Analysis

  • max time kernel
    144s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 02:47

General

  • Target

    35119711b6d9c6dc6f2e81ea22f30694f4159affcf82dc8dacd8814789ccd09b.exe

  • Size

    705KB

  • MD5

    23441cc20ece3b1c75a725168040c8d5

  • SHA1

    ff08b63ef53e1d0762f970df97eb366bc35cfa50

  • SHA256

    35119711b6d9c6dc6f2e81ea22f30694f4159affcf82dc8dacd8814789ccd09b

  • SHA512

    0002c0b3e2eb1db5d79e2ee14a0fdfe019d65147d6203f236457024192c573d713f1a4398524577a9fb33d8bc54424dbf41903cb7915be02a95dc599c4a8c91c

  • SSDEEP

    12288:ry90iWsjrrlb/g1Dtuscw0z3pkf31irn9Y8c0r4Zbf4uYcGRV:ryqetgD+wi6vYrnfc8uZGX

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\35119711b6d9c6dc6f2e81ea22f30694f4159affcf82dc8dacd8814789ccd09b.exe
    "C:\Users\Admin\AppData\Local\Temp\35119711b6d9c6dc6f2e81ea22f30694f4159affcf82dc8dacd8814789ccd09b.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3584
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un104057.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un104057.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1236
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr688500.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr688500.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4728
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4728 -s 1036
          4⤵
          • Program crash
          PID:372
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu329644.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu329644.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:3300
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4728 -ip 4728
    1⤵
      PID:4872

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un104057.exe

      Filesize

      550KB

      MD5

      a1714de3a8fb6ec135b1f8047258bbd1

      SHA1

      24b70653e5b6dd05e218057d1b6d4fe7ded8c2c1

      SHA256

      ff590cd84ff34bee0c4fa2f130176d30f9468a6bb811d1df41375d9151e24cc7

      SHA512

      697c95628c14572896ca80ae1b168a31d7aeec0364f80da6791c05701e4e7900269af866a64b6cd1574b7604af5a281ea4b7f7cffe0d8cb132346060616e6fc0

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr688500.exe

      Filesize

      299KB

      MD5

      e421d6b1d3f6ef43b500600449b5b0fd

      SHA1

      b38462bdc5be7eed5cbb25d1534da730696dd853

      SHA256

      31122770bf7bc2225bb6eb2522d426fec3477e79098411ae19bb8b3468532c4b

      SHA512

      9cdcd4b3c995f45aa1294a8738932e0f73aa439b7797c74280f94bcde3c6c93315a9cfc93cf076d5e382e7235d96c32c627c6425051e8ecd324428dc2659d454

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu329644.exe

      Filesize

      382KB

      MD5

      d7465c5706e237d1ff34ca1b16d70bbb

      SHA1

      337945c4c8bdb7ed5f99b95e5b4a0cafd8a27351

      SHA256

      6307f86605ad9a06a238b5b64cac7f47b8cc6483a320dd3de8d78d3825cc98e6

      SHA512

      f336edd11d39b50d5178affd497f0a9e12339dedc7cba41e3fd4bf1437d37b0e652b31b02d3831b7593446c3931fd356fd290091b225f4f277a8d4ffa49140ec

