Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 21:19
Static task
static1
Behavioral task
behavioral1
Sample
fee014ec849f4ed449fe1ea18665180d0938ce83911ff759e34c9525420a89dc.exe
Resource
win10v2004-20241007-en
General
-
Target
fee014ec849f4ed449fe1ea18665180d0938ce83911ff759e34c9525420a89dc.exe
-
Size
752KB
-
MD5
58343cd4aff52d8f3f20ea52299d9b1e
-
SHA1
c35cb7ac45e58695c4da5b492c43e9c29d016aee
-
SHA256
fee014ec849f4ed449fe1ea18665180d0938ce83911ff759e34c9525420a89dc
-
SHA512
9b52e06e34ce0ace8ae3bcaff54944a7d750b516b67d95c3bc09f3d3c12009f984ced1389f63be93c552f93e06f283a7847094780407b1eb6788beb7995976c0
-
SSDEEP
12288:yy90RoTb5S13d8VKjDiVhnIgH6LjWFUfXijxLjuI5HAbKO8e8XDqocePT/d1G:yycoTbc8VKHiVtIgHqYLjdq2X8aT/d1G
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/5068-19-0x0000000000C70000-0x0000000000C8A000-memory.dmp healer behavioral1/memory/5068-21-0x0000000002950000-0x0000000002968000-memory.dmp healer behavioral1/memory/5068-43-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/5068-49-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/5068-47-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/5068-45-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/5068-41-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/5068-39-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/5068-37-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/5068-36-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/5068-33-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/5068-31-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/5068-29-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/5068-27-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/5068-25-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/5068-23-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/5068-22-0x0000000002950000-0x0000000002962000-memory.dmp healer -
Healer family
-
Processes:
pr984251.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr984251.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr984251.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr984251.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr984251.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr984251.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr984251.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/3164-61-0x0000000002630000-0x000000000266C000-memory.dmp family_redline behavioral1/memory/3164-62-0x0000000002AE0000-0x0000000002B1A000-memory.dmp family_redline behavioral1/memory/3164-78-0x0000000002AE0000-0x0000000002B15000-memory.dmp family_redline behavioral1/memory/3164-82-0x0000000002AE0000-0x0000000002B15000-memory.dmp family_redline behavioral1/memory/3164-96-0x0000000002AE0000-0x0000000002B15000-memory.dmp family_redline behavioral1/memory/3164-94-0x0000000002AE0000-0x0000000002B15000-memory.dmp family_redline behavioral1/memory/3164-92-0x0000000002AE0000-0x0000000002B15000-memory.dmp family_redline behavioral1/memory/3164-90-0x0000000002AE0000-0x0000000002B15000-memory.dmp family_redline behavioral1/memory/3164-88-0x0000000002AE0000-0x0000000002B15000-memory.dmp family_redline behavioral1/memory/3164-86-0x0000000002AE0000-0x0000000002B15000-memory.dmp family_redline behavioral1/memory/3164-84-0x0000000002AE0000-0x0000000002B15000-memory.dmp family_redline behavioral1/memory/3164-80-0x0000000002AE0000-0x0000000002B15000-memory.dmp family_redline behavioral1/memory/3164-76-0x0000000002AE0000-0x0000000002B15000-memory.dmp family_redline behavioral1/memory/3164-75-0x0000000002AE0000-0x0000000002B15000-memory.dmp family_redline behavioral1/memory/3164-70-0x0000000002AE0000-0x0000000002B15000-memory.dmp family_redline behavioral1/memory/3164-69-0x0000000002AE0000-0x0000000002B15000-memory.dmp family_redline behavioral1/memory/3164-66-0x0000000002AE0000-0x0000000002B15000-memory.dmp family_redline behavioral1/memory/3164-72-0x0000000002AE0000-0x0000000002B15000-memory.dmp family_redline behavioral1/memory/3164-64-0x0000000002AE0000-0x0000000002B15000-memory.dmp family_redline behavioral1/memory/3164-63-0x0000000002AE0000-0x0000000002B15000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un409349.exepr984251.exequ768794.exepid process 4120 un409349.exe 5068 pr984251.exe 3164 qu768794.exe -
