Analysis

  • max time kernel
    144s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 20:39

General

  • Target

    2739adcc3825c2e989503f9d8750d88b4872d8201427e3baab4be58b22dc2e0a.exe

  • Size

    552KB

  • MD5

    27a5bda558815b3ad76de08072e0bcb3

  • SHA1

    f8b40ac1616fc8beac38355594eb91c86038e53a

  • SHA256

    2739adcc3825c2e989503f9d8750d88b4872d8201427e3baab4be58b22dc2e0a

  • SHA512

    0af63da570b21c73e3235a1434ce7d5140cbc639bb26936a7ec4631177ff9e29bdde97759d346cd0ea9df73a7a6113f88a514472be77de8c8a9d6fbd5079bece

  • SSDEEP

    12288:Jy90og+IFvkQZ+9EvWJdkphJxFtzoXdqdrnJY8c05iZQb:Jyv/ukgykphFo6rnTcSz

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 2 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2739adcc3825c2e989503f9d8750d88b4872d8201427e3baab4be58b22dc2e0a.exe
    "C:\Users\Admin\AppData\Local\Temp\2739adcc3825c2e989503f9d8750d88b4872d8201427e3baab4be58b22dc2e0a.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4856
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pr340132.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pr340132.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4436
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4436 -s 1084
        3⤵
        • Program crash
        PID:4448
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\qu265053.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\qu265053.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:3996
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4436 -ip 4436
    1⤵
      PID:4440

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pr340132.exe

      Filesize

      299KB

      MD5

      5c5b80ccb0123d5a59ca9a6d1dbfa822

      SHA1

      21174ffaa7a56a0ffec3c648e92860b79634b28c

      SHA256

      614820920ecfbd8f98e26039d5301f3a23725a983b3d45ea4a42c828d936a937

      SHA512

      6a969e62f07623f1fa34c008fc098c9e5125bcc061db43d164f628fee3fe160ccb344774f6c64d55ff4a9ba1fa24082cee56c14190d5405dfd98e3910e29ca22

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\qu265053.exe

      Filesize

      382KB

      MD5

      a98f3d642ac3390e9efd64ecf3850ca8

      SHA1

      c9fcfe88a7a8b7c6eb4bf084a120646c6dccc7bc

      SHA256

      6836dba43f5810f8d023914a6557952100ef3d09e7721ed30457aa4e61fbe0cb

      SHA512

      d6b2ede829c0f9afc57ec9dc004ba555418f888e056f00429c24225a78e7814c2cd34993eae9f738e7f79233806426271b63f49cbef32cbebfb32c4a75d810c8

