Analysis

  • max time kernel
    140s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-11-2024 13:48

General

  • Target

    396b13a0a6cc1c09e169820a1fb8675f7df7198c18792dc14bf25df06dc6b26d.exe

  • Size

    479KB

  • MD5

    d51dadc0354cf8f0192b3dcd2f00b4e3

  • SHA1

    94156f83da9c16dc21aee1525973cfe268cfd38d

  • SHA256

    396b13a0a6cc1c09e169820a1fb8675f7df7198c18792dc14bf25df06dc6b26d

  • SHA512

    d73245c292ef8b207b91b03623cb1e46b5487dad5d7291a561d8fb3c770aad33938800514009a1e87ac93fd71ddd4715e808cbd8b5c74e5198d17751b8f17784

  • SSDEEP

    12288:6Mr+y90yw6J4MGtbQR7PfXmyGvOnbd7Gdc:kyA6qZtUR7nWyVbb

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\396b13a0a6cc1c09e169820a1fb8675f7df7198c18792dc14bf25df06dc6b26d.exe
    "C:\Users\Admin\AppData\Local\Temp\396b13a0a6cc1c09e169820a1fb8675f7df7198c18792dc14bf25df06dc6b26d.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1136
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4239019.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4239019.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1480
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a9529822.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a9529822.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2152
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b5382645.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b5382645.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:3708

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4239019.exe

    Filesize

    307KB

    MD5

    a6cd56ff726ea65d281a56c01d288adb

    SHA1

    39d1e2c70237d1857b5e90ad79ee90b1fd68a938

    SHA256

    0c4442891d2acf3621360c3817a0d50b895524fa4e2d94e147805d8f3904f295

    SHA512

    c5605da4c07eb278b15d412b2f1c1ddd29fa85c98335319bde43eb9c304e87a1a845f8b46a569b16c07d73ff6c9e1820e20dc36de23b37f5c2254cf68cef9378

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a9529822.exe

    Filesize

    175KB

    MD5

    a5c214ff76db50be4a42f79d0d815525

    SHA1

    ec303e8dd8f83d16818b8d09c1dfdf45c8e13361

    SHA256

    5f761deab80ad2d9b9ae66652bc4eab9eef098f6b9230c1f4498848a8c4e872f

    SHA512

    80d594af1b09fabe2e1fe0840bc198f5a5e106467365d667ebce9d6c77c77564f8a685857dc61da3b68da0e58d6cb57bb97c305435c7a5ade7edeb17e33f6d54

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b5382645.exe

    Filesize

    136KB

    MD5

    3b665c032b24f1302c82c9097a5255a6

    SHA1

    139c2a0e577c232ce6e5539dc9ef2a11ad1e8e67

    SHA256

    d8aea963df1d5132e377df18ae19ef47e9375c7cbefebf01a935ecc67655c8df

    SHA512

    bc0b667aed19167fc4864d8209c360dabde56af2f5a8c785d84c5f900649d59eb92f6f8de89f2be81d3e87b321129e05f72d65ce6ee4c27e1ba10f25878271e2

  • memory/2152-36-0x0000000002520000-0x0000000002532000-memory.dmp

    Filesize

    72KB

  • memory/2152-50-0x0000000074660000-0x0000000074E10000-memory.dmp

    Filesize

    7.7MB

  • memory/2152-34-0x0000000002520000-0x0000000002532000-memory.dmp

    Filesize

    72KB

  • memory/2152-17-0x0000000074660000-0x0000000074E10000-memory.dmp

    Filesize

    7.7MB

  • memory/2152-20-0x0000000074660000-0x0000000074E10000-memory.dmp

    Filesize

    7.7MB

  • memory/2152-19-0x0000000002520000-0x0000000002538000-memory.dmp

    Filesize

    96KB

  • memory/2152-26-0x0000000002520000-0x0000000002532000-memory.dmp

    Filesize

    72KB

  • memory/2152-48-0x0000000002520000-0x0000000002532000-memory.dmp

    Filesize

    72KB

  • memory/2152-47-0x0000000002520000-0x0000000002532000-memory.dmp

    Filesize

    72KB

  • memory/2152-44-0x0000000002520000-0x0000000002532000-memory.dmp

    Filesize

    72KB

  • memory/2152-42-0x0000000002520000-0x0000000002532000-memory.dmp

    Filesize

    72KB

  • memory/2152-40-0x0000000002520000-0x0000000002532000-memory.dmp

    Filesize

    72KB

  • memory/2152-38-0x0000000002520000-0x0000000002532000-memory.dmp

    Filesize

    72KB

  • memory/2152-15-0x0000000002040000-0x000000000205A000-memory.dmp

    Filesize

    104KB

  • memory/2152-18-0x0000000004BC0000-0x0000000005164000-memory.dmp

    Filesize

    5.6MB

  • memory/2152-32-0x0000000002520000-0x0000000002532000-memory.dmp

    Filesize

    72KB

  • memory/2152-16-0x0000000074660000-0x0000000074E10000-memory.dmp

    Filesize

    7.7MB

  • memory/2152-28-0x0000000002520000-0x0000000002532000-memory.dmp

    Filesize

    72KB

  • memory/2152-24-0x0000000002520000-0x0000000002532000-memory.dmp

    Filesize

    72KB

  • memory/2152-22-0x0000000002520000-0x0000000002532000-memory.dmp

    Filesize

    72KB

  • memory/2152-21-0x0000000002520000-0x0000000002532000-memory.dmp

    Filesize

    72KB

  • memory/2152-49-0x000000007466E000-0x000000007466F000-memory.dmp

    Filesize

    4KB

  • memory/2152-30-0x0000000002520000-0x0000000002532000-memory.dmp

    Filesize

    72KB

  • memory/2152-52-0x0000000074660000-0x0000000074E10000-memory.dmp

    Filesize

    7.7MB

  • memory/2152-14-0x000000007466E000-0x000000007466F000-memory.dmp

    Filesize

    4KB

  • memory/3708-56-0x0000000000930000-0x0000000000958000-memory.dmp

    Filesize

    160KB

  • memory/3708-57-0x0000000007BC0000-0x00000000081D8000-memory.dmp

    Filesize

    6.1MB

  • memory/3708-58-0x0000000007640000-0x0000000007652000-memory.dmp

    Filesize

    72KB

  • memory/3708-59-0x00000000077B0000-0x00000000078BA000-memory.dmp

    Filesize

    1.0MB

  • memory/3708-60-0x00000000076E0000-0x000000000771C000-memory.dmp

    Filesize

    240KB

  • memory/3708-61-0x0000000002930000-0x000000000297C000-memory.dmp

    Filesize

    304KB