Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 22:54
Static task
static1
Behavioral task
behavioral1
Sample
3a709d995a745e3dbb2fa6c8b21dfd4db934e992b2e491c77b31a339b45188ae.exe
Resource
win10v2004-20241007-en
General
-
Target
3a709d995a745e3dbb2fa6c8b21dfd4db934e992b2e491c77b31a339b45188ae.exe
-
Size
708KB
-
MD5
6b230639ba3b916f3f3b67f8191ede02
-
SHA1
9706fa122f6d94814c3c91b4b529cd3fdca1f367
-
SHA256
3a709d995a745e3dbb2fa6c8b21dfd4db934e992b2e491c77b31a339b45188ae
-
SHA512
a9176d18d3c3aac09a386eb6a78b2dd534ad71fe86ecef6e53cce33cd5806bf39ddf1cfd6690f21555f0f095410a7f72b9cb48c4f9c195e81f1a11fb2ea8570c
-
SSDEEP
12288:Fy90saboV+K4wTBBbohZZYUw5qSi6uKXtusncIsAye2xQj:FyjV+KlTfbOnYpqSFNnCAR2xE
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/368-18-0x0000000004C70000-0x0000000004C8A000-memory.dmp healer behavioral1/memory/368-20-0x00000000076F0000-0x0000000007708000-memory.dmp healer behavioral1/memory/368-48-0x00000000076F0000-0x0000000007702000-memory.dmp healer behavioral1/memory/368-46-0x00000000076F0000-0x0000000007702000-memory.dmp healer behavioral1/memory/368-44-0x00000000076F0000-0x0000000007702000-memory.dmp healer behavioral1/memory/368-42-0x00000000076F0000-0x0000000007702000-memory.dmp healer behavioral1/memory/368-40-0x00000000076F0000-0x0000000007702000-memory.dmp healer behavioral1/memory/368-38-0x00000000076F0000-0x0000000007702000-memory.dmp healer behavioral1/memory/368-36-0x00000000076F0000-0x0000000007702000-memory.dmp healer behavioral1/memory/368-34-0x00000000076F0000-0x0000000007702000-memory.dmp healer behavioral1/memory/368-32-0x00000000076F0000-0x0000000007702000-memory.dmp healer behavioral1/memory/368-30-0x00000000076F0000-0x0000000007702000-memory.dmp healer behavioral1/memory/368-28-0x00000000076F0000-0x0000000007702000-memory.dmp healer behavioral1/memory/368-26-0x00000000076F0000-0x0000000007702000-memory.dmp healer behavioral1/memory/368-24-0x00000000076F0000-0x0000000007702000-memory.dmp healer behavioral1/memory/368-22-0x00000000076F0000-0x0000000007702000-memory.dmp healer behavioral1/memory/368-21-0x00000000076F0000-0x0000000007702000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr846938.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr846938.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr846938.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr846938.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr846938.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr846938.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4436-60-0x00000000049B0000-0x00000000049EC000-memory.dmp family_redline behavioral1/memory/4436-61-0x0000000004C30000-0x0000000004C6A000-memory.dmp family_redline behavioral1/memory/4436-73-0x0000000004C30000-0x0000000004C65000-memory.dmp family_redline behavioral1/memory/4436-75-0x0000000004C30000-0x0000000004C65000-memory.dmp family_redline behavioral1/memory/4436-95-0x0000000004C30000-0x0000000004C65000-memory.dmp family_redline behavioral1/memory/4436-93-0x0000000004C30000-0x0000000004C65000-memory.dmp family_redline behavioral1/memory/4436-91-0x0000000004C30000-0x0000000004C65000-memory.dmp family_redline behavioral1/memory/4436-89-0x0000000004C30000-0x0000000004C65000-memory.dmp family_redline behavioral1/memory/4436-88-0x0000000004C30000-0x0000000004C65000-memory.dmp family_redline behavioral1/memory/4436-83-0x0000000004C30000-0x0000000004C65000-memory.dmp family_redline behavioral1/memory/4436-81-0x0000000004C30000-0x0000000004C65000-memory.dmp family_redline behavioral1/memory/4436-79-0x0000000004C30000-0x0000000004C65000-memory.dmp family_redline behavioral1/memory/4436-77-0x0000000004C30000-0x0000000004C65000-memory.dmp family_redline behavioral1/memory/4436-71-0x0000000004C30000-0x0000000004C65000-memory.dmp family_redline behavioral1/memory/4436-69-0x0000000004C30000-0x0000000004C65000-memory.dmp family_redline behavioral1/memory/4436-67-0x0000000004C30000-0x0000000004C65000-memory.dmp family_redline behavioral1/memory/4436-85-0x0000000004C30000-0x0000000004C65000-memory.dmp family_redline behavioral1/memory/4436-65-0x0000000004C30000-0x0000000004C65000-memory.dmp family_redline behavioral1/memory/4436-63-0x0000000004C30000-0x0000000004C65000-memory.dmp family_redline behavioral1/memory/4436-62-0x0000000004C30000-0x0000000004C65000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4840 un108784.exe 368 pr846938.exe 4436 qu950815.