Analysis

  • max time kernel
    143s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/11/2024, 03:47

General

  • Target

    a7f387c0f2574f8663005de7101e429305e39117ca84a4246fcd0f93541bba21.exe

  • Size

    706KB

  • MD5

    33079571dd5aafa1d08ac91328ea3acf

  • SHA1

    4283c73ea9c748301735f16857518444d492e6a8

  • SHA256

    a7f387c0f2574f8663005de7101e429305e39117ca84a4246fcd0f93541bba21

  • SHA512

    17d14040890dd2832ae95354d774fde043699e1402d9230f2d7fc09049017e63f99cadb3d7463e1dcf1576d3e8bd55e57ad3bd8a58e55df9be18bf65ef9a1342

  • SSDEEP

    12288:Yy90rKiULXOFxEFzs+sEpUadVNvbK1grCiU5O7ABPGOjYw4tz:YywBUiHEp9saUwvvbKaU5AIPbu

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a7f387c0f2574f8663005de7101e429305e39117ca84a4246fcd0f93541bba21.exe
    "C:\Users\Admin\AppData\Local\Temp\a7f387c0f2574f8663005de7101e429305e39117ca84a4246fcd0f93541bba21.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1968
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un880018.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un880018.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1548
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr953577.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr953577.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3504
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3504 -s 1080
          4⤵
          • Program crash
          PID:2384
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu330721.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu330721.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2196
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3504 -ip 3504
    1⤵
      PID:3312

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un880018.exe

            Filesize

            552KB

            MD5

            de3c2c72336d1c423e2d460446007de3

            SHA1

            48f91ed28921f83b807469060694a559bf94cdae

            SHA256

            babcda7c3e32d3f2f9ceb5bfcc29294475a5529afed39fa1cbcc0b619a21aff9

            SHA512

            094dd1c765a88df2e3f54f12b84b355feb1edb6dbb39cfc27345c20041f778b57df4f49cdb2db4e916451df7ca73c49781df473566c120a9857a7733ecca97a7

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr953577.exe

            Filesize

            299KB

            MD5

            44328a49e6eb8384e35adfa3e19b9495

            SHA1

            b45ee412603a3b5d7fe93491db746a1c8acba59b

            SHA256

            61f871c0542a8fcc6ea81fc869d95fbae3af50dc87cde48326a99c24d952fb42

            SHA512

            5c820fa684ed83440eb91a139e05101dbd5113eb7bf844a0e013d2561b56acf3d49ed4de89a5ac2599bcd7664ec590e7d7b898a2bcd34fdc6383091114e1a0df

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu330721.exe

            Filesize

            381KB

            MD5

            dab3e79815b33249c49762a326249940

            SHA1

            9843704b17e34915050722b67dbda209a8133bd7

            SHA256

            f13ab08a3aa121d4e3ff4c538f6bbd2769da1dc35d9c55e2501743101da058ed

            SHA512

            9fc3c600d2360795c9d240a100bcdb1d31c07fec1290ab3a7348a0425922a7a433efa680adf7f5f937356f6335dd9f2df5ba7c93624fac841e1cac331ebbb024

