AD0000-0x0000000002B05000-memory.dmp family_redline behavioral1/memory/2956-66-0x0000000002AD0000-0x0000000002B05000-memory.dmp family_redline behavioral1/memory/2956-64-0x0000000002AD0000-0x0000000002B05000-memory.dmp family_redline behavioral1/memory/2956-63-0x0000000002AD0000-0x0000000002B05000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4068 un006019.exe 3200 47130129.exe 2956 rk777415.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 47130129.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 47130129.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un006019.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6bfc906486e36b9db0a215399e93932b784d2cc4a5b9d5db3e1531259181c45a.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4736 3200 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6bfc906486e36b9db0a215399e93932b784d2cc4a5b9d5db3e1531259181c45a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un006019.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 47130129.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rk777415.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3200 47130129.exe 3200 47130129.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3200 47130129.exe Token: SeDebugPrivilege 2956 rk777415.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2180 wrote to memory of 4068 2180 6bfc906486e36b9db0a215399e93932b784d2cc4a5b9d5db3e1531259181c45a.exe 84 PID 2180 wrote to memory of 4068 2180 6bfc906486e36b9db0a215399e93932b784d2cc4a5b9d5db3e1531259181c45a.exe 84 PID 2180 wrote to memory of 4068 2180 6bfc906486e36b9db0a215399e93932b784d2cc4a5b9d5db3e1531259181c45a.exe 84 PID 4068 wrote to memory of 3200 4068 un006019.exe 86 PID 4068 wrote to memory of 3200 4068 un006019.exe 86 PID 4068 wrote to memory of 3200 4068 un006019.exe 86 PID 4068 wrote to memory of 2956 4068 un006019.exe 95 PID 4068 wrote to memory of 2956 4068 un006019.exe 95 PID 4068 wrote to memory of 2956 4068 un006019.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\6bfc906486e36b9db0a215399e93932b784d2cc4a5b9d5db3e1531259181c45a.exe"C:\Users\Admin\AppData\Local\Temp\6bfc906486e36b9db0a215399e93932b784d2cc4a5b9d5db3e1531259181c45a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un006019.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un006019.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\47130129.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\47130129.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3200 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3200 -s 10724⤵
- Program crash
PID:4736
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk777415.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk777415.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2956
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3200 -ip 32001⤵PID:2912
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
591KB
MD5120eacb14c1ccad737b9c5b41dcb72cd
SHA13215a75efc8929a8bf35be527ba8f0d5e77afa8f
SHA256652a09e007a0c37c1f72c2fd5c8a6a49d707bf683fb2717c3c8f86e3a1af5e0f
SHA51212cce217433c355a0b19729459312d6c301530a5a9e7aa62e21440d2da35faf36b7797e3b07c3282c11b6ccb6b00851d77a28abb0117b365754c99ad5085faa1
-
Filesize
376KB
MD598e4334dc9e7e3e8f4944a04b5dfb527
SHA1f6d3a9d06e65f1b814b48adf9d1216ff5d8fa941
SHA256004bfa6b62acbf1b622bf40b2aa817f2674690284d117376d0813c3be97310c8
SHA51228c06ef7cc2f0f3aa55ecd93113ba567514ebe8c62e0ebdb20a55417e10103248e81e5a29b3ed5c322efe2acf067834d5cfdc13b90663822f3b28f59cdb5597c
-
Filesize
459KB
MD5e750aa7d85e308f0ea839ba80344251a
SHA1e1c986b90b51b1472c23a4754749862b53120448
SHA256c1d7bee00ee3939782f22d061e68e5ed36a81e3978c8f8ee0ac8c6756d04ec42
SHA51285d23cf9d09e96a2c85ec5c615c4fc9436ad3ea56e5c39878c7ebf49c8bb009663c98eddb779578d1c02855a6d358f2313459650afce9619b2a2ca4f6087b7ef