Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/11/2024, 20:23
Static task
static1
Behavioral task
behavioral1
Sample
432ba4a90558d2d03e4471b7c83d7fdc4255d61116cb854cb977877f7c591662.exe
Resource
win10v2004-20241007-en
General
-
Target
432ba4a90558d2d03e4471b7c83d7fdc4255d61116cb854cb977877f7c591662.exe
-
Size
704KB
-
MD5
02808a985a1d2b1e9df1f01c927389ec
-
SHA1
a1694f943957b90c65ac31573611c9ef1d34f914
-
SHA256
432ba4a90558d2d03e4471b7c83d7fdc4255d61116cb854cb977877f7c591662
-
SHA512
f9ebde954e185542a387b75d2409d26cc4d2164ebd9ac75dd9e00a774338b274647365f28f5c56de189005aaf17d5ce8f46925b16b9e6a9c203308919e8428cc
-
SSDEEP
12288:6y90uMjQDJZxQOHmnYKXuNVR7S7l0wTvBoTAKeq714ETSCo2A:6ynzxQOGnbu7RO7lVlsAKeq7KlGA
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/732-18-0x0000000004AB0000-0x0000000004ACA000-memory.dmp healer behavioral1/memory/732-20-0x0000000007130000-0x0000000007148000-memory.dmp healer behavioral1/memory/732-21-0x0000000007130000-0x0000000007142000-memory.dmp healer behavioral1/memory/732-40-0x0000000007130000-0x0000000007142000-memory.dmp healer behavioral1/memory/732-48-0x0000000007130000-0x0000000007142000-memory.dmp healer behavioral1/memory/732-46-0x0000000007130000-0x0000000007142000-memory.dmp healer behavioral1/memory/732-44-0x0000000007130000-0x0000000007142000-memory.dmp healer behavioral1/memory/732-42-0x0000000007130000-0x0000000007142000-memory.dmp healer behavioral1/memory/732-38-0x0000000007130000-0x0000000007142000-memory.dmp healer behavioral1/memory/732-36-0x0000000007130000-0x0000000007142000-memory.dmp healer behavioral1/memory/732-34-0x0000000007130000-0x0000000007142000-memory.dmp healer behavioral1/memory/732-32-0x0000000007130000-0x0000000007142000-memory.dmp healer behavioral1/memory/732-30-0x0000000007130000-0x0000000007142000-memory.dmp healer behavioral1/memory/732-28-0x0000000007130000-0x0000000007142000-memory.dmp healer behavioral1/memory/732-26-0x0000000007130000-0x0000000007142000-memory.dmp healer behavioral1/memory/732-24-0x0000000007130000-0x0000000007142000-memory.dmp healer behavioral1/memory/732-22-0x0000000007130000-0x0000000007142000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr419942.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr419942.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr419942.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr419942.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr419942.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr419942.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2564-60-0x0000000004E10000-0x0000000004E4C000-memory.dmp family_redline behavioral1/memory/2564-61-0x0000000004E90000-0x0000000004ECA000-memory.dmp family_redline behavioral1/memory/2564-71-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_redline behavioral1/memory/2564-95-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_redline behavioral1/memory/2564-93-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_redline behavioral1/memory/2564-91-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_redline behavioral1/memory/2564-89-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_redline behavioral1/memory/2564-87-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_redline behavioral1/memory/2564-85-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_redline behavioral1/memory/2564-83-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_redline behavioral1/memory/2564-81-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_redline behavioral1/memory/2564-79-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_redline behavioral1/memory/2564-77-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_redline behavioral1/memory/2564-75-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_redline behavioral1/memory/2564-73-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_redline behavioral1/memory/2564-69-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_redline behavioral1/memory/2564-67-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_redline behavioral1/memory/2564-65-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_redline behavioral1/memory/2564-63-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_redline behavioral1/memory/2564-62-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 1404 un602191.exe 732 pr419942.exe 2564 qu266245.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr419942.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr419942.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 432ba4a90558d2d03e4471b7c83d7fdc4255d61116cb854cb977877f7c591662.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un602191.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4464 732 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu266245.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 432ba4a90558d2d03e4471b7c83d7fdc4255d61116cb854cb977877f7c591662.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un602191.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr419942.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 732 pr419942.exe 732 pr419942.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 732 pr419942.exe Token: SeDebugPrivilege 2564 qu266245.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2292 wrote to memory of 1404 2292 432ba4a90558d2d03e4471b7c83d7fdc4255d61116cb854cb977877f7c591662.exe 83 PID 2292 wrote to memory of 1404 2292 432ba4a90558d2d03e4471b7c83d7fdc4255d61116cb854cb977877f7c591662.exe 83 PID 2292 wrote to memory of 1404 2292 432ba4a90558d2d03e4471b7c83d7fdc4255d61116cb854cb977877f7c591662.exe 83 PID 1404 wrote to memory of 732 1404 un602191.exe 84 PID 1404 wrote to memory of 732 1404 un602191.exe 84 PID 1404 wrote to memory of 732 1404 un602191.exe 84 PID 1404 wrote to memory of 2564 1404 un602191.exe 99 PID 1404 wrote to memory of 2564 1404 un602191.exe 99 PID 1404 wrote to memory of 2564 1404 un602191.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\432ba4a90558d2d03e4471b7c83d7fdc4255d61116cb854cb977877f7c591662.exe"C:\Users\Admin\AppData\Local\Temp\432ba4a90558d2d03e4471b7c83d7fdc4255d61116cb854cb977877f7c591662.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un602191.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un602191.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr419942.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr419942.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:732 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 732 -s 10884⤵
- Program crash
PID:4464
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu266245.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu266245.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2564
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 732 -ip 7321⤵PID:4088
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
550KB
MD5a52897ad479bd8149abc166e83870455
SHA1901ddfbf7333d6e794fafb7d3e71464e05078d51
SHA2562dbdb94968bdfff3cbf36f09c0e4f6f96edf1b84dd05c3d9dc99dbe26f41b3d2
SHA5129c81dd09ad3cc221d38b1ebdac2ec631e9e2ee61d19a42d2df583c9b5610a40bf1466a3ec9b7e8af585c60188a5780d5936e7d5971b5f5436be9215d719c30d9
-
Filesize
277KB
MD5b963357cfa287a86dd9b1b0ee67efc28
SHA1556c8a450bb53f11e3da12777eb2b4d28dd42c00
SHA256d24606b15b5a3432f45268dea44ea2938f0eaaa51ab7d7022cee1eef0b2edda4
SHA512f93d950e8bef970608a25fb0cba33626354e3496d37415ec56c4f6568790bd0b6b70cbb19ed3a29b294bc46daf33a809d320e8b37321743a6a768722856a0de4
-
Filesize
360KB
MD5aeec624db5e04c7afdf36ec9589b506f
SHA1b1963510329600c37d69a312c6a4253e33de6ca7
SHA256c6c63280f7c76afbd22c2e14bd386b0d43f59d1480f9fe6279d1a2f489223580
SHA5122545b9dd82556d7a6845acfd2b986bf67bd1d23754414e57e70fe0c2432311475a5f4cec1973947ca19a39850849c5efd105fba41e7f04d23a4e93c5e8bd8f96