Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/11/2024, 23:40

General

  • Target

    b7a97f5c651f69fd0a78d64d2cde21a85f2ac7f89754678241d0f1f043b20902.exe

  • Size

    1.5MB

  • MD5

    575e0df06e03f3aab8aff3842186e2fa

  • SHA1

    678e144810f6c5f45f1043fa793d07861badf91d

  • SHA256

    b7a97f5c651f69fd0a78d64d2cde21a85f2ac7f89754678241d0f1f043b20902

  • SHA512

    61c3adcafc728fa474fc85d7ef995abb09e8d73aed8deee0d94e640db32b87e3815310984e33fbae159bc2590c0f42413ef15607b88e89ffef9746a7684c7040

  • SSDEEP

    49152:bGluRiRXFE+7hZKKqTxGG/76Nn4NBgg2Eqq:ylykVQzTxGG+NeBgjvq

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 6 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b7a97f5c651f69fd0a78d64d2cde21a85f2ac7f89754678241d0f1f043b20902.exe
    "C:\Users\Admin\AppData\Local\Temp\b7a97f5c651f69fd0a78d64d2cde21a85f2ac7f89754678241d0f1f043b20902.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4392
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ki445556.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ki445556.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2896
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ki457220.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ki457220.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4036
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ki986590.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ki986590.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4156
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ki072616.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ki072616.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1916
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\az699241.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\az699241.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1604
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\bu254929.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\bu254929.exe
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              PID:4024
  • C:\Windows\system32\sc.exe
    C:\Windows\system32\sc.exe start wuauserv
    1⤵
    • Launches sc.exe
    PID:216

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ki445556.exe

    Filesize

    1.2MB

    MD5

    c27e25dd9e80f2c25dbf21c27be2c5ad

    SHA1

    5010bcb0cdaf58e216b7d631b9696e3799e490d2

    SHA256

    b91ca2dcc07d102b7c416b0ae517d6277b18613625c6d6c9a8488d4b00019fc4

    SHA512

    8f43705d2c8487a9f7259ade82e3615acdcd3c04e1c85f4c30dbc539a17781ae6e50bd6589c4823b9a5f7f81cea724eca1e8c51a8e14449893cfe71a51e88380

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ki457220.exe

    Filesize

    1.1MB

    MD5

    1f692b5c523bd8bed477760479d9c5ea

    SHA1

    b97852dda73140b165e84b27d65db1d280bef077

    SHA256

    cf317ee488e2d86d837732274b39e1ec3321e98f4a53777123587759128b3845

    SHA512

    c13a43241ef4c4fd67c8d6f512e969662919933a184f153cfe531d4a4dd8ce9444a1dfed8b214ebacb204221e83ce792c7d062a1cf1fb4ca9db377f20b384c89

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ki986590.exe

    Filesize

    803KB

    MD5

    7c3b9ff0b94aab7f7873bbd584a85cc9

    SHA1

    0020911146454b99e8a976e1bd88ec6793f4794c

    SHA256

    e91822e8c1037bebc8a4d835ac1825d85d4ea5692baacb5032416b78ff55bb1e

    SHA512

    df18b3462be2d6d741e70f0873311815ef65b4b008c1ba73c6f6c0a164a0e264784629456b9e87007cc96ce6110495114f1f934f6fe23d9410eeda79ab124e38

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ki072616.exe

    Filesize

    469KB

    MD5

    d0665685a860266a8c17fbc71b3ef011

    SHA1

    f0f334744eebd16be3da3242a2cd7be3f2d830a5

    SHA256

    b023c17890e92297e93cfcd48ad1766aca6cb5cc052635dbf6cb4696a562c354

    SHA512

    eaa11cfe5ab87cfcb4ef40a1c22c98b08be8bc6ea5534330dda5ed735d07bf1e2a29bfd2793bb247d910f502902cb26c891111e22461fa2cdae92c8f02ebfff8

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\az699241.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\bu254929.exe

    Filesize

    488KB

    MD5

    d73a80349bef96e54f9ba31198000c40

    SHA1

    adbb3c978f0de3d3fbf491d700d7f5f9cdca44bd

    SHA256

    d3852d274a3a6c2c0cbb56a3ce1170627274ad8a690a358d97bb82166ce6df44

    SHA512

    9288141bf2ee768c2ede729704061411108289f3eb0aba252f10ce140094d64946564ce40dabf901962f209ec65807d9fc39eb20c5a7075aa7b042c13e8e7e45

  • memory/1604-35-0x0000000000E80000-0x0000000000E8A000-memory.dmp

    Filesize

    40KB

  • memory/4024-79-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4024-71-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4024-43-0x0000000004E00000-0x0000000004E3A000-memory.dmp

    Filesize

    232KB

  • memory/4024-49-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4024-57-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4024-107-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4024-103-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4024-101-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4024-99-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4024-97-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4024-95-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4024-93-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4024-91-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4024-89-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4024-85-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4024-83-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4024-81-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4024-41-0x0000000004D40000-0x0000000004D7C000-memory.dmp

    Filesize

    240KB

  • memory/4024-77-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4024-75-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4024-73-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4024-42-0x0000000004F20000-0x00000000054C4000-memory.dmp

    Filesize

    5.6MB

  • memory/4024-69-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4024-65-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4024-63-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4024-61-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4024-59-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4024-55-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4024-53-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4024-51-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4024-105-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4024-87-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4024-67-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4024-47-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4024-45-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4024-44-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4024-836-0x0000000007950000-0x0000000007F68000-memory.dmp

    Filesize

    6.1MB

  • memory/4024-837-0x0000000007FA0000-0x0000000007FB2000-memory.dmp

    Filesize

    72KB

  • memory/4024-838-0x0000000007FC0000-0x00000000080CA000-memory.dmp

    Filesize

    1.0MB

  • memory/4024-839-0x00000000080E0000-0x000000000811C000-memory.dmp

    Filesize

    240KB

  • memory/4024-840-0x00000000027F0000-0x000000000283C000-memory.dmp

    Filesize

    304KB