Analysis

  • max time kernel
    113s
  • max time network
    115s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2024 20:18

General

  • Target

    2bbb57df78c445565781f4ddc0b007609cc4a244766ea52f6d947fcefb85ee0aN.exe

  • Size

    707KB

  • MD5

    8b4f9d497d9838b4249244b3b0628280

  • SHA1

    bbc6492652ba3dbe010b2cec5a4e08dc3e283fe7

  • SHA256

    2bbb57df78c445565781f4ddc0b007609cc4a244766ea52f6d947fcefb85ee0a

  • SHA512

    bcdef7e2dbe6d02b26d286eabf4c0c4aa45ebba83dd84d3b7c38776628009299dc111cc20e6b2001b498a7e1d4227bd8c56ab78dc930377c9c2a93af41c3ce59

  • SSDEEP

    12288:F1y90G2KYdOU3p4PoydS6evMI/jqmCTx/XtyuncIbAocx+u6qScHUE:3yYFkUZ4XSvxfCTRLn1AoUH

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2bbb57df78c445565781f4ddc0b007609cc4a244766ea52f6d947fcefb85ee0aN.exe
    "C:\Users\Admin\AppData\Local\Temp\2bbb57df78c445565781f4ddc0b007609cc4a244766ea52f6d947fcefb85ee0aN.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2224
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un825031.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un825031.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:624
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr241228.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr241228.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2264
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 1084
          4⤵
          • Program crash
          PID:440
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu749000.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu749000.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:3928
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2264 -ip 2264
    1⤵
      PID:1040

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un825031.exe

      Filesize

      553KB

      MD5

      a64d6be1090c18050fabe486f6d8da6b

      SHA1

      c5ca20866816bd477dcb0906da0ac8870aa3b00e

      SHA256

      745d48febd007d5f6700deff6d7536b690238f423d866337732c8e3caffc0392

      SHA512

      68fea40f7fc2879dd43be1347a73e35de03f11dc142b295ce7700a7a5dd9ebc3faa9fb1f7b00dce85bbecc7ee573d7e793a75c52d9c2e3012f2bac8805adc0d7

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr241228.exe

      Filesize

      278KB

      MD5

      2c2b0b24ca9a2259792f045cf300cb8b

      SHA1

      11acf749f90e40d3f518afaa1433c1405986c683

      SHA256

      6c7e987dc5aff987208f18e4f57849b8611d6341e8b02c8776bb88270fe0180a

      SHA512

      976a306172870a553012b2fb5799d7d102007f2fff264deadbeeb5fc71d2d323a9e292df246ae4de9c35581cb5f40a4ba43252a453313b049bb70f961f7b57c5

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu749000.exe

      Filesize

      360KB

      MD5

      ef5c9bc4ae442d3733135f5ca5928c86

      SHA1

      2da72bf4b273db116529cf0e9e201a0f6ce5d4be

      SHA256

      9e223a7975df03fc9e575765af63ce9c373979ba5d4b297cd86c8dbb51c00be1

      SHA512

      1a8cd19f93cd5078ab5677b7090d881f386771db3c1b4b11768eb0fb9b23e1b607a690f6b639535235cb28ff831cd9c62915929b92d213aa053f58cfcc2ae0d6

    • memory/2264-15-0x0000000002E40000-0x0000000002F40000-memory.dmp

      Filesize

      1024KB

    • memory/2264-16-0x0000000002CF0000-0x0000000002D1D000-memory.dmp

      Filesize

      180KB

    • memory/2264-17-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2264-18-0x0000000004EA0000-0x0000000004EBA000-memory.dmp

