Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 23:37
Static task
static1
Behavioral task
behavioral1
Sample
652cbf5548ba5088cb00da45bc3eeaca154f49c94d623a216501c6de93b0b45a.exe
Resource
win10v2004-20241007-en
General
-
Target
652cbf5548ba5088cb00da45bc3eeaca154f49c94d623a216501c6de93b0b45a.exe
-
Size
767KB
-
MD5
b93281bfa0d076ef0c69231d8c2ddc5a
-
SHA1
f7f6a1530e2469dcf57538ab385d13fd5ad5c9a4
-
SHA256
652cbf5548ba5088cb00da45bc3eeaca154f49c94d623a216501c6de93b0b45a
-
SHA512
cbd4682226d381081080d2d19bdb129a0fd9fbba5fc59a0f4bac5fcdeead06f6f154c61de5cc18336d10a4cc38d54e757d7b7686990b2ba2eac1bf359bca2ace
-
SSDEEP
12288:Jy90aHqRjCOqlvCU5laCfj+UJ4IUfTBIpZUQequ+raDUD+hiuxVE/pYxJsfzk2:JytHkqlxLrlGIUfTapZUQequ+rmNRg/t
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/4380-19-0x0000000002530000-0x000000000254A000-memory.dmp healer behavioral1/memory/4380-21-0x0000000002710000-0x0000000002728000-memory.dmp healer behavioral1/memory/4380-22-0x0000000002710000-0x0000000002722000-memory.dmp healer behavioral1/memory/4380-29-0x0000000002710000-0x0000000002722000-memory.dmp healer behavioral1/memory/4380-49-0x0000000002710000-0x0000000002722000-memory.dmp healer behavioral1/memory/4380-47-0x0000000002710000-0x0000000002722000-memory.dmp healer behavioral1/memory/4380-45-0x0000000002710000-0x0000000002722000-memory.dmp healer behavioral1/memory/4380-43-0x0000000002710000-0x0000000002722000-memory.dmp healer behavioral1/memory/4380-41-0x0000000002710000-0x0000000002722000-memory.dmp healer behavioral1/memory/4380-39-0x0000000002710000-0x0000000002722000-memory.dmp healer behavioral1/memory/4380-37-0x0000000002710000-0x0000000002722000-memory.dmp healer behavioral1/memory/4380-35-0x0000000002710000-0x0000000002722000-memory.dmp healer behavioral1/memory/4380-33-0x0000000002710000-0x0000000002722000-memory.dmp healer behavioral1/memory/4380-31-0x0000000002710000-0x0000000002722000-memory.dmp healer behavioral1/memory/4380-27-0x0000000002710000-0x0000000002722000-memory.dmp healer behavioral1/memory/4380-25-0x0000000002710000-0x0000000002722000-memory.dmp healer behavioral1/memory/4380-23-0x0000000002710000-0x0000000002722000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr535961.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr535961.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr535961.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr535961.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr535961.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr535961.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3128-61-0x0000000004D40000-0x0000000004D7C000-memory.dmp family_redline behavioral1/memory/3128-62-0x00000000053F0000-0x000000000542A000-memory.dmp family_redline behavioral1/memory/3128-68-0x00000000053F0000-0x0000000005425000-memory.dmp family_redline behavioral1/memory/3128-82-0x00000000053F0000-0x0000000005425000-memory.dmp family_redline behavioral1/memory/3128-96-0x00000000053F0000-0x0000000005425000-memory.dmp family_redline behavioral1/memory/3128-94-0x00000000053F0000-0x0000000005425000-memory.dmp family_redline behavioral1/memory/3128-92-0x00000000053F0000-0x0000000005425000-memory.dmp family_redline behavioral1/memory/3128-91-0x00000000053F0000-0x0000000005425000-memory.dmp family_redline behavioral1/memory/3128-88-0x00000000053F0000-0x0000000005425000-memory.dmp family_redline behavioral1/memory/3128-87-0x00000000053F0000-0x0000000005425000-memory.dmp family_redline behavioral1/memory/3128-84-0x00000000053F0000-0x0000000005425000-memory.dmp family_redline behavioral1/memory/3128-80-0x00000000053F0000-0x0000000005425000-memory.dmp family_redline behavioral1/memory/3128-78-0x00000000053F0000-0x0000000005425000-memory.dmp family_redline behavioral1/memory/3128-76-0x00000000053F0000-0x0000000005425000-memory.dmp family_redline behavioral1/memory/3128-74-0x00000000053F0000-0x0000000005425000-memory.dmp family_redline behavioral1/memory/3128-72-0x00000000053F0000-0x0000000005425000-memory.dmp family_redline behavioral1/memory/3128-70-0x00000000053F0000-0x0000000005425000-memory.dmp family_redline behavioral1/memory/3128-66-0x00000000053F0000-0x0000000005425000-memory.dmp family_redline behavioral1/memory/3128-64-0x00000000053F0000-0x0000000005425000-memory.dmp family_redline behavioral1/memory/3128-63-0x00000000053F0000-0x0000000005425000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4308 un026840.exe 4380 pr535961.exe 3128 qu456491.