Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 00:44

General

  • Target

    2444b3c56a169877faefec28f5878a354ad10088b8770ac3986d0851188cf660.exe

  • Size

    922KB

  • MD5

    c6fef5172909338da818ddedb8d58be1

  • SHA1

    21af1d3796ed7130f561db50d887c64c6f9a36f8

  • SHA256

    2444b3c56a169877faefec28f5878a354ad10088b8770ac3986d0851188cf660

  • SHA512

    249fc7df557c50179b592dc95ab5f46df330f02fee3b874d7928d6621e7035bbece98d3e79828b9122ded8e91771bf378cb2d215259db219f525b42a719047ee

  • SSDEEP

    12288:Yy90KMU3gWJm95C1EJ0m0agdy7skWQHoQ5Hbdf92O3PhhJfbZwvPHb13Xtezh:Yy5MIRdy7PWQHzWOph7wnHJnYzh

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 4 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2444b3c56a169877faefec28f5878a354ad10088b8770ac3986d0851188cf660.exe
    "C:\Users\Admin\AppData\Local\Temp\2444b3c56a169877faefec28f5878a354ad10088b8770ac3986d0851188cf660.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4124
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziAE1880.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziAE1880.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:976
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziLj8326.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziLj8326.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2952
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it309466.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it309466.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3944
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr603834.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr603834.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:2740
  • C:\Windows\system32\sc.exe
    C:\Windows\system32\sc.exe start wuauserv
    1⤵
    • Launches sc.exe
    PID:5324

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziAE1880.exe

    Filesize

    616KB

    MD5

    d5b1b6fb3bec374afe5791cc46a2c51b

    SHA1

    9f8268f0c88882cc7b91f951c28b24a8c67aa359

    SHA256

    c10489225d21e6671d8d05f74d665cfc06879a3e0f06d9b1855f95efec3c22a3

    SHA512

    85d724bf06e5124055182b39a8ed80468d7e7479c5211b7c235e845d85f84df85cf3486ce84fe32196dd379c321006f36a11731201ebd435b2f90cc2fe0f93c3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziLj8326.exe

    Filesize

    462KB

    MD5

    d9e9f6f101b93206063c75294d40c896

    SHA1

    9124509d0dc55b96bbd8867a11c2bc8a82ff89e7

    SHA256

    8fe54cfe1c4aebdb9a425dd4f8a5d6fa591359ef24b3b833410d2aae2ea253ff

    SHA512

    93607716ea11a2e9e3c6c58006d6daa83b494ba26fc63dac05751a8e20b0339188d9fedd2a8255f1155a895dc1931a091a74208f89af4050a7bff6651eafd1e0

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it309466.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr603834.exe

    Filesize

    474KB

    MD5

    eabdd473f6a67450b60941beda918fac

    SHA1

    d24e512b72c006caa3a14e72ed05e2dfd8abce6b

    SHA256

    87b34cc57105eaea32541ec85c3eb71f5b0370d94ecdc337d06a4272c5746b2f

    SHA512

    b31b36f82cead1e6eb3b2651011c1da25c88a6ea9d6e13f909a4f2bfd25c5a90ee5ecb5e06ae6dcb5f66acae0ab1b2e47ed8ea4f09d1c5b08d2da43e2ce79105

