Analysis
-
max time kernel
115s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-11-2024 23:23
Static task
static1
Behavioral task
behavioral1
Sample
6d8a991e9729370076ce86b8ea90e19fe602a7e576c7433949cf89942a733947N.exe
Resource
win10v2004-20241007-en
General
-
Target
6d8a991e9729370076ce86b8ea90e19fe602a7e576c7433949cf89942a733947N.exe
-
Size
706KB
-
MD5
c677fd34d9750aace8e323d15c81f710
-
SHA1
331b6493456c9801ef43bdbc7ca77017f61b0b42
-
SHA256
6d8a991e9729370076ce86b8ea90e19fe602a7e576c7433949cf89942a733947
-
SHA512
19c626c727f8714aeb5890cb5649b9a97802da5eef1f5c9fd4a129b993f1075c8a62f6214680d9722af554febc31e2946fe04a8c011dc67c61ce013fa738a80b
-
SSDEEP
12288:Zy90/NsSMCokxbAhnJJ+QiQZgrciUxODcHEXw1m:ZyQsExMgrlUxUdF
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/2712-18-0x0000000004B60000-0x0000000004B7A000-memory.dmp healer behavioral1/memory/2712-20-0x0000000004BE0000-0x0000000004BF8000-memory.dmp healer behavioral1/memory/2712-48-0x0000000004BE0000-0x0000000004BF2000-memory.dmp healer behavioral1/memory/2712-46-0x0000000004BE0000-0x0000000004BF2000-memory.dmp healer behavioral1/memory/2712-45-0x0000000004BE0000-0x0000000004BF2000-memory.dmp healer behavioral1/memory/2712-42-0x0000000004BE0000-0x0000000004BF2000-memory.dmp healer behavioral1/memory/2712-40-0x0000000004BE0000-0x0000000004BF2000-memory.dmp healer behavioral1/memory/2712-38-0x0000000004BE0000-0x0000000004BF2000-memory.dmp healer behavioral1/memory/2712-36-0x0000000004BE0000-0x0000000004BF2000-memory.dmp healer behavioral1/memory/2712-34-0x0000000004BE0000-0x0000000004BF2000-memory.dmp healer behavioral1/memory/2712-32-0x0000000004BE0000-0x0000000004BF2000-memory.dmp healer behavioral1/memory/2712-30-0x0000000004BE0000-0x0000000004BF2000-memory.dmp healer behavioral1/memory/2712-28-0x0000000004BE0000-0x0000000004BF2000-memory.dmp healer behavioral1/memory/2712-26-0x0000000004BE0000-0x0000000004BF2000-memory.dmp healer behavioral1/memory/2712-24-0x0000000004BE0000-0x0000000004BF2000-memory.dmp healer behavioral1/memory/2712-22-0x0000000004BE0000-0x0000000004BF2000-memory.dmp healer behavioral1/memory/2712-21-0x0000000004BE0000-0x0000000004BF2000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr069399.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr069399.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr069399.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr069399.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr069399.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr069399.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2692-60-0x0000000004AA0000-0x0000000004ADC000-memory.dmp family_redline behavioral1/memory/2692-61-0x0000000004D50000-0x0000000004D8A000-memory.dmp family_redline behavioral1/memory/2692-77-0x0000000004D50000-0x0000000004D85000-memory.dmp family_redline behavioral1/memory/2692-83-0x0000000004D50000-0x0000000004D85000-memory.dmp family_redline behavioral1/memory/2692-95-0x0000000004D50000-0x0000000004D85000-memory.dmp family_redline behavioral1/memory/2692-93-0x0000000004D50000-0x0000000004D85000-memory.dmp family_redline behavioral1/memory/2692-91-0x0000000004D50000-0x0000000004D85000-memory.dmp family_redline behavioral1/memory/2692-89-0x0000000004D50000-0x0000000004D85000-memory.dmp family_redline behavioral1/memory/2692-87-0x0000000004D50000-0x0000000004D85000-memory.dmp family_redline behavioral1/memory/2692-85-0x0000000004D50000-0x0000000004D85000-memory.dmp family_redline behavioral1/memory/2692-81-0x0000000004D50000-0x0000000004D85000-memory.dmp family_redline behavioral1/memory/2692-79-0x0000000004D50000-0x0000000004D85000-memory.dmp family_redline behavioral1/memory/2692-75-0x0000000004D50000-0x0000000004D85000-memory.dmp family_redline behavioral1/memory/2692-73-0x0000000004D50000-0x0000000004D85000-memory.dmp family_redline behavioral1/memory/2692-72-0x0000000004D50000-0x0000000004D85000-memory.dmp family_redline behavioral1/memory/2692-69-0x0000000004D50000-0x0000000004D85000-memory.dmp family_redline behavioral1/memory/2692-67-0x0000000004D50000-0x0000000004D85000-memory.dmp family_redline behavioral1/memory/2692-65-0x0000000004D50000-0x0000000004D85000-memory.dmp family_redline behavioral1/memory/2692-63-0x0000000004D50000-0x0000000004D85000-memory.dmp family_redline behavioral1/memory/2692-62-0x0000000004D50000-0x0000000004D85000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3208 un453974.exe 2712 pr069399.exe 2692 qu543965.