Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 05:19
Static task
static1
Behavioral task
behavioral1
Sample
ea3b6fbb4d48852592727c65fe4b3bebf7c36941a1f703cd7bd5ad7baea6cc4b.exe
Resource
win10v2004-20241007-en
General
-
Target
ea3b6fbb4d48852592727c65fe4b3bebf7c36941a1f703cd7bd5ad7baea6cc4b.exe
-
Size
704KB
-
MD5
b88a26a8cafcafb49b24316e8695d6cc
-
SHA1
d2f00be63ece81870f211e36c6281357ba24a3a2
-
SHA256
ea3b6fbb4d48852592727c65fe4b3bebf7c36941a1f703cd7bd5ad7baea6cc4b
-
SHA512
d3185d385fabd9b8dfbbcada8d3fa13dfd4e21e21f299f3b48559f619253e3ce89ce1e30a960049bcf47479cb4deed79bb2a4eb5d79debb314a4ffd5c8087be5
-
SSDEEP
12288:my90H9AcgVm1P9PkvurYKL7twTvBDTBqeqvvTMpGBQ:mywA/m1Fcv4n7WlPBqeqvLDBQ
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/3760-18-0x0000000004900000-0x000000000491A000-memory.dmp healer behavioral1/memory/3760-20-0x0000000004A90000-0x0000000004AA8000-memory.dmp healer behavioral1/memory/3760-21-0x0000000004A90000-0x0000000004AA2000-memory.dmp healer behavioral1/memory/3760-46-0x0000000004A90000-0x0000000004AA2000-memory.dmp healer behavioral1/memory/3760-44-0x0000000004A90000-0x0000000004AA2000-memory.dmp healer behavioral1/memory/3760-42-0x0000000004A90000-0x0000000004AA2000-memory.dmp healer behavioral1/memory/3760-40-0x0000000004A90000-0x0000000004AA2000-memory.dmp healer behavioral1/memory/3760-38-0x0000000004A90000-0x0000000004AA2000-memory.dmp healer behavioral1/memory/3760-36-0x0000000004A90000-0x0000000004AA2000-memory.dmp healer behavioral1/memory/3760-34-0x0000000004A90000-0x0000000004AA2000-memory.dmp healer behavioral1/memory/3760-32-0x0000000004A90000-0x0000000004AA2000-memory.dmp healer behavioral1/memory/3760-48-0x0000000004A90000-0x0000000004AA2000-memory.dmp healer behavioral1/memory/3760-30-0x0000000004A90000-0x0000000004AA2000-memory.dmp healer behavioral1/memory/3760-28-0x0000000004A90000-0x0000000004AA2000-memory.dmp healer behavioral1/memory/3760-26-0x0000000004A90000-0x0000000004AA2000-memory.dmp healer behavioral1/memory/3760-24-0x0000000004A90000-0x0000000004AA2000-memory.dmp healer behavioral1/memory/3760-22-0x0000000004A90000-0x0000000004AA2000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr892680.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr892680.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr892680.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr892680.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr892680.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr892680.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1208-60-0x0000000004CA0000-0x0000000004CDC000-memory.dmp family_redline behavioral1/memory/1208-61-0x0000000004D30000-0x0000000004D6A000-memory.dmp family_redline behavioral1/memory/1208-73-0x0000000004D30000-0x0000000004D65000-memory.dmp family_redline behavioral1/memory/1208-89-0x0000000004D30000-0x0000000004D65000-memory.dmp family_redline behavioral1/memory/1208-95-0x0000000004D30000-0x0000000004D65000-memory.dmp family_redline behavioral1/memory/1208-93-0x0000000004D30000-0x0000000004D65000-memory.dmp family_redline behavioral1/memory/1208-91-0x0000000004D30000-0x0000000004D65000-memory.dmp family_redline behavioral1/memory/1208-87-0x0000000004D30000-0x0000000004D65000-memory.dmp family_redline behavioral1/memory/1208-85-0x0000000004D30000-0x0000000004D65000-memory.dmp family_redline behavioral1/memory/1208-83-0x0000000004D30000-0x0000000004D65000-memory.dmp family_redline behavioral1/memory/1208-81-0x0000000004D30000-0x0000000004D65000-memory.dmp family_redline behavioral1/memory/1208-79-0x0000000004D30000-0x0000000004D65000-memory.dmp family_redline behavioral1/memory/1208-77-0x0000000004D30000-0x0000000004D65000-memory.dmp family_redline behavioral1/memory/1208-75-0x0000000004D30000-0x0000000004D65000-memory.dmp family_redline behavioral1/memory/1208-71-0x0000000004D30000-0x0000000004D65000-memory.dmp family_redline behavioral1/memory/1208-69-0x0000000004D30000-0x0000000004D65000-memory.dmp family_redline behavioral1/memory/1208-67-0x0000000004D30000-0x0000000004D65000-memory.dmp family_redline behavioral1/memory/1208-65-0x0000000004D30000-0x0000000004D65000-memory.dmp family_redline behavioral1/memory/1208-63-0x0000000004D30000-0x0000000004D65000-memory.dmp family_redline behavioral1/memory/1208-62-0x0000000004D30000-0x0000000004D65000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 2428 un227742.exe 3760 pr892680.exe 1208 qu102495.