  • memory/2740-87-0x00000000028C0000-0x00000000028F5000-memory.dmp

    Filesize

    212KB

  • memory/2740-29-0x00000000027F0000-0x000000000282C000-memory.dmp

    Filesize

    240KB

  • memory/2740-828-0x0000000002590000-0x00000000025DC000-memory.dmp

    Filesize

    304KB

  • memory/2740-83-0x00000000028C0000-0x00000000028F5000-memory.dmp

    Filesize

    212KB

  • memory/2740-30-0x00000000050C0000-0x0000000005664000-memory.dmp

    Filesize

    5.6MB

  • memory/2740-31-0x00000000028C0000-0x00000000028FA000-memory.dmp

    Filesize

    232KB

  • memory/2740-35-0x00000000028C0000-0x00000000028F5000-memory.dmp

    Filesize

    212KB

  • memory/2740-33-0x00000000028C0000-0x00000000028F5000-memory.dmp

    Filesize

    212KB

  • memory/2740-32-0x00000000028C0000-0x00000000028F5000-memory.dmp

    Filesize

    212KB

  • memory/2740-41-0x00000000028C0000-0x00000000028F5000-memory.dmp

    Filesize

    212KB

  • memory/2740-827-0x0000000005070000-0x00000000050AC000-memory.dmp

    Filesize

    240KB

  • memory/2740-37-0x00000000028C0000-0x00000000028F5000-memory.dmp

    Filesize

    212KB

  • memory/2740-81-0x00000000028C0000-0x00000000028F5000-memory.dmp

    Filesize

    212KB

  • memory/2740-65-0x00000000028C0000-0x00000000028F5000-memory.dmp

    Filesize

    212KB

  • memory/2740-49-0x00000000028C0000-0x00000000028F5000-memory.dmp

    Filesize

    212KB

  • memory/2740-44-0x00000000028C0000-0x00000000028F5000-memory.dmp

    Filesize

    212KB

  • memory/2740-95-0x00000000028C0000-0x00000000028F5000-memory.dmp

    Filesize

    212KB

  • memory/2740-93-0x00000000028C0000-0x00000000028F5000-memory.dmp

    Filesize

    212KB

  • memory/2740-91-0x00000000028C0000-0x00000000028F5000-memory.dmp

    Filesize

    212KB

  • memory/2740-89-0x00000000028C0000-0x00000000028F5000-memory.dmp

    Filesize

    212KB

  • memory/2740-39-0x00000000028C0000-0x00000000028F5000-memory.dmp

    Filesize

    212KB

  • memory/2740-826-0x0000000008010000-0x000000000811A000-memory.dmp

    Filesize

    1.0MB

  • memory/2740-85-0x00000000028C0000-0x00000000028F5000-memory.dmp

    Filesize

    212KB

  • memory/2740-79-0x00000000028C0000-0x00000000028F5000-memory.dmp

    Filesize

    212KB

  • memory/2740-77-0x00000000028C0000-0x00000000028F5000-memory.dmp

    Filesize

    212KB

  • memory/2740-75-0x00000000028C0000-0x00000000028F5000-memory.dmp

    Filesize

    212KB

  • memory/2740-73-0x00000000028C0000-0x00000000028F5000-memory.dmp

    Filesize

    212KB

  • memory/2740-71-0x00000000028C0000-0x00000000028F5000-memory.dmp

    Filesize

    212KB

  • memory/2740-69-0x00000000028C0000-0x00000000028F5000-memory.dmp

    Filesize

    212KB

  • memory/2740-67-0x00000000028C0000-0x00000000028F5000-memory.dmp

    Filesize

    212KB

  • memory/2740-63-0x00000000028C0000-0x00000000028F5000-memory.dmp

    Filesize

    212KB

  • memory/2740-61-0x00000000028C0000-0x00000000028F5000-memory.dmp

    Filesize

    212KB

  • memory/2740-59-0x00000000028C0000-0x00000000028F5000-memory.dmp

    Filesize

    212KB

  • memory/2740-57-0x00000000028C0000-0x00000000028F5000-memory.dmp

    Filesize

    212KB

  • memory/2740-55-0x00000000028C0000-0x00000000028F5000-memory.dmp

    Filesize

    212KB

  • memory/2740-53-0x00000000028C0000-0x00000000028F5000-memory.dmp

    Filesize

    212KB

  • memory/2740-51-0x00000000028C0000-0x00000000028F5000-memory.dmp

    Filesize

    212KB

  • memory/2740-47-0x00000000028C0000-0x00000000028F5000-memory.dmp

    Filesize

    212KB

  • memory/2740-45-0x00000000028C0000-0x00000000028F5000-memory.dmp

    Filesize

    212KB

  • memory/2740-824-0x00000000079F0000-0x0000000008008000-memory.dmp

    Filesize

    6.1MB

  • memory/2740-825-0x0000000005050000-0x0000000005062000-memory.dmp

    Filesize

    72KB

  • memory/3944-23-0x00007FFE43493000-0x00007FFE43495000-memory.dmp

    Filesize

    8KB

  • memory/3944-21-0x00007FFE43493000-0x00007FFE43495000-memory.dmp

    Filesize

    8KB

  • memory/3944-22-0x0000000000E80000-0x0000000000E8A000-memory.dmp

    Filesize

    40KB