Analysis

  • max time kernel
    140s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-11-2024 13:45

General

  • Target

    63dcaf2e9abd3c4c6c69bf00b1a15d4f03f8b8061c41fa1187cf496cdaa7be57.exe

  • Size

    568KB

  • MD5

    edf661d65584cea7826690b6eb855c45

  • SHA1

    8b1088f3c94a5f84a73ea9bc2bc03ee63eaac5c3

  • SHA256

    63dcaf2e9abd3c4c6c69bf00b1a15d4f03f8b8061c41fa1187cf496cdaa7be57

  • SHA512

    6b77003e17a2aa8b344e8539b07efffe9a67995c4f648ac9a6c07c43a3a2cbb50b0b9a15d817a0a54fb1c8f8af217d655c36b092e2fe999351d6942279d6770d

  • SSDEEP

    12288:Ay90KkTVaabXfRD8vEfz79WI8XFRhXZtRhveHcphybRpCXxaWhBr:AyfkTV9Cv6f9W1FhebOX0Wvr

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\63dcaf2e9abd3c4c6c69bf00b1a15d4f03f8b8061c41fa1187cf496cdaa7be57.exe
    "C:\Users\Admin\AppData\Local\Temp\63dcaf2e9abd3c4c6c69bf00b1a15d4f03f8b8061c41fa1187cf496cdaa7be57.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4836
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zigN6936.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zigN6936.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4460
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it135526.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it135526.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3924
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp388609.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp388609.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:836

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zigN6936.exe

    Filesize

    414KB

    MD5

    b6c8f9af27b4ff9a041172fb51fc2140

    SHA1

    27064834921164776b58150a65000951c3c9803b

    SHA256

    2b68ab5a62ffd0ca2594831de8f706e6401612a4d332a6deb91851bf639a5e5d

    SHA512

    584d79daf535b931284f0a7738b8d803cfbf0f6931ea48beaefea1f5942cc2cf3979ce21195dfe9cf8bc15f944ba106730adf8d76e3716410bbfd8f0c3ad8d69

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it135526.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp388609.exe

    Filesize

    343KB

    MD5

    4143004c666c35da6ea0a342abbdc64f

    SHA1

    41412aab0d83c275ebae63f270b6f924af3f25bd

    SHA256

    fc7bd5f9ae90a493f79e7c5f9d06e2d981773f6e39c2b60b747bec1be716cc30

    SHA512

    396787c161cdb4446ebe3e6d22874f79830bde059155e0d4d85651fcc52c31460a8e18e5ccc1ba98fd64805edbb860e2e682c41b92f1d6ee3ad6bfecbd9e85bf

