Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 00:41
Static task
static1
Behavioral task
behavioral1
Sample
30dca1a27e967f1985f9e10b4fa54f1a73a9de59d8303152fb0cdded054abcf9.exe
Resource
win10v2004-20241007-en
General
-
Target
30dca1a27e967f1985f9e10b4fa54f1a73a9de59d8303152fb0cdded054abcf9.exe
-
Size
702KB
-
MD5
fae1766f0fa762b9ffa72c2e02c8584a
-
SHA1
63e69ee757342c008ec9d9bd2bb4601a6d482123
-
SHA256
30dca1a27e967f1985f9e10b4fa54f1a73a9de59d8303152fb0cdded054abcf9
-
SHA512
968513775bdc84ff2082eca9dd1bfe5df17a681a816d88c528a06efbada7c17accc86801c76512a7be0822a4c66ff336bc313542d747d61255fcfeb857285829
-
SSDEEP
12288:Py90wozfqMznx4Wq8J5HPq+ayba1ESMWn/VSn1yImtTBDKX:PyBojHznx4WqkHPq+aYa1EVW/V41yImI
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/1132-18-0x0000000004BD0000-0x0000000004BEA000-memory.dmp healer behavioral1/memory/1132-20-0x0000000007150000-0x0000000007168000-memory.dmp healer behavioral1/memory/1132-21-0x0000000007150000-0x0000000007162000-memory.dmp healer behavioral1/memory/1132-48-0x0000000007150000-0x0000000007162000-memory.dmp healer behavioral1/memory/1132-46-0x0000000007150000-0x0000000007162000-memory.dmp healer behavioral1/memory/1132-44-0x0000000007150000-0x0000000007162000-memory.dmp healer behavioral1/memory/1132-42-0x0000000007150000-0x0000000007162000-memory.dmp healer behavioral1/memory/1132-40-0x0000000007150000-0x0000000007162000-memory.dmp healer behavioral1/memory/1132-38-0x0000000007150000-0x0000000007162000-memory.dmp healer behavioral1/memory/1132-34-0x0000000007150000-0x0000000007162000-memory.dmp healer behavioral1/memory/1132-32-0x0000000007150000-0x0000000007162000-memory.dmp healer behavioral1/memory/1132-30-0x0000000007150000-0x0000000007162000-memory.dmp healer behavioral1/memory/1132-28-0x0000000007150000-0x0000000007162000-memory.dmp healer behavioral1/memory/1132-26-0x0000000007150000-0x0000000007162000-memory.dmp healer behavioral1/memory/1132-24-0x0000000007150000-0x0000000007162000-memory.dmp healer behavioral1/memory/1132-22-0x0000000007150000-0x0000000007162000-memory.dmp healer behavioral1/memory/1132-36-0x0000000007150000-0x0000000007162000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr436229.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr436229.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr436229.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr436229.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr436229.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr436229.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2328-60-0x0000000007150000-0x000000000718C000-memory.dmp family_redline behavioral1/memory/2328-61-0x00000000071D0000-0x000000000720A000-memory.dmp family_redline behavioral1/memory/2328-75-0x00000000071D0000-0x0000000007205000-memory.dmp family_redline behavioral1/memory/2328-83-0x00000000071D0000-0x0000000007205000-memory.dmp family_redline behavioral1/memory/2328-93-0x00000000071D0000-0x0000000007205000-memory.dmp family_redline behavioral1/memory/2328-91-0x00000000071D0000-0x0000000007205000-memory.dmp family_redline behavioral1/memory/2328-89-0x00000000071D0000-0x0000000007205000-memory.dmp family_redline behavioral1/memory/2328-87-0x00000000071D0000-0x0000000007205000-memory.dmp family_redline behavioral1/memory/2328-85-0x00000000071D0000-0x0000000007205000-memory.dmp family_redline behavioral1/memory/2328-81-0x00000000071D0000-0x0000000007205000-memory.dmp family_redline behavioral1/memory/2328-79-0x00000000071D0000-0x0000000007205000-memory.dmp family_redline behavioral1/memory/2328-77-0x00000000071D0000-0x0000000007205000-memory.dmp family_redline behavioral1/memory/2328-73-0x00000000071D0000-0x0000000007205000-memory.dmp family_redline behavioral1/memory/2328-71-0x00000000071D0000-0x0000000007205000-memory.dmp family_redline behavioral1/memory/2328-69-0x00000000071D0000-0x0000000007205000-memory.dmp family_redline behavioral1/memory/2328-67-0x00000000071D0000-0x0000000007205000-memory.dmp family_redline behavioral1/memory/2328-95-0x00000000071D0000-0x0000000007205000-memory.dmp family_redline behavioral1/memory/2328-65-0x00000000071D0000-0x0000000007205000-memory.dmp family_redline behavioral1/memory/2328-63-0x00000000071D0000-0x0000000007205000-memory.dmp family_redline behavioral1/memory/2328-62-0x00000000071D0000-0x0000000007205000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 960 un022183.exe 1132 pr436229.exe 2328 qu313490.