Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/11/2024, 23:39

General

  • Target

    7574fe016f2054f7a0e72370b50c30e72e5dbfe24eff0432da8c22b0a45b7220.exe

  • Size

    706KB

  • MD5

    5fd519c38b652f67d45d4c18d6a3dc25

  • SHA1

    67debdf31728cc8c2f1d1e14207d96108fd78ac4

  • SHA256

    7574fe016f2054f7a0e72370b50c30e72e5dbfe24eff0432da8c22b0a45b7220

  • SHA512

    22c7afbc31a786386a8ec207584bf89d931f67fced72fa524e65907d5d54c3485772f2449802fc949d23ba9c99817d06887f287066354e5fe086fa8f60aee90d

  • SSDEEP

    12288:5iy908QHVW7TSrVSrZhAhnYgppPAQMgrLiUbOvpeEXdmA3BX3:YykW7TG8sbA9Ub4tdmABX3

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7574fe016f2054f7a0e72370b50c30e72e5dbfe24eff0432da8c22b0a45b7220.exe
    "C:\Users\Admin\AppData\Local\Temp\7574fe016f2054f7a0e72370b50c30e72e5dbfe24eff0432da8c22b0a45b7220.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4460
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un942327.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un942327.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3272
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr601502.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr601502.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3452
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3452 -s 1080
          4⤵
          • Program crash
          PID:636
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu810730.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu810730.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:3004
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3452 -ip 3452
    1⤵
      PID:4980

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un942327.exe

      Filesize

      552KB

      MD5

      9b04406eff82bc329d3262969c44325e

      SHA1

      0327a6377903be7af07086fbef8b2aee70c62526

      SHA256

      e74dc1d9905af32581b6aac053566e3fa4aedca3df9cb2ae52611d91d57375d9

      SHA512

      43999683906989810883e9ac7da83a564b52cfb8ea9499d776207c2756398b03658b5b2139c2b28eabd9e3e011b9f7450be1995a4784fc322a8d482b9e9aa1fc

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr601502.exe

      Filesize

      299KB

      MD5

      c4120b5d41181b5cd42b1d7d898e0857

      SHA1

      fff0cd509004f8de482360f21334d1f649a76e6d

      SHA256

      5ad2165b4bc14e59026ac892218384e5eaf2643ea7e54782a29d0924592d0d57

      SHA512

      93666d99e12037bf5118fc0cf13f1ac1b3d6e4d72f5e6b26156825c456d98892cb111827c715f11a59b15ed5a73c32f3a2bcffb23f2c5c4a17747c4db8acf126

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu810730.exe

      Filesize

      381KB

      MD5

      9db012879ec336d73fec6a0f88d366b2

      SHA1

      9d18821ca9e22d310e86ff744f3828b082824a04

      SHA256

      510b44e4e57557fb3a7cad00b43a7a0ec784cc7eaa8da78e64104d4a0c01dbf9

      SHA512

      f3150cd1e0af3f33821735e6a20bd32dc7166eb67d2f8583cd15293149454a4d6f1b686dde50fbcaaf8e49847edee6d067bacc6352b8309d2b59744fc8441d92

