Analysis

  • max time kernel
    144s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 00:41

General

  • Target

    30dca1a27e967f1985f9e10b4fa54f1a73a9de59d8303152fb0cdded054abcf9.exe

  • Size

    702KB

  • MD5

    fae1766f0fa762b9ffa72c2e02c8584a

  • SHA1

    63e69ee757342c008ec9d9bd2bb4601a6d482123

  • SHA256

    30dca1a27e967f1985f9e10b4fa54f1a73a9de59d8303152fb0cdded054abcf9

  • SHA512

    968513775bdc84ff2082eca9dd1bfe5df17a681a816d88c528a06efbada7c17accc86801c76512a7be0822a4c66ff336bc313542d747d61255fcfeb857285829

  • SSDEEP

    12288:Py90wozfqMznx4Wq8J5HPq+ayba1ESMWn/VSn1yImtTBDKX:PyBojHznx4WqkHPq+aYa1EVW/V41yImI

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\30dca1a27e967f1985f9e10b4fa54f1a73a9de59d8303152fb0cdded054abcf9.exe
    "C:\Users\Admin\AppData\Local\Temp\30dca1a27e967f1985f9e10b4fa54f1a73a9de59d8303152fb0cdded054abcf9.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:228
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un022183.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un022183.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:960
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr436229.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr436229.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1132
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1132 -s 1080
          4⤵
          • Program crash
          PID:1188
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu313490.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu313490.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2328
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1132 -ip 1132
    1⤵
      PID:5116

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un022183.exe

      Filesize

      549KB

      MD5

      98496729e01ed34277712f28d6786688

      SHA1

      155c3379cb7c7f738466f7e1a9957b9d223303cc

      SHA256

      c7f037f5369c79f7e94e873bdae7ea8162f6839e44039309f905c1c2b6c43f1a

      SHA512

      ccc27d89a407cc4a378f8f8d24b2cfc8118b8cebbc2d5d70583cfe2bef6b878926d137e9083892b65980c4052dda38ef6c6d14d8be9eadd54a9ecae92f0b2ff8

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr436229.exe

      Filesize

      286KB

      MD5

      a4e6bace08d60a4135e938866bc03abe

      SHA1

      ec55a6744895bf4067d97c9a967d6adc1f5aa249

      SHA256

      7117136e1e10c6715adc81242a9f36b83188cbc83f08103efddd70a45f143ddf

      SHA512

      7dfec9078460efff59683c55435a1570ff116043a4cf4a3e13ef84195748f4c1d8e3b615baf35b6bb9d75297eede5945bf2f510e940bfc71a3a1c0a4312ae50e

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu313490.exe

      Filesize

      368KB

      MD5

      0847c24197be0166fb6c107f2b8491b4

      SHA1

      cec8c1524422f8ccc973b5e57fe3845a9b56246f

      SHA256

      6d0543fcfb8f3d80d96510eec10d28b25558e28cb6f9175c70c092a74bf82f61

      SHA512

      2eefe6dc715a4d33cb002f46b95ceac77f307896797cdc94904ed5def470519425b4db24c9a2d6fe88826e2d345e3f02b62c905d0737faec59daf0fb706699c8

    • memory/1132-15-0x0000000002D40000-0x0000000002E40000-memory.dmp

      Filesize

      1024KB

    • memory/1132-17-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1132-16-0x0000000002BC0000-0x0000000002BED000-memory.dmp

