Analysis
-
max time kernel
114s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 11:25
Static task
static1
Behavioral task
behavioral1
Sample
d84ffc49297c60e6deb96fa465907cf4b7624881aaf6edad44171f9f717056c3N.exe
Resource
win10v2004-20241007-en
General
-
Target
d84ffc49297c60e6deb96fa465907cf4b7624881aaf6edad44171f9f717056c3N.exe
-
Size
551KB
-
MD5
637416edb6535e0803a07bd3db417e20
-
SHA1
8c1b929abad12fb7dd6637f7ab661f5f4cc480ed
-
SHA256
d84ffc49297c60e6deb96fa465907cf4b7624881aaf6edad44171f9f717056c3
-
SHA512
d7a530854ed47aae9ecca1e3fc4f6dfef13dc31433375101a1c9fc3032ada32756a6f3067b9428395d7fa394a2f7bafea92792f46687367ed70349dd4dbb317a
-
SSDEEP
12288:/y90wWlOperKHgzaBk6EZIKlaRzm9QJfCYZ:/y7HC+BwTlaRzm9QJfCK
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/220-10-0x0000000004A70000-0x0000000004A8A000-memory.dmp healer behavioral1/memory/220-13-0x0000000004CD0000-0x0000000004CE8000-memory.dmp healer behavioral1/memory/220-14-0x0000000004CD0000-0x0000000004CE2000-memory.dmp healer behavioral1/memory/220-41-0x0000000004CD0000-0x0000000004CE2000-memory.dmp healer behavioral1/memory/220-39-0x0000000004CD0000-0x0000000004CE2000-memory.dmp healer behavioral1/memory/220-37-0x0000000004CD0000-0x0000000004CE2000-memory.dmp healer behavioral1/memory/220-35-0x0000000004CD0000-0x0000000004CE2000-memory.dmp healer behavioral1/memory/220-33-0x0000000004CD0000-0x0000000004CE2000-memory.dmp healer behavioral1/memory/220-31-0x0000000004CD0000-0x0000000004CE2000-memory.dmp healer behavioral1/memory/220-29-0x0000000004CD0000-0x0000000004CE2000-memory.dmp healer behavioral1/memory/220-27-0x0000000004CD0000-0x0000000004CE2000-memory.dmp healer behavioral1/memory/220-25-0x0000000004CD0000-0x0000000004CE2000-memory.dmp healer behavioral1/memory/220-23-0x0000000004CD0000-0x0000000004CE2000-memory.dmp healer behavioral1/memory/220-21-0x0000000004CD0000-0x0000000004CE2000-memory.dmp healer behavioral1/memory/220-19-0x0000000004CD0000-0x0000000004CE2000-memory.dmp healer behavioral1/memory/220-17-0x0000000004CD0000-0x0000000004CE2000-memory.dmp healer behavioral1/memory/220-15-0x0000000004CD0000-0x0000000004CE2000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr127026.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr127026.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr127026.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr127026.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr127026.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr127026.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/5056-52-0x0000000004C00000-0x0000000004C3C000-memory.dmp family_redline behavioral1/memory/5056-53-0x0000000007180000-0x00000000071BA000-memory.dmp family_redline behavioral1/memory/5056-85-0x0000000007180000-0x00000000071B5000-memory.dmp family_redline behavioral1/memory/5056-67-0x0000000007180000-0x00000000071B5000-memory.dmp family_redline behavioral1/memory/5056-87-0x0000000007180000-0x00000000071B5000-memory.dmp family_redline behavioral1/memory/5056-83-0x0000000007180000-0x00000000071B5000-memory.dmp family_redline behavioral1/memory/5056-81-0x0000000007180000-0x00000000071B5000-memory.dmp family_redline behavioral1/memory/5056-79-0x0000000007180000-0x00000000071B5000-memory.dmp family_redline behavioral1/memory/5056-77-0x0000000007180000-0x00000000071B5000-memory.dmp family_redline behavioral1/memory/5056-75-0x0000000007180000-0x00000000071B5000-memory.dmp family_redline behavioral1/memory/5056-73-0x0000000007180000-0x00000000071B5000-memory.dmp family_redline behavioral1/memory/5056-71-0x0000000007180000-0x00000000071B5000-memory.dmp