    • memory/3004-73-0x0000000007790000-0x00000000077C5000-memory.dmp

      Filesize

      212KB

    • memory/3004-79-0x0000000007790000-0x00000000077C5000-memory.dmp

      Filesize

      212KB

    • memory/3004-855-0x000000000A340000-0x000000000A352000-memory.dmp

      Filesize

      72KB

    • memory/3004-854-0x0000000009C90000-0x000000000A2A8000-memory.dmp

      Filesize

      6.1MB

    • memory/3004-62-0x0000000007790000-0x00000000077C5000-memory.dmp

      Filesize

      212KB

    • memory/3004-63-0x0000000007790000-0x00000000077C5000-memory.dmp

      Filesize

      212KB

    • memory/3004-89-0x0000000007790000-0x00000000077C5000-memory.dmp

      Filesize

      212KB

    • memory/3004-65-0x0000000007790000-0x00000000077C5000-memory.dmp

      Filesize

      212KB

    • memory/3004-67-0x0000000007790000-0x00000000077C5000-memory.dmp

      Filesize

      212KB

    • memory/3004-69-0x0000000007790000-0x00000000077C5000-memory.dmp

      Filesize

      212KB

    • memory/3004-857-0x000000000A490000-0x000000000A4CC000-memory.dmp

      Filesize

      240KB

    • memory/3004-858-0x0000000004A00000-0x0000000004A4C000-memory.dmp

      Filesize

      304KB

    • memory/3004-77-0x0000000007790000-0x00000000077C5000-memory.dmp

      Filesize

      212KB

    • memory/3004-856-0x000000000A360000-0x000000000A46A000-memory.dmp

      Filesize

      1.0MB

    • memory/3004-81-0x0000000007790000-0x00000000077C5000-memory.dmp

      Filesize

      212KB

    • memory/3004-83-0x0000000007790000-0x00000000077C5000-memory.dmp

      Filesize

      212KB

    • memory/3004-85-0x0000000007790000-0x00000000077C5000-memory.dmp

      Filesize

      212KB

    • memory/3004-87-0x0000000007790000-0x00000000077C5000-memory.dmp

      Filesize

      212KB

    • memory/3004-91-0x0000000007790000-0x00000000077C5000-memory.dmp

      Filesize

      212KB

    • memory/3004-93-0x0000000007790000-0x00000000077C5000-memory.dmp

      Filesize

      212KB

    • memory/3004-95-0x0000000007790000-0x00000000077C5000-memory.dmp

      Filesize

      212KB

    • memory/3004-75-0x0000000007790000-0x00000000077C5000-memory.dmp

      Filesize

      212KB

    • memory/3004-71-0x0000000007790000-0x00000000077C5000-memory.dmp

      Filesize

      212KB

    • memory/3004-61-0x0000000007790000-0x00000000077CA000-memory.dmp

      Filesize

      232KB

    • memory/3004-60-0x0000000007000000-0x000000000703C000-memory.dmp

      Filesize

      240KB

    • memory/3452-38-0x0000000007280000-0x0000000007292000-memory.dmp

      Filesize

      72KB

    • memory/3452-54-0x0000000000400000-0x0000000002BB4000-memory.dmp

      Filesize

      39.7MB

    • memory/3452-55-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/3452-52-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/3452-51-0x0000000000400000-0x0000000002BB4000-memory.dmp

      Filesize

      39.7MB

    • memory/3452-50-0x0000000002C90000-0x0000000002CBD000-memory.dmp

      Filesize

      180KB

    • memory/3452-49-0x0000000002DF0000-0x0000000002EF0000-memory.dmp

      Filesize

      1024KB

    • memory/3452-21-0x0000000007280000-0x0000000007292000-memory.dmp

      Filesize

      72KB

    • memory/3452-22-0x0000000007280000-0x0000000007292000-memory.dmp

      Filesize

      72KB

    • memory/3452-24-0x0000000007280000-0x0000000007292000-memory.dmp

      Filesize

      72KB

    • memory/3452-26-0x0000000007280000-0x0000000007292000-memory.dmp

      Filesize

      72KB

    • memory/3452-28-0x0000000007280000-0x0000000007292000-memory.dmp

      Filesize

      72KB

    • memory/3452-30-0x0000000007280000-0x0000000007292000-memory.dmp

      Filesize

      72KB

    • memory/3452-32-0x0000000007280000-0x0000000007292000-memory.dmp

      Filesize

      72KB

    • memory/3452-34-0x0000000007280000-0x0000000007292000-memory.dmp

      Filesize

      72KB

    • memory/3452-36-0x0000000007280000-0x0000000007292000-memory.dmp

      Filesize

      72KB

    • memory/3452-40-0x0000000007280000-0x0000000007292000-memory.dmp

      Filesize

      72KB

    • memory/3452-42-0x0000000007280000-0x0000000007292000-memory.dmp

      Filesize

      72KB

    • memory/3452-44-0x0000000007280000-0x0000000007292000-memory.dmp

      Filesize

      72KB

    • memory/3452-46-0x0000000007280000-0x0000000007292000-memory.dmp

      Filesize

      72KB

    • memory/3452-48-0x0000000007280000-0x0000000007292000-memory.dmp

      Filesize

      72KB

    • memory/3452-20-0x0000000007280000-0x0000000007298000-memory.dmp

      Filesize

      96KB

    • memory/3452-19-0x00000000073C0000-0x0000000007964000-memory.dmp

      Filesize

      5.6MB

    • memory/3452-18-0x0000000004850000-0x000000000486A000-memory.dmp

      Filesize

      104KB

    • memory/3452-17-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/3452-16-0x0000000002C90000-0x0000000002CBD000-memory.dmp

      Filesize

      180KB

    • memory/3452-15-0x0000000002DF0000-0x0000000002EF0000-memory.dmp

      Filesize

      1024KB