Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 08:51
Static task
static1
Behavioral task
behavioral1
Sample
d2d66ab66c4a40e5fb571bf7cdc527f6c6b7478940a9c6e3717fb256b78b77ca.exe
Resource
win10v2004-20241007-en
General
-
Target
d2d66ab66c4a40e5fb571bf7cdc527f6c6b7478940a9c6e3717fb256b78b77ca.exe
-
Size
553KB
-
MD5
7f1e656b1ee20bf673c614d89697df19
-
SHA1
e6a4cd2afda729e451c0c5adb91aeb9919f9a783
-
SHA256
d2d66ab66c4a40e5fb571bf7cdc527f6c6b7478940a9c6e3717fb256b78b77ca
-
SHA512
e38e3da6d8ab99bef3a211e797641cf709c433be9050279fdcd7da22d5688e5d30e9d76c5d2ab102dd806b1e160f296439d014969c59ef002524a4de2105cec3
-
SSDEEP
6144:elp0yN90QEKwZHnmu7ybLcw2QK7jgxQjmZ/SGAJK33MCoQgQ+ock/tnGaK2ncXYy:py90HZHx4LcrvRjAHAOguXtnVncITA5
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/1272-11-0x0000000004A80000-0x0000000004A9A000-memory.dmp healer behavioral1/memory/1272-13-0x0000000007120000-0x0000000007138000-memory.dmp healer behavioral1/memory/1272-24-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/1272-22-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/1272-20-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/1272-18-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/1272-16-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/1272-15-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/1272-34-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/1272-42-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/1272-40-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/1272-38-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/1272-36-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/1272-32-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/1272-30-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/1272-28-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/1272-26-0x0000000007120000-0x0000000007132000-memory.dmp healer -
Healer family
-
Processes:
pr671525.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr671525.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr671525.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr671525.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr671525.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr671525.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr671525.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/3012-55-0x00000000049A0000-0x00000000049DC000-memory.dmp family_redline behavioral1/memory/3012-56-0x0000000004E60000-0x0000000004E9A000-memory.dmp family_redline behavioral1/memory/3012-62-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/3012-66-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/3012-90-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/3012-88-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/3012-86-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/3012-84-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/3012-80-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/3012-78-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/3012-76-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/3012-74-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/3012-72-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/3012-70-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/3012-64-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/3012-82-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/3012-68-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/3012-60-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/3012-58-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/3012-57-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 2 IoCs
Processes:
pr671525.exequ361890.exepid Process 1272 pr671525.exe 3012 qu361890.exe -
Processes:
pr671525.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr671525.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr671525.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
d2d66ab66c4a40e5fb571bf7cdc527f6c6b7478940a9c6e3717fb256b78b77ca.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d2d66ab66c4a40e5fb571bf7cdc527f6c6b7478940a9c6e3717fb256b78b77ca.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 1720 1272 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
d2d66ab66c4a40e5fb571bf7cdc527f6c6b7478940a9c6e3717fb256b78b77ca.exepr671525.exequ361890.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d2d66ab66c4a40e5fb571bf7cdc527f6c6b7478940a9c6e3717fb256b78b77ca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr671525.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu361890.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pr671525.exepid Process 1272 pr671525.exe 1272 pr671525.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pr671525.exequ361890.exedescription pid Process Token: SeDebugPrivilege 1272 pr671525.exe Token: SeDebugPrivilege 3012 qu361890.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
d2d66ab66c4a40e5fb571bf7cdc527f6c6b7478940a9c6e3717fb256b78b77ca.exedescription pid Process procid_target PID 3788 wrote to memory of 1272 3788 d2d66ab66c4a40e5fb571bf7cdc527f6c6b7478940a9c6e3717fb256b78b77ca.exe 82 PID 3788 wrote to memory of 1272 3788 d2d66ab66c4a40e5fb571bf7cdc527f6c6b7478940a9c6e3717fb256b78b77ca.exe 82 PID 3788 wrote to memory of 1272 3788 d2d66ab66c4a40e5fb571bf7cdc527f6c6b7478940a9c6e3717fb256b78b77ca.exe 82 PID 3788 wrote to memory of 3012 3788 d2d66ab66c4a40e5fb571bf7cdc527f6c6b7478940a9c6e3717fb256b78b77ca.exe 90 PID 3788 wrote to memory of 3012 3788 d2d66ab66c4a40e5fb571bf7cdc527f6c6b7478940a9c6e3717fb256b78b77ca.exe 90 PID 3788 wrote to memory of 3012 3788 d2d66ab66c4a40e5fb571bf7cdc527f6c6b7478940a9c6e3717fb256b78b77ca.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2d66ab66c4a40e5fb571bf7cdc527f6c6b7478940a9c6e3717fb256b78b77ca.exe"C:\Users\Admin\AppData\Local\Temp\d2d66ab66c4a40e5fb571bf7cdc527f6c6b7478940a9c6e3717fb256b78b77ca.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pr671525.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pr671525.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1272 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1272 -s 10363⤵
- Program crash
PID:1720
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\qu361890.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\qu361890.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1272 -ip 12721⤵PID:3308
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
278KB
MD5078988ed909b0b8c6000dc4a103b7af2
SHA1d346194fcfab9308bfdbfa506e6ad95bd6a29f63
SHA256e9e1332a666a45f365e8a00b2db676b631f05280c1b081cd2a9b3c8325e74a75
SHA512f3f8a7fef87a1a1adc3ad0b44d1846851bac50aed0e1e4b8102723144be569555c1bc6cf2ffbc1996fc27a2b8d01229b1bcc75371c5fe928632d96f33e5fd7f6
-
Filesize
360KB
MD55e60cfbd2824d977c4eb3681f8541eb8
SHA18b3f63bb03be97f59c7bf93c67774c8003e802a0
SHA2564472794766746d50455c960c49698f9ee0cd42b73855bcc8aec8be736baa0f12
SHA512a7fbd2a0e708878abda417f54796467b2b7c6685ca15e1acd6b247da578a2a8bb9da8b02f5d8398bc28079d55034189fd1b931f5b1e2022a24acbe626afc050b