Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/11/2024, 17:50
Static task
static1
Behavioral task
behavioral1
Sample
5237c7bc9a058a0d6acbb3cbeb6ae6730b0f422ac92a5fbaa8ec54ef83b07d1aN.exe
Resource
win10v2004-20241007-en
General
-
Target
5237c7bc9a058a0d6acbb3cbeb6ae6730b0f422ac92a5fbaa8ec54ef83b07d1aN.exe
-
Size
763KB
-
MD5
6b8d7f849fbea0558014eee91b732890
-
SHA1
067a71a23684f6c52441fee85b540b11aa5ca27d
-
SHA256
5237c7bc9a058a0d6acbb3cbeb6ae6730b0f422ac92a5fbaa8ec54ef83b07d1a
-
SHA512
e32ea01f081cb8f24e4040c79d3a0e82c06e757b78edaf48b612be2d86aee671264e4acd5b475a79dabbbbc3dfb142b7544ab463618796ffd03354e50f7babc1
-
SSDEEP
12288:Ly907gX4jtpfUR6qCreF2rWL3rwvqTgE3sCZ66hbuJgYPaAc1PRBXStgLe:Ly4VrUoqCreQrWgvREDQ6ZIgNx1PRBiX
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/1192-19-0x0000000002660000-0x000000000267A000-memory.dmp healer behavioral1/memory/1192-21-0x0000000002940000-0x0000000002958000-memory.dmp healer behavioral1/memory/1192-22-0x0000000002940000-0x0000000002952000-memory.dmp healer behavioral1/memory/1192-23-0x0000000002940000-0x0000000002952000-memory.dmp healer behavioral1/memory/1192-45-0x0000000002940000-0x0000000002952000-memory.dmp healer behavioral1/memory/1192-49-0x0000000002940000-0x0000000002952000-memory.dmp healer behavioral1/memory/1192-47-0x0000000002940000-0x0000000002952000-memory.dmp healer behavioral1/memory/1192-43-0x0000000002940000-0x0000000002952000-memory.dmp healer behavioral1/memory/1192-41-0x0000000002940000-0x0000000002952000-memory.dmp healer behavioral1/memory/1192-39-0x0000000002940000-0x0000000002952000-memory.dmp healer behavioral1/memory/1192-37-0x0000000002940000-0x0000000002952000-memory.dmp healer behavioral1/memory/1192-35-0x0000000002940000-0x0000000002952000-memory.dmp healer behavioral1/memory/1192-33-0x0000000002940000-0x0000000002952000-memory.dmp healer behavioral1/memory/1192-31-0x0000000002940000-0x0000000002952000-memory.dmp healer behavioral1/memory/1192-27-0x0000000002940000-0x0000000002952000-memory.dmp healer behavioral1/memory/1192-25-0x0000000002940000-0x0000000002952000-memory.dmp healer behavioral1/memory/1192-29-0x0000000002940000-0x0000000002952000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr633034.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr633034.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr633034.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr633034.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr633034.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr633034.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1392-60-0x00000000027D0000-0x000000000280C000-memory.dmp family_redline behavioral1/memory/1392-61-0x0000000002A10000-0x0000000002A4A000-memory.dmp family_redline behavioral1/memory/1392-67-0x0000000002A10000-0x0000000002A45000-memory.dmp family_redline behavioral1/memory/1392-65-0x0000000002A10000-0x0000000002A45000-memory.dmp family_redline behavioral1/memory/1392-63-0x0000000002A10000-0x0000000002A45000-memory.dmp family_redline behavioral1/memory/1392-62-0x0000000002A10000-0x0000000002A45000-memory.dmp family_redline behavioral1/memory/1392-79-0x0000000002A10000-0x0000000002A45000-memory.dmp family_redline behavioral1/memory/1392-95-0x0000000002A10000-0x0000000002A45000-memory.dmp family_redline behavioral1/memory/1392-93-0x0000000002A10000-0x0000000002A45000-memory.dmp family_redline behavioral1/memory/1392-91-0x0000000002A10000-0x0000000002A45000-memory.dmp family_redline behavioral1/memory/1392-89-0x0000000002A10000-0x0000000002A45000-memory.dmp family_redline behavioral1/memory/1392-87-0x0000000002A10000-0x0000000002A45000-memory.dmp family_redline behavioral1/memory/1392-85-0x0000000002A10000-0x0000000002A45000-memory.dmp family_redline behavioral1/memory/1392-83-0x0000000002A10000-0x0000000002A45000-memory.dmp family_redline behavioral1/memory/1392-81-0x0000000002A10000-0x0000000002A45000-memory.dmp family_redline behavioral1/memory/1392-77-0x0000000002A10000-0x0000000002A45000-memory.dmp family_redline behavioral1/memory/1392-75-0x0000000002A10000-0x0000000002A45000-memory.dmp family_redline behavioral1/memory/1392-74-0x0000000002A10000-0x0000000002A45000-memory.dmp family_redline behavioral1/memory/1392-71-0x0000000002A10000-0x0000000002A45000-memory.dmp family_redline behavioral1/memory/1392-69-0x0000000002A10000-0x0000000002A45000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3232 un567812.exe 1192 pr633034.exe 1392 qu318082.