Analysis
-
max time kernel
112s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 03:11
Static task
static1
Behavioral task
behavioral1
Sample
ba36c8b2791c166735060bfb3b139b73cd1c06febe1f8e6e858582eebef1d5f6.exe
Resource
win10v2004-20241007-en
General
-
Target
ba36c8b2791c166735060bfb3b139b73cd1c06febe1f8e6e858582eebef1d5f6.exe
-
Size
763KB
-
MD5
2548aa362b6a9d35a822594cf3462cc3
-
SHA1
672f91567badcd96964ce1eba033dfd45dd82b67
-
SHA256
ba36c8b2791c166735060bfb3b139b73cd1c06febe1f8e6e858582eebef1d5f6
-
SHA512
55b3872083be0d6a978bc51be8de18ff6797b392f2ac59a4521ea81a001cfc3b27efea46974384d941db2d0357c1199b7dbc38eab775346ea5b338261ab73c9a
-
SSDEEP
12288:ly90P2sTIu1kewXrK3UlKI0l7nfHWLgVns8cLZ1mas6KbjJgWJaOQ+ADEADhp3:ly8222Fe3kemEs8cjmN6MVgLL+aP3
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4088-19-0x0000000002780000-0x000000000279A000-memory.dmp healer behavioral1/memory/4088-21-0x0000000004EF0000-0x0000000004F08000-memory.dmp healer behavioral1/memory/4088-22-0x0000000004EF0000-0x0000000004F02000-memory.dmp healer behavioral1/memory/4088-27-0x0000000004EF0000-0x0000000004F02000-memory.dmp healer behavioral1/memory/4088-49-0x0000000004EF0000-0x0000000004F02000-memory.dmp healer behavioral1/memory/4088-47-0x0000000004EF0000-0x0000000004F02000-memory.dmp healer behavioral1/memory/4088-45-0x0000000004EF0000-0x0000000004F02000-memory.dmp healer behavioral1/memory/4088-43-0x0000000004EF0000-0x0000000004F02000-memory.dmp healer behavioral1/memory/4088-41-0x0000000004EF0000-0x0000000004F02000-memory.dmp healer behavioral1/memory/4088-39-0x0000000004EF0000-0x0000000004F02000-memory.dmp healer behavioral1/memory/4088-37-0x0000000004EF0000-0x0000000004F02000-memory.dmp healer behavioral1/memory/4088-35-0x0000000004EF0000-0x0000000004F02000-memory.dmp healer behavioral1/memory/4088-33-0x0000000004EF0000-0x0000000004F02000-memory.dmp healer behavioral1/memory/4088-31-0x0000000004EF0000-0x0000000004F02000-memory.dmp healer behavioral1/memory/4088-29-0x0000000004EF0000-0x0000000004F02000-memory.dmp healer behavioral1/memory/4088-25-0x0000000004EF0000-0x0000000004F02000-memory.dmp healer behavioral1/memory/4088-23-0x0000000004EF0000-0x0000000004F02000-memory.dmp healer -
Healer family
-
Processes:
pr053063.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr053063.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr053063.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr053063.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr053063.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr053063.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr053063.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/3196-60-0x00000000026D0000-0x000000000270C000-memory.dmp family_redline behavioral1/memory/3196-61-0x00000000029B0000-0x00000000029EA000-memory.dmp family_redline behavioral1/memory/3196-65-0x00000000029B0000-0x00000000029E5000-memory.dmp family_redline behavioral1/memory/3196-75-0x00000000029B0000-0x00000000029E5000-memory.dmp family_redline behavioral1/memory/3196-95-0x00000000029B0000-0x00000000029E5000-memory.dmp family_redline behavioral1/memory/3196-93-0x00000000029B0000-0x00000000029E5000-memory.dmp family_redline behavioral1/memory/3196-91-0x00000000029B0000-0x00000000029E5000-memory.dmp family_redline behavioral1/memory/3196-89-0x00000000029B0000-0x00000000029E5000-memory.dmp family_redline behavioral1/memory/3196-85-0x00000000029B0000-0x00000000029E5000-memory.dmp family_redline behavioral1/memory/3196-84-0x00000000029B0000-0x00000000029E5000-memory.dmp family_redline behavioral1/memory/3196-81-0x00000000029B0000-0x00000000029E5000-memory.dmp family_redline behavioral1/memory/3196-80-0x00000000029B0000-0x00000000029E5000-memory.dmp family_redline behavioral1/memory/3196-73-0x00000000029B0000-0x00000000029E5000-memory.dmp family_redline behavioral1/memory/3196-71-0x00000000029B0000-0x00000000029E5000-memory.dmp family_redline behavioral1/memory/3196-69-0x00000000029B0000-0x00000000029E5000-memory.dmp family_redline behavioral1/memory/3196-67-0x00000000029B0000-0x00000000029E5000-memory.dmp family_redline behavioral1/memory/3196-87-0x00000000029B0000-0x00000000029E5000-memory.dmp family_redline behavioral1/memory/3196-77-0x00000000029B0000-0x00000000029E5000-memory.dmp family_redline behavioral1/memory/3196-63-0x00000000029B0000-0x00000000029E5000-memory.dmp family_redline behavioral1/memory/3196-62-0x00000000029B0000-0x00000000029E5000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un649286.exepr053063.exequ955870.exepid process 4128 un649286.exe 4088 pr053063.exe 3196 qu955870.exe -
