Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:24
Static task
static1
Behavioral task
behavioral1
Sample
9cee8382a737afdd9ad7e330cae0888d394fe420219ee105f105aa8ed93d9263.exe
Resource
win10v2004-20241007-en
General
-
Target
9cee8382a737afdd9ad7e330cae0888d394fe420219ee105f105aa8ed93d9263.exe
-
Size
1.1MB
-
MD5
ed61424792e61b5dc3c862b462fcfdfc
-
SHA1
9240bbc8276691132b2e577c0147e6697bc74e1c
-
SHA256
9cee8382a737afdd9ad7e330cae0888d394fe420219ee105f105aa8ed93d9263
-
SHA512
942bb61bd6cbd1a4cc50bbe15905a71f2333808920b0a49ce5a74c637f9043ba2e90c8c0732231e7e88acb515871cc973cbdfe324c7b2dcf729e55ed9819b584
-
SSDEEP
24576:my6x9oerWs9f4x1+bZrK5Gpe+1r0YAZN4DC/He+wR11KUf:1+RWs9A+dWIpe+1GDSC/+LX1
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/1468-23-0x0000000002920000-0x000000000293A000-memory.dmp healer behavioral1/memory/1468-25-0x0000000004EE0000-0x0000000004EF8000-memory.dmp healer behavioral1/memory/1468-49-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/1468-53-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/1468-51-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/1468-47-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/1468-46-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/1468-43-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/1468-41-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/1468-39-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/1468-37-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/1468-35-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/1468-33-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/1468-31-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/1468-30-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/1468-27-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/1468-26-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr808653.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr808653.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr808653.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr808653.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr808653.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr808653.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2784-62-0x0000000002750000-0x000000000278C000-memory.dmp family_redline behavioral1/memory/2784-63-0x0000000004E20000-0x0000000004E5A000-memory.dmp family_redline behavioral1/memory/2784-77-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/2784-81-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/2784-79-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/2784-75-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/2784-73-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/2784-71-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/2784-91-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/2784-69-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/2784-67-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/2784-65-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/2784-64-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/2784-97-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/2784-95-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/2784-93-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/2784-89-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/2784-87-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/2784-85-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/2784-83-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 2472 un505675.exe 4356 un952305.exe 1468 pr808653.exe 2784 qu818945.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr808653.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr808653.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9cee8382a737afdd9ad7e330cae0888d394fe420219ee105f105aa8ed93d9263.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un505675.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un952305.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2088 1468 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9cee8382a737afdd9ad7e330cae0888d394fe420219ee105f105aa8ed93d9263.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un505675.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un952305.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr808653.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu818945.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1468 pr808653.exe 1468 pr808653.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1468 pr808653.exe Token: SeDebugPrivilege 2784 qu818945.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3372 wrote to memory of 2472 3372 9cee8382a737afdd9ad7e330cae0888d394fe420219ee105f105aa8ed93d9263.exe 83 PID 3372 wrote to memory of 2472 3372 9cee8382a737afdd9ad7e330cae0888d394fe420219ee105f105aa8ed93d9263.exe 83 PID 3372 wrote to memory of 2472 3372 9cee8382a737afdd9ad7e330cae0888d394fe420219ee105f105aa8ed93d9263.exe 83 PID 2472 wrote to memory of 4356 2472 un505675.exe 84 PID 2472 wrote to memory of 4356 2472 un505675.exe 84 PID 2472 wrote to memory of 4356 2472 un505675.exe 84 PID 4356 wrote to memory of 1468 4356 un952305.exe 85 PID 4356 wrote to memory of 1468 4356 un952305.exe 85 PID 4356 wrote to memory of 1468 4356 un952305.exe 85 PID 4356 wrote to memory of 2784 4356 un952305.exe 100 PID 4356 wrote to memory of 2784 4356 un952305.exe 100 PID 4356 wrote to memory of 2784 4356 un952305.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\9cee8382a737afdd9ad7e330cae0888d394fe420219ee105f105aa8ed93d9263.exe"C:\Users\Admin\AppData\Local\Temp\9cee8382a737afdd9ad7e330cae0888d394fe420219ee105f105aa8ed93d9263.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un505675.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un505675.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un952305.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un952305.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr808653.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr808653.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1468 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1468 -s 10805⤵
- Program crash
PID:2088
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu818945.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu818945.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2784
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1468 -ip 14681⤵PID:1432
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
795KB
MD509450058951340dab8a9068299e5fb2d
SHA1a4751fb1f995767ff3818172354612027645b3ec
SHA256edecbaa76258654357a164ee15a6fe475a5d1ed1d0b2cf62d05ef67807230e0d
SHA512269dc65f9167a8271ac4a3732c695aa7082b7e4e4b937f94b379ba0380e763f89d56682342a3f76f885aefd8bb6e33b01ea8751c2236421ce1ec25e80ce2326c
-
Filesize
641KB
MD5f265b6370568a9e659bc87c3dee5aeca
SHA1d3fb2760414f018526580b315673b37acfd99bfd
SHA2564223dd1a0625b33c817d95c308e329de4f4eba7e02a1117c703bd823c8717d98
SHA512b8ad453c800f7584bf89fd41417cfd8dcc5a481af0d0fa4758ae2f4e371d03d8f69cb3fe2606449ad3175cbd22957b598cfaa425ca0dfa909f7c2dca73dec1ae
-
Filesize
405KB
MD5556bcd31e45341ec9f530c5d3d660800
SHA1527021acd7032d422fff1917ae7b386e5b79e6df
SHA256d3920f8f9ba3e73041512392c216eec8d31ea672cc5940c04f300c085d714fcb
SHA512736d6251a1e4fcc9e2d3d971d3315487e8d2f790f5e474132c12ab47556edb9173cd99ce2c10d3995187a95f86d388597317ab455ab3b6e887f367374035fc5e
-
Filesize
487KB
MD58b39b4a5048de56593a61f105853c0d7
SHA12a6463954af3f2a69a50eb2fb7ff9595b5dcbf40
SHA2565038e4f3fabeb584e1cb40bb3e28e0dfcb509c56eb463aee07337848305e8b51
SHA512b2b0c3ee63e3d32693c15d554af28effebdaf2b41d29f1061422f3f61fe11ad564a84f5fd08dce36a556f469cee4757e87603c0426c20e0f23a838a8c4165880