Analysis
-
max time kernel
120s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 07:46
Static task
static1
Behavioral task
behavioral1
Sample
30170679e4ec96c1a340a567ffff904878a150a3537af5651dadff803374e79d.exe
Resource
win10v2004-20241007-en
General
-
Target
30170679e4ec96c1a340a567ffff904878a150a3537af5651dadff803374e79d.exe
-
Size
764KB
-
MD5
dfde52ac16f9194baee325a3bc984063
-
SHA1
4f825c296b86ff33db743a285e906b0f949316ca
-
SHA256
30170679e4ec96c1a340a567ffff904878a150a3537af5651dadff803374e79d
-
SHA512
fb4f016b7fddf0ca0733ed9f54394905bb58d7ea28939540ab6c06bf6436369575eac32c60ca87f7526ab35c42802a0aa72359d8ebe87699250143fef469a9a0
-
SSDEEP
12288:Yy90xBllvPMFMotocoLoBZUnNBwNGpgcdTY+TIthcrv6WbbJgJcaveIIlttUrUC/:YyEllsF3GJ/HwAO+dj6I9gHm1ltg/
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/5008-19-0x00000000025E0000-0x00000000025FA000-memory.dmp healer behavioral1/memory/5008-21-0x0000000002960000-0x0000000002978000-memory.dmp healer behavioral1/memory/5008-39-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/5008-47-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/5008-49-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/5008-46-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/5008-43-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/5008-41-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/5008-33-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/5008-31-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/5008-29-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/5008-27-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/5008-25-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/5008-23-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/5008-22-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/5008-37-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/5008-35-0x0000000002960000-0x0000000002972000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr195717.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr195717.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr195717.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr195717.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr195717.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr195717.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4732-61-0x0000000002790000-0x00000000027CC000-memory.dmp family_redline behavioral1/memory/4732-62-0x0000000004DE0000-0x0000000004E1A000-memory.dmp family_redline behavioral1/memory/4732-74-0x0000000004DE0000-0x0000000004E15000-memory.dmp family_redline behavioral1/memory/4732-76-0x0000000004DE0000-0x0000000004E15000-memory.dmp family_redline behavioral1/memory/4732-96-0x0000000004DE0000-0x0000000004E15000-memory.dmp family_redline behavioral1/memory/4732-94-0x0000000004DE0000-0x0000000004E15000-memory.dmp family_redline behavioral1/memory/4732-92-0x0000000004DE0000-0x0000000004E15000-memory.dmp family_redline behavioral1/memory/4732-90-0x0000000004DE0000-0x0000000004E15000-memory.dmp family_redline behavioral1/memory/4732-88-0x0000000004DE0000-0x0000000004E15000-memory.dmp family_redline behavioral1/memory/4732-86-0x0000000004DE0000-0x0000000004E15000-memory.dmp family_redline behavioral1/memory/4732-84-0x0000000004DE0000-0x0000000004E15000-memory.dmp family_redline behavioral1/memory/4732-82-0x0000000004DE0000-0x0000000004E15000-memory.dmp family_redline behavioral1/memory/4732-80-0x0000000004DE0000-0x0000000004E15000-memory.dmp family_redline behavioral1/memory/4732-78-0x0000000004DE0000-0x0000000004E15000-memory.dmp family_redline behavioral1/memory/4732-72-0x0000000004DE0000-0x0000000004E15000-memory.dmp family_redline behavioral1/memory/4732-70-0x0000000004DE0000-0x0000000004E15000-memory.dmp family_redline behavioral1/memory/4732-68-0x0000000004DE0000-0x0000000004E15000-memory.dmp family_redline behavioral1/memory/4732-66-0x0000000004DE0000-0x0000000004E15000-memory.dmp family_redline behavioral1/memory/4732-64-0x0000000004DE0000-0x0000000004E15000-memory.dmp family_redline behavioral1/memory/4732-63-0x0000000004DE0000-0x0000000004E15000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3492 un367032.exe 5008 pr195717.exe 4732 qu506715.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr195717.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr195717.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 30170679e4ec96c1a340a567ffff904878a150a3537af5651dadff803374e79d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un367032.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3420 5008 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 30170679e4ec96c1a340a567ffff904878a150a3537af5651dadff803374e79d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un367032.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr195717.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu506715.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5008 pr195717.exe 5008 pr195717.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5008 pr195717.exe Token: SeDebugPrivilege 4732 qu506715.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1600 wrote to memory of 3492 1600 30170679e4ec96c1a340a567ffff904878a150a3537af5651dadff803374e79d.exe 84 PID 1600 wrote to memory of 3492 1600 30170679e4ec96c1a340a567ffff904878a150a3537af5651dadff803374e79d.exe 84 PID 1600 wrote to memory of 3492 1600 30170679e4ec96c1a340a567ffff904878a150a3537af5651dadff803374e79d.exe 84 PID 3492 wrote to memory of 5008 3492 un367032.exe 86 PID 3492 wrote to memory of 5008 3492 un367032.exe 86 PID 3492 wrote to memory of 5008 3492 un367032.exe 86 PID 3492 wrote to memory of 4732 3492 un367032.exe 95 PID 3492 wrote to memory of 4732 3492 un367032.exe 95 PID 3492 wrote to memory of 4732 3492 un367032.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\30170679e4ec96c1a340a567ffff904878a150a3537af5651dadff803374e79d.exe"C:\Users\Admin\AppData\Local\Temp\30170679e4ec96c1a340a567ffff904878a150a3537af5651dadff803374e79d.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un367032.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un367032.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr195717.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr195717.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5008 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5008 -s 10844⤵
- Program crash
PID:3420
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu506715.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu506715.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4732
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5008 -ip 50081⤵PID:2740
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
610KB
MD5386dddbc58a1b21e2ab686ea0c06dc21
SHA1126fa8a69f5560c1c5445e3fafd99e5a15cfc844
SHA2561653ce05261e5f77288d1ed1cc43175e9d6aefd589d4ab4f8b689a64448e901f
SHA51246e4df15c765ca29c6b30a0b44e1d08e0d5a7b79cd4b454aa21b2de4126d49f08d5c0bd18c99c8c41fcf9c402d835deb9ccf1c238e5a8767ea1c912a2f203e3e
-
Filesize
403KB
MD5e2c468607d537a7e7cdebce8399ff235
SHA16216df552053619985cb93d412bd49e15300d469
SHA256a1779b0207832fca1050bfa7404830502b0c7fdcc78670d35725335584ccd27d
SHA5124494ef43b36e91626c7d21db45e875ed9c1978207863d37d83f43cca25a25a0bf5fe63c0ca361ee857528293f7bb74c027b518291680e7a0cfe41ad3d926514c
-
Filesize
486KB
MD5d6c1451f317769904578f1b2b96ebe5f
SHA1515e246d65950cfffe0900ae5adb58bee0d374d4
SHA25676c4dcde5b928428ce52f5e5ce81e306b64272be2ac75cb4da89a6865df75e1f
SHA512e76a7b2166137836d0ecffd912d0199a2f301000d1daafb53ff964d1be4721cdc6bbf3384226c05c29802b6a8626b00a19164fd48c01a570264b52f87add845e