Analysis

  • max time kernel
    147s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/11/2024, 21:41

General

  • Target

    243fe2077b67a8927acc2735ec4fe2aec2fcc8755f8bf6f140cb88627e53cd00.exe

  • Size

    611KB

  • MD5

    315f1dc5b515aa635c131b165ae10e0f

  • SHA1

    83e71a090abfe8c671b8615d98a90fa4ea92621d

  • SHA256

    243fe2077b67a8927acc2735ec4fe2aec2fcc8755f8bf6f140cb88627e53cd00

  • SHA512

    1fa54afd4dca431f002ea658bec28ae7f5ce954c0594634798c77b68b3d4ca8e3d9ef8aa9569d2b0280edefb18e5109089c94a66b576b4f4abeccec7644274f9

  • SSDEEP

    12288:uy90p4GJVDhv5xU0bg0XvVyDoE6ovm+jn7s9bgWtVX9dTNxv1mDzk:uyvGJnbg0XwE96jujVX7TNODzk

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\243fe2077b67a8927acc2735ec4fe2aec2fcc8755f8bf6f140cb88627e53cd00.exe
    "C:\Users\Admin\AppData\Local\Temp\243fe2077b67a8927acc2735ec4fe2aec2fcc8755f8bf6f140cb88627e53cd00.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3180
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st066922.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st066922.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3676
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\51818713.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\51818713.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:440
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp858618.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp858618.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1664
  • C:\Windows\system32\sc.exe
    C:\Windows\system32\sc.exe start wuauserv
    1⤵
    • Launches sc.exe
    PID:4940

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st066922.exe

    Filesize

    457KB

    MD5

    825f86ea57bb03682e683f6c7aed5709

    SHA1

    fce928338ad6963c6eaa53172084d7e214747534

    SHA256

    5c07e59ed99cebcd0624e954c1f4265c0c5371c60f796f997bc7732534d8b48f

    SHA512

    4343fe7a497694d6839bf5be35c73ed8369a14ee1beaaddc5c54b6e8653a965f6e94456ae7306e48baa87e673315dcccfe5633c201c4483af67d7ada9466e0b2

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\51818713.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp858618.exe

    Filesize

    459KB

    MD5

    f9a508e4ee8e3b4c11c4356eb225e653

    SHA1

    b0f1b10ccadfd72f6b7d4dbaf80830f9e820c3bb

    SHA256

    179d3564a18869c57af06f1518b4f8d6121252a8bc377b99c087b786beb3aac9

    SHA512

    37a40adca3ef4955ff74e04673883d802cc6627c2cd17a764f5eac69d9b08db837f9198fcf7fa2e38a9ea1043edb12095ab3a65d1b6e459c7f0d9a2bf23a0d99

