Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 19:14
Static task
static1
Behavioral task
behavioral1
Sample
0189ad1ebb6632804140d4cac57e2788890d94709244a2b9d91a9a4a3840ef49.exe
Resource
win10v2004-20241007-en
General
-
Target
0189ad1ebb6632804140d4cac57e2788890d94709244a2b9d91a9a4a3840ef49.exe
-
Size
763KB
-
MD5
adcd8c905e9fa9974d3bdb8ead81f2a4
-
SHA1
c82d7b2ebad761880191397acf13e2676aa610ba
-
SHA256
0189ad1ebb6632804140d4cac57e2788890d94709244a2b9d91a9a4a3840ef49
-
SHA512
82f7e1d37f2fb8bb7ca2b9d3a09e02fee15525937077561a67ff7c16e39de9856b35677fa41c3c7182990cfc324a18051d737be96c92e84d49cb91ce2b4b0dd2
-
SSDEEP
12288:vy90ArogDjQBUAwLTayt9QgQJ/dlBVhkwL8jIP/kVrSU3SFDRdDPMoEYH7BZpUf:vyfDjQBvwahgQ5jhkw2IPAcFDRaYdc
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/2032-19-0x0000000002550000-0x000000000256A000-memory.dmp healer behavioral1/memory/2032-21-0x0000000002730000-0x0000000002748000-memory.dmp healer behavioral1/memory/2032-22-0x0000000002730000-0x0000000002742000-memory.dmp healer behavioral1/memory/2032-33-0x0000000002730000-0x0000000002742000-memory.dmp healer behavioral1/memory/2032-47-0x0000000002730000-0x0000000002742000-memory.dmp healer behavioral1/memory/2032-45-0x0000000002730000-0x0000000002742000-memory.dmp healer behavioral1/memory/2032-44-0x0000000002730000-0x0000000002742000-memory.dmp healer behavioral1/memory/2032-41-0x0000000002730000-0x0000000002742000-memory.dmp healer behavioral1/memory/2032-39-0x0000000002730000-0x0000000002742000-memory.dmp healer behavioral1/memory/2032-37-0x0000000002730000-0x0000000002742000-memory.dmp healer behavioral1/memory/2032-35-0x0000000002730000-0x0000000002742000-memory.dmp healer behavioral1/memory/2032-31-0x0000000002730000-0x0000000002742000-memory.dmp healer behavioral1/memory/2032-29-0x0000000002730000-0x0000000002742000-memory.dmp healer behavioral1/memory/2032-27-0x0000000002730000-0x0000000002742000-memory.dmp healer behavioral1/memory/2032-25-0x0000000002730000-0x0000000002742000-memory.dmp healer behavioral1/memory/2032-23-0x0000000002730000-0x0000000002742000-memory.dmp healer behavioral1/memory/2032-49-0x0000000002730000-0x0000000002742000-memory.dmp healer -
Healer family
-
Processes:
pr663676.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr663676.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr663676.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr663676.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr663676.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr663676.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr663676.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4152-62-0x0000000002720000-0x000000000275C000-memory.dmp family_redline behavioral1/memory/4152-63-0x00000000053C0000-0x00000000053FA000-memory.dmp family_redline behavioral1/memory/4152-73-0x00000000053C0000-0x00000000053F5000-memory.dmp family_redline behavioral1/memory/4152-77-0x00000000053C0000-0x00000000053F5000-memory.dmp family_redline behavioral1/memory/4152-97-0x00000000053C0000-0x00000000053F5000-memory.dmp family_redline behavioral1/memory/4152-95-0x00000000053C0000-0x00000000053F5000-memory.dmp family_redline behavioral1/memory/4152-91-0x00000000053C0000-0x00000000053F5000-memory.dmp family_redline behavioral1/memory/4152-89-0x00000000053C0000-0x00000000053F5000-memory.dmp family_redline behavioral1/memory/4152-87-0x00000000053C0000-0x00000000053F5000-memory.dmp family_redline behavioral1/memory/4152-85-0x00000000053C0000-0x00000000053F5000-memory.dmp family_redline behavioral1/memory/4152-83-0x00000000053C0000-0x00000000053F5000-memory.dmp family_redline behavioral1/memory/4152-81-0x00000000053C0000-0x00000000053F5000-memory.dmp family_redline behavioral1/memory/4152-79-0x00000000053C0000-0x00000000053F5000-memory.dmp family_redline behavioral1/memory/4152-75-0x00000000053C0000-0x00000000053F5000-memory.dmp family_redline behavioral1/memory/4152-71-0x00000000053C0000-0x00000000053F5000-memory.dmp family_redline behavioral1/memory/4152-69-0x00000000053C0000-0x00000000053F5000-memory.dmp family_redline behavioral1/memory/4152-93-0x00000000053C0000-0x00000000053F5000-memory.dmp family_redline behavioral1/memory/4152-67-0x00000000053C0000-0x00000000053F5000-memory.dmp family_redline behavioral1/memory/4152-65-0x00000000053C0000-0x00000000053F5000-memory.dmp family_redline behavioral1/memory/4152-64-0x00000000053C0000-0x00000000053F5000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un209782.exepr663676.exequ079282.exepid process 4456 un209782.exe 2032 pr663676.exe 4152 qu079282.exe -
