Analysis

  • max time kernel
    113s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-11-2024 19:18

General

  • Target

    a51a3130f28af6af5c188268c721266021007edf31684b9797f062d8e1bd9ce0.exe

  • Size

    550KB

  • MD5

    c3bd84a984004f9c4b0da0b8a4e4f71b

  • SHA1

    9ac0b8e8782a9550c5a29d5d954763bcd12a6c94

  • SHA256

    a51a3130f28af6af5c188268c721266021007edf31684b9797f062d8e1bd9ce0

  • SHA512

    c60a877d17bdcf1eab059383c173b5e934fddd7af594ef9c67f8a87a92868d152a4341a2bf1a11dfb59a3bc8ae121b860a1ad1c0a0cb9dd735605fb8591381a2

  • SSDEEP

    12288:2y90TOSJ8bi0IRzkGnHY/U+0ebzm9gJfCSdnA:2y6LEijLcU+7zm9gJfC0A

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 2 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a51a3130f28af6af5c188268c721266021007edf31684b9797f062d8e1bd9ce0.exe
    "C:\Users\Admin\AppData\Local\Temp\a51a3130f28af6af5c188268c721266021007edf31684b9797f062d8e1bd9ce0.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:820
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pr150953.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pr150953.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:448
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 448 -s 1084
        3⤵
        • Program crash
        PID:2240
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\qu312211.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\qu312211.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2000
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 448 -ip 448
    1⤵
      PID:64

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pr150953.exe

      Filesize

      277KB

      MD5

      9efe15cd302bccb28fb1e7c8df71ade0

      SHA1

      cbc8b829caadf6ed02542def696d1c78c15dd8a7

      SHA256

      5e9da66df2c1a46f48577e76eaed661f997193474e92ecd8d42eebe73c02c350

      SHA512

      c5f3595aa3acd5c8af0575d7c8caae6449871522d8905d99af9772948a95c31cea1c696ca831626f5ad3ff4ca334b2e8ff404fa9dc260c343fddba71bc782c66

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\qu312211.exe

      Filesize

      360KB

      MD5

      f54e0e0c1242afc2966d0dcd7709b7d0

      SHA1

      a6ad360b767901848bb6430d4540748f3103aa7a

      SHA256

      3aae91d0d367136e2b885f382abf1302b8739928d43c700c71952d923344f577

      SHA512

      2eb290d48e40adf1b996e9d294a7c0d4d8745916d96f4d4f4dae65ad435fd63f8894b09840a06835aa8bcfdb58f3fee691b20067a1c25ad8767470078015106a