  • memory/440-14-0x00007FF9DB1C3000-0x00007FF9DB1C5000-memory.dmp

    Filesize

    8KB

  • memory/440-15-0x0000000000BF0000-0x0000000000BFA000-memory.dmp

    Filesize

    40KB

  • memory/440-16-0x00007FF9DB1C3000-0x00007FF9DB1C5000-memory.dmp

    Filesize

    8KB

  • memory/1664-78-0x0000000004F70000-0x0000000004FA5000-memory.dmp

    Filesize

    212KB

  • memory/1664-69-0x0000000004F70000-0x0000000004FA5000-memory.dmp

    Filesize

    212KB

  • memory/1664-24-0x0000000004F70000-0x0000000004FAA000-memory.dmp

    Filesize

    232KB

  • memory/1664-32-0x0000000004F70000-0x0000000004FA5000-memory.dmp

    Filesize

    212KB

  • memory/1664-34-0x0000000004F70000-0x0000000004FA5000-memory.dmp

    Filesize

    212KB

  • memory/1664-58-0x0000000004F70000-0x0000000004FA5000-memory.dmp

    Filesize

    212KB

  • memory/1664-38-0x0000000004F70000-0x0000000004FA5000-memory.dmp

    Filesize

    212KB

  • memory/1664-30-0x0000000004F70000-0x0000000004FA5000-memory.dmp

    Filesize

    212KB

  • memory/1664-28-0x0000000004F70000-0x0000000004FA5000-memory.dmp

    Filesize

    212KB

  • memory/1664-26-0x0000000004F70000-0x0000000004FA5000-memory.dmp

    Filesize

    212KB

  • memory/1664-25-0x0000000004F70000-0x0000000004FA5000-memory.dmp

    Filesize

    212KB

  • memory/1664-88-0x0000000004F70000-0x0000000004FA5000-memory.dmp

    Filesize

    212KB

  • memory/1664-86-0x0000000004F70000-0x0000000004FA5000-memory.dmp

    Filesize

    212KB

  • memory/1664-84-0x0000000004F70000-0x0000000004FA5000-memory.dmp

    Filesize

    212KB

  • memory/1664-82-0x0000000004F70000-0x0000000004FA5000-memory.dmp

    Filesize

    212KB

  • memory/1664-80-0x0000000004F70000-0x0000000004FA5000-memory.dmp

    Filesize

    212KB

  • memory/1664-22-0x0000000002580000-0x00000000025BC000-memory.dmp

    Filesize

    240KB

  • memory/1664-77-0x0000000004F70000-0x0000000004FA5000-memory.dmp

    Filesize

    212KB

  • memory/1664-74-0x0000000004F70000-0x0000000004FA5000-memory.dmp

    Filesize

    212KB

  • memory/1664-73-0x0000000004F70000-0x0000000004FA5000-memory.dmp

    Filesize

    212KB

  • memory/1664-70-0x0000000004F70000-0x0000000004FA5000-memory.dmp

    Filesize

    212KB

  • memory/1664-23-0x0000000004FE0000-0x0000000005584000-memory.dmp

    Filesize

    5.6MB

  • memory/1664-66-0x0000000004F70000-0x0000000004FA5000-memory.dmp

    Filesize

    212KB

  • memory/1664-64-0x0000000004F70000-0x0000000004FA5000-memory.dmp

    Filesize

    212KB

  • memory/1664-62-0x0000000004F70000-0x0000000004FA5000-memory.dmp

    Filesize

    212KB

  • memory/1664-60-0x0000000004F70000-0x0000000004FA5000-memory.dmp

    Filesize

    212KB

  • memory/1664-56-0x0000000004F70000-0x0000000004FA5000-memory.dmp

    Filesize

    212KB

  • memory/1664-55-0x0000000004F70000-0x0000000004FA5000-memory.dmp

    Filesize

    212KB

  • memory/1664-52-0x0000000004F70000-0x0000000004FA5000-memory.dmp

    Filesize

    212KB

  • memory/1664-50-0x0000000004F70000-0x0000000004FA5000-memory.dmp

    Filesize

    212KB

  • memory/1664-48-0x0000000004F70000-0x0000000004FA5000-memory.dmp

    Filesize

    212KB

  • memory/1664-46-0x0000000004F70000-0x0000000004FA5000-memory.dmp

    Filesize

    212KB

  • memory/1664-44-0x0000000004F70000-0x0000000004FA5000-memory.dmp

    Filesize

    212KB

  • memory/1664-42-0x0000000004F70000-0x0000000004FA5000-memory.dmp

    Filesize

    212KB

  • memory/1664-40-0x0000000004F70000-0x0000000004FA5000-memory.dmp

    Filesize

    212KB

  • memory/1664-36-0x0000000004F70000-0x0000000004FA5000-memory.dmp

    Filesize

    212KB

  • memory/1664-817-0x0000000007A50000-0x0000000008068000-memory.dmp

    Filesize

    6.1MB

  • memory/1664-818-0x00000000080E0000-0x00000000080F2000-memory.dmp

    Filesize

    72KB

  • memory/1664-819-0x0000000008100000-0x000000000820A000-memory.dmp

    Filesize

    1.0MB

  • memory/1664-820-0x0000000008220000-0x000000000825C000-memory.dmp

    Filesize

    240KB

  • memory/1664-821-0x0000000002800000-0x000000000284C000-memory.dmp

    Filesize

    304KB