Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 01:35

General

  • Target

    54604b98e3006c4e902e2441eee991b9780fdfdcaaf11de172fda5a4eefabb2e.exe

  • Size

    702KB

  • MD5

    ef1ba6eca6fa7f5c2ae91a0099798d9f

  • SHA1

    99c41114968863a0d59213d8a00d121a6453812a

  • SHA256

    54604b98e3006c4e902e2441eee991b9780fdfdcaaf11de172fda5a4eefabb2e

  • SHA512

    60b62b2b95ed9abfdaddeccc4b3b40a3ea67f0f4b9043e15a280a78c338258756862881f1ecec42a8b33aab78713350cfa94ef94afbd7013e46b14233da7230a

  • SSDEEP

    12288:5y901USmH9Ydjl/Pzz6ABHpnm0EuDJWzhwirbmqCXO9:5yTSiyx/Pzz6WHpnlEL5bmqN9

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\54604b98e3006c4e902e2441eee991b9780fdfdcaaf11de172fda5a4eefabb2e.exe
    "C:\Users\Admin\AppData\Local\Temp\54604b98e3006c4e902e2441eee991b9780fdfdcaaf11de172fda5a4eefabb2e.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2296
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un725702.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un725702.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3936
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr479134.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr479134.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2332
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2332 -s 1084
          4⤵
          • Program crash
          PID:3420
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu675271.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu675271.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2888
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2332 -ip 2332
    1⤵
      PID:3316

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un725702.exe

      Filesize

      549KB

      MD5

      4accf73fe149d3cd9122b6a09a361ddc

      SHA1

      5d22f9fbcda27b0da274a0a364ff7b0c454d47cd

      SHA256

      be03b05ef58d414cf324e1a68127fcf7618fdfc343b2b7b5aac09248010fc11b

      SHA512

      7acdb9364a20fabddd9f4bf30c146d2204142742137218bcf61f3d7bd6d6909aef9a7da11a7dfe9567bce35935e4aa9dd3c23d65457a7a7dde0ae3b03f22bdac

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr479134.exe

      Filesize

      286KB

      MD5

      9ab01b9fa8fddc96c57f2b7ba709b54e

      SHA1

      ff65957267f6f7402191835d744c99d9d2d513b4

      SHA256

      e86fe3cd075ae25c903a0aa52a5565c0c9a5196e716425251b1d8bc5319b5fe4

      SHA512

      e612ac8b6649b04042ba4cb79b4aa065b41d09ee5923b91bd1ec913495985a4bf087b9825063cb266f3e73a940508670fc9a51343e0ada9ce16cee63475c5915

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu675271.exe

      Filesize

      359KB

      MD5

      bc1cfd00a50463fc668be9e69ca38e69

      SHA1

      d5f6f221fada14085db14f366492c8c1e1a824a4

      SHA256

      c96a4ba612916c71587d7e77c29710444cc400d21a78458722982438f602a38a

      SHA512

      281862e361722ad42f7bdeaa3759d8783ceb317f7061576e988d8fea94afa8689a6735b4753ddbe4421266a399507a96830e4427b7e9323e46c244fe9077ab6b

    • memory/2332-15-0x0000000002CB0000-0x0000000002DB0000-memory.dmp

      Filesize

      1024KB

    • memory/2332-16-0x0000000002BC0000-0x0000000002BED000-memory.dmp

      Filesize

      180KB

    • memory/2332-17-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2332-18-0x0000000004BC0000-0x0000000004BDA000-memory.dmp