Processes:
pr663676.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr663676.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr663676.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
0189ad1ebb6632804140d4cac57e2788890d94709244a2b9d91a9a4a3840ef49.exeun209782.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0189ad1ebb6632804140d4cac57e2788890d94709244a2b9d91a9a4a3840ef49.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un209782.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3516 2032 WerFault.exe pr663676.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
qu079282.exe0189ad1ebb6632804140d4cac57e2788890d94709244a2b9d91a9a4a3840ef49.exeun209782.exepr663676.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu079282.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0189ad1ebb6632804140d4cac57e2788890d94709244a2b9d91a9a4a3840ef49.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un209782.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr663676.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pr663676.exepid process 2032 pr663676.exe 2032 pr663676.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pr663676.exequ079282.exedescription pid process Token: SeDebugPrivilege 2032 pr663676.exe Token: SeDebugPrivilege 4152 qu079282.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
0189ad1ebb6632804140d4cac57e2788890d94709244a2b9d91a9a4a3840ef49.exeun209782.exedescription pid process target process PID 744 wrote to memory of 4456 744 0189ad1ebb6632804140d4cac57e2788890d94709244a2b9d91a9a4a3840ef49.exe un209782.exe PID 744 wrote to memory of 4456 744 0189ad1ebb6632804140d4cac57e2788890d94709244a2b9d91a9a4a3840ef49.exe un209782.exe PID 744 wrote to memory of 4456 744 0189ad1ebb6632804140d4cac57e2788890d94709244a2b9d91a9a4a3840ef49.exe un209782.exe PID 4456 wrote to memory of 2032 4456 un209782.exe pr663676.exe PID 4456 wrote to memory of 2032 4456 un209782.exe pr663676.exe PID 4456 wrote to memory of 2032 4456 un209782.exe pr663676.exe PID 4456 wrote to memory of 4152 4456 un209782.exe qu079282.exe PID 4456 wrote to memory of 4152 4456 un209782.exe qu079282.exe PID 4456 wrote to memory of 4152 4456 un209782.exe qu079282.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0189ad1ebb6632804140d4cac57e2788890d94709244a2b9d91a9a4a3840ef49.exe"C:\Users\Admin\AppData\Local\Temp\0189ad1ebb6632804140d4cac57e2788890d94709244a2b9d91a9a4a3840ef49.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un209782.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un209782.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr663676.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr663676.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 10964⤵
- Program crash
PID:3516
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu079282.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu079282.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4152
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2032 -ip 20321⤵PID:4860
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
609KB
MD52a1313518332e60ada5719f62c9a5b29
SHA17a2cd4c373404b3c27935169da713cc1d44aa542
SHA256c82c23b67fb8200c60456197f9965f01857774ebe95e821868c9d7c956c2aa85
SHA5126b1c3916428210d5a953b8a0eac397af8032518d1971cac4a63ed98b567998cdca9a81816c56f2c263073d2b385bac6a0279a865cb93cbd1f6840a81fd442558
-
Filesize
403KB
MD5144349d7aa5c6396574c3f08a39f6000
SHA1ada290a4aaf5d2dfcf4dd3bfbe38e098cb815868
SHA25692945d18e632c64043309ac1f56060659780a9ddb38586631a8a22cb85da024f
SHA51241000cdc70c95b5f0c32c9467dd03319258d9374f34569f4eaa5bc4e223473a2874dfd9aacd07ec64d6e58040658b59771c7311c713f03238b605b1db627f7d9
-
Filesize
485KB
MD554740a609fd9d3e23fcf6fcd08c9463c
SHA1b96d3046bb13e8b77be1de7c0da1f7ed63e61876
SHA2562ca15150a8480211ef1773a7c2a4d47f770acff73129fa13a05e500c7a645a83
SHA5129e3f946b50b6ba01caf98788f4327e83d3c45f1dbfeb8f8378beda5c1723ef59d89bcb261d4f97f57c19cacba08f639f66276a6d7243a0482f80d6e9e4a713a0