Analysis

  • max time kernel
    113s
  • max time network
    116s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-11-2024 16:29

General

  • Target

    bbc8033697d68672723af5e36ecade94ca02dbf00cd7f2f127c79f3151328d4e.exe

  • Size

    610KB

  • MD5

    e6a7dd3cabf6fdafd95a9c7d4f255afd

  • SHA1

    8c9db9e588a1a90d13e044510a8c5985d70eff7e

  • SHA256

    bbc8033697d68672723af5e36ecade94ca02dbf00cd7f2f127c79f3151328d4e

  • SHA512

    40e9c0f968fd13afce11b299c44ed5cb5cbfbee74d70dd350f157c4b5298d961e43911022174c9286d76e65b28f4ac2ee4629c41467f3a63c66b1eabe515f616

  • SSDEEP

    12288:py90z7jIfNNDjzPbDfkbIh85Sn6NbZJgvOaRMkF:pySEZiIhb61rgrakF

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 2 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bbc8033697d68672723af5e36ecade94ca02dbf00cd7f2f127c79f3151328d4e.exe
    "C:\Users\Admin\AppData\Local\Temp\bbc8033697d68672723af5e36ecade94ca02dbf00cd7f2f127c79f3151328d4e.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:936
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pr888016.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pr888016.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1564
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1564 -s 1080
        3⤵
        • Program crash
        PID:64
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\qu001845.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\qu001845.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:1040
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1564 -ip 1564
    1⤵
      PID:5016

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pr888016.exe

      Filesize

      403KB

      MD5

      ef1e59823de2cece9c40e321e8fe2536

      SHA1

      7abd2c58fe3c046fc0253aac34d1f9e09fc52bd4

      SHA256

      67c400de98c15707c137bc5d3c81b69a75b114195b0e157c684d2b11e821b1d0

      SHA512

      01eef57d2df8a7e14bbb3e9e23d7dbde9cd0ad95b7e7915b9e5def5130bebb3e7fcb6f7286f21d7aab2dea3b0b0159af175197c79ec38433b05cb6c6efaee573

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\qu001845.exe

      Filesize

      486KB

      MD5

      c067b92d5b2de38666d85396b71d32b6

      SHA1

      a2269944f9d03d2a1f3fafdd9145c0215b8809e5

      SHA256

      a41be215fbadfc45a5f4df77836602a354c454f32a5e42ab5eb4444c4af02c9e

      SHA512

      d5fae3a99ba817c1f28fadcf249221662b173f25d033871321d2b2986ca85274fd42eda8fcd8a05df1312a7f76803bae666807a118f5a5c78fbcd92d31bd56b8