  • memory/836-88-0x0000000002370000-0x00000000023A5000-memory.dmp

    Filesize

    212KB

  • memory/836-22-0x00000000022F0000-0x000000000232C000-memory.dmp

    Filesize

    240KB

  • memory/836-821-0x00000000020B0000-0x00000000020FC000-memory.dmp

    Filesize

    304KB

  • memory/836-84-0x0000000002370000-0x00000000023A5000-memory.dmp

    Filesize

    212KB

  • memory/836-23-0x0000000004D00000-0x00000000052A4000-memory.dmp

    Filesize

    5.6MB

  • memory/836-24-0x0000000002370000-0x00000000023AA000-memory.dmp

    Filesize

    232KB

  • memory/836-40-0x0000000002370000-0x00000000023A5000-memory.dmp

    Filesize

    212KB

  • memory/836-42-0x0000000002370000-0x00000000023A5000-memory.dmp

    Filesize

    212KB

  • memory/836-38-0x0000000002370000-0x00000000023A5000-memory.dmp

    Filesize

    212KB

  • memory/836-36-0x0000000002370000-0x00000000023A5000-memory.dmp

    Filesize

    212KB

  • memory/836-86-0x0000000002370000-0x00000000023A5000-memory.dmp

    Filesize

    212KB

  • memory/836-32-0x0000000002370000-0x00000000023A5000-memory.dmp

    Filesize

    212KB

  • memory/836-82-0x0000000002370000-0x00000000023A5000-memory.dmp

    Filesize

    212KB

  • memory/836-70-0x0000000002370000-0x00000000023A5000-memory.dmp

    Filesize

    212KB

  • memory/836-56-0x0000000002370000-0x00000000023A5000-memory.dmp

    Filesize

    212KB

  • memory/836-30-0x0000000002370000-0x00000000023A5000-memory.dmp

    Filesize

    212KB

  • memory/836-28-0x0000000002370000-0x00000000023A5000-memory.dmp

    Filesize

    212KB

  • memory/836-26-0x0000000002370000-0x00000000023A5000-memory.dmp

    Filesize

    212KB

  • memory/836-25-0x0000000002370000-0x00000000023A5000-memory.dmp

    Filesize

    212KB

  • memory/836-820-0x0000000002800000-0x000000000283C000-memory.dmp

    Filesize

    240KB

  • memory/836-34-0x0000000002370000-0x00000000023A5000-memory.dmp

    Filesize

    212KB

  • memory/836-819-0x0000000007D50000-0x0000000007E5A000-memory.dmp

    Filesize

    1.0MB

  • memory/836-80-0x0000000002370000-0x00000000023A5000-memory.dmp

    Filesize

    212KB

  • memory/836-78-0x0000000002370000-0x00000000023A5000-memory.dmp

    Filesize

    212KB

  • memory/836-76-0x0000000002370000-0x00000000023A5000-memory.dmp

    Filesize

    212KB

  • memory/836-74-0x0000000002370000-0x00000000023A5000-memory.dmp

    Filesize

    212KB

  • memory/836-72-0x0000000002370000-0x00000000023A5000-memory.dmp

    Filesize

    212KB

  • memory/836-68-0x0000000002370000-0x00000000023A5000-memory.dmp

    Filesize

    212KB

  • memory/836-66-0x0000000002370000-0x00000000023A5000-memory.dmp

    Filesize

    212KB

  • memory/836-64-0x0000000002370000-0x00000000023A5000-memory.dmp

    Filesize

    212KB

  • memory/836-62-0x0000000002370000-0x00000000023A5000-memory.dmp

    Filesize

    212KB

  • memory/836-60-0x0000000002370000-0x00000000023A5000-memory.dmp

    Filesize

    212KB

  • memory/836-58-0x0000000002370000-0x00000000023A5000-memory.dmp

    Filesize

    212KB

  • memory/836-54-0x0000000002370000-0x00000000023A5000-memory.dmp

    Filesize

    212KB

  • memory/836-52-0x0000000002370000-0x00000000023A5000-memory.dmp

    Filesize

    212KB

  • memory/836-50-0x0000000002370000-0x00000000023A5000-memory.dmp

    Filesize

    212KB

  • memory/836-48-0x0000000002370000-0x00000000023A5000-memory.dmp

    Filesize

    212KB

  • memory/836-46-0x0000000002370000-0x00000000023A5000-memory.dmp

    Filesize

    212KB

  • memory/836-44-0x0000000002370000-0x00000000023A5000-memory.dmp

    Filesize

    212KB

  • memory/836-817-0x0000000007730000-0x0000000007D48000-memory.dmp

    Filesize

    6.1MB

  • memory/836-818-0x00000000026B0000-0x00000000026C2000-memory.dmp

    Filesize

    72KB

  • memory/3924-17-0x00007FF992CE3000-0x00007FF992CE5000-memory.dmp

    Filesize

    8KB

  • memory/3924-14-0x00007FF992CE3000-0x00007FF992CE5000-memory.dmp

    Filesize

    8KB

  • memory/3924-15-0x0000000000590000-0x000000000059A000-memory.dmp

    Filesize

    40KB