Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 12:38
Static task
static1
Behavioral task
behavioral1
Sample
28d1dd3ca9b4495da3ac488e6d0c284807a1b7ae119e8d4a537ede2866f07ddb.exe
Resource
win10v2004-20241007-en
General
-
Target
28d1dd3ca9b4495da3ac488e6d0c284807a1b7ae119e8d4a537ede2866f07ddb.exe
-
Size
707KB
-
MD5
5afb547ee62e7bbf93c60e4c415303d1
-
SHA1
6b54f957767952eaf47cca7888910540961cc2d5
-
SHA256
28d1dd3ca9b4495da3ac488e6d0c284807a1b7ae119e8d4a537ede2866f07ddb
-
SHA512
5b012e10f07a13fa697c0972278c0e8c09001ed8e27f11a58cd5520a493df1a7fa967fd2f071c958e4f939980b7fa3f5303448d19a52cc5df35225f2d446a3fb
-
SSDEEP
12288:Ty90P6zuCta2sTIMa8Ltk3KIRj/wSzQ4QXtPencIEA8RWoZVZ1:Ty5zT0Yt3/OSzSQnuA8RzVZ1
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/1152-18-0x0000000004980000-0x000000000499A000-memory.dmp healer behavioral1/memory/1152-20-0x0000000004BD0000-0x0000000004BE8000-memory.dmp healer behavioral1/memory/1152-21-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer behavioral1/memory/1152-46-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer behavioral1/memory/1152-44-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer behavioral1/memory/1152-42-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer behavioral1/memory/1152-40-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer behavioral1/memory/1152-38-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer behavioral1/memory/1152-37-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer behavioral1/memory/1152-34-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer behavioral1/memory/1152-33-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer behavioral1/memory/1152-30-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer behavioral1/memory/1152-28-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer behavioral1/memory/1152-26-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer behavioral1/memory/1152-24-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer behavioral1/memory/1152-22-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer behavioral1/memory/1152-48-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr672242.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr672242.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr672242.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr672242.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr672242.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr672242.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1068-59-0x0000000007110000-0x000000000714C000-memory.dmp family_redline behavioral1/memory/1068-60-0x0000000007190000-0x00000000071CA000-memory.dmp family_redline behavioral1/memory/1068-68-0x0000000007190000-0x00000000071C5000-memory.dmp family_redline behavioral1/memory/1068-66-0x0000000007190000-0x00000000071C5000-memory.dmp family_redline behavioral1/memory/1068-64-0x0000000007190000-0x00000000071C5000-memory.dmp family_redline behavioral1/memory/1068-78-0x0000000007190000-0x00000000071C5000-memory.dmp family_redline behavioral1/memory/1068-94-0x0000000007190000-0x00000000071C5000-memory.dmp family_redline behavioral1/memory/1068-92-0x0000000007190000-0x00000000071C5000-memory.dmp family_redline behavioral1/memory/1068-90-0x0000000007190000-0x00000000071C5000-memory.dmp family_redline behavioral1/memory/1068-88-0x0000000007190000-0x00000000071C5000-memory.dmp family_redline behavioral1/memory/1068-86-0x0000000007190000-0x00000000071C5000-memory.dmp family_redline behavioral1/memory/1068-84-0x0000000007190000-0x00000000071C5000-memory.dmp family_redline behavioral1/memory/1068-82-0x0000000007190000-0x00000000071C5000-memory.dmp family_redline behavioral1/memory/1068-80-0x0000000007190000-0x00000000071C5000-memory.dmp family_redline behavioral1/memory/1068-76-0x0000000007190000-0x00000000071C5000-memory.dmp family_redline behavioral1/memory/1068-74-0x0000000007190000-0x00000000071C5000-memory.dmp family_redline behavioral1/memory/1068-72-0x0000000007190000-0x00000000071C5000-memory.dmp family_redline behavioral1/memory/1068-70-0x0000000007190000-0x00000000071C5000-memory.dmp family_redline behavioral1/memory/1068-62-0x0000000007190000-0x00000000071C5000-memory.dmp family_redline behavioral1/memory/1068-61-0x0000000007190000-0x00000000071C5000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3464 un870073.exe 1152 pr672242.exe 1068 qu014226.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr672242.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr672242.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 28d1dd3ca9b4495da3ac488e6d0c284807a1b7ae119e8d4a537ede2866f07ddb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un870073.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1484 1152 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 28d1dd3ca9b4495da3ac488e6d0c284807a1b7ae119e8d4a537ede2866f07ddb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un870073.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr672242.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu014226.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1152 pr672242.exe 1152 pr672242.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1152 pr672242.exe Token: SeDebugPrivilege 1068 qu014226.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2552 wrote to memory of 3464 2552 28d1dd3ca9b4495da3ac488e6d0c284807a1b7ae119e8d4a537ede2866f07ddb.exe 82 PID 2552 wrote to memory of 3464 2552 28d1dd3ca9b4495da3ac488e6d0c284807a1b7ae119e8d4a537ede2866f07ddb.exe 82 PID 2552 wrote to memory of 3464 2552 28d1dd3ca9b4495da3ac488e6d0c284807a1b7ae119e8d4a537ede2866f07ddb.exe 82 PID 3464 wrote to memory of 1152 3464 un870073.exe 83 PID 3464 wrote to memory of 1152 3464 un870073.exe 83 PID 3464 wrote to memory of 1152 3464 un870073.exe 83 PID 3464 wrote to memory of 1068 3464 un870073.exe 91 PID 3464 wrote to memory of 1068 3464 un870073.exe 91 PID 3464 wrote to memory of 1068 3464 un870073.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\28d1dd3ca9b4495da3ac488e6d0c284807a1b7ae119e8d4a537ede2866f07ddb.exe"C:\Users\Admin\AppData\Local\Temp\28d1dd3ca9b4495da3ac488e6d0c284807a1b7ae119e8d4a537ede2866f07ddb.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un870073.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un870073.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr672242.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr672242.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1152 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1152 -s 10644⤵
- Program crash
PID:1484
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu014226.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu014226.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1068
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1152 -ip 11521⤵PID:2880
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
553KB
MD5764990535e6a290c5a92b7bc61b61b14
SHA14a461467ebedd776a2c531a57f703453a7572f06
SHA256e3f0e0702b8bc3eada9fb35679e56cbd80e07c7f67ee1834254e1d239cbdbc03
SHA5120a04a093a768aa7bdcd1d7c16c7fcdd5f65a4d1281010cd1440bbcc477a3903e647c5d05a02dcda165eaf1b82675272ddefe0cea6f757c88352d870b2ce79bbd
-
Filesize
278KB
MD5b95637933ff70230579a3c572764fdc2
SHA1e31eb9be1b6b881157e9487d0e0ab668b7114df1
SHA256fc3bb9f02f559e2a4d83fe631aebae0cb31a1c58f0a238aa5b291e7bfce193ad
SHA5121c91c410ea1fa6bb0938a075b521e57201c4cf61762245653e78ab1a8a3dbd52bd2739b16b739b171f38a66ebbfbd13db85095bd6aa65f283f475321acb97127
-
Filesize
360KB
MD51121b75943e72e91a7de5ab5d45adf70
SHA1b6799d16ee4f30caa971c2a81b83046867390d02
SHA2564e1869813a69c8b05b7a019cb55e6769d1449413635af4ecd42cb429fb3a54d6
SHA512a9ec13f2fa2e44458baafb12ff68ecef92c290a6d9d52db8462a85baa973c33759e8195b45948ded4dcef6dbad8ab0274e2cc330a25119dfb368029ce6257feb