      Filesize

      104KB

    • memory/2332-19-0x00000000071D0000-0x0000000007774000-memory.dmp

      Filesize

      5.6MB

    • memory/2332-20-0x0000000007150000-0x0000000007168000-memory.dmp

      Filesize

      96KB

    • memory/2332-48-0x0000000007150000-0x0000000007162000-memory.dmp

      Filesize

      72KB

    • memory/2332-46-0x0000000007150000-0x0000000007162000-memory.dmp

      Filesize

      72KB

    • memory/2332-44-0x0000000007150000-0x0000000007162000-memory.dmp

      Filesize

      72KB

    • memory/2332-42-0x0000000007150000-0x0000000007162000-memory.dmp

      Filesize

      72KB

    • memory/2332-40-0x0000000007150000-0x0000000007162000-memory.dmp

      Filesize

      72KB

    • memory/2332-38-0x0000000007150000-0x0000000007162000-memory.dmp

      Filesize

      72KB

    • memory/2332-36-0x0000000007150000-0x0000000007162000-memory.dmp

      Filesize

      72KB

    • memory/2332-34-0x0000000007150000-0x0000000007162000-memory.dmp

      Filesize

      72KB

    • memory/2332-32-0x0000000007150000-0x0000000007162000-memory.dmp

      Filesize

      72KB

    • memory/2332-30-0x0000000007150000-0x0000000007162000-memory.dmp

      Filesize

      72KB

    • memory/2332-28-0x0000000007150000-0x0000000007162000-memory.dmp

      Filesize

      72KB

    • memory/2332-26-0x0000000007150000-0x0000000007162000-memory.dmp

      Filesize

      72KB

    • memory/2332-24-0x0000000007150000-0x0000000007162000-memory.dmp

      Filesize

      72KB

    • memory/2332-22-0x0000000007150000-0x0000000007162000-memory.dmp

      Filesize

      72KB

    • memory/2332-21-0x0000000007150000-0x0000000007162000-memory.dmp

      Filesize

      72KB

    • memory/2332-49-0x0000000002CB0000-0x0000000002DB0000-memory.dmp

      Filesize

      1024KB

    • memory/2332-50-0x0000000002BC0000-0x0000000002BED000-memory.dmp

      Filesize

      180KB

    • memory/2332-52-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2332-51-0x0000000000400000-0x0000000002BB1000-memory.dmp

      Filesize

      39.7MB

    • memory/2332-55-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2332-54-0x0000000000400000-0x0000000002BB1000-memory.dmp

      Filesize

      39.7MB

    • memory/2888-60-0x0000000004B30000-0x0000000004B6C000-memory.dmp

      Filesize

      240KB

    • memory/2888-61-0x00000000071C0000-0x00000000071FA000-memory.dmp

      Filesize

      232KB

    • memory/2888-71-0x00000000071C0000-0x00000000071F5000-memory.dmp

      Filesize

      212KB

    • memory/2888-79-0x00000000071C0000-0x00000000071F5000-memory.dmp

      Filesize

      212KB

    • memory/2888-93-0x00000000071C0000-0x00000000071F5000-memory.dmp

      Filesize

      212KB

    • memory/2888-91-0x00000000071C0000-0x00000000071F5000-memory.dmp

      Filesize

      212KB

    • memory/2888-89-0x00000000071C0000-0x00000000071F5000-memory.dmp

      Filesize

      212KB

    • memory/2888-87-0x00000000071C0000-0x00000000071F5000-memory.dmp

      Filesize

      212KB

    • memory/2888-85-0x00000000071C0000-0x00000000071F5000-memory.dmp

      Filesize

      212KB

    • memory/2888-83-0x00000000071C0000-0x00000000071F5000-memory.dmp

      Filesize

      212KB

    • memory/2888-77-0x00000000071C0000-0x00000000071F5000-memory.dmp

      Filesize

      212KB

    • memory/2888-75-0x00000000071C0000-0x00000000071F5000-memory.dmp

      Filesize

      212KB

    • memory/2888-73-0x00000000071C0000-0x00000000071F5000-memory.dmp

      Filesize

      212KB

    • memory/2888-69-0x00000000071C0000-0x00000000071F5000-memory.dmp

      Filesize

      212KB

    • memory/2888-95-0x00000000071C0000-0x00000000071F5000-memory.dmp

      Filesize

      212KB

    • memory/2888-81-0x00000000071C0000-0x00000000071F5000-memory.dmp

      Filesize

      212KB

    • memory/2888-67-0x00000000071C0000-0x00000000071F5000-memory.dmp

      Filesize

      212KB

    • memory/2888-65-0x00000000071C0000-0x00000000071F5000-memory.dmp

      Filesize

      212KB

    • memory/2888-63-0x00000000071C0000-0x00000000071F5000-memory.dmp

      Filesize

      212KB

    • memory/2888-62-0x00000000071C0000-0x00000000071F5000-memory.dmp

      Filesize

      212KB

    • memory/2888-854-0x0000000009CB0000-0x000000000A2C8000-memory.dmp

      Filesize

      6.1MB

    • memory/2888-855-0x000000000A350000-0x000000000A362000-memory.dmp

      Filesize

      72KB

    • memory/2888-856-0x000000000A370000-0x000000000A47A000-memory.dmp

      Filesize

      1.0MB

    • memory/2888-857-0x000000000A490000-0x000000000A4CC000-memory.dmp

      Filesize

      240KB

    • memory/2888-858-0x0000000004BE0000-0x0000000004C2C000-memory.dmp

      Filesize

      304KB