family_redline behavioral1/memory/5056-69-0x0000000007180000-0x00000000071B5000-memory.dmp family_redline behavioral1/memory/5056-65-0x0000000007180000-0x00000000071B5000-memory.dmp family_redline behavioral1/memory/5056-63-0x0000000007180000-0x00000000071B5000-memory.dmp family_redline behavioral1/memory/5056-61-0x0000000007180000-0x00000000071B5000-memory.dmp family_redline behavioral1/memory/5056-59-0x0000000007180000-0x00000000071B5000-memory.dmp family_redline behavioral1/memory/5056-57-0x0000000007180000-0x00000000071B5000-memory.dmp family_redline behavioral1/memory/5056-55-0x0000000007180000-0x00000000071B5000-memory.dmp family_redline behavioral1/memory/5056-54-0x0000000007180000-0x00000000071B5000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 2 IoCs
pid Process 220 pr127026.exe 5056 qu650285.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr127026.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr127026.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d84ffc49297c60e6deb96fa465907cf4b7624881aaf6edad44171f9f717056c3N.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4832 220 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d84ffc49297c60e6deb96fa465907cf4b7624881aaf6edad44171f9f717056c3N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr127026.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu650285.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 220 pr127026.exe 220 pr127026.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 220 pr127026.exe Token: SeDebugPrivilege 5056 qu650285.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 852 wrote to memory of 220 852 d84ffc49297c60e6deb96fa465907cf4b7624881aaf6edad44171f9f717056c3N.exe 84 PID 852 wrote to memory of 220 852 d84ffc49297c60e6deb96fa465907cf4b7624881aaf6edad44171f9f717056c3N.exe 84 PID 852 wrote to memory of 220 852 d84ffc49297c60e6deb96fa465907cf4b7624881aaf6edad44171f9f717056c3N.exe 84 PID 852 wrote to memory of 5056 852 d84ffc49297c60e6deb96fa465907cf4b7624881aaf6edad44171f9f717056c3N.exe 94 PID 852 wrote to memory of 5056 852 d84ffc49297c60e6deb96fa465907cf4b7624881aaf6edad44171f9f717056c3N.exe 94 PID 852 wrote to memory of 5056 852 d84ffc49297c60e6deb96fa465907cf4b7624881aaf6edad44171f9f717056c3N.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\d84ffc49297c60e6deb96fa465907cf4b7624881aaf6edad44171f9f717056c3N.exe"C:\Users\Admin\AppData\Local\Temp\d84ffc49297c60e6deb96fa465907cf4b7624881aaf6edad44171f9f717056c3N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pr127026.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pr127026.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:220 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 220 -s 10883⤵
- Program crash
PID:4832
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\qu650285.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\qu650285.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 220 -ip 2201⤵PID:1836
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
277KB
MD5fad22d1ae2535fb18806501a5d9b8a14
SHA188262fd27056e25ed6c7cfcf56b366f7a45cbeae
SHA256dc2d3a33763236c39f7c5b6b18c6822764b6010afa0c2bf17cde6724fcd47689
SHA51238dd7c5275fec407cc472209c367eaf2fd33fda3cd54c5dba1883de4014b61be7d4c025e5f0482ebfcfec03896dc2e70f3ec417c5f6c3ce5cef579d4a5d41e50
-
Filesize
360KB
MD5f602d9774230d97e9eb0b35ebe2a9c3d
SHA1cee4fe97300ce46a4148fe537cccf4c630888b73
SHA256e1712b4f539d47c6cc925987751c717113df30c1548d77bdcb5ebd0b54a2601e
SHA512e40bb6be04dda0c293223a5baec0dcb9dfb7d52ed8d3277abf278e6edfe92c4b9b7cf75fefa6dba98e9ced27b9df52c9d616f068dfb9a97b5c0be916c0beb83b