Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/11/2024, 15:14

General

  • Target

    55bed2f1577271c1b2622ecdfa9fe1fc30ddc54febc4a05f32eff6ce1b3a7cd3N.exe

  • Size

    705KB

  • MD5

    e363ef2ea4589ae8ed9ff35f4d6448b0

  • SHA1

    497a5cc55b83b73cfbff72e047a51b766b8bfa8e

  • SHA256

    55bed2f1577271c1b2622ecdfa9fe1fc30ddc54febc4a05f32eff6ce1b3a7cd3

  • SHA512

    51ed4fa951431d6d4383b300c7047249b6c36212204aeefc08fdca94670e8f5bbe51be22ebc9d1f46a96c7684547a79f8657871c964d6a447a935526311a9f62

  • SSDEEP

    12288:5y900UoxtJnZCN4cJYKigW0ZSG/NbDTq5IFeqt4rytqZKZW:5yfUobCN4cJPWep/NneyFeqtMSCKo

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\55bed2f1577271c1b2622ecdfa9fe1fc30ddc54febc4a05f32eff6ce1b3a7cd3N.exe
    "C:\Users\Admin\AppData\Local\Temp\55bed2f1577271c1b2622ecdfa9fe1fc30ddc54febc4a05f32eff6ce1b3a7cd3N.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2484
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un539888.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un539888.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4964
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr581439.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr581439.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3640
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3640 -s 1060
          4⤵
          • Program crash
          PID:1180
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu369738.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu369738.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4724
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3640 -ip 3640
    1⤵
      PID:1472

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un539888.exe

      Filesize

      551KB

      MD5

      eb7bae9c204a35848bbb8fe28f4f7f43

      SHA1

      3a27677231ddff1f1a0377c2bb188aea2d2537af

      SHA256

      3c70a784c329a31fa8490d0dc90ed06936bb635db7112e821fa3e44c09d86c75

      SHA512

      43e6130d96839a6911608d226700073560ce5ea099fb0249d0398e0bb457bf62c7c57ca5726ca62f8e5d4a839cc3f0dd4f1d3cbbe001bf03a153f6fde640a14c

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr581439.exe

      Filesize

      277KB

      MD5

      b7167512a443043c8f251c3317260e5c

      SHA1

      5c8257fe287fb15d882ce611bccc50681304d69d

      SHA256

      bc31e69b7b687f7ee50239cd5766b1fe51d47e66563932eca4480214ebbb7dc7

      SHA512

      62ccdfbc8bdb82a65ba65f4a144c6547686d09d4418dd7dd96369bc1fac516ac1dcd89df6f036c21e03bc312ad4232a4d08e3e5aa64ed3ddb33354b4a82a58c6

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu369738.exe

      Filesize

      360KB

      MD5

      2a436b4178b745e61b9ae7531ab69501

      SHA1

      9c83b535a0cb5a0c8c360fd636653df2017094e8

      SHA256

      23b9ea6081087fc074f06f72b5293470e69a9009fab484cf5282c9fc6eed3b26

      SHA512

      274ebd1126453341a4d7ef04d94ba52dd4d0b4f9f2a0ece7194b72a444d5db8b5f5d97dc2c03e680f72c9a98a221569e681b3ebc57c66d0cc152bde61f156b53

    • memory/3640-15-0x0000000002C70000-0x0000000002D70000-memory.dmp

      Filesize

      1024KB

    • memory/3640-16-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/3640-17-0x0000000004B40000-0x0000000004B5A000-memory.dmp

