Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:39
Static task
static1
Behavioral task
behavioral1
Sample
2739adcc3825c2e989503f9d8750d88b4872d8201427e3baab4be58b22dc2e0a.exe
Resource
win10v2004-20241007-en
General
-
Target
2739adcc3825c2e989503f9d8750d88b4872d8201427e3baab4be58b22dc2e0a.exe
-
Size
552KB
-
MD5
27a5bda558815b3ad76de08072e0bcb3
-
SHA1
f8b40ac1616fc8beac38355594eb91c86038e53a
-
SHA256
2739adcc3825c2e989503f9d8750d88b4872d8201427e3baab4be58b22dc2e0a
-
SHA512
0af63da570b21c73e3235a1434ce7d5140cbc639bb26936a7ec4631177ff9e29bdde97759d346cd0ea9df73a7a6113f88a514472be77de8c8a9d6fbd5079bece
-
SSDEEP
12288:Jy90og+IFvkQZ+9EvWJdkphJxFtzoXdqdrnJY8c05iZQb:Jyv/ukgykphFo6rnTcSz
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/4436-11-0x00000000048B0000-0x00000000048CA000-memory.dmp healer behavioral1/memory/4436-14-0x0000000004AF0000-0x0000000004B08000-memory.dmp healer behavioral1/memory/4436-15-0x0000000004AF0000-0x0000000004B02000-memory.dmp healer behavioral1/memory/4436-42-0x0000000004AF0000-0x0000000004B02000-memory.dmp healer behavioral1/memory/4436-40-0x0000000004AF0000-0x0000000004B02000-memory.dmp healer behavioral1/memory/4436-38-0x0000000004AF0000-0x0000000004B02000-memory.dmp healer behavioral1/memory/4436-36-0x0000000004AF0000-0x0000000004B02000-memory.dmp healer behavioral1/memory/4436-34-0x0000000004AF0000-0x0000000004B02000-memory.dmp healer behavioral1/memory/4436-32-0x0000000004AF0000-0x0000000004B02000-memory.dmp healer behavioral1/memory/4436-30-0x0000000004AF0000-0x0000000004B02000-memory.dmp healer behavioral1/memory/4436-22-0x0000000004AF0000-0x0000000004B02000-memory.dmp healer behavioral1/memory/4436-20-0x0000000004AF0000-0x0000000004B02000-memory.dmp healer behavioral1/memory/4436-18-0x0000000004AF0000-0x0000000004B02000-memory.dmp healer behavioral1/memory/4436-16-0x0000000004AF0000-0x0000000004B02000-memory.dmp healer behavioral1/memory/4436-28-0x0000000004AF0000-0x0000000004B02000-memory.dmp healer behavioral1/memory/4436-26-0x0000000004AF0000-0x0000000004B02000-memory.dmp healer behavioral1/memory/4436-24-0x0000000004AF0000-0x0000000004B02000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr340132.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr340132.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr340132.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr340132.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr340132.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr340132.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3996-55-0x00000000047D0000-0x000000000480C000-memory.dmp family_redline behavioral1/memory/3996-56-0x00000000077B0000-0x00000000077EA000-memory.dmp family_redline behavioral1/memory/3996-60-0x00000000077B0000-0x00000000077E5000-memory.dmp family_redline behavioral1/memory/3996-70-0x00000000077B0000-0x00000000077E5000-memory.dmp family_redline behavioral1/memory/3996-90-0x00000000077B0000-0x00000000077E5000-memory.dmp family_redline behavioral1/memory/3996-88-0x00000000077B0000-0x00000000077E5000-memory.dmp family_redline behavioral1/memory/3996-86-0x00000000077B0000-0x00000000077E5000-memory.dmp family_redline behavioral1/memory/3996-84-0x00000000077B0000-0x00000000077E5000-memory.dmp family_redline behavioral1/memory/3996-82-0x00000000077B0000-0x00000000077E5000-memory.dmp family_redline behavioral1/memory/3996-80-0x00000000077B0000-0x00000000077E5000-memory.dmp family_redline behavioral1/memory/3996-76-0x00000000077B0000-0x00000000077E5000-memory.dmp family_redline behavioral1/memory/3996-74-0x00000000077B0000-0x00000000077E5000-memory.dmp