Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-11-2024 02:11

General

  • Target

    6ec121d0d1f0c8a727c47028d52ba809c6b3ee635f26f055561097d36e09c53f.exe

  • Size

    610KB

  • MD5

    661b93a0d1686d5c8ee8f3a7a31660de

  • SHA1

    33f4b792c28b97db11e8815fc7751110530d8d22

  • SHA256

    6ec121d0d1f0c8a727c47028d52ba809c6b3ee635f26f055561097d36e09c53f

  • SHA512

    0cbb5453af4db814388598ae61aed7b7c5820b1838cd662afc1ee884ddcf89a8c513f985207f5b1f389bdf0391e50b2a34c2143656f1624ef294fd58ca08f5c3

  • SSDEEP

    12288:Vy909GwMUUy5FvIRywsMFJY1Ofc+WrisbZJgEHaRMyk:VyYG+bzAEwJFSprXrgvKyk

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 2 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6ec121d0d1f0c8a727c47028d52ba809c6b3ee635f26f055561097d36e09c53f.exe
    "C:\Users\Admin\AppData\Local\Temp\6ec121d0d1f0c8a727c47028d52ba809c6b3ee635f26f055561097d36e09c53f.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pr369570.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pr369570.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1452
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1452 -s 1080
        3⤵
        • Program crash
        PID:1648
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\qu764352.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\qu764352.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:3916
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1452 -ip 1452
    1⤵
      PID:4580

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pr369570.exe

      Filesize

      403KB

      MD5

      f21e6a8efa42d0541672586b3700b5cf

      SHA1

      0eb3705d1e6f944cdb1c85baad121cee8280881a

      SHA256

      576dca44e9623d21e0434fca3640c10f2a03b575bbf606f7f92b54cd66b99930

      SHA512

      7079499abf78b5bea3dc0c8a53973ad0a64f015d3f43fb095d21016caf27fbc6b5e8583043a8f77b96c1b585f37d97db98341ddbcf8a53441692e1e0e1e78722

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\qu764352.exe

      Filesize

      486KB

      MD5

      1c2555f6e99989880ced7de5dc387f2b

      SHA1

      117cc855e2243be27b1b69dfbb5f455fa289346d

      SHA256

      df042a35d1722bf4540ae92284645e9a401a4f7fb68b9628a3fb5e21d498ed73

      SHA512

      0a09cc21bae89172bb186b2371410d19d2442d8ed14c9c22ca397378154230ec93a3ea77961458b1c552fb8aa4efb7ce3ef15d5a6ec2743a5eaa4fec8304197d

    • memory/1452-48-0x0000000000400000-0x000000000080A000-memory.dmp

      Filesize

      4.0MB

    • memory/1452-10-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1452-8-0x00000000008C0000-0x00000000009C0000-memory.dmp