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr846938.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr846938.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3a709d995a745e3dbb2fa6c8b21dfd4db934e992b2e491c77b31a339b45188ae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un108784.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4928 368 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr846938.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu950815.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3a709d995a745e3dbb2fa6c8b21dfd4db934e992b2e491c77b31a339b45188ae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un108784.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 368 pr846938.exe 368 pr846938.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 368 pr846938.exe Token: SeDebugPrivilege 4436 qu950815.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1204 wrote to memory of 4840 1204 3a709d995a745e3dbb2fa6c8b21dfd4db934e992b2e491c77b31a339b45188ae.exe 82 PID 1204 wrote to memory of 4840 1204 3a709d995a745e3dbb2fa6c8b21dfd4db934e992b2e491c77b31a339b45188ae.exe 82 PID 1204 wrote to memory of 4840 1204 3a709d995a745e3dbb2fa6c8b21dfd4db934e992b2e491c77b31a339b45188ae.exe 82 PID 4840 wrote to memory of 368 4840 un108784.exe 83 PID 4840 wrote to memory of 368 4840 un108784.exe 83 PID 4840 wrote to memory of 368 4840 un108784.exe 83 PID 4840 wrote to memory of 4436 4840 un108784.exe 91 PID 4840 wrote to memory of 4436 4840 un108784.exe 91 PID 4840 wrote to memory of 4436 4840 un108784.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a709d995a745e3dbb2fa6c8b21dfd4db934e992b2e491c77b31a339b45188ae.exe"C:\Users\Admin\AppData\Local\Temp\3a709d995a745e3dbb2fa6c8b21dfd4db934e992b2e491c77b31a339b45188ae.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un108784.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un108784.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr846938.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr846938.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:368 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 368 -s 10804⤵
- Program crash
PID:4928
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu950815.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu950815.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4436
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 368 -ip 3681⤵PID:2004
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
554KB
MD53a5d6a54e81e63506c190845092b9260
SHA1ef46adfbb9ef511566b35408061e7a60b0b23db2
SHA256017d87660477d503ec7b958a4cbf4f52b07507bbdbffd66a474d120b6897378f
SHA51220513c86a511ef3f777dd4605a49076ef8e26f5b6b856331693524ec45c5c5c9a9784ae7b21c558c1f23d57136ec18a3bd16588167d6792d50165eb19ed4b1d1
-
Filesize
278KB
MD5829060537d91dc2918c544cf16ba653b
SHA143e69c6507b9b445cc3c2957196fdaef3a13812f
SHA2560ea71555480c4ebdf246532f88e9f6614811a05e39e5c473b8ed4dfbdc2f8945
SHA512256a8afbc33db314509ee44339bcebd13cf779bc15293bc26a0bbce461a762dab24458029d7733e376bb17de75ee28269fc0c9e31c63c2295a409b465e01b425
-
Filesize
360KB
MD50a05aa7284a37ee0e7565603ac8b7204
SHA15f25a12d3c73e103423745389d9582343a74d8de
SHA256db2ece9889cb787503b3b638491889f66797a23bc7d8beec4f1eaeda5acb9328
SHA5125f204dc009ba04f8d8acfde14c0891442d72af247b8edfc2e623b98294f6968bc9fa9ef7dd3563eb3686ef168b7c35dafe4f81578ad9a5f907bf45287ceeb122