    • memory/3300-79-0x00000000077F0000-0x0000000007825000-memory.dmp

      Filesize

      212KB

    • memory/3300-854-0x0000000009CF0000-0x000000000A308000-memory.dmp

      Filesize

      6.1MB

    • memory/3300-65-0x00000000077F0000-0x0000000007825000-memory.dmp

      Filesize

      212KB

    • memory/3300-67-0x00000000077F0000-0x0000000007825000-memory.dmp

      Filesize

      212KB

    • memory/3300-91-0x00000000077F0000-0x0000000007825000-memory.dmp

      Filesize

      212KB

    • memory/3300-69-0x00000000077F0000-0x0000000007825000-memory.dmp

      Filesize

      212KB

    • memory/3300-857-0x000000000A490000-0x000000000A4CC000-memory.dmp

      Filesize

      240KB

    • memory/3300-73-0x00000000077F0000-0x0000000007825000-memory.dmp

      Filesize

      212KB

    • memory/3300-75-0x00000000077F0000-0x0000000007825000-memory.dmp

      Filesize

      212KB

    • memory/3300-77-0x00000000077F0000-0x0000000007825000-memory.dmp

      Filesize

      212KB

    • memory/3300-62-0x00000000077F0000-0x0000000007825000-memory.dmp

      Filesize

      212KB

    • memory/3300-858-0x0000000004A60000-0x0000000004AAC000-memory.dmp

      Filesize

      304KB

    • memory/3300-83-0x00000000077F0000-0x0000000007825000-memory.dmp

      Filesize

      212KB

    • memory/3300-63-0x00000000077F0000-0x0000000007825000-memory.dmp

      Filesize

      212KB

    • memory/3300-855-0x000000000A350000-0x000000000A362000-memory.dmp

      Filesize

      72KB

    • memory/3300-856-0x000000000A370000-0x000000000A47A000-memory.dmp

      Filesize

      1.0MB

    • memory/3300-85-0x00000000077F0000-0x0000000007825000-memory.dmp

      Filesize

      212KB

    • memory/3300-87-0x00000000077F0000-0x0000000007825000-memory.dmp

      Filesize

      212KB

    • memory/3300-89-0x00000000077F0000-0x0000000007825000-memory.dmp

      Filesize

      212KB

    • memory/3300-93-0x00000000077F0000-0x0000000007825000-memory.dmp

      Filesize

      212KB

    • memory/3300-95-0x00000000077F0000-0x0000000007825000-memory.dmp

      Filesize

      212KB

    • memory/3300-81-0x00000000077F0000-0x0000000007825000-memory.dmp

      Filesize

      212KB

    • memory/3300-71-0x00000000077F0000-0x0000000007825000-memory.dmp

      Filesize

      212KB

    • memory/3300-61-0x00000000077F0000-0x000000000782A000-memory.dmp

      Filesize

      232KB

    • memory/3300-60-0x0000000004B20000-0x0000000004B5C000-memory.dmp

      Filesize

      240KB

    • memory/4728-42-0x0000000007850000-0x0000000007862000-memory.dmp

      Filesize

      72KB

    • memory/4728-54-0x0000000000400000-0x0000000002BB5000-memory.dmp

      Filesize

      39.7MB

    • memory/4728-55-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4728-52-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4728-51-0x0000000000400000-0x0000000002BB5000-memory.dmp

      Filesize

      39.7MB

    • memory/4728-50-0x0000000002BC0000-0x0000000002BED000-memory.dmp

      Filesize

      180KB

    • memory/4728-49-0x0000000002C80000-0x0000000002D80000-memory.dmp

      Filesize

      1024KB

    • memory/4728-22-0x0000000007850000-0x0000000007862000-memory.dmp

      Filesize

      72KB

    • memory/4728-24-0x0000000007850000-0x0000000007862000-memory.dmp

      Filesize

      72KB

    • memory/4728-26-0x0000000007850000-0x0000000007862000-memory.dmp

      Filesize

      72KB

    • memory/4728-28-0x0000000007850000-0x0000000007862000-memory.dmp

      Filesize

      72KB

    • memory/4728-32-0x0000000007850000-0x0000000007862000-memory.dmp

      Filesize

      72KB

    • memory/4728-34-0x0000000007850000-0x0000000007862000-memory.dmp

      Filesize

      72KB

    • memory/4728-36-0x0000000007850000-0x0000000007862000-memory.dmp

      Filesize

      72KB

    • memory/4728-39-0x0000000007850000-0x0000000007862000-memory.dmp

      Filesize

      72KB

    • memory/4728-40-0x0000000007850000-0x0000000007862000-memory.dmp

      Filesize

      72KB

    • memory/4728-44-0x0000000007850000-0x0000000007862000-memory.dmp

      Filesize

      72KB

    • memory/4728-46-0x0000000007850000-0x0000000007862000-memory.dmp

      Filesize

      72KB

    • memory/4728-48-0x0000000007850000-0x0000000007862000-memory.dmp

      Filesize

      72KB

    • memory/4728-30-0x0000000007850000-0x0000000007862000-memory.dmp

      Filesize

      72KB

    • memory/4728-21-0x0000000007850000-0x0000000007862000-memory.dmp

      Filesize

      72KB

    • memory/4728-20-0x0000000007850000-0x0000000007868000-memory.dmp

      Filesize

      96KB

    • memory/4728-19-0x00000000072A0000-0x0000000007844000-memory.dmp

      Filesize

      5.6MB

    • memory/4728-18-0x0000000004B10000-0x0000000004B2A000-memory.dmp

      Filesize

      104KB

    • memory/4728-16-0x0000000002BC0000-0x0000000002BED000-memory.dmp

      Filesize

      180KB

    • memory/4728-17-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4728-15-0x0000000002C80000-0x0000000002D80000-memory.dmp

      Filesize

      1024KB