Analysis
-
max time kernel
113s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:30
Static task
static1
Behavioral task
behavioral1
Sample
2517d2a28ff6eb41161a7a198d40a859a4ae73bf244ac3416e5f8e6d1e3a28a5N.exe
Resource
win10v2004-20241007-en
General
-
Target
2517d2a28ff6eb41161a7a198d40a859a4ae73bf244ac3416e5f8e6d1e3a28a5N.exe
-
Size
690KB
-
MD5
6cf012e82f2563063dd416a6e063f490
-
SHA1
bbb51af6a95b3bc5fa8e66fb8172971062db159b
-
SHA256
2517d2a28ff6eb41161a7a198d40a859a4ae73bf244ac3416e5f8e6d1e3a28a5
-
SHA512
61da9c0b94cea6d3cf006e095e46a727320223420ad36382de46de4b41edee0b4d1a678d274d6a43d72909c0cd3c341a5f8baf75af73a5d90ee451ca5db02611
-
SSDEEP
12288:qy90pTPO5H6GZGeqKSjKUgz46ARJWG0+fA2FmB8JTk:qyQOb+tgz4zRJR42FYwk
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/2356-19-0x0000000004960000-0x000000000497A000-memory.dmp healer behavioral1/memory/2356-21-0x0000000004FB0000-0x0000000004FC8000-memory.dmp healer behavioral1/memory/2356-33-0x0000000004FB0000-0x0000000004FC3000-memory.dmp healer behavioral1/memory/2356-49-0x0000000004FB0000-0x0000000004FC3000-memory.dmp healer behavioral1/memory/2356-47-0x0000000004FB0000-0x0000000004FC3000-memory.dmp healer behavioral1/memory/2356-45-0x0000000004FB0000-0x0000000004FC3000-memory.dmp healer behavioral1/memory/2356-43-0x0000000004FB0000-0x0000000004FC3000-memory.dmp healer behavioral1/memory/2356-41-0x0000000004FB0000-0x0000000004FC3000-memory.dmp healer behavioral1/memory/2356-39-0x0000000004FB0000-0x0000000004FC3000-memory.dmp healer behavioral1/memory/2356-37-0x0000000004FB0000-0x0000000004FC3000-memory.dmp healer behavioral1/memory/2356-31-0x0000000004FB0000-0x0000000004FC3000-memory.dmp healer behavioral1/memory/2356-29-0x0000000004FB0000-0x0000000004FC3000-memory.dmp healer behavioral1/memory/2356-27-0x0000000004FB0000-0x0000000004FC3000-memory.dmp healer behavioral1/memory/2356-25-0x0000000004FB0000-0x0000000004FC3000-memory.dmp healer behavioral1/memory/2356-23-0x0000000004FB0000-0x0000000004FC3000-memory.dmp healer behavioral1/memory/2356-35-0x0000000004FB0000-0x0000000004FC3000-memory.dmp healer behavioral1/memory/2356-22-0x0000000004FB0000-0x0000000004FC3000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 93817876.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 93817876.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 93817876.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 93817876.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 93817876.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 93817876.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1692-61-0x0000000002430000-0x000000000246C000-memory.dmp family_redline behavioral1/memory/1692-62-0x0000000002610000-0x000000000264A000-memory.dmp family_redline behavioral1/memory/1692-66-0x0000000002610000-0x0000000002645000-memory.dmp family_redline behavioral1/memory/1692-64-0x0000000002610000-0x0000000002645000-memory.dmp family_redline behavioral1/memory/1692-63-0x0000000002610000-0x0000000002645000-memory.dmp family_redline behavioral1/memory/1692-90-0x0000000002610000-0x0000000002645000-memory.dmp family_redline behavioral1/memory/1692-96-0x0000000002610000-0x0000000002645000-memory.dmp family_redline behavioral1/memory/1692-94-0x0000000002610000-0x0000000002645000-memory.dmp family_redline behavioral1/memory/1692-92-0x0000000002610000-0x0000000002645000-memory.dmp family_redline behavioral1/memory/1692-88-0x0000000002610000-0x0000000002645000-memory.dmp family_redline behavioral1/memory/1692-86-0x0000000002610000-0x0000000002645000-memory.dmp family_redline behavioral1/memory/1692-84-0x0000000002610000-0x0000000002645000-memory.dmp family_redline behavioral1/memory/1692-83-0x0000000002610000-0x0000000002645000-memory.dmp family_redline behavioral1/memory/1692-81-0x0000000002610000-0x0000000002645000-memory.dmp family_redline behavioral1/memory/1692-78-0x0000000002610000-0x0000000002645000-memory.dmp family_redline behavioral1/memory/1692-76-0x0000000002610000-0x0000000002645000-memory.dmp family_redline behavioral1/memory/1692-74-0x0000000002610000-0x0000000002645000-memory.dmp family_redline behavioral1/memory/1692-72-0x0000000002610000-0x0000000002645000-memory.dmp family_redline behavioral1/memory/1692-70-0x0000000002610000-0x0000000002645000-memory.dmp family_redline behavioral1/memory/1692-68-0x0000000002610000-0x0000000002645000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 2296 un028297.exe 2356 93817876.exe 1692 rk554490.