      Filesize

      104KB

    • memory/3640-18-0x0000000007230000-0x00000000077D4000-memory.dmp

      Filesize

      5.6MB

    • memory/3640-19-0x0000000004CF0000-0x0000000004D08000-memory.dmp

      Filesize

      96KB

    • memory/3640-20-0x0000000000400000-0x0000000002B9F000-memory.dmp

      Filesize

      39.6MB

    • memory/3640-21-0x0000000004CF0000-0x0000000004D02000-memory.dmp

      Filesize

      72KB

    • memory/3640-48-0x0000000004CF0000-0x0000000004D02000-memory.dmp

      Filesize

      72KB

    • memory/3640-46-0x0000000004CF0000-0x0000000004D02000-memory.dmp

      Filesize

      72KB

    • memory/3640-45-0x0000000004CF0000-0x0000000004D02000-memory.dmp

      Filesize

      72KB

    • memory/3640-42-0x0000000004CF0000-0x0000000004D02000-memory.dmp

      Filesize

      72KB

    • memory/3640-40-0x0000000004CF0000-0x0000000004D02000-memory.dmp

      Filesize

      72KB

    • memory/3640-38-0x0000000004CF0000-0x0000000004D02000-memory.dmp

      Filesize

      72KB

    • memory/3640-36-0x0000000004CF0000-0x0000000004D02000-memory.dmp

      Filesize

      72KB

    • memory/3640-34-0x0000000004CF0000-0x0000000004D02000-memory.dmp

      Filesize

      72KB

    • memory/3640-32-0x0000000004CF0000-0x0000000004D02000-memory.dmp

      Filesize

      72KB

    • memory/3640-31-0x0000000004CF0000-0x0000000004D02000-memory.dmp

      Filesize

      72KB

    • memory/3640-29-0x0000000004CF0000-0x0000000004D02000-memory.dmp

      Filesize

      72KB

    • memory/3640-26-0x0000000004CF0000-0x0000000004D02000-memory.dmp

      Filesize

      72KB

    • memory/3640-24-0x0000000004CF0000-0x0000000004D02000-memory.dmp

      Filesize

      72KB

    • memory/3640-22-0x0000000004CF0000-0x0000000004D02000-memory.dmp

      Filesize

      72KB

    • memory/3640-49-0x0000000002C70000-0x0000000002D70000-memory.dmp

      Filesize

      1024KB

    • memory/3640-50-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/3640-51-0x0000000000400000-0x0000000002B9F000-memory.dmp

      Filesize

      39.6MB

    • memory/3640-54-0x0000000000400000-0x0000000002B9F000-memory.dmp

      Filesize

      39.6MB

    • memory/3640-55-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4724-60-0x0000000004C00000-0x0000000004C3C000-memory.dmp

      Filesize

      240KB

    • memory/4724-61-0x0000000004D40000-0x0000000004D7A000-memory.dmp

      Filesize

      232KB

    • memory/4724-85-0x0000000004D40000-0x0000000004D75000-memory.dmp

      Filesize

      212KB

    • memory/4724-95-0x0000000004D40000-0x0000000004D75000-memory.dmp

      Filesize

      212KB

    • memory/4724-93-0x0000000004D40000-0x0000000004D75000-memory.dmp

      Filesize

      212KB

    • memory/4724-91-0x0000000004D40000-0x0000000004D75000-memory.dmp

      Filesize

      212KB

    • memory/4724-89-0x0000000004D40000-0x0000000004D75000-memory.dmp

      Filesize

      212KB

    • memory/4724-87-0x0000000004D40000-0x0000000004D75000-memory.dmp

      Filesize

      212KB

    • memory/4724-83-0x0000000004D40000-0x0000000004D75000-memory.dmp

      Filesize

      212KB

    • memory/4724-81-0x0000000004D40000-0x0000000004D75000-memory.dmp

      Filesize

      212KB

    • memory/4724-79-0x0000000004D40000-0x0000000004D75000-memory.dmp

      Filesize

      212KB

    • memory/4724-77-0x0000000004D40000-0x0000000004D75000-memory.dmp

      Filesize

      212KB

    • memory/4724-75-0x0000000004D40000-0x0000000004D75000-memory.dmp

      Filesize

      212KB

    • memory/4724-73-0x0000000004D40000-0x0000000004D75000-memory.dmp

      Filesize

      212KB

    • memory/4724-71-0x0000000004D40000-0x0000000004D75000-memory.dmp

      Filesize

      212KB

    • memory/4724-69-0x0000000004D40000-0x0000000004D75000-memory.dmp

      Filesize

      212KB

    • memory/4724-67-0x0000000004D40000-0x0000000004D75000-memory.dmp

      Filesize

      212KB

    • memory/4724-65-0x0000000004D40000-0x0000000004D75000-memory.dmp

      Filesize

      212KB

    • memory/4724-63-0x0000000004D40000-0x0000000004D75000-memory.dmp

      Filesize

      212KB

    • memory/4724-62-0x0000000004D40000-0x0000000004D75000-memory.dmp

      Filesize

      212KB

    • memory/4724-854-0x0000000009D20000-0x000000000A338000-memory.dmp

      Filesize

      6.1MB

    • memory/4724-855-0x000000000A340000-0x000000000A352000-memory.dmp

      Filesize

      72KB

    • memory/4724-856-0x000000000A360000-0x000000000A46A000-memory.dmp

      Filesize

      1.0MB

    • memory/4724-857-0x000000000A480000-0x000000000A4BC000-memory.dmp

      Filesize

      240KB

    • memory/4724-858-0x0000000004C60000-0x0000000004CAC000-memory.dmp

      Filesize

      304KB