Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 09:19
Static task
static1
Behavioral task
behavioral1
Sample
a7d649649ac038a87357d6451d715b236e0141aa500166e674f59e4924d3476b.exe
Resource
win10v2004-20241007-en
General
-
Target
a7d649649ac038a87357d6451d715b236e0141aa500166e674f59e4924d3476b.exe
-
Size
706KB
-
MD5
5d1eb84238d8e339441a65d05ffde753
-
SHA1
1e2ee34249324ab10ec0c4381fd65b36eeb88b9a
-
SHA256
a7d649649ac038a87357d6451d715b236e0141aa500166e674f59e4924d3476b
-
SHA512
ca95e5f05ecb9fa9828bd69903e61a6cfdb15c467d36010749424f4e3c9d433b4e1396142c49ac1416b3a306f9703a98e03f5b8cb3825d9399641a54cfa41939
-
SSDEEP
12288:Zy90/NsSMCokxbAhnJJ+QiQZgrciUxODcHEXw1mU:ZyQsExMgrlUxUdFU
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/2332-18-0x00000000070D0000-0x00000000070EA000-memory.dmp healer behavioral1/memory/2332-20-0x0000000007720000-0x0000000007738000-memory.dmp healer behavioral1/memory/2332-48-0x0000000007720000-0x0000000007732000-memory.dmp healer behavioral1/memory/2332-46-0x0000000007720000-0x0000000007732000-memory.dmp healer behavioral1/memory/2332-44-0x0000000007720000-0x0000000007732000-memory.dmp healer behavioral1/memory/2332-42-0x0000000007720000-0x0000000007732000-memory.dmp healer behavioral1/memory/2332-40-0x0000000007720000-0x0000000007732000-memory.dmp healer behavioral1/memory/2332-38-0x0000000007720000-0x0000000007732000-memory.dmp healer behavioral1/memory/2332-36-0x0000000007720000-0x0000000007732000-memory.dmp healer behavioral1/memory/2332-34-0x0000000007720000-0x0000000007732000-memory.dmp healer behavioral1/memory/2332-32-0x0000000007720000-0x0000000007732000-memory.dmp healer behavioral1/memory/2332-30-0x0000000007720000-0x0000000007732000-memory.dmp healer behavioral1/memory/2332-28-0x0000000007720000-0x0000000007732000-memory.dmp healer behavioral1/memory/2332-26-0x0000000007720000-0x0000000007732000-memory.dmp healer behavioral1/memory/2332-24-0x0000000007720000-0x0000000007732000-memory.dmp healer behavioral1/memory/2332-22-0x0000000007720000-0x0000000007732000-memory.dmp healer behavioral1/memory/2332-21-0x0000000007720000-0x0000000007732000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr069399.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr069399.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr069399.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr069399.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr069399.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr069399.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3096-60-0x0000000004DB0000-0x0000000004DEC000-memory.dmp family_redline behavioral1/memory/3096-61-0x0000000004E50000-0x0000000004E8A000-memory.dmp family_redline behavioral1/memory/3096-69-0x0000000004E50000-0x0000000004E85000-memory.dmp family_redline behavioral1/memory/3096-83-0x0000000004E50000-0x0000000004E85000-memory.dmp family_redline behavioral1/memory/3096-95-0x0000000004E50000-0x0000000004E85000-memory.dmp family_redline behavioral1/memory/3096-93-0x0000000004E50000-0x0000000004E85000-memory.dmp family_redline behavioral1/memory/3096-91-0x0000000004E50000-0x0000000004E85000-memory.dmp family_redline behavioral1/memory/3096-89-0x0000000004E50000-0x0000000004E85000-memory.dmp family_redline behavioral1/memory/3096-87-0x0000000004E50000-0x0000000004E85000-memory.dmp family_redline behavioral1/memory/3096-81-0x0000000004E50000-0x0000000004E85000-memory.dmp family_redline behavioral1/memory/3096-79-0x0000000004E50000-0x0000000004E85000-memory.dmp family_redline behavioral1/memory/3096-77-0x0000000004E50000-0x0000000004E85000-memory.dmp family_redline behavioral1/memory/3096-75-0x0000000004E50000-0x0000000004E85000-memory.dmp family_redline behavioral1/memory/3096-73-0x0000000004E50000-0x0000000004E85000-memory.dmp family_redline behavioral1/memory/3096-71-0x0000000004E50000-0x0000000004E85000-memory.dmp family_redline behavioral1/memory/3096-67-0x0000000004E50000-0x0000000004E85000-memory.dmp family_redline behavioral1/memory/3096-85-0x0000000004E50000-0x0000000004E85000-memory.dmp family_redline behavioral1/memory/3096-65-0x0000000004E50000-0x0000000004E85000-memory.dmp family_redline behavioral1/memory/3096-63-0x0000000004E50000-0x0000000004E85000-memory.dmp family_redline behavioral1/memory/3096-62-0x0000000004E50000-0x0000000004E85000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4900 un453974.exe 2332 pr069399.exe 3096 qu543965.