    • memory/448-48-0x0000000000400000-0x0000000002B9F000-memory.dmp

      Filesize

      39.6MB

    • memory/448-39-0x0000000004BA0000-0x0000000004BB2000-memory.dmp

      Filesize

      72KB

    • memory/448-11-0x00000000071B0000-0x0000000007754000-memory.dmp

      Filesize

      5.6MB

    • memory/448-12-0x0000000004BA0000-0x0000000004BB8000-memory.dmp

      Filesize

      96KB

    • memory/448-13-0x0000000000400000-0x0000000002B9F000-memory.dmp

      Filesize

      39.6MB

    • memory/448-41-0x0000000004BA0000-0x0000000004BB2000-memory.dmp

      Filesize

      72KB

    • memory/448-8-0x0000000002C50000-0x0000000002D50000-memory.dmp

      Filesize

      1024KB

    • memory/448-37-0x0000000004BA0000-0x0000000004BB2000-memory.dmp

      Filesize

      72KB

    • memory/448-35-0x0000000004BA0000-0x0000000004BB2000-memory.dmp

      Filesize

      72KB

    • memory/448-34-0x0000000004BA0000-0x0000000004BB2000-memory.dmp

      Filesize

      72KB

    • memory/448-31-0x0000000004BA0000-0x0000000004BB2000-memory.dmp

      Filesize

      72KB

    • memory/448-29-0x0000000004BA0000-0x0000000004BB2000-memory.dmp

      Filesize

      72KB

    • memory/448-27-0x0000000004BA0000-0x0000000004BB2000-memory.dmp

      Filesize

      72KB

    • memory/448-26-0x0000000004BA0000-0x0000000004BB2000-memory.dmp

      Filesize

      72KB

    • memory/448-24-0x0000000004BA0000-0x0000000004BB2000-memory.dmp

      Filesize

      72KB

    • memory/448-21-0x0000000004BA0000-0x0000000004BB2000-memory.dmp

      Filesize

      72KB

    • memory/448-19-0x0000000004BA0000-0x0000000004BB2000-memory.dmp

      Filesize

      72KB

    • memory/448-17-0x0000000004BA0000-0x0000000004BB2000-memory.dmp

      Filesize

      72KB

    • memory/448-49-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/448-14-0x0000000004BA0000-0x0000000004BB2000-memory.dmp

      Filesize

      72KB

    • memory/448-42-0x0000000000400000-0x0000000002B9F000-memory.dmp

      Filesize

      39.6MB

    • memory/448-44-0x0000000002C50000-0x0000000002D50000-memory.dmp

      Filesize

      1024KB

    • memory/448-46-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/448-9-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/448-15-0x0000000004BA0000-0x0000000004BB2000-memory.dmp

      Filesize

      72KB

    • memory/448-10-0x0000000004AF0000-0x0000000004B0A000-memory.dmp

      Filesize

      104KB

    • memory/2000-55-0x0000000007190000-0x00000000071CA000-memory.dmp

      Filesize

      232KB

    • memory/2000-88-0x0000000007190000-0x00000000071C5000-memory.dmp

      Filesize

      212KB

    • memory/2000-851-0x000000000A490000-0x000000000A4CC000-memory.dmp

      Filesize

      240KB

    • memory/2000-89-0x0000000007190000-0x00000000071C5000-memory.dmp

      Filesize

      212KB

    • memory/2000-75-0x0000000007190000-0x00000000071C5000-memory.dmp

      Filesize

      212KB

    • memory/2000-85-0x0000000007190000-0x00000000071C5000-memory.dmp

      Filesize

      212KB

    • memory/2000-83-0x0000000007190000-0x00000000071C5000-memory.dmp

      Filesize

      212KB

    • memory/2000-65-0x0000000007190000-0x00000000071C5000-memory.dmp

      Filesize

      212KB

    • memory/2000-79-0x0000000007190000-0x00000000071C5000-memory.dmp

      Filesize

      212KB

    • memory/2000-77-0x0000000007190000-0x00000000071C5000-memory.dmp

      Filesize

      212KB

    • memory/2000-73-0x0000000007190000-0x00000000071C5000-memory.dmp

      Filesize

      212KB

    • memory/2000-852-0x0000000004AA0000-0x0000000004AEC000-memory.dmp

      Filesize

      304KB

    • memory/2000-67-0x0000000007190000-0x00000000071C5000-memory.dmp

      Filesize

      212KB

    • memory/2000-69-0x0000000007190000-0x00000000071C5000-memory.dmp

      Filesize

      212KB

    • memory/2000-81-0x0000000007190000-0x00000000071C5000-memory.dmp

      Filesize

      212KB

    • memory/2000-63-0x0000000007190000-0x00000000071C5000-memory.dmp

      Filesize

      212KB

    • memory/2000-61-0x0000000007190000-0x00000000071C5000-memory.dmp

      Filesize

      212KB

    • memory/2000-59-0x0000000007190000-0x00000000071C5000-memory.dmp

      Filesize

      212KB

    • memory/2000-57-0x0000000007190000-0x00000000071C5000-memory.dmp

      Filesize

      212KB

    • memory/2000-56-0x0000000007190000-0x00000000071C5000-memory.dmp

      Filesize

      212KB

    • memory/2000-848-0x0000000009D60000-0x000000000A378000-memory.dmp

      Filesize

      6.1MB

    • memory/2000-849-0x00000000072E0000-0x00000000072F2000-memory.dmp

      Filesize

      72KB

    • memory/2000-850-0x000000000A380000-0x000000000A48A000-memory.dmp

      Filesize

      1.0MB

    • memory/2000-54-0x0000000004CA0000-0x0000000004CDC000-memory.dmp

      Filesize

      240KB

    • memory/2000-71-0x0000000007190000-0x00000000071C5000-memory.dmp

      Filesize

      212KB