Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 15:14
Static task
static1
Behavioral task
behavioral1
Sample
55bed2f1577271c1b2622ecdfa9fe1fc30ddc54febc4a05f32eff6ce1b3a7cd3N.exe
Resource
win10v2004-20241007-en
General
-
Target
55bed2f1577271c1b2622ecdfa9fe1fc30ddc54febc4a05f32eff6ce1b3a7cd3N.exe
-
Size
705KB
-
MD5
e363ef2ea4589ae8ed9ff35f4d6448b0
-
SHA1
497a5cc55b83b73cfbff72e047a51b766b8bfa8e
-
SHA256
55bed2f1577271c1b2622ecdfa9fe1fc30ddc54febc4a05f32eff6ce1b3a7cd3
-
SHA512
51ed4fa951431d6d4383b300c7047249b6c36212204aeefc08fdca94670e8f5bbe51be22ebc9d1f46a96c7684547a79f8657871c964d6a447a935526311a9f62
-
SSDEEP
12288:5y900UoxtJnZCN4cJYKigW0ZSG/NbDTq5IFeqt4rytqZKZW:5yfUobCN4cJPWep/NneyFeqtMSCKo
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/3640-17-0x0000000004B40000-0x0000000004B5A000-memory.dmp healer behavioral1/memory/3640-19-0x0000000004CF0000-0x0000000004D08000-memory.dmp healer behavioral1/memory/3640-21-0x0000000004CF0000-0x0000000004D02000-memory.dmp healer behavioral1/memory/3640-48-0x0000000004CF0000-0x0000000004D02000-memory.dmp healer behavioral1/memory/3640-46-0x0000000004CF0000-0x0000000004D02000-memory.dmp healer behavioral1/memory/3640-45-0x0000000004CF0000-0x0000000004D02000-memory.dmp healer behavioral1/memory/3640-42-0x0000000004CF0000-0x0000000004D02000-memory.dmp healer behavioral1/memory/3640-40-0x0000000004CF0000-0x0000000004D02000-memory.dmp healer behavioral1/memory/3640-38-0x0000000004CF0000-0x0000000004D02000-memory.dmp healer behavioral1/memory/3640-36-0x0000000004CF0000-0x0000000004D02000-memory.dmp healer behavioral1/memory/3640-34-0x0000000004CF0000-0x0000000004D02000-memory.dmp healer behavioral1/memory/3640-32-0x0000000004CF0000-0x0000000004D02000-memory.dmp healer behavioral1/memory/3640-31-0x0000000004CF0000-0x0000000004D02000-memory.dmp healer behavioral1/memory/3640-29-0x0000000004CF0000-0x0000000004D02000-memory.dmp healer behavioral1/memory/3640-26-0x0000000004CF0000-0x0000000004D02000-memory.dmp healer behavioral1/memory/3640-24-0x0000000004CF0000-0x0000000004D02000-memory.dmp healer behavioral1/memory/3640-22-0x0000000004CF0000-0x0000000004D02000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr581439.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr581439.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr581439.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr581439.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr581439.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr581439.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4724-60-0x0000000004C00000-0x0000000004C3C000-memory.dmp family_redline behavioral1/memory/4724-61-0x0000000004D40000-0x0000000004D7A000-memory.dmp family_redline behavioral1/memory/4724-85-0x0000000004D40000-0x0000000004D75000-memory.dmp family_redline behavioral1/memory/4724-95-0x0000000004D40000-0x0000000004D75000-memory.dmp family_redline behavioral1/memory/4724-93-0x0000000004D40000-0x0000000004D75000-memory.dmp family_redline behavioral1/memory/4724-91-0x0000000004D40000-0x0000000004D75000-memory.dmp family_redline behavioral1/memory/4724-89-0x0000000004D40000-0x0000000004D75000-memory.dmp family_redline behavioral1/memory/4724-87-0x0000000004D40000-0x0000000004D75000-memory.dmp family_redline behavioral1/memory/4724-83-0x0000000004D40000-0x0000000004D75000-memory.dmp family_redline behavioral1/memory/4724-81-0x0000000004D40000-0x0000000004D75000-memory.dmp family_redline behavioral1/memory/4724-79-0x0000000004D40000-0x0000000004D75000-memory.dmp family_redline behavioral1/memory/4724-77-0x0000000004D40000-0x0000000004D75000-memory.dmp family_redline behavioral1/memory/4724-75-0x0000000004D40000-0x0000000004D75000-memory.dmp family_redline behavioral1/memory/4724-73-0x0000000004D40000-0x0000000004D75000-memory.dmp family_redline behavioral1/memory/4724-71-0x0000000004D40000-0x0000000004D75000-memory.dmp family_redline behavioral1/memory/4724-69-0x0000000004D40000-0x0000000004D75000-memory.dmp family_redline behavioral1/memory/4724-67-0x0000000004D40000-0x0000000004D75000-memory.dmp family_redline behavioral1/memory/4724-65-0x0000000004D40000-0x0000000004D75000-memory.dmp family_redline behavioral1/memory/4724-63-0x0000000004D40000-0x0000000004D75000-memory.dmp family_redline behavioral1/memory/4724-62-0x0000000004D40000-0x0000000004D75000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4964 un539888.exe 3640 pr581439.exe 4724 qu369738.