Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 01:43

General

  • Target

    9e64f799a8a8be104f37600c7ae6489261a0b6e89b2ecf35cd6b74328da30ee6.exe

  • Size

    705KB

  • MD5

    9c67db527642254955403eb91262639f

  • SHA1

    fb0c3ee22e52e0e263bd9db74b97f5f1f61a22ae

  • SHA256

    9e64f799a8a8be104f37600c7ae6489261a0b6e89b2ecf35cd6b74328da30ee6

  • SHA512

    245f2ee1d88a840deb114dd85c60c3a71ffdd48444be10739715ec9528225fa8c804aabccd380edbdced6ea913418be2f70780b3f00da9d48ab3a5bb07f89c05

  • SSDEEP

    12288:py90jIE/1N0blWvIDJ1CHqI3AodPcJR8RSJc8BZTqwrGJY8c0VYZAwVmJ5:py8IE/+q0XCHJiR8R8lrGTci0M5

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9e64f799a8a8be104f37600c7ae6489261a0b6e89b2ecf35cd6b74328da30ee6.exe
    "C:\Users\Admin\AppData\Local\Temp\9e64f799a8a8be104f37600c7ae6489261a0b6e89b2ecf35cd6b74328da30ee6.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1292
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un483080.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un483080.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:980
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr064516.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr064516.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2180
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2180 -s 1028
          4⤵
          • Program crash
          PID:8
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu447182.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu447182.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1516
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2180 -ip 2180
    1⤵
      PID:5068

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un483080.exe

      Filesize

      552KB

      MD5

      40bb754ef407334b266413825691d137

      SHA1

      36ad8d73883f812470b8a6dd1f1f2f9c3b1f9723

      SHA256

      28b9edeb503874e8ab2daaebf51ea4172ad6d5955d6a2a060865bcfa98f64fe0

      SHA512

      b259e0f8c41959dafbf854b7c0df330c31cbe96edfb17aea56e85b278520e04c920124197ceb62edc272279ab150693c8ac87486195fbc5893f70f5628094777

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr064516.exe

      Filesize

      299KB

      MD5

      9884dfa9103bdb20837a78520cdf51c8

      SHA1

      ec8a4045bffbd49b9edfd944aedb220e4817e756

      SHA256

      8caf4c70a719285ac4f641ccf8713ee3d5c3ba1b0b44a1615b844519062aeaed

      SHA512

      928b43eb3754fa7141075aa73a440982cf9dcb73c0ad62d85b13afc9ffdabe777816a8344b0e68353dd1727b1766e59ab1c585115b49c0210e32aa083f21f09c

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu447182.exe

      Filesize

      382KB

      MD5

      0cf612cdf8e691f0ff0aae8ea76de8a7

      SHA1

      63bbea3f3ce5b39acda398957cab58ee8db89df8

      SHA256

      b46b68d9a3b1db4ae9a19e1a956ff1356ac10c66ff0bc044bb7b4faa80cfdc95

      SHA512

      4e60db62fc146d27137f590d561297481bfcc24bf95560557dc1832429fae8eaca7c14ebd5a0004c58323a561a35c366a1728669dea3d3714a5b0d32cf6614d8

