Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-10-2024 22:00

General

  • Target

    0ad768060c70d8d1e51fc1d968b61a1a3755455c8c2a6f813c061f7fa19323d6.exe

  • Size

    1.0MB

  • MD5

    aff8b61b9cbfc22b8aa24d134701bc38

  • SHA1

    6e23d0ce463e776d69cb1f244a5b7bdbd6345d32

  • SHA256

    0ad768060c70d8d1e51fc1d968b61a1a3755455c8c2a6f813c061f7fa19323d6

  • SHA512

    6bb5e655dbd51066bcfab7a474517e5ff15e55255910ec96543ab41f0b7e7a87ee83227d280a14e719ded22697b0b7cbc95ad664b290d7cca4426e885eb36866

  • SSDEEP

    24576:dy+Kr1jRoM6Ubj3i4WX6BU8btDZEjTdRCLFf6:4fKM6UbMX6BU8bV6jTds

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 4 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0ad768060c70d8d1e51fc1d968b61a1a3755455c8c2a6f813c061f7fa19323d6.exe
    "C:\Users\Admin\AppData\Local\Temp\0ad768060c70d8d1e51fc1d968b61a1a3755455c8c2a6f813c061f7fa19323d6.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3620
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un339856.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un339856.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2344
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un644713.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un644713.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3940
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr625402.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr625402.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3344
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3344 -s 1064
            5⤵
            • Program crash
            PID:3156
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu756415.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu756415.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:2060
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3344 -ip 3344
    1⤵
      PID:4744

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un339856.exe

      Filesize

      761KB

      MD5

      7af0238458ea0c5b608c1142a45c93bd

      SHA1

      d748e1e380737bdde4ac72bdf4338e1003ee2ac7

      SHA256

      df67c776250674bd4979c615bf5c5be3503bc7aea2b2e8907b949fa7c3d4577f

      SHA512

      f482242265646afd7fa5a029ef6131daef720101e672c11ce9ab8380720deaee4991d8b50801fcc676f9a98f1c9cc6c7f9ad5ea7d8ef7e0937c22d6666c4a4a5

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un644713.exe

      Filesize

      607KB

      MD5

      4620c25adc0f5320e8fb5430701dbd56

      SHA1

      99fd99f5ab015570a02181a2b4565727e48e1b1a

      SHA256

      0db90983e3df55577f98b560e42a04db539e89cf6b5d7172120e9dd5f5e8d256

      SHA512

      edaceb95df565a4c6f8394a86c94320e331b7dfb6cd9fce072ee65d0e26a9d012e4fb677388e50561884724d19b578178df4739ecb6922f3354baddd98bb3333

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr625402.exe

      Filesize

      405KB

      MD5

      b6a83e1f71e94863f5e0c3283a3239ef

      SHA1

      29c007b4bb8a7474081134d055c3814cc8fcd041

      SHA256

      9e8d0193daa660a3a83df5d6f101a63c54efd70991f7a96f58987b7cb8d12160

      SHA512

      973dfc4b29e3d0d7b49e01748adf3d309fe0315c49691225dd0000764c8b1710a5ee7db80d3ad530c60df123ffaefc77ba0988e6200144fec516ba462ad35ada

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu756415.exe

      Filesize

      488KB

      MD5

      066b99e5b55587478e3881cbaf58b2f2

      SHA1

      3bce90751a632e60fe6d87a7f3c9301cd15a4031

      SHA256

      40ae794fb1dfceed7bc191f26e643f4942da2b6b3f873de0aa325e7b56453fb1

      SHA512

      829ef5511ac2bf7e913f74760a1c9fc8a05d23ffcee732f796e7deb4e85c37ab4c53d023a10ecbdc158030acb0e88ef4935c490a80673838b38ebaa31bae38c7