    • memory/3996-853-0x0000000004A50000-0x0000000004A9C000-memory.dmp

      Filesize

      304KB

    • memory/3996-66-0x00000000077B0000-0x00000000077E5000-memory.dmp

      Filesize

      212KB

    • memory/3996-82-0x00000000077B0000-0x00000000077E5000-memory.dmp

      Filesize

      212KB

    • memory/3996-64-0x00000000077B0000-0x00000000077E5000-memory.dmp

      Filesize

      212KB

    • memory/3996-849-0x0000000009CB0000-0x000000000A2C8000-memory.dmp

      Filesize

      6.1MB

    • memory/3996-68-0x00000000077B0000-0x00000000077E5000-memory.dmp

      Filesize

      212KB

    • memory/3996-72-0x00000000077B0000-0x00000000077E5000-memory.dmp

      Filesize

      212KB

    • memory/3996-852-0x000000000A4A0000-0x000000000A4DC000-memory.dmp

      Filesize

      240KB

    • memory/3996-76-0x00000000077B0000-0x00000000077E5000-memory.dmp

      Filesize

      212KB

    • memory/3996-80-0x00000000077B0000-0x00000000077E5000-memory.dmp

      Filesize

      212KB

    • memory/3996-58-0x00000000077B0000-0x00000000077E5000-memory.dmp

      Filesize

      212KB

    • memory/3996-57-0x00000000077B0000-0x00000000077E5000-memory.dmp

      Filesize

      212KB

    • memory/3996-62-0x00000000077B0000-0x00000000077E5000-memory.dmp

      Filesize

      212KB

    • memory/3996-78-0x00000000077B0000-0x00000000077E5000-memory.dmp

      Filesize

      212KB

    • memory/3996-74-0x00000000077B0000-0x00000000077E5000-memory.dmp

      Filesize

      212KB

    • memory/3996-851-0x000000000A370000-0x000000000A47A000-memory.dmp

      Filesize

      1.0MB

    • memory/3996-850-0x000000000A350000-0x000000000A362000-memory.dmp

      Filesize

      72KB

    • memory/3996-84-0x00000000077B0000-0x00000000077E5000-memory.dmp

      Filesize

      212KB

    • memory/3996-86-0x00000000077B0000-0x00000000077E5000-memory.dmp

      Filesize

      212KB

    • memory/3996-88-0x00000000077B0000-0x00000000077E5000-memory.dmp

      Filesize

      212KB

    • memory/3996-90-0x00000000077B0000-0x00000000077E5000-memory.dmp

      Filesize

      212KB

    • memory/3996-70-0x00000000077B0000-0x00000000077E5000-memory.dmp

      Filesize

      212KB

    • memory/3996-60-0x00000000077B0000-0x00000000077E5000-memory.dmp

      Filesize

      212KB

    • memory/3996-56-0x00000000077B0000-0x00000000077EA000-memory.dmp

      Filesize

      232KB

    • memory/3996-55-0x00000000047D0000-0x000000000480C000-memory.dmp

      Filesize

      240KB

    • memory/4436-34-0x0000000004AF0000-0x0000000004B02000-memory.dmp

      Filesize

      72KB

    • memory/4436-50-0x0000000000400000-0x0000000002BB5000-memory.dmp

      Filesize

      39.7MB

    • memory/4436-49-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4436-46-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4436-45-0x0000000002C90000-0x0000000002CBD000-memory.dmp

      Filesize

      180KB

    • memory/4436-43-0x0000000002D80000-0x0000000002E80000-memory.dmp

      Filesize

      1024KB

    • memory/4436-24-0x0000000004AF0000-0x0000000004B02000-memory.dmp

      Filesize

      72KB

    • memory/4436-26-0x0000000004AF0000-0x0000000004B02000-memory.dmp

      Filesize

      72KB

    • memory/4436-28-0x0000000004AF0000-0x0000000004B02000-memory.dmp

      Filesize

      72KB

    • memory/4436-16-0x0000000004AF0000-0x0000000004B02000-memory.dmp

      Filesize

      72KB

    • memory/4436-18-0x0000000004AF0000-0x0000000004B02000-memory.dmp

      Filesize

      72KB

    • memory/4436-20-0x0000000004AF0000-0x0000000004B02000-memory.dmp

      Filesize

      72KB

    • memory/4436-22-0x0000000004AF0000-0x0000000004B02000-memory.dmp

      Filesize

      72KB

    • memory/4436-30-0x0000000004AF0000-0x0000000004B02000-memory.dmp

      Filesize

      72KB

    • memory/4436-32-0x0000000004AF0000-0x0000000004B02000-memory.dmp

      Filesize

      72KB

    • memory/4436-36-0x0000000004AF0000-0x0000000004B02000-memory.dmp

      Filesize

      72KB

    • memory/4436-38-0x0000000004AF0000-0x0000000004B02000-memory.dmp

      Filesize

      72KB

    • memory/4436-40-0x0000000004AF0000-0x0000000004B02000-memory.dmp

      Filesize

      72KB

    • memory/4436-42-0x0000000004AF0000-0x0000000004B02000-memory.dmp

      Filesize

      72KB

    • memory/4436-15-0x0000000004AF0000-0x0000000004B02000-memory.dmp

      Filesize

      72KB

    • memory/4436-13-0x0000000000400000-0x0000000002BB5000-memory.dmp

      Filesize

      39.7MB

    • memory/4436-14-0x0000000004AF0000-0x0000000004B08000-memory.dmp

      Filesize

      96KB

    • memory/4436-12-0x00000000072B0000-0x0000000007854000-memory.dmp

      Filesize

      5.6MB

    • memory/4436-11-0x00000000048B0000-0x00000000048CA000-memory.dmp

      Filesize

      104KB

    • memory/4436-10-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4436-9-0x0000000002C90000-0x0000000002CBD000-memory.dmp

      Filesize

      180KB

    • memory/4436-8-0x0000000002D80000-0x0000000002E80000-memory.dmp

      Filesize

      1024KB