          • memory/2196-79-0x0000000007770000-0x00000000077A5000-memory.dmp

            Filesize

            212KB

          • memory/2196-83-0x0000000007770000-0x00000000077A5000-memory.dmp

            Filesize

            212KB

          • memory/2196-855-0x000000000A350000-0x000000000A362000-memory.dmp

            Filesize

            72KB

          • memory/2196-854-0x0000000009C90000-0x000000000A2A8000-memory.dmp

            Filesize

            6.1MB

          • memory/2196-67-0x0000000007770000-0x00000000077A5000-memory.dmp

            Filesize

            212KB

          • memory/2196-69-0x0000000007770000-0x00000000077A5000-memory.dmp

            Filesize

            212KB

          • memory/2196-71-0x0000000007770000-0x00000000077A5000-memory.dmp

            Filesize

            212KB

          • memory/2196-73-0x0000000007770000-0x00000000077A5000-memory.dmp

            Filesize

            212KB

          • memory/2196-75-0x0000000007770000-0x00000000077A5000-memory.dmp

            Filesize

            212KB

          • memory/2196-77-0x0000000007770000-0x00000000077A5000-memory.dmp

            Filesize

            212KB

          • memory/2196-857-0x000000000A4A0000-0x000000000A4DC000-memory.dmp

            Filesize

            240KB

          • memory/2196-858-0x0000000006C80000-0x0000000006CCC000-memory.dmp

            Filesize

            304KB

          • memory/2196-81-0x0000000007770000-0x00000000077A5000-memory.dmp

            Filesize

            212KB

          • memory/2196-856-0x000000000A370000-0x000000000A47A000-memory.dmp

            Filesize

            1.0MB

          • memory/2196-85-0x0000000007770000-0x00000000077A5000-memory.dmp

            Filesize

            212KB

          • memory/2196-89-0x0000000007770000-0x00000000077A5000-memory.dmp

            Filesize

            212KB

          • memory/2196-91-0x0000000007770000-0x00000000077A5000-memory.dmp

            Filesize

            212KB

          • memory/2196-94-0x0000000007770000-0x00000000077A5000-memory.dmp

            Filesize

            212KB

          • memory/2196-95-0x0000000007770000-0x00000000077A5000-memory.dmp

            Filesize

            212KB

          • memory/2196-87-0x0000000007770000-0x00000000077A5000-memory.dmp

            Filesize

            212KB

          • memory/2196-62-0x0000000007770000-0x00000000077A5000-memory.dmp

            Filesize

            212KB

          • memory/2196-63-0x0000000007770000-0x00000000077A5000-memory.dmp

            Filesize

            212KB

          • memory/2196-65-0x0000000007770000-0x00000000077A5000-memory.dmp

            Filesize

            212KB

          • memory/2196-61-0x0000000007770000-0x00000000077AA000-memory.dmp

            Filesize

            232KB

          • memory/2196-60-0x0000000004AF0000-0x0000000004B2C000-memory.dmp

            Filesize

            240KB

          • memory/3504-38-0x0000000004E10000-0x0000000004E22000-memory.dmp

            Filesize

            72KB

          • memory/3504-54-0x0000000000400000-0x0000000002BB4000-memory.dmp

            Filesize

            39.7MB

          • memory/3504-55-0x0000000000400000-0x0000000000430000-memory.dmp

            Filesize

            192KB

          • memory/3504-52-0x0000000000400000-0x0000000000430000-memory.dmp

            Filesize

            192KB

          • memory/3504-50-0x0000000000400000-0x0000000002BB4000-memory.dmp

            Filesize

            39.7MB

          • memory/3504-51-0x0000000002C90000-0x0000000002CBD000-memory.dmp

            Filesize

            180KB

          • memory/3504-49-0x0000000002F30000-0x0000000003030000-memory.dmp

            Filesize

            1024KB

          • memory/3504-46-0x0000000004E10000-0x0000000004E22000-memory.dmp

            Filesize

            72KB

          • memory/3504-21-0x0000000004E10000-0x0000000004E22000-memory.dmp

            Filesize

            72KB

          • memory/3504-24-0x0000000004E10000-0x0000000004E22000-memory.dmp

            Filesize

            72KB

          • memory/3504-26-0x0000000004E10000-0x0000000004E22000-memory.dmp

            Filesize

            72KB

          • memory/3504-28-0x0000000004E10000-0x0000000004E22000-memory.dmp

            Filesize

            72KB

          • memory/3504-30-0x0000000004E10000-0x0000000004E22000-memory.dmp

            Filesize

            72KB

          • memory/3504-33-0x0000000004E10000-0x0000000004E22000-memory.dmp

            Filesize

            72KB

          • memory/3504-34-0x0000000004E10000-0x0000000004E22000-memory.dmp

            Filesize

            72KB

          • memory/3504-37-0x0000000004E10000-0x0000000004E22000-memory.dmp

            Filesize

            72KB

          • memory/3504-41-0x0000000004E10000-0x0000000004E22000-memory.dmp

            Filesize

            72KB

          • memory/3504-42-0x0000000004E10000-0x0000000004E22000-memory.dmp

            Filesize

            72KB

          • memory/3504-44-0x0000000004E10000-0x0000000004E22000-memory.dmp

            Filesize

            72KB

          • memory/3504-48-0x0000000004E10000-0x0000000004E22000-memory.dmp

            Filesize

            72KB

          • memory/3504-22-0x0000000004E10000-0x0000000004E22000-memory.dmp

            Filesize

            72KB

          • memory/3504-20-0x0000000004E10000-0x0000000004E28000-memory.dmp

            Filesize

            96KB

          • memory/3504-19-0x00000000072A0000-0x0000000007844000-memory.dmp

            Filesize

            5.6MB

          • memory/3504-18-0x0000000002F00000-0x0000000002F1A000-memory.dmp

            Filesize

            104KB

          • memory/3504-17-0x0000000000400000-0x0000000000430000-memory.dmp

            Filesize

            192KB

          • memory/3504-16-0x0000000002C90000-0x0000000002CBD000-memory.dmp

            Filesize

            180KB

          • memory/3504-15-0x0000000002F30000-0x0000000003030000-memory.dmp

            Filesize

            1024KB