Analysis
-
max time kernel
113s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 12:43
Static task
static1
Behavioral task
behavioral1
Sample
cc2a576321ce576bcd94a78ccf3dfb3fe61bc07728eaab1f97908fc3117ffabc.exe
Resource
win10v2004-20241007-en
General
-
Target
cc2a576321ce576bcd94a78ccf3dfb3fe61bc07728eaab1f97908fc3117ffabc.exe
-
Size
705KB
-
MD5
b21cc4f3d3fda85a4d44fc1f55cd0bf5
-
SHA1
03b83bb6404b1b132729989e387c24ef60ef2002
-
SHA256
cc2a576321ce576bcd94a78ccf3dfb3fe61bc07728eaab1f97908fc3117ffabc
-
SHA512
65e7df65df253baf9e5fb31a33948eb072c4d87cd926b0c991dbc5d7c20b603d95839284be6d5fb4a83e413a9c49e55b2cf8c82046f7d0c9a88d4bbc3b0bebbd
-
SSDEEP
12288:gy90eyy+aHD45NtODfLKvD05Jm3npNnHNLItFGaeoqncVCGgL8IO1VAVQ1YSNgnp:gyElU4DYfmDt3npRWtFNqc6UVAlVoW
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/2940-18-0x0000000004A20000-0x0000000004A3A000-memory.dmp healer behavioral1/memory/2940-20-0x0000000004B10000-0x0000000004B28000-memory.dmp healer behavioral1/memory/2940-48-0x0000000004B10000-0x0000000004B22000-memory.dmp healer behavioral1/memory/2940-46-0x0000000004B10000-0x0000000004B22000-memory.dmp healer behavioral1/memory/2940-44-0x0000000004B10000-0x0000000004B22000-memory.dmp healer behavioral1/memory/2940-42-0x0000000004B10000-0x0000000004B22000-memory.dmp healer behavioral1/memory/2940-40-0x0000000004B10000-0x0000000004B22000-memory.dmp healer behavioral1/memory/2940-38-0x0000000004B10000-0x0000000004B22000-memory.dmp healer behavioral1/memory/2940-36-0x0000000004B10000-0x0000000004B22000-memory.dmp healer behavioral1/memory/2940-34-0x0000000004B10000-0x0000000004B22000-memory.dmp healer behavioral1/memory/2940-32-0x0000000004B10000-0x0000000004B22000-memory.dmp healer behavioral1/memory/2940-30-0x0000000004B10000-0x0000000004B22000-memory.dmp healer behavioral1/memory/2940-28-0x0000000004B10000-0x0000000004B22000-memory.dmp healer behavioral1/memory/2940-26-0x0000000004B10000-0x0000000004B22000-memory.dmp healer behavioral1/memory/2940-24-0x0000000004B10000-0x0000000004B22000-memory.dmp healer behavioral1/memory/2940-22-0x0000000004B10000-0x0000000004B22000-memory.dmp healer behavioral1/memory/2940-21-0x0000000004B10000-0x0000000004B22000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr923858.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr923858.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr923858.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr923858.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr923858.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr923858.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2692-60-0x00000000070A0000-0x00000000070DC000-memory.dmp family_redline behavioral1/memory/2692-61-0x00000000077E0000-0x000000000781A000-memory.dmp family_redline behavioral1/memory/2692-73-0x00000000077E0000-0x0000000007815000-memory.dmp family_redline behavioral1/memory/2692-75-0x00000000077E0000-0x0000000007815000-memory.dmp family_redline behavioral1/memory/2692-95-0x00000000077E0000-0x0000000007815000-memory.dmp family_redline behavioral1/memory/2692-91-0x00000000077E0000-0x0000000007815000-memory.dmp family_redline behavioral1/memory/2692-89-0x00000000077E0000-0x0000000007815000-memory.dmp family_redline behavioral1/memory/2692-87-0x00000000077E0000-0x0000000007815000-memory.dmp family_redline behavioral1/memory/2692-85-0x00000000077E0000-0x0000000007815000-memory.dmp family_redline behavioral1/memory/2692-83-0x00000000077E0000-0x0000000007815000-memory.dmp family_redline behavioral1/memory/2692-81-0x00000000077E0000-0x0000000007815000-memory.dmp family_redline behavioral1/memory/2692-79-0x00000000077E0000-0x0000000007815000-memory.dmp family_redline behavioral1/memory/2692-77-0x00000000077E0000-0x0000000007815000-memory.dmp family_redline behavioral1/memory/2692-71-0x00000000077E0000-0x0000000007815000-memory.dmp family_redline behavioral1/memory/2692-69-0x00000000077E0000-0x0000000007815000-memory.dmp family_redline behavioral1/memory/2692-67-0x00000000077E0000-0x0000000007815000-memory.dmp family_redline behavioral1/memory/2692-93-0x00000000077E0000-0x0000000007815000-memory.dmp family_redline behavioral1/memory/2692-65-0x00000000077E0000-0x0000000007815000-memory.dmp family_redline behavioral1/memory/2692-63-0x00000000077E0000-0x0000000007815000-memory.dmp family_redline behavioral1/memory/2692-62-0x00000000077E0000-0x0000000007815000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 536 un619199.exe 2940 pr923858.exe 2692 qu640890.