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr892680.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr892680.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ea3b6fbb4d48852592727c65fe4b3bebf7c36941a1f703cd7bd5ad7baea6cc4b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un227742.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1836 3760 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr892680.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu102495.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea3b6fbb4d48852592727c65fe4b3bebf7c36941a1f703cd7bd5ad7baea6cc4b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un227742.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3760 pr892680.exe 3760 pr892680.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3760 pr892680.exe Token: SeDebugPrivilege 1208 qu102495.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4884 wrote to memory of 2428 4884 ea3b6fbb4d48852592727c65fe4b3bebf7c36941a1f703cd7bd5ad7baea6cc4b.exe 83 PID 4884 wrote to memory of 2428 4884 ea3b6fbb4d48852592727c65fe4b3bebf7c36941a1f703cd7bd5ad7baea6cc4b.exe 83 PID 4884 wrote to memory of 2428 4884 ea3b6fbb4d48852592727c65fe4b3bebf7c36941a1f703cd7bd5ad7baea6cc4b.exe 83 PID 2428 wrote to memory of 3760 2428 un227742.exe 84 PID 2428 wrote to memory of 3760 2428 un227742.exe 84 PID 2428 wrote to memory of 3760 2428 un227742.exe 84 PID 2428 wrote to memory of 1208 2428 un227742.exe 96 PID 2428 wrote to memory of 1208 2428 un227742.exe 96 PID 2428 wrote to memory of 1208 2428 un227742.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea3b6fbb4d48852592727c65fe4b3bebf7c36941a1f703cd7bd5ad7baea6cc4b.exe"C:\Users\Admin\AppData\Local\Temp\ea3b6fbb4d48852592727c65fe4b3bebf7c36941a1f703cd7bd5ad7baea6cc4b.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un227742.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un227742.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr892680.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr892680.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3760 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3760 -s 10924⤵
- Program crash
PID:1836
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu102495.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu102495.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1208
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3760 -ip 37601⤵PID:3616
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
550KB
MD5a4131c1d4446bbca7d599f13f933fc2a
SHA1e59c86e53bb91633680ee18ff6ff7ac38227b962
SHA256b40269271033df805a725ca0f8562f2ff6da64a42aa5af269e2cfa3348e01c0b
SHA512b3ff0f82f1b611f9dd5dd93e2df6e4919170d421c5df072e8642ca80f33940a979b8ae8ab70a096553e49d34a71e6cf9bc4efde3baaf42ef09df53dc87f2844e
-
Filesize
277KB
MD584b1d033eb8b3159406f81159cb2c3fb
SHA1a757f6250dbc4f3c12868aa350b04ef43f89301f
SHA2569b04d9f9ebf7127e8a5a40ec8c09ffd1a2684346e980297f653beefe397730ad
SHA512eeb584d5bee699190e1070cf7088ddd1af9fbefba99fd71f6fa7f01dc308ce9c08e05c4d1aa2584802a520f5d5a0e20afa2a085d31cd30344937d301c43ffe2a
-
Filesize
360KB
MD56e06dda023270f3ef92970cffe13a939
SHA186b8636cc34d8621eed7bb29541ee92f8594b322
SHA256015cb65ab28ce847c5df3e30c6e329ec52899d88054202f2a713811ad4fab0b3
SHA512a472b86e392ce3d6ef2234f9168df236328f22f6fa0c7d74b9a680ff50f536743610ee7ed2f6ee457882e00d6feb6529a2c29c5e03e3f831c27a2cfe1d166d7b