Analysis

  • max time kernel
    144s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-11-2024 13:51

General

  • Target

    71158b38a33d1d8a245fb87b34c4bc308ae4f4677e27d9653fce877af52b04eb.exe

  • Size

    694KB

  • MD5

    db0a3ab1ecc9016cd406d8ee8d500739

  • SHA1

    aca142d0ee07098cea6f1a525a9ce3e683861a8b

  • SHA256

    71158b38a33d1d8a245fb87b34c4bc308ae4f4677e27d9653fce877af52b04eb

  • SHA512

    3f3ad90a85d52977728f0600158af2da3994af422fbb9c76e2eff5e33455544fc26af09fe6a9c93fb64eb3d4c0b68c22e9f1d2c606d3ff75f77ae573e2e080fe

  • SSDEEP

    12288:ay90cmp1cgFePaUeWbEJWa83oMRmNmQT7DllaMxUB5zhZi9SY:ayocSWaUeWbvzoMkNJJXWRY

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\71158b38a33d1d8a245fb87b34c4bc308ae4f4677e27d9653fce877af52b04eb.exe
    "C:\Users\Admin\AppData\Local\Temp\71158b38a33d1d8a245fb87b34c4bc308ae4f4677e27d9653fce877af52b04eb.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:876
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un853150.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un853150.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1896
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr478867.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr478867.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3876
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3876 -s 1084
          4⤵
          • Program crash
          PID:976
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu456147.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu456147.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1912
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3876 -ip 3876
    1⤵
      PID:2380

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un853150.exe

      Filesize

      541KB

      MD5

      bcdef6c5da03c91b6c4ee75e21188a2f

      SHA1

      61f02c00cd4e163856a7dae3fa482af834af23e1

      SHA256

      e429f2e0dec4d872451a292059647d02c65b0d527f3831e5e49201b437c23a69

      SHA512

      ebcbba84cd21abdef4bf8d43434920967ec51a93c5305f094ff9bc0b282a13bf205de39911a1da6784b5024d6ccd2233d332e43ee66d97209c580bdc5d59d3f2

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr478867.exe

      Filesize

      278KB

      MD5

      55035719f1967b40a21bd260f4e40da8

      SHA1

      3db0f8d1d38a37c525391720b30de411534138c5

      SHA256

      b6ebebb7b32f21a0a50795dd1d19d91820ee04991769113a87c8f5f7f2cbede7

      SHA512

      7e22f6e49056f48ca0eeaa045c555a688b54208c0919151916bf2543e7d5dc7bc6496a5185b6aa3169d3d83364185f6e70eb5223f61b87d27ea8af416f1a2985

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu456147.exe

      Filesize

      361KB

      MD5

      88d1ca5e656cd3223240e232767762ea

      SHA1

      0e52da74d0a30764cd88a2db1b2857f7f6cf971d

      SHA256

      ceb49b2729f99910f489e86cfa97b19fdb81637b36acf96a644a6537dc297a4a

      SHA512

      24a76563d8a0cf8d3d5de24d1392ca953839fe507f5b0c49381dafcfa53c8ebd0758bf1586d3ec3b8e3ed14e072cb07eca642c5ecf82324a6e262516d652b54c

