Analysis

  • max time kernel
    138s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-05-2024 10:53

General

  • Target

    6aa8d5d0d6b96fe2a165ee46c9e31059a444b4fae6660eee669539f88bf869df.exe

  • Size

    308KB

  • MD5

    d5f61fc6a8c52e0a93619aa88abf0823

  • SHA1

    e8ab904b74f798424102a1739f810f09f1987d60

  • SHA256

    6aa8d5d0d6b96fe2a165ee46c9e31059a444b4fae6660eee669539f88bf869df

  • SHA512

    3b5a5f2a02c8788cb4e7245073766e30d3bbb4cb635ae648502d80ceed32a876b0103bc90ecc4fb1749f84d354cc3ba91034aad95f3fd1ea82fe12eca0b6b85f

  • SSDEEP

    6144:K0y+bnr+jp0yN90QE3lEY+zbPsn4Jkb2LPrKRc57uiL4P7:MMrby901b+zYebLPrKG5fL8

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6aa8d5d0d6b96fe2a165ee46c9e31059a444b4fae6660eee669539f88bf869df.exe
    "C:\Users\Admin\AppData\Local\Temp\6aa8d5d0d6b96fe2a165ee46c9e31059a444b4fae6660eee669539f88bf869df.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2260
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k6912702.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k6912702.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4160
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l1624569.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l1624569.exe
      2⤵
      • Executes dropped EXE
      PID:2296
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4036,i,10373433614523925616,13586256558317053467,262144 --variations-seed-version --mojo-platform-channel-handle=4204 /prefetch:8
    1⤵
      PID:3732

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k6912702.exe

      Filesize

      175KB

      MD5

      ddacfe0ab3780ff5989c3f2c32e681cd

      SHA1

      ffeeedaf65d9e6d3634d263d6a42a703777d567e

      SHA256

      3206d9f91f805541bfe3ef067f2b41572a9c7c558db98e8473bb5d7dde6bca05

      SHA512

      bfd8c9a4909bdeca40450a24570fe6031a7c23cc2586c913f944ba2242121b8aad3133fcdbaf55546a50302fbd0894229becc12f4d721848903a5f29aa88e13f

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l1624569.exe

      Filesize

      136KB

      MD5

      100120265e59b27a64574c737cd3dd59

      SHA1

      6d525c91ab327ab0fa09dd23e50fb11198d0c8f0

      SHA256

      20e7be4a67709e8af75acd6d7f91f7818e1b85e7cc10690c9904f968f207c46b

      SHA512

      203545141f943c1e5d81b2c105a0db41a49eb9fec335e8bb7cfd63529cfc50a9ce8a7dc49b5059ad7dd7b135a6796dd5c7665b31c6a916a2ccdab31edf08bee4

    • memory/2296-53-0x0000000007780000-0x00000000077CC000-memory.dmp

      Filesize

      304KB

    • memory/2296-52-0x0000000007740000-0x000000000777C000-memory.dmp

      Filesize

      240KB

    • memory/2296-51-0x0000000007810000-0x000000000791A000-memory.dmp

      Filesize

      1.0MB

    • memory/2296-50-0x00000000076E0000-0x00000000076F2000-memory.dmp

      Filesize

      72KB

    • memory/2296-49-0x0000000007CE0000-0x00000000082F8000-memory.dmp

      Filesize

      6.1MB

    • memory/2296-47-0x0000000000970000-0x0000000000998000-memory.dmp

      Filesize

      160KB

    • memory/2296-48-0x0000000074160000-0x000000007420B000-memory.dmp

      Filesize

      684KB

    • memory/4160-39-0x0000000004980000-0x0000000004992000-memory.dmp

      Filesize

      72KB

    • memory/4160-12-0x0000000004980000-0x0000000004992000-memory.dmp

      Filesize

      72KB

    • memory/4160-33-0x0000000004980000-0x0000000004992000-memory.dmp

      Filesize

      72KB

    • memory/4160-31-0x0000000004980000-0x0000000004992000-memory.dmp

      Filesize

      72KB

    • memory/4160-29-0x0000000004980000-0x0000000004992000-memory.dmp

      Filesize

      72KB

    • memory/4160-27-0x0000000004980000-0x0000000004992000-memory.dmp

      Filesize

      72KB

    • memory/4160-25-0x0000000004980000-0x0000000004992000-memory.dmp

      Filesize

      72KB

    • memory/4160-23-0x0000000004980000-0x0000000004992000-memory.dmp

      Filesize

      72KB

    • memory/4160-19-0x0000000004980000-0x0000000004992000-memory.dmp

      Filesize

      72KB

    • memory/4160-17-0x0000000004980000-0x0000000004992000-memory.dmp

      Filesize

      72KB

    • memory/4160-15-0x0000000004980000-0x0000000004992000-memory.dmp

      Filesize

      72KB

    • memory/4160-35-0x0000000004980000-0x0000000004992000-memory.dmp

      Filesize

      72KB

    • memory/4160-40-0x00000000741B0000-0x0000000074960000-memory.dmp

      Filesize

      7.7MB

    • memory/4160-41-0x00000000741B0000-0x0000000074960000-memory.dmp

      Filesize

      7.7MB

    • memory/4160-43-0x00000000741B0000-0x0000000074960000-memory.dmp

      Filesize

      7.7MB

    • memory/4160-37-0x0000000004980000-0x0000000004992000-memory.dmp

      Filesize

      72KB

    • memory/4160-21-0x0000000004980000-0x0000000004992000-memory.dmp

      Filesize

      72KB

    • memory/4160-13-0x0000000004980000-0x0000000004992000-memory.dmp

      Filesize

      72KB

    • memory/4160-11-0x00000000741B0000-0x0000000074960000-memory.dmp

      Filesize

      7.7MB

    • memory/4160-10-0x0000000004980000-0x0000000004998000-memory.dmp

      Filesize

      96KB

    • memory/4160-9-0x0000000004AE0000-0x0000000005084000-memory.dmp

      Filesize

      5.6MB

    • memory/4160-8-0x0000000002470000-0x000000000248A000-memory.dmp

      Filesize

      104KB

    • memory/4160-7-0x00000000741BE000-0x00000000741BF000-memory.dmp

      Filesize

      4KB