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr436229.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr436229.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 30dca1a27e967f1985f9e10b4fa54f1a73a9de59d8303152fb0cdded054abcf9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un022183.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1188 1132 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 30dca1a27e967f1985f9e10b4fa54f1a73a9de59d8303152fb0cdded054abcf9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un022183.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr436229.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu313490.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1132 pr436229.exe 1132 pr436229.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1132 pr436229.exe Token: SeDebugPrivilege 2328 qu313490.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 228 wrote to memory of 960 228 30dca1a27e967f1985f9e10b4fa54f1a73a9de59d8303152fb0cdded054abcf9.exe 85 PID 228 wrote to memory of 960 228 30dca1a27e967f1985f9e10b4fa54f1a73a9de59d8303152fb0cdded054abcf9.exe 85 PID 228 wrote to memory of 960 228 30dca1a27e967f1985f9e10b4fa54f1a73a9de59d8303152fb0cdded054abcf9.exe 85 PID 960 wrote to memory of 1132 960 un022183.exe 86 PID 960 wrote to memory of 1132 960 un022183.exe 86 PID 960 wrote to memory of 1132 960 un022183.exe 86 PID 960 wrote to memory of 2328 960 un022183.exe 99 PID 960 wrote to memory of 2328 960 un022183.exe 99 PID 960 wrote to memory of 2328 960 un022183.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\30dca1a27e967f1985f9e10b4fa54f1a73a9de59d8303152fb0cdded054abcf9.exe"C:\Users\Admin\AppData\Local\Temp\30dca1a27e967f1985f9e10b4fa54f1a73a9de59d8303152fb0cdded054abcf9.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un022183.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un022183.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr436229.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr436229.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1132 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1132 -s 10804⤵
- Program crash
PID:1188
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu313490.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu313490.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2328
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1132 -ip 11321⤵PID:5116
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
549KB
MD598496729e01ed34277712f28d6786688
SHA1155c3379cb7c7f738466f7e1a9957b9d223303cc
SHA256c7f037f5369c79f7e94e873bdae7ea8162f6839e44039309f905c1c2b6c43f1a
SHA512ccc27d89a407cc4a378f8f8d24b2cfc8118b8cebbc2d5d70583cfe2bef6b878926d137e9083892b65980c4052dda38ef6c6d14d8be9eadd54a9ecae92f0b2ff8
-
Filesize
286KB
MD5a4e6bace08d60a4135e938866bc03abe
SHA1ec55a6744895bf4067d97c9a967d6adc1f5aa249
SHA2567117136e1e10c6715adc81242a9f36b83188cbc83f08103efddd70a45f143ddf
SHA5127dfec9078460efff59683c55435a1570ff116043a4cf4a3e13ef84195748f4c1d8e3b615baf35b6bb9d75297eede5945bf2f510e940bfc71a3a1c0a4312ae50e
-
Filesize
368KB
MD50847c24197be0166fb6c107f2b8491b4
SHA1cec8c1524422f8ccc973b5e57fe3845a9b56246f
SHA2566d0543fcfb8f3d80d96510eec10d28b25558e28cb6f9175c70c092a74bf82f61
SHA5122eefe6dc715a4d33cb002f46b95ceac77f307896797cdc94904ed5def470519425b4db24c9a2d6fe88826e2d345e3f02b62c905d0737faec59daf0fb706699c8