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr535961.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr535961.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 652cbf5548ba5088cb00da45bc3eeaca154f49c94d623a216501c6de93b0b45a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un026840.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4104 4380 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 652cbf5548ba5088cb00da45bc3eeaca154f49c94d623a216501c6de93b0b45a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un026840.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr535961.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu456491.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4380 pr535961.exe 4380 pr535961.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4380 pr535961.exe Token: SeDebugPrivilege 3128 qu456491.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5096 wrote to memory of 4308 5096 652cbf5548ba5088cb00da45bc3eeaca154f49c94d623a216501c6de93b0b45a.exe 82 PID 5096 wrote to memory of 4308 5096 652cbf5548ba5088cb00da45bc3eeaca154f49c94d623a216501c6de93b0b45a.exe 82 PID 5096 wrote to memory of 4308 5096 652cbf5548ba5088cb00da45bc3eeaca154f49c94d623a216501c6de93b0b45a.exe 82 PID 4308 wrote to memory of 4380 4308 un026840.exe 83 PID 4308 wrote to memory of 4380 4308 un026840.exe 83 PID 4308 wrote to memory of 4380 4308 un026840.exe 83 PID 4308 wrote to memory of 3128 4308 un026840.exe 91 PID 4308 wrote to memory of 3128 4308 un026840.exe 91 PID 4308 wrote to memory of 3128 4308 un026840.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\652cbf5548ba5088cb00da45bc3eeaca154f49c94d623a216501c6de93b0b45a.exe"C:\Users\Admin\AppData\Local\Temp\652cbf5548ba5088cb00da45bc3eeaca154f49c94d623a216501c6de93b0b45a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un026840.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un026840.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr535961.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr535961.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4380 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4380 -s 10804⤵
- Program crash
PID:4104
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu456491.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu456491.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3128
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4380 -ip 43801⤵PID:2156
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
613KB
MD586b521d40b9b77a13cac511f6ad1f728
SHA11a052b85b70acab76cb0d94ce82f43787e34826a
SHA256b3b73abe8d591e007976306a4c5a29169d42b443fe1c5d5cb5d684e44515f2ae
SHA5121f57106492fa305a257f598ad1463f579011a73ae90fbbe94efe51b03a368167284715cf284f6d2ba466c719a03fe1e3c3272d1d471477d1f7cc5e35034886be
-
Filesize
404KB
MD5a0b567e6fb774dcf3a2fcd87e4ca2f09
SHA1138bac7c8c32651d62bca8358229bb38da8de5d7
SHA2560cca7a0a57efb97439e9536c70c60e6c373e706e77431447c4aca0bf8119cbfa
SHA512835b29a42ff79e8cc3b25524961c283f848bff7f07d77f27e79e4d822c50c47cb7af47a63d0136e89f25da87c2e442d75effbab1d8e74030dade7cbc9ad95c1f
-
Filesize
487KB
MD5f36e589d9f7e7abdb9ab819de3aa1a67
SHA1bd98d743cd005a5173820700767e37058162687b
SHA25676cda4df9837663248103a8a0d1dfa744442a7ff789a161fe5149222428bba29
SHA5124b3b685e298f1bc1ab83f12026a27d385912e7d4b0093550d56a7bf4bf15ef8e97c9d1dcfca4993b35a2f4e6c11c2016735f923724224fd6a982c0b69323d8ca