Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 01:04
Static task
static1
Behavioral task
behavioral1
Sample
761b9a5fb212d63fa686604c4ee76769475d0d3fea554ee47ffea820e81e9a44.exe
Resource
win10v2004-20241007-en
General
-
Target
761b9a5fb212d63fa686604c4ee76769475d0d3fea554ee47ffea820e81e9a44.exe
-
Size
707KB
-
MD5
2a44568c7e2f68b5861b2a494c780682
-
SHA1
d6a3a8972455ebc491d84179e2b4c1b6165a7c2b
-
SHA256
761b9a5fb212d63fa686604c4ee76769475d0d3fea554ee47ffea820e81e9a44
-
SHA512
490827aeebc5fd4fc9b0e21c71fb9e64be6480ef7f73114c3ed27d2ec7b454c04fd71ef0a559f8b9b395951ac668d8b89e01f755d78beb8bfb68d3e0209374ee
-
SSDEEP
12288:iy903zQ0H3fIApMRE6KjJJokBkILjuaSUjdXtYBncIKApDDwKvPyK:iycQ0XwAIERjJbBpTSU9qn8ApDDwKvaK
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4708-18-0x0000000004B30000-0x0000000004B4A000-memory.dmp healer behavioral1/memory/4708-20-0x0000000004BD0000-0x0000000004BE8000-memory.dmp healer behavioral1/memory/4708-21-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer behavioral1/memory/4708-34-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer behavioral1/memory/4708-48-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer behavioral1/memory/4708-46-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer behavioral1/memory/4708-44-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer behavioral1/memory/4708-42-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer behavioral1/memory/4708-40-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer behavioral1/memory/4708-38-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer behavioral1/memory/4708-36-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer behavioral1/memory/4708-32-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer behavioral1/memory/4708-30-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer behavioral1/memory/4708-28-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer behavioral1/memory/4708-26-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer behavioral1/memory/4708-24-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer behavioral1/memory/4708-22-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer -
Healer family
-
Processes:
pr943060.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr943060.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr943060.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr943060.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr943060.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr943060.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr943060.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4860-60-0x0000000004CA0000-0x0000000004CDC000-memory.dmp family_redline behavioral1/memory/4860-61-0x0000000007190000-0x00000000071CA000-memory.dmp family_redline behavioral1/memory/4860-69-0x0000000007190000-0x00000000071C5000-memory.dmp family_redline behavioral1/memory/4860-95-0x0000000007190000-0x00000000071C5000-memory.dmp family_redline behavioral1/memory/4860-93-0x0000000007190000-0x00000000071C5000-memory.dmp family_redline behavioral1/memory/4860-91-0x0000000007190000-0x00000000071C5000-memory.dmp family_redline behavioral1/memory/4860-89-0x0000000007190000-0x00000000071C5000-memory.dmp family_redline behavioral1/memory/4860-87-0x0000000007190000-0x00000000071C5000-memory.dmp family_redline behavioral1/memory/4860-85-0x0000000007190000-0x00000000071C5000-memory.dmp family_redline behavioral1/memory/4860-83-0x0000000007190000-0x00000000071C5000-memory.dmp family_redline behavioral1/memory/4860-81-0x0000000007190000-0x00000000071C5000-memory.dmp family_redline behavioral1/memory/4860-79-0x0000000007190000-0x00000000071C5000-memory.dmp family_redline behavioral1/memory/4860-77-0x0000000007190000-0x00000000071C5000-memory.dmp family_redline behavioral1/memory/4860-75-0x0000000007190000-0x00000000071C5000-memory.dmp family_redline behavioral1/memory/4860-73-0x0000000007190000-0x00000000071C5000-memory.dmp family_redline behavioral1/memory/4860-71-0x0000000007190000-0x00000000071C5000-memory.dmp family_redline behavioral1/memory/4860-67-0x0000000007190000-0x00000000071C5000-memory.dmp family_redline behavioral1/memory/4860-65-0x0000000007190000-0x00000000071C5000-memory.dmp family_redline behavioral1/memory/4860-63-0x0000000007190000-0x00000000071C5000-memory.dmp family_redline behavioral1/memory/4860-62-0x0000000007190000-0x00000000071C5000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un190527.exepr943060.exequ974859.exepid process 1052 un190527.exe 4708 pr943060.exe 4860 qu974859.exe -