Processes:
pr053063.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr053063.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr053063.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ba36c8b2791c166735060bfb3b139b73cd1c06febe1f8e6e858582eebef1d5f6.exeun649286.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ba36c8b2791c166735060bfb3b139b73cd1c06febe1f8e6e858582eebef1d5f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un649286.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4144 4088 WerFault.exe pr053063.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ba36c8b2791c166735060bfb3b139b73cd1c06febe1f8e6e858582eebef1d5f6.exeun649286.exepr053063.exequ955870.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ba36c8b2791c166735060bfb3b139b73cd1c06febe1f8e6e858582eebef1d5f6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un649286.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr053063.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu955870.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pr053063.exepid process 4088 pr053063.exe 4088 pr053063.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pr053063.exequ955870.exedescription pid process Token: SeDebugPrivilege 4088 pr053063.exe Token: SeDebugPrivilege 3196 qu955870.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
ba36c8b2791c166735060bfb3b139b73cd1c06febe1f8e6e858582eebef1d5f6.exeun649286.exedescription pid process target process PID 2288 wrote to memory of 4128 2288 ba36c8b2791c166735060bfb3b139b73cd1c06febe1f8e6e858582eebef1d5f6.exe un649286.exe PID 2288 wrote to memory of 4128 2288 ba36c8b2791c166735060bfb3b139b73cd1c06febe1f8e6e858582eebef1d5f6.exe un649286.exe PID 2288 wrote to memory of 4128 2288 ba36c8b2791c166735060bfb3b139b73cd1c06febe1f8e6e858582eebef1d5f6.exe un649286.exe PID 4128 wrote to memory of 4088 4128 un649286.exe pr053063.exe PID 4128 wrote to memory of 4088 4128 un649286.exe pr053063.exe PID 4128 wrote to memory of 4088 4128 un649286.exe pr053063.exe PID 4128 wrote to memory of 3196 4128 un649286.exe qu955870.exe PID 4128 wrote to memory of 3196 4128 un649286.exe qu955870.exe PID 4128 wrote to memory of 3196 4128 un649286.exe qu955870.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba36c8b2791c166735060bfb3b139b73cd1c06febe1f8e6e858582eebef1d5f6.exe"C:\Users\Admin\AppData\Local\Temp\ba36c8b2791c166735060bfb3b139b73cd1c06febe1f8e6e858582eebef1d5f6.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un649286.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un649286.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr053063.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr053063.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4088 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4088 -s 10844⤵
- Program crash
PID:4144
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu955870.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu955870.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3196
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4088 -ip 40881⤵PID:2724
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
609KB
MD57cf6a86538453da686eb4b8e4114846c
SHA18e09ea987d95931f6307242e1c9bdc5cbf5085f5
SHA25619879b74e224a59ff97d673f1867d880a8094d8142abe54d9fcf92e3d329e924
SHA51253cbb57f83ca20a62e6b21a355f2e48218927fb1190768c6966592fd9247a952d9084e1b241b49017e58251702c78508c1709cb18215e474a69874ad2696886b
-
Filesize
403KB
MD50b254631bb3f386988b95726404652ef
SHA1ebf2263ac38c321d7930b0cae01159cd5f312ec6
SHA2562481d1f1bacb1003849a7ba1dd73643014b5ad29ba883b3ed2c65561ca2b8a51
SHA512031a1da71078ceec41bcc3654f21315909600566fb625f7fc9a23be1d797fc9509e43e6b7bad61402e983a3e388cdd42855c01afb13f48e8b70362bc16c75686
-
Filesize
486KB
MD555a38d5fac27293e166f059113054072
SHA17f09334cfa0166cdffaeabda58ea186ead6f9a09
SHA256e82d6d97f263c0e6ec304f86c61ea7e9fa15cb3c2ae42d00f7768819c4fef5c1
SHA51279b1d7150198f3e7225c9534250186a8169c307f792ca58404f6227ab10b640db68cc259ece9335f50eb0ef0d09095cc59913e5262bfdb47d1fc920af3640c6c