Processes:
pr984251.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr984251.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr984251.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
fee014ec849f4ed449fe1ea18665180d0938ce83911ff759e34c9525420a89dc.exeun409349.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fee014ec849f4ed449fe1ea18665180d0938ce83911ff759e34c9525420a89dc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un409349.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4300 5068 WerFault.exe pr984251.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
qu768794.exefee014ec849f4ed449fe1ea18665180d0938ce83911ff759e34c9525420a89dc.exeun409349.exepr984251.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu768794.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fee014ec849f4ed449fe1ea18665180d0938ce83911ff759e34c9525420a89dc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un409349.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr984251.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pr984251.exepid process 5068 pr984251.exe 5068 pr984251.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pr984251.exequ768794.exedescription pid process Token: SeDebugPrivilege 5068 pr984251.exe Token: SeDebugPrivilege 3164 qu768794.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
fee014ec849f4ed449fe1ea18665180d0938ce83911ff759e34c9525420a89dc.exeun409349.exedescription pid process target process PID 540 wrote to memory of 4120 540 fee014ec849f4ed449fe1ea18665180d0938ce83911ff759e34c9525420a89dc.exe un409349.exe PID 540 wrote to memory of 4120 540 fee014ec849f4ed449fe1ea18665180d0938ce83911ff759e34c9525420a89dc.exe un409349.exe PID 540 wrote to memory of 4120 540 fee014ec849f4ed449fe1ea18665180d0938ce83911ff759e34c9525420a89dc.exe un409349.exe PID 4120 wrote to memory of 5068 4120 un409349.exe pr984251.exe PID 4120 wrote to memory of 5068 4120 un409349.exe pr984251.exe PID 4120 wrote to memory of 5068 4120 un409349.exe pr984251.exe PID 4120 wrote to memory of 3164 4120 un409349.exe qu768794.exe PID 4120 wrote to memory of 3164 4120 un409349.exe qu768794.exe PID 4120 wrote to memory of 3164 4120 un409349.exe qu768794.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fee014ec849f4ed449fe1ea18665180d0938ce83911ff759e34c9525420a89dc.exe"C:\Users\Admin\AppData\Local\Temp\fee014ec849f4ed449fe1ea18665180d0938ce83911ff759e34c9525420a89dc.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un409349.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un409349.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr984251.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr984251.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5068 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5068 -s 10924⤵
- Program crash
PID:4300
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu768794.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu768794.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3164
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 5068 -ip 50681⤵PID:1652
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
598KB
MD5cb139ac048529ad8bdba10324e886dc8
SHA116db9d0490d138a0e3d1a615573c7ef77d0383bc
SHA256ff38dd86f70954ad21049d92530c4f6296b3b84663a4955e41ae318067a5e6cb
SHA512057741614961bac68cf69d3901f9df4b1683c72d223cb4fba903c4a8602b83f45214dda6ce11ebd27255561522db02882b20a4e0a3d29ed423881da88099c9d1
-
Filesize
391KB
MD56ef0b94c4f1cb6a21efb56ffa0834a4a
SHA1360ec80b299f52c883f8260893881c8f4798d86c
SHA25629615663dd4ddb8ebfa6728fc2bba0306febad15067cbbfeb3191a17fbf532fc
SHA5120da6983de5e2106d440a8751cd7d0f997175e29fffd1cba971f6f94ac52c68cd86a2f2bd405b36d72c462f504e55eee6b61340b3f18b93e2ac410272cc7fc4b1
-
Filesize
474KB
MD536b2d2424ada054999afe6dc8f54275e
SHA1cc964dd99fd3e6d06aed7b130eeb8e0f70ac171a
SHA256c1e1aaf8e0262827846ec20c1bfca1a6f3de1669c2ca8baa98fa2ac7f0094b75
SHA51205bc92bd6b221739621ba2fa07c5c6c798b0224208eb703e9bb4dac2a2ba161a1b89f1eace59c090a6031e2efb27054404bc2d69020fb951d59f4a95509a315c