Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-11-2024 13:12

General

  • Target

    ce130bd208f35611bf7d9a6484ca33869cb619a3756913e66a0ae69eb6ab751a.exe

  • Size

    479KB

  • MD5

    695603f32c753c511f41a6da7f7395a3

  • SHA1

    eeddf0de7649347d83cb148d637226e0bb97ba89

  • SHA256

    ce130bd208f35611bf7d9a6484ca33869cb619a3756913e66a0ae69eb6ab751a

  • SHA512

    88c11ccf756242b8543a1a667654e312c1e123b9c2a613a8d6f78337945fae6481be7f290175ca45dda029db0d5c45a0e3f84df8cbdf5a91c739404b5622da3a

  • SSDEEP

    6144:Kxy+bnr+wp0yN90QE1cJpJ0B4KYIExFAOaoYX0S+GYfUFnq8ysycUYLxJAVoxb+K:nMrMy90QDJFKeaoM0tI8tYLxYooK

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ce130bd208f35611bf7d9a6484ca33869cb619a3756913e66a0ae69eb6ab751a.exe
    "C:\Users\Admin\AppData\Local\Temp\ce130bd208f35611bf7d9a6484ca33869cb619a3756913e66a0ae69eb6ab751a.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1664
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2640431.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2640431.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3516
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k4237128.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k4237128.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3456
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2603947.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2603947.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4488

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2640431.exe

    Filesize

    307KB

    MD5

    f1cdac57ef7cdd31243d2820a955a5a2

    SHA1

    dc037db41e0f9dde382adae80acbca0b0a008ab3

    SHA256

    0d520294c599feba740354f81b2e360c37274b1e67daf6a021714735420664c1

    SHA512

    6d4419132ccbccfebf9611f881a2e16b1cdbb52338050b670a20e65799cdbf79fc26515b2dc3b4cfcf30c61f8d55d762b4d5f35802f2725ae39110db92f8801e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k4237128.exe

    Filesize

    175KB

    MD5

    05e8062565c44a2831f08f568280bde4

    SHA1

    723009922d727b19da2f16ac032d6410efaff9b8

    SHA256

    f023989fadd6acbf6c64c42ec191b011e0e8869b4a0f686daf85fa115da80045

    SHA512

    af925c4b27e6d129184e0b0439bc4bc6f74489f45ed39db61e10af7a7bea0a2759aadd7ba973366245fa594bf9dcd849c1e869c3e9d06efc9191c1f7f9b6b64a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2603947.exe

    Filesize

    136KB

    MD5

    e90bb87eb40510f903806962a6c95124

    SHA1

    448e9dd5808cfbf884e892e137a0544e9d70d555

    SHA256

    e6e73da5f74b905c307e969328c0b68478d53c7844622b9c497c408da7909183

    SHA512

    9f215345f4bec1ead0e8427f597edb80016e7842b9da3c1084e8799a35ba510fe5b3a969c065fe433bef563dd86b332ede6cea6c450a044ce26c57b3b9530f21

  • memory/3456-34-0x0000000005080000-0x0000000005092000-memory.dmp

    Filesize

    72KB

  • memory/3456-50-0x0000000074B40000-0x00000000752F0000-memory.dmp

    Filesize

    7.7MB

  • memory/3456-32-0x0000000005080000-0x0000000005092000-memory.dmp

    Filesize

    72KB

  • memory/3456-19-0x0000000074B40000-0x00000000752F0000-memory.dmp

    Filesize

    7.7MB

  • memory/3456-18-0x0000000005080000-0x0000000005098000-memory.dmp

    Filesize

    96KB

  • memory/3456-20-0x0000000074B40000-0x00000000752F0000-memory.dmp

    Filesize

    7.7MB

  • memory/3456-48-0x0000000005080000-0x0000000005092000-memory.dmp

    Filesize

    72KB

  • memory/3456-46-0x0000000005080000-0x0000000005092000-memory.dmp

    Filesize

    72KB

  • memory/3456-44-0x0000000005080000-0x0000000005092000-memory.dmp

    Filesize

    72KB

  • memory/3456-42-0x0000000005080000-0x0000000005092000-memory.dmp

    Filesize

    72KB

  • memory/3456-40-0x0000000005080000-0x0000000005092000-memory.dmp

    Filesize

    72KB

  • memory/3456-38-0x0000000005080000-0x0000000005092000-memory.dmp

    Filesize

    72KB

  • memory/3456-36-0x0000000005080000-0x0000000005092000-memory.dmp

    Filesize

    72KB

  • memory/3456-15-0x00000000049F0000-0x0000000004A0A000-memory.dmp

    Filesize

    104KB

  • memory/3456-17-0x0000000004A70000-0x0000000005014000-memory.dmp

    Filesize

    5.6MB

  • memory/3456-30-0x0000000005080000-0x0000000005092000-memory.dmp

    Filesize

    72KB

  • memory/3456-16-0x0000000074B40000-0x00000000752F0000-memory.dmp

    Filesize

    7.7MB

  • memory/3456-26-0x0000000005080000-0x0000000005092000-memory.dmp

    Filesize

    72KB

  • memory/3456-24-0x0000000005080000-0x0000000005092000-memory.dmp

    Filesize

    72KB

  • memory/3456-22-0x0000000005080000-0x0000000005092000-memory.dmp

    Filesize

    72KB

  • memory/3456-21-0x0000000005080000-0x0000000005092000-memory.dmp

    Filesize

    72KB

  • memory/3456-49-0x0000000074B4E000-0x0000000074B4F000-memory.dmp

    Filesize

    4KB

  • memory/3456-28-0x0000000005080000-0x0000000005092000-memory.dmp

    Filesize

    72KB

  • memory/3456-52-0x0000000074B40000-0x00000000752F0000-memory.dmp

    Filesize

    7.7MB

  • memory/3456-14-0x0000000074B4E000-0x0000000074B4F000-memory.dmp

    Filesize

    4KB

  • memory/4488-56-0x0000000000780000-0x00000000007A8000-memory.dmp

    Filesize

    160KB

  • memory/4488-57-0x0000000007A80000-0x0000000008098000-memory.dmp

    Filesize

    6.1MB

  • memory/4488-58-0x00000000074E0000-0x00000000074F2000-memory.dmp

    Filesize

    72KB

  • memory/4488-59-0x0000000007610000-0x000000000771A000-memory.dmp

    Filesize

    1.0MB

  • memory/4488-60-0x0000000007540000-0x000000000757C000-memory.dmp

    Filesize

    240KB

  • memory/4488-61-0x0000000002950000-0x000000000299C000-memory.dmp

    Filesize

    304KB