Analysis
-
max time kernel
143s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 03:29
Static task
static1
Behavioral task
behavioral1
Sample
ea84c1b13cb1d985a4d28e797d968d8688c4cba095f28a966db1ed9cd7655597.exe
Resource
win10v2004-20241007-en
General
-
Target
ea84c1b13cb1d985a4d28e797d968d8688c4cba095f28a966db1ed9cd7655597.exe
-
Size
701KB
-
MD5
921531d129cfdabf7a80bae0a6802dfc
-
SHA1
97564fbfe67aa19b62bb597d9ff4355c4410a1e7
-
SHA256
ea84c1b13cb1d985a4d28e797d968d8688c4cba095f28a966db1ed9cd7655597
-
SHA512
6c3a39db72207a86bcc74205da279386f11d397961dcdcfff735833376c462844af020874d79436cc05c50d9a7fa4d2c4d6094399a5710df80b119ae700b0e5d
-
SSDEEP
12288:7y90Nq0qDk1lY1kFgt6H/NyEG2Zo9wUi1/S27s0zQiT3iS:7yU32cfJGhwB55HiS
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/1692-17-0x0000000004950000-0x000000000496A000-memory.dmp healer behavioral1/memory/1692-19-0x0000000004C60000-0x0000000004C78000-memory.dmp healer behavioral1/memory/1692-34-0x0000000004C60000-0x0000000004C72000-memory.dmp healer behavioral1/memory/1692-48-0x0000000004C60000-0x0000000004C72000-memory.dmp healer behavioral1/memory/1692-46-0x0000000004C60000-0x0000000004C72000-memory.dmp healer behavioral1/memory/1692-44-0x0000000004C60000-0x0000000004C72000-memory.dmp healer behavioral1/memory/1692-42-0x0000000004C60000-0x0000000004C72000-memory.dmp healer behavioral1/memory/1692-40-0x0000000004C60000-0x0000000004C72000-memory.dmp healer behavioral1/memory/1692-38-0x0000000004C60000-0x0000000004C72000-memory.dmp healer behavioral1/memory/1692-36-0x0000000004C60000-0x0000000004C72000-memory.dmp healer behavioral1/memory/1692-26-0x0000000004C60000-0x0000000004C72000-memory.dmp healer behavioral1/memory/1692-24-0x0000000004C60000-0x0000000004C72000-memory.dmp healer behavioral1/memory/1692-22-0x0000000004C60000-0x0000000004C72000-memory.dmp healer behavioral1/memory/1692-21-0x0000000004C60000-0x0000000004C72000-memory.dmp healer behavioral1/memory/1692-32-0x0000000004C60000-0x0000000004C72000-memory.dmp healer behavioral1/memory/1692-30-0x0000000004C60000-0x0000000004C72000-memory.dmp healer behavioral1/memory/1692-28-0x0000000004C60000-0x0000000004C72000-memory.dmp healer -
Healer family
-
Processes:
23943948.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 23943948.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 23943948.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 23943948.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 23943948.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 23943948.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 23943948.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/808-59-0x0000000007110000-0x000000000714C000-memory.dmp family_redline behavioral1/memory/808-60-0x0000000007780000-0x00000000077BA000-memory.dmp family_redline behavioral1/memory/808-66-0x0000000007780000-0x00000000077B5000-memory.dmp family_redline behavioral1/memory/808-64-0x0000000007780000-0x00000000077B5000-memory.dmp family_redline behavioral1/memory/808-62-0x0000000007780000-0x00000000077B5000-memory.dmp family_redline behavioral1/memory/808-61-0x0000000007780000-0x00000000077B5000-memory.dmp family_redline behavioral1/memory/808-74-0x0000000007780000-0x00000000077B5000-memory.dmp family_redline behavioral1/memory/808-94-0x0000000007780000-0x00000000077B5000-memory.dmp family_redline behavioral1/memory/808-92-0x0000000007780000-0x00000000077B5000-memory.dmp family_redline behavioral1/memory/808-91-0x0000000007780000-0x00000000077B5000-memory.dmp family_redline behavioral1/memory/808-88-0x0000000007780000-0x00000000077B5000-memory.dmp family_redline behavioral1/memory/808-86-0x0000000007780000-0x00000000077B5000-memory.dmp family_redline behavioral1/memory/808-84-0x0000000007780000-0x00000000077B5000-memory.dmp family_redline behavioral1/memory/808-82-0x0000000007780000-0x00000000077B5000-memory.dmp family_redline behavioral1/memory/808-80-0x0000000007780000-0x00000000077B5000-memory.dmp family_redline behavioral1/memory/808-78-0x0000000007780000-0x00000000077B5000-memory.dmp family_redline behavioral1/memory/808-72-0x0000000007780000-0x00000000077B5000-memory.dmp family_redline behavioral1/memory/808-70-0x0000000007780000-0x00000000077B5000-memory.dmp family_redline behavioral1/memory/808-68-0x0000000007780000-0x00000000077B5000-memory.dmp family_redline behavioral1/memory/808-76-0x0000000007780000-0x00000000077B5000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un018517.exe23943948.exerk260895.exepid process 3532 un018517.exe 1692 23943948.exe 808 rk260895.exe -