    • memory/1912-89-0x00000000071B0000-0x00000000071E5000-memory.dmp

      Filesize

      212KB

    • memory/1912-77-0x00000000071B0000-0x00000000071E5000-memory.dmp

      Filesize

      212KB

    • memory/1912-855-0x000000000A350000-0x000000000A362000-memory.dmp

      Filesize

      72KB

    • memory/1912-854-0x0000000009D30000-0x000000000A348000-memory.dmp

      Filesize

      6.1MB

    • memory/1912-62-0x00000000071B0000-0x00000000071E5000-memory.dmp

      Filesize

      212KB

    • memory/1912-63-0x00000000071B0000-0x00000000071E5000-memory.dmp

      Filesize

      212KB

    • memory/1912-65-0x00000000071B0000-0x00000000071E5000-memory.dmp

      Filesize

      212KB

    • memory/1912-67-0x00000000071B0000-0x00000000071E5000-memory.dmp

      Filesize

      212KB

    • memory/1912-69-0x00000000071B0000-0x00000000071E5000-memory.dmp

      Filesize

      212KB

    • memory/1912-71-0x00000000071B0000-0x00000000071E5000-memory.dmp

      Filesize

      212KB

    • memory/1912-857-0x000000000A490000-0x000000000A4CC000-memory.dmp

      Filesize

      240KB

    • memory/1912-858-0x00000000047F0000-0x000000000483C000-memory.dmp

      Filesize

      304KB

    • memory/1912-73-0x00000000071B0000-0x00000000071E5000-memory.dmp

      Filesize

      212KB

    • memory/1912-856-0x000000000A370000-0x000000000A47A000-memory.dmp

      Filesize

      1.0MB

    • memory/1912-79-0x00000000071B0000-0x00000000071E5000-memory.dmp

      Filesize

      212KB

    • memory/1912-82-0x00000000071B0000-0x00000000071E5000-memory.dmp

      Filesize

      212KB

    • memory/1912-83-0x00000000071B0000-0x00000000071E5000-memory.dmp

      Filesize

      212KB

    • memory/1912-85-0x00000000071B0000-0x00000000071E5000-memory.dmp

      Filesize

      212KB

    • memory/1912-87-0x00000000071B0000-0x00000000071E5000-memory.dmp

      Filesize

      212KB

    • memory/1912-91-0x00000000071B0000-0x00000000071E5000-memory.dmp

      Filesize

      212KB

    • memory/1912-93-0x00000000071B0000-0x00000000071E5000-memory.dmp

      Filesize

      212KB

    • memory/1912-95-0x00000000071B0000-0x00000000071E5000-memory.dmp

      Filesize

      212KB

    • memory/1912-75-0x00000000071B0000-0x00000000071E5000-memory.dmp

      Filesize

      212KB

    • memory/1912-61-0x00000000071B0000-0x00000000071EA000-memory.dmp

      Filesize

      232KB

    • memory/1912-60-0x0000000004BC0000-0x0000000004BFC000-memory.dmp

      Filesize

      240KB

    • memory/3876-38-0x0000000007290000-0x00000000072A2000-memory.dmp

      Filesize

      72KB

    • memory/3876-54-0x0000000000400000-0x0000000002BA6000-memory.dmp

      Filesize

      39.6MB

    • memory/3876-55-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/3876-52-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/3876-50-0x0000000000400000-0x0000000002BA6000-memory.dmp

      Filesize

      39.6MB

    • memory/3876-51-0x0000000002BB0000-0x0000000002BDD000-memory.dmp

      Filesize

      180KB

    • memory/3876-49-0x0000000002DD0000-0x0000000002ED0000-memory.dmp

      Filesize

      1024KB

    • memory/3876-21-0x0000000007290000-0x00000000072A2000-memory.dmp

      Filesize

      72KB

    • memory/3876-22-0x0000000007290000-0x00000000072A2000-memory.dmp

      Filesize

      72KB

    • memory/3876-24-0x0000000007290000-0x00000000072A2000-memory.dmp

      Filesize

      72KB

    • memory/3876-26-0x0000000007290000-0x00000000072A2000-memory.dmp

      Filesize

      72KB

    • memory/3876-28-0x0000000007290000-0x00000000072A2000-memory.dmp

      Filesize

      72KB

    • memory/3876-48-0x0000000007290000-0x00000000072A2000-memory.dmp

      Filesize

      72KB

    • memory/3876-32-0x0000000007290000-0x00000000072A2000-memory.dmp

      Filesize

      72KB

    • memory/3876-34-0x0000000007290000-0x00000000072A2000-memory.dmp

      Filesize

      72KB

    • memory/3876-36-0x0000000007290000-0x00000000072A2000-memory.dmp

      Filesize

      72KB

    • memory/3876-40-0x0000000007290000-0x00000000072A2000-memory.dmp

      Filesize

      72KB

    • memory/3876-42-0x0000000007290000-0x00000000072A2000-memory.dmp

      Filesize

      72KB

    • memory/3876-44-0x0000000007290000-0x00000000072A2000-memory.dmp

      Filesize

      72KB

    • memory/3876-46-0x0000000007290000-0x00000000072A2000-memory.dmp

      Filesize

      72KB

    • memory/3876-31-0x0000000007290000-0x00000000072A2000-memory.dmp

      Filesize

      72KB

    • memory/3876-20-0x0000000007290000-0x00000000072A8000-memory.dmp

      Filesize

      96KB

    • memory/3876-19-0x0000000007380000-0x0000000007924000-memory.dmp

      Filesize

      5.6MB

    • memory/3876-18-0x0000000004990000-0x00000000049AA000-memory.dmp

      Filesize

      104KB

    • memory/3876-17-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/3876-16-0x0000000002BB0000-0x0000000002BDD000-memory.dmp

      Filesize

      180KB

    • memory/3876-15-0x0000000002DD0000-0x0000000002ED0000-memory.dmp

      Filesize

      1024KB