Analysis
-
max time kernel
113s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/11/2024, 19:07
Static task
static1
Behavioral task
behavioral1
Sample
684e4bc849d0b833749d881925bbf1b23353741f1def9f5f35c2d7f9c8f17e50.exe
Resource
win10v2004-20241007-en
General
-
Target
684e4bc849d0b833749d881925bbf1b23353741f1def9f5f35c2d7f9c8f17e50.exe
-
Size
707KB
-
MD5
36728a3757a305d001c4df36a4fee4f1
-
SHA1
615527e3a76eb35915d58598a6b91bf9e9a01727
-
SHA256
684e4bc849d0b833749d881925bbf1b23353741f1def9f5f35c2d7f9c8f17e50
-
SHA512
78ca3564423f8532d90ed26824da35caf519174390a5930db1880eb32f217699da5a707c84bcd5222d390473e8004a1a081d214cc0120363bee89ba9a35bdec0
-
SSDEEP
12288:Ry905Ws60kom0boq1HZuYMwxZ6+fe8bxqs28PbmuO1ztfJTjpU04Zxw+rPdjmMd:Ryv31oVbnunwRW6q/8auO1ltNU04AmNd
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/4480-18-0x00000000048E0000-0x00000000048FA000-memory.dmp healer behavioral1/memory/4480-20-0x0000000004E50000-0x0000000004E68000-memory.dmp healer behavioral1/memory/4480-21-0x0000000004E50000-0x0000000004E62000-memory.dmp healer behavioral1/memory/4480-30-0x0000000004E50000-0x0000000004E62000-memory.dmp healer behavioral1/memory/4480-48-0x0000000004E50000-0x0000000004E62000-memory.dmp healer behavioral1/memory/4480-46-0x0000000004E50000-0x0000000004E62000-memory.dmp healer behavioral1/memory/4480-44-0x0000000004E50000-0x0000000004E62000-memory.dmp healer behavioral1/memory/4480-42-0x0000000004E50000-0x0000000004E62000-memory.dmp healer behavioral1/memory/4480-40-0x0000000004E50000-0x0000000004E62000-memory.dmp healer behavioral1/memory/4480-36-0x0000000004E50000-0x0000000004E62000-memory.dmp healer behavioral1/memory/4480-34-0x0000000004E50000-0x0000000004E62000-memory.dmp healer behavioral1/memory/4480-28-0x0000000004E50000-0x0000000004E62000-memory.dmp healer behavioral1/memory/4480-26-0x0000000004E50000-0x0000000004E62000-memory.dmp healer behavioral1/memory/4480-24-0x0000000004E50000-0x0000000004E62000-memory.dmp healer behavioral1/memory/4480-38-0x0000000004E50000-0x0000000004E62000-memory.dmp healer behavioral1/memory/4480-22-0x0000000004E50000-0x0000000004E62000-memory.dmp healer behavioral1/memory/4480-32-0x0000000004E50000-0x0000000004E62000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr238608.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr238608.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr238608.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr238608.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr238608.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr238608.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4428-60-0x0000000004BD0000-0x0000000004C0C000-memory.dmp family_redline behavioral1/memory/4428-61-0x0000000004D70000-0x0000000004DAA000-memory.dmp family_redline behavioral1/memory/4428-62-0x0000000004D70000-0x0000000004DA5000-memory.dmp family_redline behavioral1/memory/4428-63-0x0000000004D70000-0x0000000004DA5000-memory.dmp family_redline behavioral1/memory/4428-95-0x0000000004D70000-0x0000000004DA5000-memory.dmp family_redline behavioral1/memory/4428-93-0x0000000004D70000-0x0000000004DA5000-memory.dmp family_redline behavioral1/memory/4428-91-0x0000000004D70000-0x0000000004DA5000-memory.dmp family_redline behavioral1/memory/4428-89-0x0000000004D70000-0x0000000004DA5000-memory.dmp family_redline behavioral1/memory/4428-87-0x0000000004D70000-0x0000000004DA5000-memory.dmp family_redline behavioral1/memory/4428-85-0x0000000004D70000-0x0000000004DA5000-memory.dmp family_redline behavioral1/memory/4428-81-0x0000000004D70000-0x0000000004DA5000-memory.dmp family_redline behavioral1/memory/4428-79-0x0000000004D70000-0x0000000004DA5000-memory.dmp family_redline behavioral1/memory/4428-77-0x0000000004D70000-0x0000000004DA5000-memory.dmp family_redline behavioral1/memory/4428-75-0x0000000004D70000-0x0000000004DA5000-memory.dmp family_redline behavioral1/memory/4428-73-0x0000000004D70000-0x0000000004DA5000-memory.dmp family_redline behavioral1/memory/4428-71-0x0000000004D70000-0x0000000004DA5000-memory.dmp family_redline behavioral1/memory/4428-69-0x0000000004D70000-0x0000000004DA5000-memory.dmp family_redline behavioral1/memory/4428-67-0x0000000004D70000-0x0000000004DA5000-memory.dmp family_redline behavioral1/memory/4428-65-0x0000000004D70000-0x0000000004DA5000-memory.dmp family_redline behavioral1/memory/4428-83-0x0000000004D70000-0x0000000004DA5000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4552 un542577.exe 4480 pr238608.exe 4428 qu960094.