      Filesize

      1024KB

    • memory/1452-12-0x0000000002790000-0x00000000027AA000-memory.dmp

      Filesize

      104KB

    • memory/1452-13-0x0000000004D50000-0x00000000052F4000-memory.dmp

      Filesize

      5.6MB

    • memory/1452-14-0x0000000005360000-0x0000000005378000-memory.dmp

      Filesize

      96KB

    • memory/1452-15-0x0000000005360000-0x0000000005372000-memory.dmp

      Filesize

      72KB

    • memory/1452-42-0x0000000005360000-0x0000000005372000-memory.dmp

      Filesize

      72KB

    • memory/1452-40-0x0000000005360000-0x0000000005372000-memory.dmp

      Filesize

      72KB

    • memory/1452-38-0x0000000005360000-0x0000000005372000-memory.dmp

      Filesize

      72KB

    • memory/1452-36-0x0000000005360000-0x0000000005372000-memory.dmp

      Filesize

      72KB

    • memory/1452-34-0x0000000005360000-0x0000000005372000-memory.dmp

      Filesize

      72KB

    • memory/1452-32-0x0000000005360000-0x0000000005372000-memory.dmp

      Filesize

      72KB

    • memory/1452-30-0x0000000005360000-0x0000000005372000-memory.dmp

      Filesize

      72KB

    • memory/1452-28-0x0000000005360000-0x0000000005372000-memory.dmp

      Filesize

      72KB

    • memory/1452-26-0x0000000005360000-0x0000000005372000-memory.dmp

      Filesize

      72KB

    • memory/1452-24-0x0000000005360000-0x0000000005372000-memory.dmp

      Filesize

      72KB

    • memory/1452-22-0x0000000005360000-0x0000000005372000-memory.dmp

      Filesize

      72KB

    • memory/1452-20-0x0000000005360000-0x0000000005372000-memory.dmp

      Filesize

      72KB

    • memory/1452-18-0x0000000005360000-0x0000000005372000-memory.dmp

      Filesize

      72KB

    • memory/1452-16-0x0000000005360000-0x0000000005372000-memory.dmp

      Filesize

      72KB

    • memory/1452-43-0x00000000008C0000-0x00000000009C0000-memory.dmp

      Filesize

      1024KB

    • memory/1452-44-0x0000000002430000-0x000000000245D000-memory.dmp

      Filesize

      180KB

    • memory/1452-45-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1452-49-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1452-9-0x0000000002430000-0x000000000245D000-memory.dmp

      Filesize

      180KB

    • memory/1452-11-0x0000000000400000-0x000000000080A000-memory.dmp

      Filesize

      4.0MB

    • memory/3916-850-0x00000000079D0000-0x0000000007FE8000-memory.dmp

      Filesize

      6.1MB

    • memory/3916-77-0x0000000002800000-0x0000000002835000-memory.dmp

      Filesize

      212KB

    • memory/3916-57-0x0000000002800000-0x000000000283A000-memory.dmp

      Filesize

      232KB

    • memory/3916-55-0x00000000025E0000-0x000000000261C000-memory.dmp

      Filesize

      240KB

    • memory/3916-61-0x0000000002800000-0x0000000002835000-memory.dmp

      Filesize

      212KB

    • memory/3916-59-0x0000000002800000-0x0000000002835000-memory.dmp

      Filesize

      212KB

    • memory/3916-75-0x0000000002800000-0x0000000002835000-memory.dmp

      Filesize

      212KB

    • memory/3916-58-0x0000000002800000-0x0000000002835000-memory.dmp

      Filesize

      212KB

    • memory/3916-71-0x0000000002800000-0x0000000002835000-memory.dmp

      Filesize

      212KB

    • memory/3916-67-0x0000000002800000-0x0000000002835000-memory.dmp

      Filesize

      212KB

    • memory/3916-91-0x0000000002800000-0x0000000002835000-memory.dmp

      Filesize

      212KB

    • memory/3916-90-0x0000000002800000-0x0000000002835000-memory.dmp

      Filesize

      212KB

    • memory/3916-87-0x0000000002800000-0x0000000002835000-memory.dmp

      Filesize

      212KB

    • memory/3916-85-0x0000000002800000-0x0000000002835000-memory.dmp

      Filesize

      212KB

    • memory/3916-83-0x0000000002800000-0x0000000002835000-memory.dmp

      Filesize

      212KB

    • memory/3916-81-0x0000000002800000-0x0000000002835000-memory.dmp

      Filesize

      212KB

    • memory/3916-79-0x0000000002800000-0x0000000002835000-memory.dmp

      Filesize

      212KB

    • memory/3916-56-0x0000000000400000-0x000000000081E000-memory.dmp

      Filesize

      4.1MB

    • memory/3916-73-0x0000000002800000-0x0000000002835000-memory.dmp

      Filesize

      212KB

    • memory/3916-69-0x0000000002800000-0x0000000002835000-memory.dmp

      Filesize

      212KB

    • memory/3916-65-0x0000000002800000-0x0000000002835000-memory.dmp

      Filesize

      212KB

    • memory/3916-63-0x0000000002800000-0x0000000002835000-memory.dmp

      Filesize

      212KB

    • memory/3916-54-0x0000000000400000-0x000000000081E000-memory.dmp

      Filesize

      4.1MB

    • memory/3916-851-0x0000000004F40000-0x0000000004F52000-memory.dmp

      Filesize

      72KB

    • memory/3916-852-0x0000000007FF0000-0x00000000080FA000-memory.dmp

      Filesize

      1.0MB

    • memory/3916-853-0x0000000008100000-0x000000000813C000-memory.dmp

      Filesize

      240KB

    • memory/3916-854-0x0000000004A20000-0x0000000004A6C000-memory.dmp

      Filesize

      304KB