Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-11-2024 13:50

General

  • Target

    cfd131a850cb7a9398062dcb81a59ad52e73036160016e13d6f54f7a9f59d459.exe

  • Size

    806KB

  • MD5

    f071c42bce262478335cb9d20f31dd12

  • SHA1

    82207af11578b81ac141e9ee3ddd7846f553f12a

  • SHA256

    cfd131a850cb7a9398062dcb81a59ad52e73036160016e13d6f54f7a9f59d459

  • SHA512

    da5967565c16ce32ece134f72f6c6552dc8a5bdc8daec5caa84e5180b7a2209968ab6560819d8a8803f287d9b4f19c22b98a856098c45d97fd8f0fe790704032

  • SSDEEP

    12288:Zy90J+sV+6wRgkB5dwMhmpNkipDmhFix1FvkXR18jMaTs4zen4Bbpa:Zy4+UWgM5dRASqfNMaTjK4B4

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 4 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cfd131a850cb7a9398062dcb81a59ad52e73036160016e13d6f54f7a9f59d459.exe
    "C:\Users\Admin\AppData\Local\Temp\cfd131a850cb7a9398062dcb81a59ad52e73036160016e13d6f54f7a9f59d459.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3680
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziSf3156.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziSf3156.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2036
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zixe2189.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zixe2189.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:5096
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it145162.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it145162.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2076
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr822882.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr822882.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:1900

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziSf3156.exe

    Filesize

    558KB

    MD5

    b135c5aafc6f698d3819209c1998cbcc

    SHA1

    54b3000f8b4582dbb2aa954274031282b5815df0

    SHA256

    7c9eef205b608b3216b932dd6a09414e5c64a3b21ae947d73f9d8fa9e8f5b873

    SHA512

    6abe9bb3640fd548c14a71a11d5a6124de1b5fdd2f1a5047e0e772465574c6e8538b9c3a9760b33253ec8d53f458f94b943ab93cc0177e6f3d31c3bdf7b95d1a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zixe2189.exe

    Filesize

    404KB

    MD5

    1f2c684ecbc4ef0453a865262c66f167

    SHA1

    7329ce675fd6e3b96cf0fb63baac68d4e3e036fb

    SHA256

    ad67265cd1bf45edafb01f0f4586700337e24ded4ccce461cd9c10e983af7180

    SHA512

    3d6faac6dbd9bc2c8e4de5ad79e342db4ca6a383344ea4eac11b92adf142cae7d8d28f5d2a457b96aa7f6729c0d9d4e0876be220335539f4556f14a2ac5a2a73

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it145162.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr822882.exe

    Filesize

    361KB

    MD5

    2484f7748a014489a3348883e7b48b64

    SHA1

    6503800588d01d32bdf38b5a0af633d0549314e0

    SHA256

    8a33f8d7fdefd5bb3e437d12494ef58df6d433d46e4ed23e1a8ba4953724784b

    SHA512

    74fba93c01f1eaca433144407a808d86c5504f6c60aabf23cf20095d763887c368c97a381da8013ef0562bbccae494be80022f4404a12b930c8803210c9ed40a