Processes:
23943948.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 23943948.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 23943948.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ea84c1b13cb1d985a4d28e797d968d8688c4cba095f28a966db1ed9cd7655597.exeun018517.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ea84c1b13cb1d985a4d28e797d968d8688c4cba095f28a966db1ed9cd7655597.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un018517.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2320 1692 WerFault.exe 23943948.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ea84c1b13cb1d985a4d28e797d968d8688c4cba095f28a966db1ed9cd7655597.exeun018517.exe23943948.exerk260895.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea84c1b13cb1d985a4d28e797d968d8688c4cba095f28a966db1ed9cd7655597.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un018517.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 23943948.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rk260895.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
23943948.exepid process 1692 23943948.exe 1692 23943948.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
23943948.exerk260895.exedescription pid process Token: SeDebugPrivilege 1692 23943948.exe Token: SeDebugPrivilege 808 rk260895.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
ea84c1b13cb1d985a4d28e797d968d8688c4cba095f28a966db1ed9cd7655597.exeun018517.exedescription pid process target process PID 2096 wrote to memory of 3532 2096 ea84c1b13cb1d985a4d28e797d968d8688c4cba095f28a966db1ed9cd7655597.exe un018517.exe PID 2096 wrote to memory of 3532 2096 ea84c1b13cb1d985a4d28e797d968d8688c4cba095f28a966db1ed9cd7655597.exe un018517.exe PID 2096 wrote to memory of 3532 2096 ea84c1b13cb1d985a4d28e797d968d8688c4cba095f28a966db1ed9cd7655597.exe un018517.exe PID 3532 wrote to memory of 1692 3532 un018517.exe 23943948.exe PID 3532 wrote to memory of 1692 3532 un018517.exe 23943948.exe PID 3532 wrote to memory of 1692 3532 un018517.exe 23943948.exe PID 3532 wrote to memory of 808 3532 un018517.exe rk260895.exe PID 3532 wrote to memory of 808 3532 un018517.exe rk260895.exe PID 3532 wrote to memory of 808 3532 un018517.exe rk260895.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea84c1b13cb1d985a4d28e797d968d8688c4cba095f28a966db1ed9cd7655597.exe"C:\Users\Admin\AppData\Local\Temp\ea84c1b13cb1d985a4d28e797d968d8688c4cba095f28a966db1ed9cd7655597.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un018517.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un018517.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\23943948.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\23943948.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1692 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1692 -s 11004⤵
- Program crash
PID:2320
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk260895.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk260895.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:808
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1692 -ip 16921⤵PID:3700
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
547KB
MD5e6b975b3dd08555942357c22ca60070f
SHA1e159a34c5c2f0187251136dafd71428cbab2fbf0
SHA256c6324a189f06b945cba502fbf5e30a7e84cfc8db23cd1f909443e898d14bf35e
SHA5123c6ea36f2e3d7f048157329d74014b550714b7818eca678ba286394a7c4458acda589d8af908e52ee33352794444eb7f16d957c77d4ba468bda8779d53f99b18
-
Filesize
269KB
MD5c64a5d3a40d673e44c045d62e3ad8c76
SHA1805f1fab4dd9f51ce41cced7c600682047461880
SHA25628b43890757f6f5c4ec8f36d7b69ff085e29be67c772f309acd9c29024b19f80
SHA512610859337488063be60bb8870f469b149cf9e1fc4b9b705a9b34e3abcf60b21934eb96ef14fc54abd2a41ff236502ddd796722ccabdfbb1665f9cb4a1a147c88
-
Filesize
353KB
MD58d469656fdddd767ebbf0031e2d1f853
SHA1bfa4af55cdd2afdce02bfc06893463f995f818fe
SHA2566883ed8eb08dc37d3dba2458a54d6d67489ea17963dac926b821aff7098eb6f2
SHA512d3be47914a7d571499cdca01214c624609ea0e315b445a7d83086a194c8f727a14fac2eb49c9c40ba4e485bb975725edb107ccfc736f2a9e908f6281a90fa89c