Analysis
-
max time kernel
113s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 16:40
Static task
static1
Behavioral task
behavioral1
Sample
3468901596aabc1130c44ea4bc1c1160e93e79b76456471fa084d9dc9b5a8ad8.exe
Resource
win10v2004-20241007-en
General
-
Target
3468901596aabc1130c44ea4bc1c1160e93e79b76456471fa084d9dc9b5a8ad8.exe
-
Size
762KB
-
MD5
4976f806538d6d14acc3c674500fee69
-
SHA1
f3d6f1972f328541b80601cafbf5a269a4959ef9
-
SHA256
3468901596aabc1130c44ea4bc1c1160e93e79b76456471fa084d9dc9b5a8ad8
-
SHA512
d2c3431efbec9ac12d2f705b9d9f952714a6dd16b8e65f6cd341f2b7f20f656cb055ad2d20e4cbf9e933aa6db76643b03e0667d5d0cf26c2344518c19ba663fb
-
SSDEEP
12288:Gy90PcHSUOEUpKHqmMi4ay3bAH4kLQM691fJgA/xvXkrUuLST:Gy19EpKKmMrpE4w76rRgMfN6ST
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/3604-19-0x00000000025B0000-0x00000000025CA000-memory.dmp healer behavioral1/memory/3604-21-0x0000000002850000-0x0000000002868000-memory.dmp healer behavioral1/memory/3604-49-0x0000000002850000-0x0000000002862000-memory.dmp healer behavioral1/memory/3604-47-0x0000000002850000-0x0000000002862000-memory.dmp healer behavioral1/memory/3604-46-0x0000000002850000-0x0000000002862000-memory.dmp healer behavioral1/memory/3604-43-0x0000000002850000-0x0000000002862000-memory.dmp healer behavioral1/memory/3604-41-0x0000000002850000-0x0000000002862000-memory.dmp healer behavioral1/memory/3604-39-0x0000000002850000-0x0000000002862000-memory.dmp healer behavioral1/memory/3604-37-0x0000000002850000-0x0000000002862000-memory.dmp healer behavioral1/memory/3604-35-0x0000000002850000-0x0000000002862000-memory.dmp healer behavioral1/memory/3604-33-0x0000000002850000-0x0000000002862000-memory.dmp healer behavioral1/memory/3604-31-0x0000000002850000-0x0000000002862000-memory.dmp healer behavioral1/memory/3604-29-0x0000000002850000-0x0000000002862000-memory.dmp healer behavioral1/memory/3604-27-0x0000000002850000-0x0000000002862000-memory.dmp healer behavioral1/memory/3604-25-0x0000000002850000-0x0000000002862000-memory.dmp healer behavioral1/memory/3604-23-0x0000000002850000-0x0000000002862000-memory.dmp healer behavioral1/memory/3604-22-0x0000000002850000-0x0000000002862000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr196046.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr196046.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr196046.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr196046.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr196046.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr196046.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3328-61-0x0000000002690000-0x00000000026CC000-memory.dmp family_redline behavioral1/memory/3328-62-0x0000000004E10000-0x0000000004E4A000-memory.dmp family_redline behavioral1/memory/3328-64-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/3328-76-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/3328-96-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/3328-92-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/3328-91-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/3328-88-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/3328-87-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/3328-84-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/3328-83-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/3328-80-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/3328-78-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/3328-74-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/3328-72-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/3328-70-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/3328-68-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/3328-66-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/3328-94-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/3328-63-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 2132 un555718.exe 3604 pr196046.exe 3328 qu784401.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr196046.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr196046.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un555718.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3468901596aabc1130c44ea4bc1c1160e93e79b76456471fa084d9dc9b5a8ad8.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1648 3604 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr196046.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu784401.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3468901596aabc1130c44ea4bc1c1160e93e79b76456471fa084d9dc9b5a8ad8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un555718.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3604 pr196046.exe 3604 pr196046.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3604 pr196046.exe Token: SeDebugPrivilege 3328 qu784401.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5092 wrote to memory of 2132 5092 3468901596aabc1130c44ea4bc1c1160e93e79b76456471fa084d9dc9b5a8ad8.exe 85 PID 5092 wrote to memory of 2132 5092 3468901596aabc1130c44ea4bc1c1160e93e79b76456471fa084d9dc9b5a8ad8.exe 85 PID 5092 wrote to memory of 2132 5092 3468901596aabc1130c44ea4bc1c1160e93e79b76456471fa084d9dc9b5a8ad8.exe 85 PID 2132 wrote to memory of 3604 2132 un555718.exe 86 PID 2132 wrote to memory of 3604 2132 un555718.exe 86 PID 2132 wrote to memory of 3604 2132 un555718.exe 86 PID 2132 wrote to memory of 3328 2132 un555718.exe 99 PID 2132 wrote to memory of 3328 2132 un555718.exe 99 PID 2132 wrote to memory of 3328 2132 un555718.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\3468901596aabc1130c44ea4bc1c1160e93e79b76456471fa084d9dc9b5a8ad8.exe"C:\Users\Admin\AppData\Local\Temp\3468901596aabc1130c44ea4bc1c1160e93e79b76456471fa084d9dc9b5a8ad8.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un555718.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un555718.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr196046.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr196046.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3604 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3604 -s 10844⤵
- Program crash
PID:1648
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu784401.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu784401.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3328
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3604 -ip 36041⤵PID:2492
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
609KB
MD5f2e8251d77d8ceaf84f8e00e7dc9715f
SHA1bca1f9108b49f30204fbcdfb275617ef5931e86c
SHA2566d3357be7bcb13fd94ea3540e3a03d418dfa520e81e48db65bd141b1368bbc3b
SHA51239334b80020d70ecf9cb4bde7094ab78312f71a0dd74964390c77e376f87fe54fc77e0c441ae31c7caebe5d616ddb24d154c9f1aaab3ab8d0ffaad1f98b93561
-
Filesize
403KB
MD51d234bdca9fff6ee829261d60246a063
SHA100168c77092e0fe109ed9e4dcd802b714fd38b34
SHA25682465435a4f324501b3043927a8f349931aa929a96744a4c24a215326a41692f
SHA5128048585a1933611a83463791b8d91c4399dd2bb374ca01e786279959a94a976fe121b473c6adf3a3527bae002227d4d416497d84b304f219f39d1b5d9867ebd0
-
Filesize
486KB
MD52229fa6b68e80ed3e410178b6e7a55d4
SHA10520d77dde75e572c94a59e6f780dffdbcb156a6
SHA256b5b4748e055b2985f33e8126a7938ea7a3784e6a5bae83ff1964aafe73de72a6
SHA512865479750ce6c61c94fda9fbf96587bc5234c370051d05a89a36ef4bc9d801cf3a42c0917f7c91f54124260cd09cf56d2ba39b0e76909f51e4d654576f2832ea