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr923858.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr923858.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cc2a576321ce576bcd94a78ccf3dfb3fe61bc07728eaab1f97908fc3117ffabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un619199.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2388 2940 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un619199.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr923858.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu640890.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cc2a576321ce576bcd94a78ccf3dfb3fe61bc07728eaab1f97908fc3117ffabc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2940 pr923858.exe 2940 pr923858.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2940 pr923858.exe Token: SeDebugPrivilege 2692 qu640890.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4116 wrote to memory of 536 4116 cc2a576321ce576bcd94a78ccf3dfb3fe61bc07728eaab1f97908fc3117ffabc.exe 83 PID 4116 wrote to memory of 536 4116 cc2a576321ce576bcd94a78ccf3dfb3fe61bc07728eaab1f97908fc3117ffabc.exe 83 PID 4116 wrote to memory of 536 4116 cc2a576321ce576bcd94a78ccf3dfb3fe61bc07728eaab1f97908fc3117ffabc.exe 83 PID 536 wrote to memory of 2940 536 un619199.exe 84 PID 536 wrote to memory of 2940 536 un619199.exe 84 PID 536 wrote to memory of 2940 536 un619199.exe 84 PID 536 wrote to memory of 2692 536 un619199.exe 96 PID 536 wrote to memory of 2692 536 un619199.exe 96 PID 536 wrote to memory of 2692 536 un619199.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc2a576321ce576bcd94a78ccf3dfb3fe61bc07728eaab1f97908fc3117ffabc.exe"C:\Users\Admin\AppData\Local\Temp\cc2a576321ce576bcd94a78ccf3dfb3fe61bc07728eaab1f97908fc3117ffabc.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un619199.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un619199.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr923858.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr923858.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2940 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2940 -s 10044⤵
- Program crash
PID:2388
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu640890.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu640890.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2692
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2940 -ip 29401⤵PID:2524
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
551KB
MD5cfb7e9fc3a779c57b6a7d134e04d7535
SHA19eef57f1923ead6061e16722e67ff503064af923
SHA25642a7094d29ffbd57e3b7b36ad3dbea511e5c6437e05c59f801385f381ac0f6ad
SHA512944c768ab9d16ac1a7b88b318b412bfc776b127fd8f2fc7ee6721b3fcc7e70f39e54f956b533b5798a2a505dcd68f9847fa7a5f7cb15ef08a1a9889eb2b3a874
-
Filesize
278KB
MD5d32c19ec601e7da91e72d0dc9870141b
SHA1b75088e949499d7bb776bf07c18ea088a8b75579
SHA256e3975f391ae881bd940990406923cd27c0e6ebb52374c716a184b30066b377a5
SHA5125badd96f265ab43e8b22c8d9cd5dc8b543210a62c3fc7b1b2d645f33127200a0e73c86f0b073cd3a42400a4f9de8ad69262034f2f0215fb56a79714d4f88f5fc
-
Filesize
359KB
MD5f19e389a46950d2e2a7631633f9b72ef
SHA1af32532a83ca586eedd8f295c24fb196d6e780ec
SHA256e9186f309b1810feea02da07dbb7a2df3591ecec3020b042549509faa0f3c55f
SHA512b866acf3165a39030bc80094901af86f775b7777ccc43d29e3fecfe780de41d926fcaee849066f2444a718375e072ab1bc8f14dadf1e3448ee71c6afa9bd4dba