Analysis
-
max time kernel
113s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 23:46
Static task
static1
Behavioral task
behavioral1
Sample
3ebc245ca4cf427eb3790a994dda14203933519498c8cebbc2ef95064a2fd49aN.exe
Resource
win10v2004-20241007-en
General
-
Target
3ebc245ca4cf427eb3790a994dda14203933519498c8cebbc2ef95064a2fd49aN.exe
-
Size
610KB
-
MD5
0bfa5f7eaedcbc7a08f55926e7809e30
-
SHA1
c0145926117cd1249233ac60dc38570a0948e6a7
-
SHA256
3ebc245ca4cf427eb3790a994dda14203933519498c8cebbc2ef95064a2fd49a
-
SHA512
cb7fea951fab1b4fc7fcd9ca4ce05344d95742a1fe36c56a088e4b80a622ab242108bf9ba8fb86d7b1f3d342585c31092d0bffc436f2719510794a562babe030
-
SSDEEP
12288:gy904fT0MBppH3fcuZdwpi5jV7h2u8HmTECcpvrgqLMnvinEhgzW:gyNphUuZrVcu8H7pjLOvkgh
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/2640-12-0x0000000002670000-0x000000000268A000-memory.dmp healer behavioral1/memory/2640-14-0x0000000002950000-0x0000000002968000-memory.dmp healer behavioral1/memory/2640-42-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/2640-40-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/2640-38-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/2640-36-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/2640-34-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/2640-32-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/2640-30-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/2640-28-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/2640-26-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/2640-24-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/2640-22-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/2640-20-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/2640-18-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/2640-16-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/2640-15-0x0000000002950000-0x0000000002962000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr483400.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr483400.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr483400.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr483400.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr483400.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr483400.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4980-55-0x00000000026D0000-0x000000000270C000-memory.dmp family_redline behavioral1/memory/4980-57-0x0000000004E40000-0x0000000004E7A000-memory.dmp family_redline behavioral1/memory/4980-59-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/4980-71-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/4980-85-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/4980-91-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/4980-89-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/4980-87-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/4980-83-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/4980-81-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/4980-79-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/4980-77-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/4980-75-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/4980-73-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/4980-69-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/4980-67-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/4980-65-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/4980-63-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/4980-61-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/4980-58-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 2 IoCs
pid Process 2640 pr483400.exe 4980 qu506407.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr483400.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr483400.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3ebc245ca4cf427eb3790a994dda14203933519498c8cebbc2ef95064a2fd49aN.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4528 2640 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3ebc245ca4cf427eb3790a994dda14203933519498c8cebbc2ef95064a2fd49aN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr483400.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu506407.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2640 pr483400.exe 2640 pr483400.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2640 pr483400.exe Token: SeDebugPrivilege 4980 qu506407.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4708 wrote to memory of 2640 4708 3ebc245ca4cf427eb3790a994dda14203933519498c8cebbc2ef95064a2fd49aN.exe 82 PID 4708 wrote to memory of 2640 4708 3ebc245ca4cf427eb3790a994dda14203933519498c8cebbc2ef95064a2fd49aN.exe 82 PID 4708 wrote to memory of 2640 4708 3ebc245ca4cf427eb3790a994dda14203933519498c8cebbc2ef95064a2fd49aN.exe 82 PID 4708 wrote to memory of 4980 4708 3ebc245ca4cf427eb3790a994dda14203933519498c8cebbc2ef95064a2fd49aN.exe 98 PID 4708 wrote to memory of 4980 4708 3ebc245ca4cf427eb3790a994dda14203933519498c8cebbc2ef95064a2fd49aN.exe 98 PID 4708 wrote to memory of 4980 4708 3ebc245ca4cf427eb3790a994dda14203933519498c8cebbc2ef95064a2fd49aN.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ebc245ca4cf427eb3790a994dda14203933519498c8cebbc2ef95064a2fd49aN.exe"C:\Users\Admin\AppData\Local\Temp\3ebc245ca4cf427eb3790a994dda14203933519498c8cebbc2ef95064a2fd49aN.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pr483400.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pr483400.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2640 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2640 -s 10883⤵
- Program crash
PID:4528
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\qu506407.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\qu506407.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2640 -ip 26401⤵PID:4176
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
403KB
MD5b44187838df2cc85efd679ccf492c5c7
SHA19173b0699a2e6658f02653cbdb4c0fe5f64a1a88
SHA256598634b17961ba91ff532cd7c79b3dd6ec4d240dee2143279eb211b590018327
SHA5124beb48ccb2d94c9cc75c485a3b790fd74ed323978eaf8811cd9842de45c5e003c73ab607361db287d1eb4e1735e1cd8696ae6ec074aaee39884a960e0592cce1
-
Filesize
486KB
MD57a90c46898c4c5ad6c87a7e699b3110c
SHA14d5461ff69e01c184668fbc047330a174450e72f
SHA2569a83de9fe938a230db792b0e80a05801ce469f97c1ca279da5fa124066925b95
SHA51238ba5703c26d179d6c2a19fd18134c5a6470d54c36081b29e90129fe166afb5a937de0f7e91c1db377a1f5f7ac0824d04ee3cb3bf235d388d6b64778188da0d4