Analysis

  • max time kernel
    138s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-05-2024 07:04

General

  • Target

    94cb7f4064a3c804b1fa19c3f5dc17ae361ced8153e20bd02842c65e16d1e3ae.exe

  • Size

    307KB

  • MD5

    24113d3ed2dc8ba8789b2874addb0750

  • SHA1

    2901dff1dd1b5b619d48c8d04d22c185922e651b

  • SHA256

    94cb7f4064a3c804b1fa19c3f5dc17ae361ced8153e20bd02842c65e16d1e3ae

  • SHA512

    409754870b1cf18269d84a798f69e11cb54540d12217fc0674524ef0e3d42ce38d199d45b7e1b7cb96a70fff87704561b6208bb58bc2628881b9a3d7422aecc7

  • SSDEEP

    6144:Kxy+bnr++p0yN90QEA5F5OYc1u31g4TBylzQbR/JOF:HMriy90mxc1u31TTEtQb1JOF

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\94cb7f4064a3c804b1fa19c3f5dc17ae361ced8153e20bd02842c65e16d1e3ae.exe
    "C:\Users\Admin\AppData\Local\Temp\94cb7f4064a3c804b1fa19c3f5dc17ae361ced8153e20bd02842c65e16d1e3ae.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k8916177.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k8916177.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1960
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l7529087.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l7529087.exe
      2⤵
      • Executes dropped EXE
      PID:4188

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k8916177.exe

    Filesize

    175KB

    MD5

    a488df49a762065f75f41ee76c2215b4

    SHA1

    6ffd0bf006ca60251cf8b298891d317693885fe9

    SHA256

    cf8fd74e3f74fb3dafb881e7070287a7ad77296cbaab59a0b8968de37365c0d3

    SHA512

    5480aa133771076a21c984512f42a9020b012f7735960b05de7908f7bc13a8944bfcdaa4a28415ac6395e4f86e96c29251dbae9284917ce7e23eb623a79477f3

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l7529087.exe

    Filesize

    136KB

    MD5

    ea7424a74eacf1d89358ccbde8484098

    SHA1

    d66cac767a565053916ba6604ca5272d2d0e17aa

    SHA256

    ed28be548a5ca5d75c2bf5ec47ba896d4f4e6916abee3cf04dca41d9fd87249a

    SHA512

    c50b3c66646a429830eb4c90fff4bacf764c9cc4ced25f1b854b3d77a1a27e9aebc6d1c28330062e4bc2adc0a603bc75a5fe4be6d7a64449a7664f8d2ffb70fc

  • memory/1960-41-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/1960-7-0x0000000073EFE000-0x0000000073EFF000-memory.dmp

    Filesize

    4KB

  • memory/1960-25-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/1960-12-0x0000000004980000-0x0000000004998000-memory.dmp

    Filesize

    96KB

  • memory/1960-10-0x0000000004A50000-0x0000000004FF4000-memory.dmp

    Filesize

    5.6MB

  • memory/1960-13-0x0000000073EF0000-0x00000000746A0000-memory.dmp

    Filesize

    7.7MB

  • memory/1960-8-0x00000000020A0000-0x00000000020BA000-memory.dmp

    Filesize

    104KB

  • memory/1960-39-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/1960-37-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/1960-35-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/1960-33-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/1960-31-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/1960-29-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/1960-27-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/1960-11-0x0000000073EF0000-0x00000000746A0000-memory.dmp

    Filesize

    7.7MB

  • memory/1960-23-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/1960-9-0x0000000073EF0000-0x00000000746A0000-memory.dmp

    Filesize

    7.7MB

  • memory/1960-19-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/1960-17-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/1960-15-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/1960-14-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/1960-43-0x0000000073EF0000-0x00000000746A0000-memory.dmp

    Filesize

    7.7MB

  • memory/1960-21-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/4188-47-0x0000000000590000-0x00000000005B8000-memory.dmp

    Filesize

    160KB

  • memory/4188-48-0x0000000073EA0000-0x0000000073F4B000-memory.dmp

    Filesize

    684KB

  • memory/4188-49-0x0000000007860000-0x0000000007E78000-memory.dmp

    Filesize

    6.1MB

  • memory/4188-50-0x00000000072F0000-0x0000000007302000-memory.dmp

    Filesize

    72KB

  • memory/4188-51-0x0000000007420000-0x000000000752A000-memory.dmp

    Filesize

    1.0MB

  • memory/4188-52-0x0000000073EA0000-0x0000000073F4B000-memory.dmp

    Filesize

    684KB

  • memory/4188-53-0x0000000007350000-0x000000000738C000-memory.dmp

    Filesize

    240KB

  • memory/4188-54-0x0000000007390000-0x00000000073DC000-memory.dmp

    Filesize

    304KB