Processes:
pr943060.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr943060.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr943060.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
761b9a5fb212d63fa686604c4ee76769475d0d3fea554ee47ffea820e81e9a44.exeun190527.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 761b9a5fb212d63fa686604c4ee76769475d0d3fea554ee47ffea820e81e9a44.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un190527.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3780 4708 WerFault.exe pr943060.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
761b9a5fb212d63fa686604c4ee76769475d0d3fea554ee47ffea820e81e9a44.exeun190527.exepr943060.exequ974859.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 761b9a5fb212d63fa686604c4ee76769475d0d3fea554ee47ffea820e81e9a44.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un190527.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr943060.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu974859.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pr943060.exepid process 4708 pr943060.exe 4708 pr943060.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pr943060.exequ974859.exedescription pid process Token: SeDebugPrivilege 4708 pr943060.exe Token: SeDebugPrivilege 4860 qu974859.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
761b9a5fb212d63fa686604c4ee76769475d0d3fea554ee47ffea820e81e9a44.exeun190527.exedescription pid process target process PID 4980 wrote to memory of 1052 4980 761b9a5fb212d63fa686604c4ee76769475d0d3fea554ee47ffea820e81e9a44.exe un190527.exe PID 4980 wrote to memory of 1052 4980 761b9a5fb212d63fa686604c4ee76769475d0d3fea554ee47ffea820e81e9a44.exe un190527.exe PID 4980 wrote to memory of 1052 4980 761b9a5fb212d63fa686604c4ee76769475d0d3fea554ee47ffea820e81e9a44.exe un190527.exe PID 1052 wrote to memory of 4708 1052 un190527.exe pr943060.exe PID 1052 wrote to memory of 4708 1052 un190527.exe pr943060.exe PID 1052 wrote to memory of 4708 1052 un190527.exe pr943060.exe PID 1052 wrote to memory of 4860 1052 un190527.exe qu974859.exe PID 1052 wrote to memory of 4860 1052 un190527.exe qu974859.exe PID 1052 wrote to memory of 4860 1052 un190527.exe qu974859.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\761b9a5fb212d63fa686604c4ee76769475d0d3fea554ee47ffea820e81e9a44.exe"C:\Users\Admin\AppData\Local\Temp\761b9a5fb212d63fa686604c4ee76769475d0d3fea554ee47ffea820e81e9a44.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un190527.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un190527.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr943060.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr943060.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4708 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 10644⤵
- Program crash
PID:3780
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu974859.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu974859.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4860
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4708 -ip 47081⤵PID:1448
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
553KB
MD5cc0592c881dc0895c74fbb073caf2da8
SHA14f098fe42e7c834d293cede05ca317b4601db5a1
SHA25668b26c131d3fd6f1a3525b43c66b4879aae414dfc985320e04ef23ffdd90be86
SHA512ef318517c9c8c8633f6b28b97931d3373b65083658848a9241d03f357996577f3b6d720d49d29bca2c04811db9b2ea3ab578e9e62e9437f0fdf29565c5b5941a
-
Filesize
278KB
MD51dfd89ba8617f2058696e3aceadd6d7b
SHA14f741628c4e2254ec9db9d44ffb151fc38c50276
SHA2560fe2a82ec77ee95aa70ea4c58e99ce6ed1d85d116d3be73ab2553c7dc820266a
SHA512a81cce8eacd763737dd682b5a75a1a2335b3d51387b2889f455b4253b56262c25deeb2c17bd65b640359d4ace11c6e19ead53ed073e122786ecb0783725cdfde
-
Filesize
360KB
MD56645e9ae413a1589d43410295dd645f3
SHA1e2500da7ee0d21d585279b78d2038c93bcbcbea9
SHA256877f937a840850ddcccf58c59a1deca8b5d40ede0509d9f5a17bfa118bf98cd3
SHA51268ad021c3c59cce5e6445db35feddd6f440c7509af042834134d60ce87aee1f6ad4445669bdc9d8c9d6934cae8278d3e5bade4f879d55d804bcc6c7423a20f2b