Analysis
-
max time kernel
114s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 15:30
Static task
static1
Behavioral task
behavioral1
Sample
cd3e7d4469a56a521d6cf67623d78aa6ba6c615d985bbbc51296c2f98513ef50N.exe
Resource
win10v2004-20241007-en
General
-
Target
cd3e7d4469a56a521d6cf67623d78aa6ba6c615d985bbbc51296c2f98513ef50N.exe
-
Size
707KB
-
MD5
91925610e25a2c425f9a5c5dd3016cf0
-
SHA1
709715d3c78309eb18d868ebde3218c04080a752
-
SHA256
cd3e7d4469a56a521d6cf67623d78aa6ba6c615d985bbbc51296c2f98513ef50
-
SHA512
077d55e7c97b63a959d52fda1cf7679c803d7863c04133119cd1a097b05e5bb04fa070d02d8408874d4bba18bb600fe5e16f555eed14ab9f88d8b50436c05fda
-
SSDEEP
12288:Ty90P6zuCta2sTIMa8Ltk3KIRj/wSzQ4QXtPencIEA8RWoZVZ:Ty5zT0Yt3/OSzSQnuA8RzVZ
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4928-17-0x0000000004A70000-0x0000000004A8A000-memory.dmp healer behavioral1/memory/4928-20-0x0000000004B80000-0x0000000004B98000-memory.dmp healer behavioral1/memory/4928-34-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4928-48-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4928-46-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4928-44-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4928-42-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4928-40-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4928-38-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4928-36-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4928-32-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4928-30-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4928-28-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4928-26-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4928-24-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4928-22-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4928-21-0x0000000004B80000-0x0000000004B92000-memory.dmp healer -
Healer family
-
Processes:
pr672242.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr672242.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr672242.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr672242.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr672242.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr672242.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr672242.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/2748-59-0x0000000007130000-0x000000000716C000-memory.dmp family_redline behavioral1/memory/2748-60-0x00000000071B0000-0x00000000071EA000-memory.dmp family_redline behavioral1/memory/2748-70-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/2748-66-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/2748-64-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/2748-62-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/2748-76-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/2748-94-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/2748-92-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/2748-90-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/2748-88-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/2748-86-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/2748-82-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/2748-80-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/2748-79-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/2748-74-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/2748-72-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/2748-68-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/2748-84-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/2748-61-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un870073.exepr672242.exequ014226.exepid Process 3824 un870073.exe 4928 pr672242.exe 2748 qu014226.exe -
Processes:
pr672242.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr672242.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr672242.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
cd3e7d4469a56a521d6cf67623d78aa6ba6c615d985bbbc51296c2f98513ef50N.exeun870073.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cd3e7d4469a56a521d6cf67623d78aa6ba6c615d985bbbc51296c2f98513ef50N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un870073.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 4880 4928 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cd3e7d4469a56a521d6cf67623d78aa6ba6c615d985bbbc51296c2f98513ef50N.exeun870073.exepr672242.exequ014226.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cd3e7d4469a56a521d6cf67623d78aa6ba6c615d985bbbc51296c2f98513ef50N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un870073.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr672242.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu014226.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pr672242.exepid Process 4928 pr672242.exe 4928 pr672242.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pr672242.exequ014226.exedescription pid Process Token: SeDebugPrivilege 4928 pr672242.exe Token: SeDebugPrivilege 2748 qu014226.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
cd3e7d4469a56a521d6cf67623d78aa6ba6c615d985bbbc51296c2f98513ef50N.exeun870073.exedescription pid Process procid_target PID 1432 wrote to memory of 3824 1432 cd3e7d4469a56a521d6cf67623d78aa6ba6c615d985bbbc51296c2f98513ef50N.exe 82 PID 1432 wrote to memory of 3824 1432 cd3e7d4469a56a521d6cf67623d78aa6ba6c615d985bbbc51296c2f98513ef50N.exe 82 PID 1432 wrote to memory of 3824 1432 cd3e7d4469a56a521d6cf67623d78aa6ba6c615d985bbbc51296c2f98513ef50N.exe 82 PID 3824 wrote to memory of 4928 3824 un870073.exe 83 PID 3824 wrote to memory of 4928 3824 un870073.exe 83 PID 3824 wrote to memory of 4928 3824 un870073.exe 83 PID 3824 wrote to memory of 2748 3824 un870073.exe 91 PID 3824 wrote to memory of 2748 3824 un870073.exe 91 PID 3824 wrote to memory of 2748 3824 un870073.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd3e7d4469a56a521d6cf67623d78aa6ba6c615d985bbbc51296c2f98513ef50N.exe"C:\Users\Admin\AppData\Local\Temp\cd3e7d4469a56a521d6cf67623d78aa6ba6c615d985bbbc51296c2f98513ef50N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un870073.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un870073.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr672242.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr672242.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4928 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4928 -s 10924⤵
- Program crash
PID:4880
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu014226.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu014226.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2748
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4928 -ip 49281⤵PID:2428
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
553KB
MD5764990535e6a290c5a92b7bc61b61b14
SHA14a461467ebedd776a2c531a57f703453a7572f06
SHA256e3f0e0702b8bc3eada9fb35679e56cbd80e07c7f67ee1834254e1d239cbdbc03
SHA5120a04a093a768aa7bdcd1d7c16c7fcdd5f65a4d1281010cd1440bbcc477a3903e647c5d05a02dcda165eaf1b82675272ddefe0cea6f757c88352d870b2ce79bbd
-
Filesize
278KB
MD5b95637933ff70230579a3c572764fdc2
SHA1e31eb9be1b6b881157e9487d0e0ab668b7114df1
SHA256fc3bb9f02f559e2a4d83fe631aebae0cb31a1c58f0a238aa5b291e7bfce193ad
SHA5121c91c410ea1fa6bb0938a075b521e57201c4cf61762245653e78ab1a8a3dbd52bd2739b16b739b171f38a66ebbfbd13db85095bd6aa65f283f475321acb97127
-
Filesize
360KB
MD51121b75943e72e91a7de5ab5d45adf70
SHA1b6799d16ee4f30caa971c2a81b83046867390d02
SHA2564e1869813a69c8b05b7a019cb55e6769d1449413635af4ecd42cb429fb3a54d6
SHA512a9ec13f2fa2e44458baafb12ff68ecef92c290a6d9d52db8462a85baa973c33759e8195b45948ded4dcef6dbad8ab0274e2cc330a25119dfb368029ce6257feb