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr069399.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr069399.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un453974.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a7d649649ac038a87357d6451d715b236e0141aa500166e674f59e4924d3476b.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1116 2332 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a7d649649ac038a87357d6451d715b236e0141aa500166e674f59e4924d3476b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un453974.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr069399.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu543965.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2332 pr069399.exe 2332 pr069399.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2332 pr069399.exe Token: SeDebugPrivilege 3096 qu543965.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 976 wrote to memory of 4900 976 a7d649649ac038a87357d6451d715b236e0141aa500166e674f59e4924d3476b.exe 83 PID 976 wrote to memory of 4900 976 a7d649649ac038a87357d6451d715b236e0141aa500166e674f59e4924d3476b.exe 83 PID 976 wrote to memory of 4900 976 a7d649649ac038a87357d6451d715b236e0141aa500166e674f59e4924d3476b.exe 83 PID 4900 wrote to memory of 2332 4900 un453974.exe 85 PID 4900 wrote to memory of 2332 4900 un453974.exe 85 PID 4900 wrote to memory of 2332 4900 un453974.exe 85 PID 4900 wrote to memory of 3096 4900 un453974.exe 98 PID 4900 wrote to memory of 3096 4900 un453974.exe 98 PID 4900 wrote to memory of 3096 4900 un453974.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7d649649ac038a87357d6451d715b236e0141aa500166e674f59e4924d3476b.exe"C:\Users\Admin\AppData\Local\Temp\a7d649649ac038a87357d6451d715b236e0141aa500166e674f59e4924d3476b.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un453974.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un453974.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr069399.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr069399.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2332 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2332 -s 11044⤵
- Program crash
PID:1116
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu543965.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu543965.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3096
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2332 -ip 23321⤵PID:1464
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
552KB
MD5a7ed067d8853c398bf1df3bbfbf16307
SHA1d962c26e56b70d97817f9d99178866af91a2625e
SHA256ae0580edf486271d9eaeeabe88b5d963fc7862bb4907e210f9f5f08af9046586
SHA5120c1c832aaa7f21772a1d6fa4d129018fb011cd29b47b12db5768dd85d39f511e46b1343f7ea28673a155f4d9ec2fb5563007d86fd347ddc019f11be68db52304
-
Filesize
299KB
MD5581efcc05af7f1ea73ae0f772692b9d9
SHA1b242e296e3fa6620b2dfa145db4b8c8bb78f8909
SHA25620db1aa767cd044288359b272e341dbdeb0d3df83665ba6aa4c10412c4cb9b7b
SHA5124be5d3cfcec332219a2ca199356f7a8896caa6da57d2ed6fe9657cabcd8ec8cdf3c70b3e0eb561b4fd1cc7dbeb01981d59e895242f00cf5d769cf12d18663c5c
-
Filesize
381KB
MD5bf140d7805d011759c5547f334bb6c53
SHA1256ca806fa6d8280f37d8b2525fb84d24d1d17c1
SHA25636861ac66271e5dc49f3fb12214517ffb969733f0e642d2dcc89cd5729e89960
SHA512ea8d42480d8ccd1e4a0ead07d0229d16f347ee5a4365f05f12e226725292fc7614790f576dfe8dbb49c9ca758174c7d9d394f7edd345cba1fc0dc7113e0d2e01