  • memory/1900-69-0x0000000007770000-0x00000000077A5000-memory.dmp

    Filesize

    212KB

  • memory/1900-29-0x0000000007140000-0x000000000717C000-memory.dmp

    Filesize

    240KB

  • memory/1900-828-0x0000000006C70000-0x0000000006CBC000-memory.dmp

    Filesize

    304KB

  • memory/1900-67-0x0000000007770000-0x00000000077A5000-memory.dmp

    Filesize

    212KB

  • memory/1900-30-0x0000000007180000-0x0000000007724000-memory.dmp

    Filesize

    5.6MB

  • memory/1900-31-0x0000000007770000-0x00000000077AA000-memory.dmp

    Filesize

    232KB

  • memory/1900-37-0x0000000007770000-0x00000000077A5000-memory.dmp

    Filesize

    212KB

  • memory/1900-39-0x0000000007770000-0x00000000077A5000-memory.dmp

    Filesize

    212KB

  • memory/1900-85-0x0000000007770000-0x00000000077A5000-memory.dmp

    Filesize

    212KB

  • memory/1900-83-0x0000000007770000-0x00000000077A5000-memory.dmp

    Filesize

    212KB

  • memory/1900-827-0x000000000A490000-0x000000000A4CC000-memory.dmp

    Filesize

    240KB

  • memory/1900-93-0x0000000007770000-0x00000000077A5000-memory.dmp

    Filesize

    212KB

  • memory/1900-65-0x0000000007770000-0x00000000077A5000-memory.dmp

    Filesize

    212KB

  • memory/1900-89-0x0000000007770000-0x00000000077A5000-memory.dmp

    Filesize

    212KB

  • memory/1900-87-0x0000000007770000-0x00000000077A5000-memory.dmp

    Filesize

    212KB

  • memory/1900-81-0x0000000007770000-0x00000000077A5000-memory.dmp

    Filesize

    212KB

  • memory/1900-79-0x0000000007770000-0x00000000077A5000-memory.dmp

    Filesize

    212KB

  • memory/1900-77-0x0000000007770000-0x00000000077A5000-memory.dmp

    Filesize

    212KB

  • memory/1900-75-0x0000000007770000-0x00000000077A5000-memory.dmp

    Filesize

    212KB

  • memory/1900-73-0x0000000007770000-0x00000000077A5000-memory.dmp

    Filesize

    212KB

  • memory/1900-95-0x0000000007770000-0x00000000077A5000-memory.dmp

    Filesize

    212KB

  • memory/1900-826-0x000000000A360000-0x000000000A46A000-memory.dmp

    Filesize

    1.0MB

  • memory/1900-91-0x0000000007770000-0x00000000077A5000-memory.dmp

    Filesize

    212KB

  • memory/1900-63-0x0000000007770000-0x00000000077A5000-memory.dmp

    Filesize

    212KB

  • memory/1900-61-0x0000000007770000-0x00000000077A5000-memory.dmp

    Filesize

    212KB

  • memory/1900-59-0x0000000007770000-0x00000000077A5000-memory.dmp

    Filesize

    212KB

  • memory/1900-57-0x0000000007770000-0x00000000077A5000-memory.dmp

    Filesize

    212KB

  • memory/1900-53-0x0000000007770000-0x00000000077A5000-memory.dmp

    Filesize

    212KB

  • memory/1900-51-0x0000000007770000-0x00000000077A5000-memory.dmp

    Filesize

    212KB

  • memory/1900-49-0x0000000007770000-0x00000000077A5000-memory.dmp

    Filesize

    212KB

  • memory/1900-47-0x0000000007770000-0x00000000077A5000-memory.dmp

    Filesize

    212KB

  • memory/1900-45-0x0000000007770000-0x00000000077A5000-memory.dmp

    Filesize

    212KB

  • memory/1900-43-0x0000000007770000-0x00000000077A5000-memory.dmp

    Filesize

    212KB

  • memory/1900-42-0x0000000007770000-0x00000000077A5000-memory.dmp

    Filesize

    212KB

  • memory/1900-71-0x0000000007770000-0x00000000077A5000-memory.dmp

    Filesize

    212KB

  • memory/1900-55-0x0000000007770000-0x00000000077A5000-memory.dmp

    Filesize

    212KB

  • memory/1900-35-0x0000000007770000-0x00000000077A5000-memory.dmp

    Filesize

    212KB

  • memory/1900-33-0x0000000007770000-0x00000000077A5000-memory.dmp

    Filesize

    212KB

  • memory/1900-32-0x0000000007770000-0x00000000077A5000-memory.dmp

    Filesize

    212KB

  • memory/1900-824-0x0000000009C80000-0x000000000A298000-memory.dmp

    Filesize

    6.1MB

  • memory/1900-825-0x000000000A340000-0x000000000A352000-memory.dmp

    Filesize

    72KB

  • memory/2076-23-0x00007FFDEECB3000-0x00007FFDEECB5000-memory.dmp

    Filesize

    8KB

  • memory/2076-21-0x00007FFDEECB3000-0x00007FFDEECB5000-memory.dmp

    Filesize

    8KB

  • memory/2076-22-0x0000000000F00000-0x0000000000F0A000-memory.dmp

    Filesize

    40KB