      Filesize

      180KB

    • memory/1132-18-0x0000000004BD0000-0x0000000004BEA000-memory.dmp

      Filesize

      104KB

    • memory/1132-19-0x0000000007240000-0x00000000077E4000-memory.dmp

      Filesize

      5.6MB

    • memory/1132-20-0x0000000007150000-0x0000000007168000-memory.dmp

      Filesize

      96KB

    • memory/1132-21-0x0000000007150000-0x0000000007162000-memory.dmp

      Filesize

      72KB

    • memory/1132-48-0x0000000007150000-0x0000000007162000-memory.dmp

      Filesize

      72KB

    • memory/1132-46-0x0000000007150000-0x0000000007162000-memory.dmp

      Filesize

      72KB

    • memory/1132-44-0x0000000007150000-0x0000000007162000-memory.dmp

      Filesize

      72KB

    • memory/1132-42-0x0000000007150000-0x0000000007162000-memory.dmp

      Filesize

      72KB

    • memory/1132-40-0x0000000007150000-0x0000000007162000-memory.dmp

      Filesize

      72KB

    • memory/1132-38-0x0000000007150000-0x0000000007162000-memory.dmp

      Filesize

      72KB

    • memory/1132-34-0x0000000007150000-0x0000000007162000-memory.dmp

      Filesize

      72KB

    • memory/1132-32-0x0000000007150000-0x0000000007162000-memory.dmp

      Filesize

      72KB

    • memory/1132-30-0x0000000007150000-0x0000000007162000-memory.dmp

      Filesize

      72KB

    • memory/1132-28-0x0000000007150000-0x0000000007162000-memory.dmp

      Filesize

      72KB

    • memory/1132-26-0x0000000007150000-0x0000000007162000-memory.dmp

      Filesize

      72KB

    • memory/1132-24-0x0000000007150000-0x0000000007162000-memory.dmp

      Filesize

      72KB

    • memory/1132-22-0x0000000007150000-0x0000000007162000-memory.dmp

      Filesize

      72KB

    • memory/1132-36-0x0000000007150000-0x0000000007162000-memory.dmp

      Filesize

      72KB

    • memory/1132-49-0x0000000002D40000-0x0000000002E40000-memory.dmp

      Filesize

      1024KB

    • memory/1132-51-0x0000000002BC0000-0x0000000002BED000-memory.dmp

      Filesize

      180KB

    • memory/1132-50-0x0000000000400000-0x0000000002BB1000-memory.dmp

      Filesize

      39.7MB

    • memory/1132-52-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1132-55-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1132-54-0x0000000000400000-0x0000000002BB1000-memory.dmp

      Filesize

      39.7MB

    • memory/2328-60-0x0000000007150000-0x000000000718C000-memory.dmp

      Filesize

      240KB

    • memory/2328-61-0x00000000071D0000-0x000000000720A000-memory.dmp

      Filesize

      232KB

    • memory/2328-75-0x00000000071D0000-0x0000000007205000-memory.dmp

      Filesize

      212KB

    • memory/2328-83-0x00000000071D0000-0x0000000007205000-memory.dmp

      Filesize

      212KB

    • memory/2328-93-0x00000000071D0000-0x0000000007205000-memory.dmp

      Filesize

      212KB

    • memory/2328-91-0x00000000071D0000-0x0000000007205000-memory.dmp

      Filesize

      212KB

    • memory/2328-89-0x00000000071D0000-0x0000000007205000-memory.dmp

      Filesize

      212KB

    • memory/2328-87-0x00000000071D0000-0x0000000007205000-memory.dmp

      Filesize

      212KB

    • memory/2328-85-0x00000000071D0000-0x0000000007205000-memory.dmp

      Filesize

      212KB

    • memory/2328-81-0x00000000071D0000-0x0000000007205000-memory.dmp

      Filesize

      212KB

    • memory/2328-79-0x00000000071D0000-0x0000000007205000-memory.dmp

      Filesize

      212KB

    • memory/2328-77-0x00000000071D0000-0x0000000007205000-memory.dmp

      Filesize

      212KB

    • memory/2328-73-0x00000000071D0000-0x0000000007205000-memory.dmp

      Filesize

      212KB

    • memory/2328-71-0x00000000071D0000-0x0000000007205000-memory.dmp

      Filesize

      212KB

    • memory/2328-69-0x00000000071D0000-0x0000000007205000-memory.dmp

      Filesize

      212KB

    • memory/2328-67-0x00000000071D0000-0x0000000007205000-memory.dmp

      Filesize

      212KB

    • memory/2328-95-0x00000000071D0000-0x0000000007205000-memory.dmp

      Filesize

      212KB

    • memory/2328-65-0x00000000071D0000-0x0000000007205000-memory.dmp

      Filesize

      212KB

    • memory/2328-63-0x00000000071D0000-0x0000000007205000-memory.dmp

      Filesize

      212KB

    • memory/2328-62-0x00000000071D0000-0x0000000007205000-memory.dmp

      Filesize

      212KB

    • memory/2328-854-0x0000000009D00000-0x000000000A318000-memory.dmp

      Filesize

      6.1MB

    • memory/2328-855-0x000000000A350000-0x000000000A362000-memory.dmp

      Filesize

      72KB

    • memory/2328-856-0x000000000A370000-0x000000000A47A000-memory.dmp

      Filesize

      1.0MB

    • memory/2328-857-0x000000000A490000-0x000000000A4CC000-memory.dmp

      Filesize

      240KB

    • memory/2328-858-0x0000000006C80000-0x0000000006CCC000-memory.dmp

      Filesize

      304KB