family_redline behavioral1/memory/3996-72-0x00000000077B0000-0x00000000077E5000-memory.dmp family_redline behavioral1/memory/3996-68-0x00000000077B0000-0x00000000077E5000-memory.dmp family_redline behavioral1/memory/3996-66-0x00000000077B0000-0x00000000077E5000-memory.dmp family_redline behavioral1/memory/3996-64-0x00000000077B0000-0x00000000077E5000-memory.dmp family_redline behavioral1/memory/3996-62-0x00000000077B0000-0x00000000077E5000-memory.dmp family_redline behavioral1/memory/3996-78-0x00000000077B0000-0x00000000077E5000-memory.dmp family_redline behavioral1/memory/3996-58-0x00000000077B0000-0x00000000077E5000-memory.dmp family_redline behavioral1/memory/3996-57-0x00000000077B0000-0x00000000077E5000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 2 IoCs
pid Process 4436 pr340132.exe 3996 qu265053.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr340132.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr340132.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2739adcc3825c2e989503f9d8750d88b4872d8201427e3baab4be58b22dc2e0a.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4448 4436 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2739adcc3825c2e989503f9d8750d88b4872d8201427e3baab4be58b22dc2e0a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr340132.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu265053.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4436 pr340132.exe 4436 pr340132.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4436 pr340132.exe Token: SeDebugPrivilege 3996 qu265053.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4856 wrote to memory of 4436 4856 2739adcc3825c2e989503f9d8750d88b4872d8201427e3baab4be58b22dc2e0a.exe 83 PID 4856 wrote to memory of 4436 4856 2739adcc3825c2e989503f9d8750d88b4872d8201427e3baab4be58b22dc2e0a.exe 83 PID 4856 wrote to memory of 4436 4856 2739adcc3825c2e989503f9d8750d88b4872d8201427e3baab4be58b22dc2e0a.exe 83 PID 4856 wrote to memory of 3996 4856 2739adcc3825c2e989503f9d8750d88b4872d8201427e3baab4be58b22dc2e0a.exe 95 PID 4856 wrote to memory of 3996 4856 2739adcc3825c2e989503f9d8750d88b4872d8201427e3baab4be58b22dc2e0a.exe 95 PID 4856 wrote to memory of 3996 4856 2739adcc3825c2e989503f9d8750d88b4872d8201427e3baab4be58b22dc2e0a.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\2739adcc3825c2e989503f9d8750d88b4872d8201427e3baab4be58b22dc2e0a.exe"C:\Users\Admin\AppData\Local\Temp\2739adcc3825c2e989503f9d8750d88b4872d8201427e3baab4be58b22dc2e0a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pr340132.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pr340132.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4436 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4436 -s 10843⤵
- Program crash
PID:4448
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\qu265053.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\qu265053.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4436 -ip 44361⤵PID:4440
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
299KB
MD55c5b80ccb0123d5a59ca9a6d1dbfa822
SHA121174ffaa7a56a0ffec3c648e92860b79634b28c
SHA256614820920ecfbd8f98e26039d5301f3a23725a983b3d45ea4a42c828d936a937
SHA5126a969e62f07623f1fa34c008fc098c9e5125bcc061db43d164f628fee3fe160ccb344774f6c64d55ff4a9ba1fa24082cee56c14190d5405dfd98e3910e29ca22
-
Filesize
382KB
MD5a98f3d642ac3390e9efd64ecf3850ca8
SHA1c9fcfe88a7a8b7c6eb4bf084a120646c6dccc7bc
SHA2566836dba43f5810f8d023914a6557952100ef3d09e7721ed30457aa4e61fbe0cb
SHA512d6b2ede829c0f9afc57ec9dc004ba555418f888e056f00429c24225a78e7814c2cd34993eae9f738e7f79233806426271b63f49cbef32cbebfb32c4a75d810c8