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr633034.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr633034.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5237c7bc9a058a0d6acbb3cbeb6ae6730b0f422ac92a5fbaa8ec54ef83b07d1aN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un567812.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3220 1192 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5237c7bc9a058a0d6acbb3cbeb6ae6730b0f422ac92a5fbaa8ec54ef83b07d1aN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un567812.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr633034.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu318082.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1192 pr633034.exe 1192 pr633034.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1192 pr633034.exe Token: SeDebugPrivilege 1392 qu318082.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3884 wrote to memory of 3232 3884 5237c7bc9a058a0d6acbb3cbeb6ae6730b0f422ac92a5fbaa8ec54ef83b07d1aN.exe 83 PID 3884 wrote to memory of 3232 3884 5237c7bc9a058a0d6acbb3cbeb6ae6730b0f422ac92a5fbaa8ec54ef83b07d1aN.exe 83 PID 3884 wrote to memory of 3232 3884 5237c7bc9a058a0d6acbb3cbeb6ae6730b0f422ac92a5fbaa8ec54ef83b07d1aN.exe 83 PID 3232 wrote to memory of 1192 3232 un567812.exe 84 PID 3232 wrote to memory of 1192 3232 un567812.exe 84 PID 3232 wrote to memory of 1192 3232 un567812.exe 84 PID 3232 wrote to memory of 1392 3232 un567812.exe 95 PID 3232 wrote to memory of 1392 3232 un567812.exe 95 PID 3232 wrote to memory of 1392 3232 un567812.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\5237c7bc9a058a0d6acbb3cbeb6ae6730b0f422ac92a5fbaa8ec54ef83b07d1aN.exe"C:\Users\Admin\AppData\Local\Temp\5237c7bc9a058a0d6acbb3cbeb6ae6730b0f422ac92a5fbaa8ec54ef83b07d1aN.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un567812.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un567812.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr633034.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr633034.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1192 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 11004⤵
- Program crash
PID:3220
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu318082.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu318082.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1392
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1192 -ip 11921⤵PID:2556
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
610KB
MD5d788d52e1ddd471c4cff5b1301e38d98
SHA1b323abcddb1582422be127d691ce49eaf98eef55
SHA2567b70064ba13166f7f877898e15c4d20307397fe1be11c172a37679bcc8d1ef63
SHA51208c257c461264f7ee6146624a79dedc20ae2124f2eb1db87e3e745585b5c7284c8f1acdee68db9234c7f51d5f5e81ce6424c4c1bf1a78b3dd9acab5a5a381e66
-
Filesize
403KB
MD5c4a06a4105d2e7bfd314c2811b861474
SHA138d3772ab7d957ef0439dbfe45c1d09500f7e94e
SHA256ca5b94c2efdd056c1fe290447254fca506ce9682212f716bbfcdc3577fa99706
SHA512ba82284d1e4986114f7619a913ef2b2ef3f44be7e777b733564e440d1afe08f410173df1a4c418888c348ca82ccbb5398b80bea4f41acfd2f1c165edadb4a650
-
Filesize
486KB
MD5867c680203f9fac4fe59dd69529c1bf8
SHA1cfc138c893488954dfd9c605452b48cb775713c2
SHA2566bb11b1395a6a313993122cad5163100349501da822a88546ea81d64a529566a
SHA512f254b72692e2ec25e939652586892dd6d2cd960e2fc6f37bd54460ee6934d60b24375905c8fc8e7c026f55176810dd5f1fc898a87c4563a9c8fc04adcd73db0a