    • memory/1516-73-0x00000000071E0000-0x0000000007215000-memory.dmp

      Filesize

      212KB

    • memory/1516-77-0x00000000071E0000-0x0000000007215000-memory.dmp

      Filesize

      212KB

    • memory/1516-855-0x00000000072F0000-0x0000000007302000-memory.dmp

      Filesize

      72KB

    • memory/1516-854-0x0000000009D60000-0x000000000A378000-memory.dmp

      Filesize

      6.1MB

    • memory/1516-62-0x00000000071E0000-0x0000000007215000-memory.dmp

      Filesize

      212KB

    • memory/1516-63-0x00000000071E0000-0x0000000007215000-memory.dmp

      Filesize

      212KB

    • memory/1516-83-0x00000000071E0000-0x0000000007215000-memory.dmp

      Filesize

      212KB

    • memory/1516-67-0x00000000071E0000-0x0000000007215000-memory.dmp

      Filesize

      212KB

    • memory/1516-69-0x00000000071E0000-0x0000000007215000-memory.dmp

      Filesize

      212KB

    • memory/1516-71-0x00000000071E0000-0x0000000007215000-memory.dmp

      Filesize

      212KB

    • memory/1516-857-0x000000000A4A0000-0x000000000A4DC000-memory.dmp

      Filesize

      240KB

    • memory/1516-858-0x0000000004C20000-0x0000000004C6C000-memory.dmp

      Filesize

      304KB

    • memory/1516-75-0x00000000071E0000-0x0000000007215000-memory.dmp

      Filesize

      212KB

    • memory/1516-856-0x000000000A380000-0x000000000A48A000-memory.dmp

      Filesize

      1.0MB

    • memory/1516-79-0x00000000071E0000-0x0000000007215000-memory.dmp

      Filesize

      212KB

    • memory/1516-85-0x00000000071E0000-0x0000000007215000-memory.dmp

      Filesize

      212KB

    • memory/1516-87-0x00000000071E0000-0x0000000007215000-memory.dmp

      Filesize

      212KB

    • memory/1516-89-0x00000000071E0000-0x0000000007215000-memory.dmp

      Filesize

      212KB

    • memory/1516-91-0x00000000071E0000-0x0000000007215000-memory.dmp

      Filesize

      212KB

    • memory/1516-93-0x00000000071E0000-0x0000000007215000-memory.dmp

      Filesize

      212KB

    • memory/1516-95-0x00000000071E0000-0x0000000007215000-memory.dmp

      Filesize

      212KB

    • memory/1516-81-0x00000000071E0000-0x0000000007215000-memory.dmp

      Filesize

      212KB

    • memory/1516-65-0x00000000071E0000-0x0000000007215000-memory.dmp

      Filesize

      212KB

    • memory/1516-61-0x00000000071E0000-0x000000000721A000-memory.dmp

      Filesize

      232KB

    • memory/1516-60-0x0000000007160000-0x000000000719C000-memory.dmp

      Filesize

      240KB

    • memory/2180-38-0x0000000007290000-0x00000000072A2000-memory.dmp

      Filesize

      72KB

    • memory/2180-54-0x0000000000400000-0x0000000002BB5000-memory.dmp

      Filesize

      39.7MB

    • memory/2180-55-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2180-52-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2180-50-0x0000000000400000-0x0000000002BB5000-memory.dmp

      Filesize

      39.7MB

    • memory/2180-51-0x0000000002BC0000-0x0000000002BED000-memory.dmp

      Filesize

      180KB

    • memory/2180-49-0x0000000002DC0000-0x0000000002EC0000-memory.dmp

      Filesize

      1024KB

    • memory/2180-21-0x0000000007290000-0x00000000072A2000-memory.dmp

      Filesize

      72KB

    • memory/2180-22-0x0000000007290000-0x00000000072A2000-memory.dmp

      Filesize

      72KB

    • memory/2180-24-0x0000000007290000-0x00000000072A2000-memory.dmp

      Filesize

      72KB

    • memory/2180-26-0x0000000007290000-0x00000000072A2000-memory.dmp

      Filesize

      72KB

    • memory/2180-28-0x0000000007290000-0x00000000072A2000-memory.dmp

      Filesize

      72KB

    • memory/2180-30-0x0000000007290000-0x00000000072A2000-memory.dmp

      Filesize

      72KB

    • memory/2180-32-0x0000000007290000-0x00000000072A2000-memory.dmp

      Filesize

      72KB

    • memory/2180-34-0x0000000007290000-0x00000000072A2000-memory.dmp

      Filesize

      72KB

    • memory/2180-36-0x0000000007290000-0x00000000072A2000-memory.dmp

      Filesize

      72KB

    • memory/2180-41-0x0000000007290000-0x00000000072A2000-memory.dmp

      Filesize

      72KB

    • memory/2180-42-0x0000000007290000-0x00000000072A2000-memory.dmp

      Filesize

      72KB

    • memory/2180-44-0x0000000007290000-0x00000000072A2000-memory.dmp

      Filesize

      72KB

    • memory/2180-48-0x0000000007290000-0x00000000072A2000-memory.dmp

      Filesize

      72KB

    • memory/2180-46-0x0000000007290000-0x00000000072A2000-memory.dmp

      Filesize

      72KB

    • memory/2180-20-0x0000000007290000-0x00000000072A8000-memory.dmp

      Filesize

      96KB

    • memory/2180-19-0x00000000072D0000-0x0000000007874000-memory.dmp

      Filesize

      5.6MB

    • memory/2180-18-0x0000000004EB0000-0x0000000004ECA000-memory.dmp

      Filesize

      104KB

    • memory/2180-17-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2180-16-0x0000000002BC0000-0x0000000002BED000-memory.dmp

      Filesize

      180KB

    • memory/2180-15-0x0000000002DC0000-0x0000000002EC0000-memory.dmp

      Filesize

      1024KB