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr581439.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr581439.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 55bed2f1577271c1b2622ecdfa9fe1fc30ddc54febc4a05f32eff6ce1b3a7cd3N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un539888.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1180 3640 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 55bed2f1577271c1b2622ecdfa9fe1fc30ddc54febc4a05f32eff6ce1b3a7cd3N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un539888.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr581439.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu369738.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3640 pr581439.exe 3640 pr581439.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3640 pr581439.exe Token: SeDebugPrivilege 4724 qu369738.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2484 wrote to memory of 4964 2484 55bed2f1577271c1b2622ecdfa9fe1fc30ddc54febc4a05f32eff6ce1b3a7cd3N.exe 85 PID 2484 wrote to memory of 4964 2484 55bed2f1577271c1b2622ecdfa9fe1fc30ddc54febc4a05f32eff6ce1b3a7cd3N.exe 85 PID 2484 wrote to memory of 4964 2484 55bed2f1577271c1b2622ecdfa9fe1fc30ddc54febc4a05f32eff6ce1b3a7cd3N.exe 85 PID 4964 wrote to memory of 3640 4964 un539888.exe 86 PID 4964 wrote to memory of 3640 4964 un539888.exe 86 PID 4964 wrote to memory of 3640 4964 un539888.exe 86 PID 4964 wrote to memory of 4724 4964 un539888.exe 95 PID 4964 wrote to memory of 4724 4964 un539888.exe 95 PID 4964 wrote to memory of 4724 4964 un539888.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\55bed2f1577271c1b2622ecdfa9fe1fc30ddc54febc4a05f32eff6ce1b3a7cd3N.exe"C:\Users\Admin\AppData\Local\Temp\55bed2f1577271c1b2622ecdfa9fe1fc30ddc54febc4a05f32eff6ce1b3a7cd3N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un539888.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un539888.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr581439.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr581439.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3640 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3640 -s 10604⤵
- Program crash
PID:1180
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu369738.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu369738.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4724
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3640 -ip 36401⤵PID:1472
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
551KB
MD5eb7bae9c204a35848bbb8fe28f4f7f43
SHA13a27677231ddff1f1a0377c2bb188aea2d2537af
SHA2563c70a784c329a31fa8490d0dc90ed06936bb635db7112e821fa3e44c09d86c75
SHA51243e6130d96839a6911608d226700073560ce5ea099fb0249d0398e0bb457bf62c7c57ca5726ca62f8e5d4a839cc3f0dd4f1d3cbbe001bf03a153f6fde640a14c
-
Filesize
277KB
MD5b7167512a443043c8f251c3317260e5c
SHA15c8257fe287fb15d882ce611bccc50681304d69d
SHA256bc31e69b7b687f7ee50239cd5766b1fe51d47e66563932eca4480214ebbb7dc7
SHA51262ccdfbc8bdb82a65ba65f4a144c6547686d09d4418dd7dd96369bc1fac516ac1dcd89df6f036c21e03bc312ad4232a4d08e3e5aa64ed3ddb33354b4a82a58c6
-
Filesize
360KB
MD52a436b4178b745e61b9ae7531ab69501
SHA19c83b535a0cb5a0c8c360fd636653df2017094e8
SHA25623b9ea6081087fc074f06f72b5293470e69a9009fab484cf5282c9fc6eed3b26
SHA512274ebd1126453341a4d7ef04d94ba52dd4d0b4f9f2a0ece7194b72a444d5db8b5f5d97dc2c03e680f72c9a98a221569e681b3ebc57c66d0cc152bde61f156b53