Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 16:44
Static task
static1
Behavioral task
behavioral1
Sample
254de53e181c0b4e15dc5a1bba0b08c6322d9088d41bfe79d15e2d79b755ca1bN.exe
Resource
win10v2004-20241007-en
General
-
Target
254de53e181c0b4e15dc5a1bba0b08c6322d9088d41bfe79d15e2d79b755ca1bN.exe
-
Size
766KB
-
MD5
c2993d421ef9d0712b3ba444dbabc500
-
SHA1
26da41c16233ca387a61f8a72df8801986e97b79
-
SHA256
254de53e181c0b4e15dc5a1bba0b08c6322d9088d41bfe79d15e2d79b755ca1b
-
SHA512
8062ff556dbaf571bd032c6ec1fcc2d722f29e10b3448bfc5a8c7c48950c409cfd68fc737515ddf8f7544a946ed8a471c9c346bc2fa1dc9646451d3c4f502832
-
SSDEEP
12288:dy90vMpqFS/w7Fa/+PB3hzkpCV34Rnn9WG1hiu0zE/prxAko4m:dywMpqFS/wZe+Z31tsn9WGHRz/I
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/3452-19-0x0000000002590000-0x00000000025AA000-memory.dmp healer behavioral1/memory/3452-21-0x0000000002730000-0x0000000002748000-memory.dmp healer behavioral1/memory/3452-49-0x0000000002730000-0x0000000002742000-memory.dmp healer behavioral1/memory/3452-47-0x0000000002730000-0x0000000002742000-memory.dmp healer behavioral1/memory/3452-46-0x0000000002730000-0x0000000002742000-memory.dmp healer behavioral1/memory/3452-43-0x0000000002730000-0x0000000002742000-memory.dmp healer behavioral1/memory/3452-41-0x0000000002730000-0x0000000002742000-memory.dmp healer behavioral1/memory/3452-39-0x0000000002730000-0x0000000002742000-memory.dmp healer behavioral1/memory/3452-37-0x0000000002730000-0x0000000002742000-memory.dmp healer behavioral1/memory/3452-35-0x0000000002730000-0x0000000002742000-memory.dmp healer behavioral1/memory/3452-34-0x0000000002730000-0x0000000002742000-memory.dmp healer behavioral1/memory/3452-32-0x0000000002730000-0x0000000002742000-memory.dmp healer behavioral1/memory/3452-29-0x0000000002730000-0x0000000002742000-memory.dmp healer behavioral1/memory/3452-27-0x0000000002730000-0x0000000002742000-memory.dmp healer behavioral1/memory/3452-26-0x0000000002730000-0x0000000002742000-memory.dmp healer behavioral1/memory/3452-23-0x0000000002730000-0x0000000002742000-memory.dmp healer behavioral1/memory/3452-22-0x0000000002730000-0x0000000002742000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr167261.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr167261.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr167261.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr167261.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr167261.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr167261.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3596-61-0x0000000002610000-0x000000000264C000-memory.dmp family_redline behavioral1/memory/3596-62-0x0000000004E60000-0x0000000004E9A000-memory.dmp family_redline behavioral1/memory/3596-84-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/3596-68-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/3596-64-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/3596-63-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/3596-96-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/3596-94-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/3596-92-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/3596-90-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/3596-88-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/3596-86-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/3596-82-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/3596-80-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/3596-78-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/3596-76-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/3596-74-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/3596-72-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/3596-70-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/3596-66-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3092 un729991.exe 3452 pr167261.exe 3596 qu612719.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr167261.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr167261.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 254de53e181c0b4e15dc5a1bba0b08c6322d9088d41bfe79d15e2d79b755ca1bN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un729991.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2996 3452 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 254de53e181c0b4e15dc5a1bba0b08c6322d9088d41bfe79d15e2d79b755ca1bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un729991.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr167261.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu612719.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3452 pr167261.exe 3452 pr167261.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3452 pr167261.exe Token: SeDebugPrivilege 3596 qu612719.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 216 wrote to memory of 3092 216 254de53e181c0b4e15dc5a1bba0b08c6322d9088d41bfe79d15e2d79b755ca1bN.exe 83 PID 216 wrote to memory of 3092 216 254de53e181c0b4e15dc5a1bba0b08c6322d9088d41bfe79d15e2d79b755ca1bN.exe 83 PID 216 wrote to memory of 3092 216 254de53e181c0b4e15dc5a1bba0b08c6322d9088d41bfe79d15e2d79b755ca1bN.exe 83 PID 3092 wrote to memory of 3452 3092 un729991.exe 84 PID 3092 wrote to memory of 3452 3092 un729991.exe 84 PID 3092 wrote to memory of 3452 3092 un729991.exe 84 PID 3092 wrote to memory of 3596 3092 un729991.exe 95 PID 3092 wrote to memory of 3596 3092 un729991.exe 95 PID 3092 wrote to memory of 3596 3092 un729991.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\254de53e181c0b4e15dc5a1bba0b08c6322d9088d41bfe79d15e2d79b755ca1bN.exe"C:\Users\Admin\AppData\Local\Temp\254de53e181c0b4e15dc5a1bba0b08c6322d9088d41bfe79d15e2d79b755ca1bN.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un729991.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un729991.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr167261.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr167261.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3452 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3452 -s 10804⤵
- Program crash
PID:2996
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu612719.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu612719.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3596
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3452 -ip 34521⤵PID:1524
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
612KB
MD5157f14f03fc003741ed8dc7f9df2e5a2
SHA15e05c54f79de8796beafe2bd5156887e5f1f1241
SHA25644b7e4d644cf18965f023080b65b623ae0719108e77a93b96f36431719d8e205
SHA5129bb4cd29e2abcf81a4362f1b0afb8bf3d3760cb14bd630a625f2c7c4fd20703d330d049d62554e15f650b4679fb8839e35183734f8c075e1ecd6aaf687fc55b7
-
Filesize
404KB
MD52b8439eb0242063f60719bf008cffd9d
SHA18899d7975b184fb7c770a3365940617b18b4adaa
SHA256289034cf6e2dfb1b393b53c73a4eebca7cee347d68ebf055ef3f2333ecbb1d89
SHA51288c64ab9d55054deb2b2ce1e4951e8da9333cb0850cd10f26cbc655c986e3b35802cb186b202c8f828b42c0cb23d640326bd16024c702692b12946872a0e8945
-
Filesize
487KB
MD5510640dbf0c5b03b39c8044d0b5e13a3
SHA1bd588271074e8ef5dec29a1cdc1a97ce47d9d906
SHA256b14ed8ebb5cf9675ca5cb61fd55d5a6679efbdae570a6b832379c1479816a235
SHA5120ff694531730442dee252f7afa59870a8a40a01d55dd96682c32a4b3a3cbcb484cc1e23086a85a3927c5c8139e418536684eb81ee0ef4849877fb882e2846b7e