Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 09:59
Static task
static1
Behavioral task
behavioral1
Sample
f2739a2887c473b9c0d85d16f5abff7a3d10321471326b9ab59a11f39bdd7aa5N.exe
Resource
win10v2004-20241007-en
General
-
Target
f2739a2887c473b9c0d85d16f5abff7a3d10321471326b9ab59a11f39bdd7aa5N.exe
-
Size
767KB
-
MD5
446204a6417c6fcca323c3a21fb86850
-
SHA1
ff885b0ca1f6e613960e2110dac11aea16d22f17
-
SHA256
f2739a2887c473b9c0d85d16f5abff7a3d10321471326b9ab59a11f39bdd7aa5
-
SHA512
cdfd616c1f7bd7d217b7d21c89a6bf2896bd44002c4c961f58ce1e8a7e54e4f12c21aa0624862f5a642a2d33e8315fd81eafb471d7a09602338a86d61fa3fcad
-
SSDEEP
12288:Ry90kyWn9YR7iUFLvvYtpjl+5ovp4XXGsEFyK6ub268FwNUL1Q:RyPd9YR2U1Qt9PaXWNDswNUZQ
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/2444-19-0x00000000026B0000-0x00000000026CA000-memory.dmp healer behavioral1/memory/2444-21-0x0000000002910000-0x0000000002928000-memory.dmp healer behavioral1/memory/2444-49-0x0000000002910000-0x0000000002922000-memory.dmp healer behavioral1/memory/2444-47-0x0000000002910000-0x0000000002922000-memory.dmp healer behavioral1/memory/2444-45-0x0000000002910000-0x0000000002922000-memory.dmp healer behavioral1/memory/2444-23-0x0000000002910000-0x0000000002922000-memory.dmp healer behavioral1/memory/2444-43-0x0000000002910000-0x0000000002922000-memory.dmp healer behavioral1/memory/2444-39-0x0000000002910000-0x0000000002922000-memory.dmp healer behavioral1/memory/2444-37-0x0000000002910000-0x0000000002922000-memory.dmp healer behavioral1/memory/2444-36-0x0000000002910000-0x0000000002922000-memory.dmp healer behavioral1/memory/2444-33-0x0000000002910000-0x0000000002922000-memory.dmp healer behavioral1/memory/2444-29-0x0000000002910000-0x0000000002922000-memory.dmp healer behavioral1/memory/2444-25-0x0000000002910000-0x0000000002922000-memory.dmp healer behavioral1/memory/2444-41-0x0000000002910000-0x0000000002922000-memory.dmp healer behavioral1/memory/2444-31-0x0000000002910000-0x0000000002922000-memory.dmp healer behavioral1/memory/2444-28-0x0000000002910000-0x0000000002922000-memory.dmp healer behavioral1/memory/2444-22-0x0000000002910000-0x0000000002922000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr324986.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr324986.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr324986.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr324986.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr324986.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr324986.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1588-60-0x0000000002830000-0x000000000286C000-memory.dmp family_redline behavioral1/memory/1588-61-0x0000000004E20000-0x0000000004E5A000-memory.dmp family_redline behavioral1/memory/1588-67-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/1588-65-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/1588-63-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/1588-62-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/1588-81-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/1588-95-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/1588-91-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/1588-89-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/1588-87-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/1588-85-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/1588-83-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/1588-79-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/1588-77-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/1588-75-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/1588-73-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/1588-71-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/1588-69-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline behavioral1/memory/1588-93-0x0000000004E20000-0x0000000004E55000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4500 un345087.exe 2444 pr324986.exe 1588 qu106121.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr324986.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr324986.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f2739a2887c473b9c0d85d16f5abff7a3d10321471326b9ab59a11f39bdd7aa5N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un345087.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f2739a2887c473b9c0d85d16f5abff7a3d10321471326b9ab59a11f39bdd7aa5N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un345087.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr324986.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu106121.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2444 pr324986.exe 2444 pr324986.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2444 pr324986.exe Token: SeDebugPrivilege 1588 qu106121.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 916 wrote to memory of 4500 916 f2739a2887c473b9c0d85d16f5abff7a3d10321471326b9ab59a11f39bdd7aa5N.exe 83 PID 916 wrote to memory of 4500 916 f2739a2887c473b9c0d85d16f5abff7a3d10321471326b9ab59a11f39bdd7aa5N.exe 83 PID 916 wrote to memory of 4500 916 f2739a2887c473b9c0d85d16f5abff7a3d10321471326b9ab59a11f39bdd7aa5N.exe 83 PID 4500 wrote to memory of 2444 4500 un345087.exe 84 PID 4500 wrote to memory of 2444 4500 un345087.exe 84 PID 4500 wrote to memory of 2444 4500 un345087.exe 84 PID 4500 wrote to memory of 1588 4500 un345087.exe 92 PID 4500 wrote to memory of 1588 4500 un345087.exe 92 PID 4500 wrote to memory of 1588 4500 un345087.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2739a2887c473b9c0d85d16f5abff7a3d10321471326b9ab59a11f39bdd7aa5N.exe"C:\Users\Admin\AppData\Local\Temp\f2739a2887c473b9c0d85d16f5abff7a3d10321471326b9ab59a11f39bdd7aa5N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un345087.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un345087.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr324986.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr324986.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2444
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu106121.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu106121.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1588
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
613KB
MD5a37ccb016518c93257e5683f9963efe6
SHA153109d007adce116b2ab8b652eb26001d0b60ca2
SHA25671c69acf8038b2ae903b220cac71039fcf0e250e50e641aa1cf85dc4dcb87b36
SHA5120913cc574725410dbb8756c028f9597a3482f2e9aae81f9b82872424303bf84f5e16ad41b28bb529d32fbb1af1ac4703f390d73ca84a72f56479326754384286
-
Filesize
404KB
MD55ffa890dd8f014333e2127c37a6d41fe
SHA1a7dcd3363a31c13d3ae139512b01832295cdc49e
SHA256f705e8b123c71ba8c883d8fa39c9f17e55677286c83c4934d9af7d126e9abac2
SHA512ee28b43ebace407595959c1e13819907f1e27cad10bfe05748fe13ae4cb1d7d1cdcfa7d26cdaa597cf91740d0a1e0f80a510ca4b360e1aa33b4e074281cc2b27
-
Filesize
485KB
MD5fbcb84017374fbaa1d5f5e4fe0b48e25
SHA19c83b52813aa0f55fd427e9f8379c538bd8bf904
SHA256781036fc76c1e1b2a56add39940b605999489d22b308ee15e4f2d3ffe2fc3e0f
SHA51296d89fe7b332ab9825926a98de6dc10a7d815e069c09cde6e36764081761412b2813b4b1280f96bf9d92658974b8b89e07068e14b1f65cc5fa47db7017d4f6ed