      Filesize

      104KB

    • memory/2264-19-0x00000000072D0000-0x0000000007874000-memory.dmp

      Filesize

      5.6MB

    • memory/2264-20-0x0000000004F30000-0x0000000004F48000-memory.dmp

      Filesize

      96KB

    • memory/2264-48-0x0000000004F30000-0x0000000004F42000-memory.dmp

      Filesize

      72KB

    • memory/2264-46-0x0000000004F30000-0x0000000004F42000-memory.dmp

      Filesize

      72KB

    • memory/2264-44-0x0000000004F30000-0x0000000004F42000-memory.dmp

      Filesize

      72KB

    • memory/2264-42-0x0000000004F30000-0x0000000004F42000-memory.dmp

      Filesize

      72KB

    • memory/2264-40-0x0000000004F30000-0x0000000004F42000-memory.dmp

      Filesize

      72KB

    • memory/2264-39-0x0000000004F30000-0x0000000004F42000-memory.dmp

      Filesize

      72KB

    • memory/2264-36-0x0000000004F30000-0x0000000004F42000-memory.dmp

      Filesize

      72KB

    • memory/2264-34-0x0000000004F30000-0x0000000004F42000-memory.dmp

      Filesize

      72KB

    • memory/2264-32-0x0000000004F30000-0x0000000004F42000-memory.dmp

      Filesize

      72KB

    • memory/2264-30-0x0000000004F30000-0x0000000004F42000-memory.dmp

      Filesize

      72KB

    • memory/2264-28-0x0000000004F30000-0x0000000004F42000-memory.dmp

      Filesize

      72KB

    • memory/2264-26-0x0000000004F30000-0x0000000004F42000-memory.dmp

      Filesize

      72KB

    • memory/2264-24-0x0000000004F30000-0x0000000004F42000-memory.dmp

      Filesize

      72KB

    • memory/2264-22-0x0000000004F30000-0x0000000004F42000-memory.dmp

      Filesize

      72KB

    • memory/2264-21-0x0000000004F30000-0x0000000004F42000-memory.dmp

      Filesize

      72KB

    • memory/2264-49-0x0000000002E40000-0x0000000002F40000-memory.dmp

      Filesize

      1024KB

    • memory/2264-51-0x0000000002CF0000-0x0000000002D1D000-memory.dmp

      Filesize

      180KB

    • memory/2264-50-0x0000000000400000-0x0000000002B9F000-memory.dmp

      Filesize

      39.6MB

    • memory/2264-52-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2264-55-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2264-54-0x0000000000400000-0x0000000002B9F000-memory.dmp

      Filesize

      39.6MB

    • memory/3928-60-0x0000000007240000-0x000000000727C000-memory.dmp

      Filesize

      240KB

    • memory/3928-61-0x0000000007890000-0x00000000078CA000-memory.dmp

      Filesize

      232KB

    • memory/3928-65-0x0000000007890000-0x00000000078C5000-memory.dmp

      Filesize

      212KB

    • memory/3928-76-0x0000000007890000-0x00000000078C5000-memory.dmp

      Filesize

      212KB

    • memory/3928-95-0x0000000007890000-0x00000000078C5000-memory.dmp

      Filesize

      212KB

    • memory/3928-93-0x0000000007890000-0x00000000078C5000-memory.dmp

      Filesize

      212KB

    • memory/3928-91-0x0000000007890000-0x00000000078C5000-memory.dmp

      Filesize

      212KB

    • memory/3928-89-0x0000000007890000-0x00000000078C5000-memory.dmp

      Filesize

      212KB

    • memory/3928-87-0x0000000007890000-0x00000000078C5000-memory.dmp

      Filesize

      212KB

    • memory/3928-83-0x0000000007890000-0x00000000078C5000-memory.dmp

      Filesize

      212KB

    • memory/3928-82-0x0000000007890000-0x00000000078C5000-memory.dmp

      Filesize

      212KB

    • memory/3928-79-0x0000000007890000-0x00000000078C5000-memory.dmp

      Filesize

      212KB

    • memory/3928-77-0x0000000007890000-0x00000000078C5000-memory.dmp

      Filesize

      212KB

    • memory/3928-73-0x0000000007890000-0x00000000078C5000-memory.dmp

      Filesize

      212KB

    • memory/3928-72-0x0000000007890000-0x00000000078C5000-memory.dmp

      Filesize

      212KB

    • memory/3928-69-0x0000000007890000-0x00000000078C5000-memory.dmp

      Filesize

      212KB

    • memory/3928-67-0x0000000007890000-0x00000000078C5000-memory.dmp

      Filesize

      212KB

    • memory/3928-85-0x0000000007890000-0x00000000078C5000-memory.dmp

      Filesize

      212KB

    • memory/3928-63-0x0000000007890000-0x00000000078C5000-memory.dmp

      Filesize

      212KB

    • memory/3928-62-0x0000000007890000-0x00000000078C5000-memory.dmp

      Filesize

      212KB

    • memory/3928-854-0x0000000009DC0000-0x000000000A3D8000-memory.dmp

      Filesize

      6.1MB

    • memory/3928-855-0x000000000A480000-0x000000000A492000-memory.dmp

      Filesize

      72KB

    • memory/3928-856-0x000000000A4A0000-0x000000000A5AA000-memory.dmp

      Filesize

      1.0MB

    • memory/3928-857-0x000000000A5C0000-0x000000000A5FC000-memory.dmp

      Filesize

      240KB

    • memory/3928-858-0x0000000004D10000-0x0000000004D5C000-memory.dmp

      Filesize

      304KB