Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 23:42
Static task
static1
Behavioral task
behavioral1
Sample
652cbf5548ba5088cb00da45bc3eeaca154f49c94d623a216501c6de93b0b45a.exe
Resource
win10v2004-20241007-en
General
-
Target
652cbf5548ba5088cb00da45bc3eeaca154f49c94d623a216501c6de93b0b45a.exe
-
Size
767KB
-
MD5
b93281bfa0d076ef0c69231d8c2ddc5a
-
SHA1
f7f6a1530e2469dcf57538ab385d13fd5ad5c9a4
-
SHA256
652cbf5548ba5088cb00da45bc3eeaca154f49c94d623a216501c6de93b0b45a
-
SHA512
cbd4682226d381081080d2d19bdb129a0fd9fbba5fc59a0f4bac5fcdeead06f6f154c61de5cc18336d10a4cc38d54e757d7b7686990b2ba2eac1bf359bca2ace
-
SSDEEP
12288:Jy90aHqRjCOqlvCU5laCfj+UJ4IUfTBIpZUQequ+raDUD+hiuxVE/pYxJsfzk2:JytHkqlxLrlGIUfTapZUQequ+rmNRg/t
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/1572-19-0x0000000002780000-0x000000000279A000-memory.dmp healer behavioral1/memory/1572-21-0x0000000004EE0000-0x0000000004EF8000-memory.dmp healer behavioral1/memory/1572-22-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/1572-27-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/1572-47-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/1572-45-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/1572-43-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/1572-42-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/1572-39-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/1572-38-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/1572-35-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/1572-33-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/1572-31-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/1572-29-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/1572-49-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/1572-25-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/1572-23-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer -
Healer family
-
Processes:
pr535961.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr535961.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr535961.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr535961.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr535961.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr535961.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr535961.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/3856-60-0x0000000002700000-0x000000000273C000-memory.dmp family_redline behavioral1/memory/3856-61-0x0000000004E40000-0x0000000004E7A000-memory.dmp family_redline behavioral1/memory/3856-67-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/3856-75-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/3856-95-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/3856-91-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/3856-89-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/3856-87-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/3856-85-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/3856-83-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/3856-81-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/3856-77-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/3856-73-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/3856-71-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/3856-69-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/3856-93-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/3856-79-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/3856-65-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/3856-63-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/3856-62-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un026840.exepr535961.exequ456491.exepid process 2664 un026840.exe 1572 pr535961.exe 3856 qu456491.exe -
Processes:
pr535961.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr535961.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr535961.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
652cbf5548ba5088cb00da45bc3eeaca154f49c94d623a216501c6de93b0b45a.exeun026840.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 652cbf5548ba5088cb00da45bc3eeaca154f49c94d623a216501c6de93b0b45a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un026840.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3988 1572 WerFault.exe pr535961.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
qu456491.exe652cbf5548ba5088cb00da45bc3eeaca154f49c94d623a216501c6de93b0b45a.exeun026840.exepr535961.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu456491.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 652cbf5548ba5088cb00da45bc3eeaca154f49c94d623a216501c6de93b0b45a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un026840.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr535961.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pr535961.exepid process 1572 pr535961.exe 1572 pr535961.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pr535961.exequ456491.exedescription pid process Token: SeDebugPrivilege 1572 pr535961.exe Token: SeDebugPrivilege 3856 qu456491.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
652cbf5548ba5088cb00da45bc3eeaca154f49c94d623a216501c6de93b0b45a.exeun026840.exedescription pid process target process PID 4060 wrote to memory of 2664 4060 652cbf5548ba5088cb00da45bc3eeaca154f49c94d623a216501c6de93b0b45a.exe un026840.exe PID 4060 wrote to memory of 2664 4060 652cbf5548ba5088cb00da45bc3eeaca154f49c94d623a216501c6de93b0b45a.exe un026840.exe PID 4060 wrote to memory of 2664 4060 652cbf5548ba5088cb00da45bc3eeaca154f49c94d623a216501c6de93b0b45a.exe un026840.exe PID 2664 wrote to memory of 1572 2664 un026840.exe pr535961.exe PID 2664 wrote to memory of 1572 2664 un026840.exe pr535961.exe PID 2664 wrote to memory of 1572 2664 un026840.exe pr535961.exe PID 2664 wrote to memory of 3856 2664 un026840.exe qu456491.exe PID 2664 wrote to memory of 3856 2664 un026840.exe qu456491.exe PID 2664 wrote to memory of 3856 2664 un026840.exe qu456491.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\652cbf5548ba5088cb00da45bc3eeaca154f49c94d623a216501c6de93b0b45a.exe"C:\Users\Admin\AppData\Local\Temp\652cbf5548ba5088cb00da45bc3eeaca154f49c94d623a216501c6de93b0b45a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un026840.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un026840.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr535961.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr535961.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1572 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1572 -s 10804⤵
- Program crash
PID:3988
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu456491.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu456491.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3856
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1572 -ip 15721⤵PID:4976
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
613KB
MD586b521d40b9b77a13cac511f6ad1f728
SHA11a052b85b70acab76cb0d94ce82f43787e34826a
SHA256b3b73abe8d591e007976306a4c5a29169d42b443fe1c5d5cb5d684e44515f2ae
SHA5121f57106492fa305a257f598ad1463f579011a73ae90fbbe94efe51b03a368167284715cf284f6d2ba466c719a03fe1e3c3272d1d471477d1f7cc5e35034886be
-
Filesize
404KB
MD5a0b567e6fb774dcf3a2fcd87e4ca2f09
SHA1138bac7c8c32651d62bca8358229bb38da8de5d7
SHA2560cca7a0a57efb97439e9536c70c60e6c373e706e77431447c4aca0bf8119cbfa
SHA512835b29a42ff79e8cc3b25524961c283f848bff7f07d77f27e79e4d822c50c47cb7af47a63d0136e89f25da87c2e442d75effbab1d8e74030dade7cbc9ad95c1f
-
Filesize
487KB
MD5f36e589d9f7e7abdb9ab819de3aa1a67
SHA1bd98d743cd005a5173820700767e37058162687b
SHA25676cda4df9837663248103a8a0d1dfa744442a7ff789a161fe5149222428bba29
SHA5124b3b685e298f1bc1ab83f12026a27d385912e7d4b0093550d56a7bf4bf15ef8e97c9d1dcfca4993b35a2f4e6c11c2016735f923724224fd6a982c0b69323d8ca