    • memory/2060-69-0x0000000004E40000-0x0000000004E75000-memory.dmp

      Filesize

      212KB

    • memory/2060-77-0x0000000004E40000-0x0000000004E75000-memory.dmp

      Filesize

      212KB

    • memory/2060-857-0x0000000007FA0000-0x0000000007FB2000-memory.dmp

      Filesize

      72KB

    • memory/2060-856-0x0000000007940000-0x0000000007F58000-memory.dmp

      Filesize

      6.1MB

    • memory/2060-64-0x0000000004E40000-0x0000000004E75000-memory.dmp

      Filesize

      212KB

    • memory/2060-65-0x0000000004E40000-0x0000000004E75000-memory.dmp

      Filesize

      212KB

    • memory/2060-67-0x0000000004E40000-0x0000000004E75000-memory.dmp

      Filesize

      212KB

    • memory/2060-87-0x0000000004E40000-0x0000000004E75000-memory.dmp

      Filesize

      212KB

    • memory/2060-859-0x00000000080E0000-0x000000000811C000-memory.dmp

      Filesize

      240KB

    • memory/2060-97-0x0000000004E40000-0x0000000004E75000-memory.dmp

      Filesize

      212KB

    • memory/2060-79-0x0000000004E40000-0x0000000004E75000-memory.dmp

      Filesize

      212KB

    • memory/2060-71-0x0000000004E40000-0x0000000004E75000-memory.dmp

      Filesize

      212KB

    • memory/2060-75-0x0000000004E40000-0x0000000004E75000-memory.dmp

      Filesize

      212KB

    • memory/2060-858-0x0000000007FC0000-0x00000000080CA000-memory.dmp

      Filesize

      1.0MB

    • memory/2060-81-0x0000000004E40000-0x0000000004E75000-memory.dmp

      Filesize

      212KB

    • memory/2060-83-0x0000000004E40000-0x0000000004E75000-memory.dmp

      Filesize

      212KB

    • memory/2060-85-0x0000000004E40000-0x0000000004E75000-memory.dmp

      Filesize

      212KB

    • memory/2060-89-0x0000000004E40000-0x0000000004E75000-memory.dmp

      Filesize

      212KB

    • memory/2060-91-0x0000000004E40000-0x0000000004E75000-memory.dmp

      Filesize

      212KB

    • memory/2060-93-0x0000000004E40000-0x0000000004E75000-memory.dmp

      Filesize

      212KB

    • memory/2060-860-0x00000000027F0000-0x000000000283C000-memory.dmp

      Filesize

      304KB

    • memory/2060-95-0x0000000004E40000-0x0000000004E75000-memory.dmp

      Filesize

      212KB

    • memory/2060-62-0x0000000002A00000-0x0000000002A3C000-memory.dmp

      Filesize

      240KB

    • memory/2060-63-0x0000000004E40000-0x0000000004E7A000-memory.dmp

      Filesize

      232KB

    • memory/2060-73-0x0000000004E40000-0x0000000004E75000-memory.dmp

      Filesize

      212KB

    • memory/3344-47-0x0000000002720000-0x0000000002732000-memory.dmp

      Filesize

      72KB

    • memory/3344-57-0x0000000000400000-0x000000000080A000-memory.dmp

      Filesize

      4.0MB

    • memory/3344-54-0x0000000000400000-0x000000000080A000-memory.dmp

      Filesize

      4.0MB

    • memory/3344-55-0x0000000000890000-0x0000000000990000-memory.dmp

      Filesize

      1024KB

    • memory/3344-34-0x0000000002720000-0x0000000002732000-memory.dmp

      Filesize

      72KB

    • memory/3344-27-0x0000000002720000-0x0000000002732000-memory.dmp

      Filesize

      72KB

    • memory/3344-29-0x0000000002720000-0x0000000002732000-memory.dmp

      Filesize

      72KB

    • memory/3344-31-0x0000000002720000-0x0000000002732000-memory.dmp

      Filesize

      72KB

    • memory/3344-37-0x0000000002720000-0x0000000002732000-memory.dmp

      Filesize

      72KB

    • memory/3344-39-0x0000000002720000-0x0000000002732000-memory.dmp

      Filesize

      72KB

    • memory/3344-41-0x0000000002720000-0x0000000002732000-memory.dmp

      Filesize

      72KB

    • memory/3344-44-0x0000000002720000-0x0000000002732000-memory.dmp

      Filesize

      72KB

    • memory/3344-45-0x0000000002720000-0x0000000002732000-memory.dmp

      Filesize

      72KB

    • memory/3344-49-0x0000000002720000-0x0000000002732000-memory.dmp

      Filesize

      72KB

    • memory/3344-52-0x0000000002720000-0x0000000002732000-memory.dmp

      Filesize

      72KB

    • memory/3344-53-0x0000000002720000-0x0000000002732000-memory.dmp

      Filesize

      72KB

    • memory/3344-26-0x0000000002720000-0x0000000002732000-memory.dmp

      Filesize

      72KB

    • memory/3344-36-0x0000000002720000-0x0000000002732000-memory.dmp

      Filesize

      72KB

    • memory/3344-25-0x0000000002720000-0x0000000002738000-memory.dmp

      Filesize

      96KB

    • memory/3344-24-0x0000000004F40000-0x00000000054E4000-memory.dmp

      Filesize

      5.6MB

    • memory/3344-23-0x0000000002510000-0x000000000252A000-memory.dmp

      Filesize

      104KB

    • memory/3344-22-0x0000000000890000-0x0000000000990000-memory.dmp

      Filesize

      1024KB