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr069399.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr069399.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6d8a991e9729370076ce86b8ea90e19fe602a7e576c7433949cf89942a733947N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un453974.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4256 2712 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6d8a991e9729370076ce86b8ea90e19fe602a7e576c7433949cf89942a733947N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un453974.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr069399.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu543965.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2712 pr069399.exe 2712 pr069399.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2712 pr069399.exe Token: SeDebugPrivilege 2692 qu543965.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 368 wrote to memory of 3208 368 6d8a991e9729370076ce86b8ea90e19fe602a7e576c7433949cf89942a733947N.exe 83 PID 368 wrote to memory of 3208 368 6d8a991e9729370076ce86b8ea90e19fe602a7e576c7433949cf89942a733947N.exe 83 PID 368 wrote to memory of 3208 368 6d8a991e9729370076ce86b8ea90e19fe602a7e576c7433949cf89942a733947N.exe 83 PID 3208 wrote to memory of 2712 3208 un453974.exe 84 PID 3208 wrote to memory of 2712 3208 un453974.exe 84 PID 3208 wrote to memory of 2712 3208 un453974.exe 84 PID 3208 wrote to memory of 2692 3208 un453974.exe 99 PID 3208 wrote to memory of 2692 3208 un453974.exe 99 PID 3208 wrote to memory of 2692 3208 un453974.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d8a991e9729370076ce86b8ea90e19fe602a7e576c7433949cf89942a733947N.exe"C:\Users\Admin\AppData\Local\Temp\6d8a991e9729370076ce86b8ea90e19fe602a7e576c7433949cf89942a733947N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un453974.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un453974.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr069399.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr069399.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2712 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2712 -s 10804⤵
- Program crash
PID:4256
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu543965.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu543965.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2692
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2712 -ip 27121⤵PID:4300
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
552KB
MD5a7ed067d8853c398bf1df3bbfbf16307
SHA1d962c26e56b70d97817f9d99178866af91a2625e
SHA256ae0580edf486271d9eaeeabe88b5d963fc7862bb4907e210f9f5f08af9046586
SHA5120c1c832aaa7f21772a1d6fa4d129018fb011cd29b47b12db5768dd85d39f511e46b1343f7ea28673a155f4d9ec2fb5563007d86fd347ddc019f11be68db52304
-
Filesize
299KB
MD5581efcc05af7f1ea73ae0f772692b9d9
SHA1b242e296e3fa6620b2dfa145db4b8c8bb78f8909
SHA25620db1aa767cd044288359b272e341dbdeb0d3df83665ba6aa4c10412c4cb9b7b
SHA5124be5d3cfcec332219a2ca199356f7a8896caa6da57d2ed6fe9657cabcd8ec8cdf3c70b3e0eb561b4fd1cc7dbeb01981d59e895242f00cf5d769cf12d18663c5c
-
Filesize
381KB
MD5bf140d7805d011759c5547f334bb6c53
SHA1256ca806fa6d8280f37d8b2525fb84d24d1d17c1
SHA25636861ac66271e5dc49f3fb12214517ffb969733f0e642d2dcc89cd5729e89960
SHA512ea8d42480d8ccd1e4a0ead07d0229d16f347ee5a4365f05f12e226725292fc7614790f576dfe8dbb49c9ca758174c7d9d394f7edd345cba1fc0dc7113e0d2e01