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr238608.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr238608.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un542577.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 684e4bc849d0b833749d881925bbf1b23353741f1def9f5f35c2d7f9c8f17e50.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4616 4480 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 684e4bc849d0b833749d881925bbf1b23353741f1def9f5f35c2d7f9c8f17e50.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un542577.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr238608.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu960094.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4480 pr238608.exe 4480 pr238608.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4480 pr238608.exe Token: SeDebugPrivilege 4428 qu960094.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3536 wrote to memory of 4552 3536 684e4bc849d0b833749d881925bbf1b23353741f1def9f5f35c2d7f9c8f17e50.exe 83 PID 3536 wrote to memory of 4552 3536 684e4bc849d0b833749d881925bbf1b23353741f1def9f5f35c2d7f9c8f17e50.exe 83 PID 3536 wrote to memory of 4552 3536 684e4bc849d0b833749d881925bbf1b23353741f1def9f5f35c2d7f9c8f17e50.exe 83 PID 4552 wrote to memory of 4480 4552 un542577.exe 84 PID 4552 wrote to memory of 4480 4552 un542577.exe 84 PID 4552 wrote to memory of 4480 4552 un542577.exe 84 PID 4552 wrote to memory of 4428 4552 un542577.exe 96 PID 4552 wrote to memory of 4428 4552 un542577.exe 96 PID 4552 wrote to memory of 4428 4552 un542577.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\684e4bc849d0b833749d881925bbf1b23353741f1def9f5f35c2d7f9c8f17e50.exe"C:\Users\Admin\AppData\Local\Temp\684e4bc849d0b833749d881925bbf1b23353741f1def9f5f35c2d7f9c8f17e50.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un542577.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un542577.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr238608.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr238608.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4480 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 10844⤵
- Program crash
PID:4616
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu960094.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu960094.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4428
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4480 -ip 44801⤵PID:4244
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
553KB
MD53ea0fa6a9e70f54afb75118b3102be57
SHA1ddb80472b8f43a09aed05406d2cffbfd05c92aca
SHA25633859145820465f41ce629cd76cfe2be0c2611f798475c0e1207c67688a0a171
SHA512b193c61522c6574dc5bd89661319e1f13b6107d1755dfc20740fac952bece50097635fbc541713d7f1038f8657985bfbd470fd5b9fd4b854fcbb81139433b744
-
Filesize
299KB
MD58e2f8961bf31b984e96b84340975a174
SHA1a6276fa9b4e76a0f443bf19f3cf12a2b6e18c31a
SHA2568db07af00948e639230028c9ea556e70a67df6a9a147a9dcd75f6bc9db27e7c6
SHA5124b87454c1d8a142d41eb25051463d8818ecd7296aea4210af2e3753beba04fdf248d264e62d0f88a80a1e9e5c139acbb162db55dea54286f40e2e1a366e029a5
-
Filesize
381KB
MD53194501365a946e59ac2e2c0dacc0163
SHA1fbc70be8a820fce9402f7fd3034e677d8c308f7d
SHA2565d27a834eaaf3c372300f4dc07ff7c80cdc9db02e5e6e70643bb9a126f462380
SHA5128d79811f2818f11fa9f2e4f8f4135929b70538d7ff54c943caa16b9d547d4ad52b31bfa4b77685c30657ae7c0cb361918b73abc9e9b2a8fd79c19cd7c43eb3c8