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 93817876.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 93817876.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2517d2a28ff6eb41161a7a198d40a859a4ae73bf244ac3416e5f8e6d1e3a28a5N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un028297.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3208 2356 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2517d2a28ff6eb41161a7a198d40a859a4ae73bf244ac3416e5f8e6d1e3a28a5N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un028297.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 93817876.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rk554490.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2356 93817876.exe 2356 93817876.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2356 93817876.exe Token: SeDebugPrivilege 1692 rk554490.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4364 wrote to memory of 2296 4364 2517d2a28ff6eb41161a7a198d40a859a4ae73bf244ac3416e5f8e6d1e3a28a5N.exe 83 PID 4364 wrote to memory of 2296 4364 2517d2a28ff6eb41161a7a198d40a859a4ae73bf244ac3416e5f8e6d1e3a28a5N.exe 83 PID 4364 wrote to memory of 2296 4364 2517d2a28ff6eb41161a7a198d40a859a4ae73bf244ac3416e5f8e6d1e3a28a5N.exe 83 PID 2296 wrote to memory of 2356 2296 un028297.exe 84 PID 2296 wrote to memory of 2356 2296 un028297.exe 84 PID 2296 wrote to memory of 2356 2296 un028297.exe 84 PID 2296 wrote to memory of 1692 2296 un028297.exe 98 PID 2296 wrote to memory of 1692 2296 un028297.exe 98 PID 2296 wrote to memory of 1692 2296 un028297.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\2517d2a28ff6eb41161a7a198d40a859a4ae73bf244ac3416e5f8e6d1e3a28a5N.exe"C:\Users\Admin\AppData\Local\Temp\2517d2a28ff6eb41161a7a198d40a859a4ae73bf244ac3416e5f8e6d1e3a28a5N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un028297.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un028297.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\93817876.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\93817876.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2356 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2356 -s 10884⤵
- Program crash
PID:3208
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk554490.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk554490.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1692
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2356 -ip 23561⤵PID:880
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
536KB
MD5e3654b910451f2ed51d6d1a69fd99da4
SHA129e11e79a97c4caef9b2675a27f7cff867781163
SHA2568018d733cb16d49d930b0ae85fd94040ddcec5c26a1084cbf05e77c0f4fab1c3
SHA5123b612b55acf4e6db36b1cac8e769cc18a825b21a69a4572599b8298f74e372ec81e0c18bf44f4ebc8d842d1883ccd20b9d7d6f5a0e02b50cf00f79d98478221f
-
Filesize
259KB
MD5bfc3ef2c826bd1262bd5025de4705767
SHA1ad555d3fab665682c8e998be40b20d2731625fa6
SHA256077f7598134239d6fb9c71d203ed133b3e57bce599de06dfa23cc0a04b8804f6
SHA51290bc11c3e3143b049d484d583301bc754dc23f83e360f821b8eaf104c6a99448e8bcbcb32a122ec5145b018dd3e401873513868e268e45b3654af164062bd115
-
Filesize
341KB
MD5dd0bfe1a480c8fc9a8359120298e6178
SHA13c3ae5680c58dff667ab78be8f4208160bc9f093
SHA256ae38536cc6301446af0c52d932352ec802280921544963d9be2c01d2fd5d37f4
SHA512fc187f5b0bdac497bf3f8b4fc23fcf213f459e4061024f5a092461ed7e9ba0a31a605ad9f33004b355b5f5910d26beaa010bc753b4bbf3a5da3e20177849e758