    • memory/1040-91-0x0000000002AD0000-0x0000000002B05000-memory.dmp

      Filesize

      212KB

    • memory/1040-88-0x0000000002AD0000-0x0000000002B05000-memory.dmp

      Filesize

      212KB

    • memory/1040-855-0x0000000002890000-0x00000000028DC000-memory.dmp

      Filesize

      304KB

    • memory/1040-854-0x00000000080F0000-0x000000000812C000-memory.dmp

      Filesize

      240KB

    • memory/1040-853-0x0000000007FE0000-0x00000000080EA000-memory.dmp

      Filesize

      1.0MB

    • memory/1040-852-0x0000000002C00000-0x0000000002C12000-memory.dmp

      Filesize

      72KB

    • memory/1040-55-0x0000000000400000-0x000000000081E000-memory.dmp

      Filesize

      4.1MB

    • memory/1040-74-0x0000000002AD0000-0x0000000002B05000-memory.dmp

      Filesize

      212KB

    • memory/1040-76-0x0000000002AD0000-0x0000000002B05000-memory.dmp

      Filesize

      212KB

    • memory/1040-78-0x0000000002AD0000-0x0000000002B05000-memory.dmp

      Filesize

      212KB

    • memory/1040-80-0x0000000002AD0000-0x0000000002B05000-memory.dmp

      Filesize

      212KB

    • memory/1040-56-0x0000000002830000-0x000000000286C000-memory.dmp

      Filesize

      240KB

    • memory/1040-84-0x0000000002AD0000-0x0000000002B05000-memory.dmp

      Filesize

      212KB

    • memory/1040-86-0x0000000002AD0000-0x0000000002B05000-memory.dmp

      Filesize

      212KB

    • memory/1040-92-0x0000000002AD0000-0x0000000002B05000-memory.dmp

      Filesize

      212KB

    • memory/1040-70-0x0000000002AD0000-0x0000000002B05000-memory.dmp

      Filesize

      212KB

    • memory/1040-59-0x0000000002AD0000-0x0000000002B05000-memory.dmp

      Filesize

      212KB

    • memory/1040-60-0x0000000002AD0000-0x0000000002B05000-memory.dmp

      Filesize

      212KB

    • memory/1040-62-0x0000000002AD0000-0x0000000002B05000-memory.dmp

      Filesize

      212KB

    • memory/1040-66-0x0000000002AD0000-0x0000000002B05000-memory.dmp

      Filesize

      212KB

    • memory/1040-68-0x0000000002AD0000-0x0000000002B05000-memory.dmp

      Filesize

      212KB

    • memory/1040-72-0x0000000002AD0000-0x0000000002B05000-memory.dmp

      Filesize

      212KB

    • memory/1040-64-0x0000000002AD0000-0x0000000002B05000-memory.dmp

      Filesize

      212KB

    • memory/1040-58-0x0000000002AD0000-0x0000000002B0A000-memory.dmp

      Filesize

      232KB

    • memory/1040-57-0x0000000000400000-0x000000000081E000-memory.dmp

      Filesize

      4.1MB

    • memory/1040-82-0x0000000002AD0000-0x0000000002B05000-memory.dmp

      Filesize

      212KB

    • memory/1040-851-0x00000000079C0000-0x0000000007FD8000-memory.dmp

      Filesize

      6.1MB

    • memory/1564-13-0x0000000004ED0000-0x0000000005474000-memory.dmp

      Filesize

      5.6MB

    • memory/1564-24-0x0000000002740000-0x0000000002752000-memory.dmp

      Filesize

      72KB

    • memory/1564-11-0x0000000000400000-0x000000000080A000-memory.dmp

      Filesize

      4.0MB

    • memory/1564-45-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1564-44-0x00000000009A0000-0x00000000009CD000-memory.dmp

      Filesize

      180KB

    • memory/1564-43-0x00000000009D0000-0x0000000000AD0000-memory.dmp

      Filesize

      1024KB

    • memory/1564-15-0x0000000002740000-0x0000000002752000-memory.dmp

      Filesize

      72KB

    • memory/1564-16-0x0000000002740000-0x0000000002752000-memory.dmp

      Filesize

      72KB

    • memory/1564-18-0x0000000002740000-0x0000000002752000-memory.dmp

      Filesize

      72KB

    • memory/1564-20-0x0000000002740000-0x0000000002752000-memory.dmp

      Filesize

      72KB

    • memory/1564-22-0x0000000002740000-0x0000000002752000-memory.dmp

      Filesize

      72KB

    • memory/1564-9-0x00000000009A0000-0x00000000009CD000-memory.dmp

      Filesize

      180KB

    • memory/1564-50-0x0000000000400000-0x000000000080A000-memory.dmp

      Filesize

      4.0MB

    • memory/1564-49-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1564-40-0x0000000002740000-0x0000000002752000-memory.dmp

      Filesize

      72KB

    • memory/1564-28-0x0000000002740000-0x0000000002752000-memory.dmp

      Filesize

      72KB

    • memory/1564-30-0x0000000002740000-0x0000000002752000-memory.dmp

      Filesize

      72KB

    • memory/1564-8-0x00000000009D0000-0x0000000000AD0000-memory.dmp

      Filesize

      1024KB

    • memory/1564-34-0x0000000002740000-0x0000000002752000-memory.dmp

      Filesize

      72KB

    • memory/1564-36-0x0000000002740000-0x0000000002752000-memory.dmp

      Filesize

      72KB

    • memory/1564-38-0x0000000002740000-0x0000000002752000-memory.dmp

      Filesize

      72KB

    • memory/1564-10-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1564-42-0x0000000002740000-0x0000000002752000-memory.dmp

      Filesize

      72KB

    • memory/1564-14-0x0000000002740000-0x0000000002758000-memory.dmp

      Filesize

      96KB

    • memory/1564-26-0x0000000002740000-0x0000000002752000-memory.dmp

      Filesize

      72KB

    • memory/1564-12-0x0000000002660000-0x000000000267A000-memory.dmp

      Filesize

      104KB

    • memory/1564-32-0x0000000002740000-0x0000000002752000-memory.dmp

      Filesize

      72KB