Analysis

  • max time kernel
    140s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 00:21

General

  • Target

    7f9bd5e1532336cf3efa0486088154348d10b19c4ecadab7ebd6bd9f21e5478b.exe

  • Size

    414KB

  • MD5

    2c9d79d65ba5969bcf4a2c7adafe6139

  • SHA1

    ceec69f6d38ca764fe0d1bde9dffcda94dc37f24

  • SHA256

    7f9bd5e1532336cf3efa0486088154348d10b19c4ecadab7ebd6bd9f21e5478b

  • SHA512

    a3d7917bd11b9192109cf93f0d35dfd45fd3115cbd54226dd658d634f4185deb35027581de6cee3bdd3a2eb5bfe472628547f3bec28a88546f8eeda4432e034c

  • SSDEEP

    6144:pap0yN90QESw+5SwIEurlpN87//ylgrpiU9EOqGRPXNETs21gt2M:1y90r+5H+K7/2grpiU2Oq0dEh1gIM

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 2 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7f9bd5e1532336cf3efa0486088154348d10b19c4ecadab7ebd6bd9f21e5478b.exe
    "C:\Users\Admin\AppData\Local\Temp\7f9bd5e1532336cf3efa0486088154348d10b19c4ecadab7ebd6bd9f21e5478b.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:832
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\it054702.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\it054702.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3992
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jr621806.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jr621806.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:4708

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\it054702.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jr621806.exe

    Filesize

    381KB

    MD5

    803550b36c6da3ed5697a9510733f8d4

    SHA1

    d618ae42c87564c89d4fc323558709fe4198ea79

    SHA256

    b876a2e9b3d35c121c28ad78a0a792d93db2ede131ee3db1e318f6ad3024aa8d

    SHA512

    15f01b55ace334bd0538275be7485abaa469411c5916817e2ef4573256fdc2d667d418aa6d6c778b1ec719200c99f451b3ff5053d55a8fcfd7779d5c40f46179

  • memory/3992-7-0x00007FFB40B63000-0x00007FFB40B65000-memory.dmp

    Filesize

    8KB

  • memory/3992-8-0x0000000000880000-0x000000000088A000-memory.dmp

    Filesize

    40KB

  • memory/3992-9-0x00007FFB40B63000-0x00007FFB40B65000-memory.dmp

    Filesize

    8KB

  • memory/4708-15-0x0000000002F30000-0x0000000003030000-memory.dmp

    Filesize

    1024KB

  • memory/4708-16-0x0000000002CA0000-0x0000000002CE6000-memory.dmp

    Filesize

    280KB

  • memory/4708-17-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB

  • memory/4708-18-0x0000000004D10000-0x0000000004D4C000-memory.dmp

    Filesize

    240KB

  • memory/4708-19-0x00000000072A0000-0x0000000007844000-memory.dmp

    Filesize

    5.6MB

  • memory/4708-20-0x00000000071E0000-0x000000000721A000-memory.dmp

    Filesize

    232KB

  • memory/4708-74-0x00000000071E0000-0x0000000007215000-memory.dmp

    Filesize

    212KB

  • memory/4708-26-0x00000000071E0000-0x0000000007215000-memory.dmp

    Filesize

    212KB

  • memory/4708-84-0x00000000071E0000-0x0000000007215000-memory.dmp

    Filesize

    212KB

  • memory/4708-82-0x00000000071E0000-0x0000000007215000-memory.dmp

    Filesize

    212KB

  • memory/4708-80-0x00000000071E0000-0x0000000007215000-memory.dmp

    Filesize

    212KB

  • memory/4708-78-0x00000000071E0000-0x0000000007215000-memory.dmp

    Filesize

    212KB

  • memory/4708-76-0x00000000071E0000-0x0000000007215000-memory.dmp

    Filesize

    212KB

  • memory/4708-815-0x000000000A370000-0x000000000A47A000-memory.dmp

    Filesize

    1.0MB

  • memory/4708-816-0x000000000A4A0000-0x000000000A4DC000-memory.dmp

    Filesize

    240KB

  • memory/4708-817-0x0000000004B50000-0x0000000004B9C000-memory.dmp

    Filesize

    304KB

  • memory/4708-814-0x000000000A350000-0x000000000A362000-memory.dmp

    Filesize

    72KB

  • memory/4708-813-0x0000000009CD0000-0x000000000A2E8000-memory.dmp

    Filesize

    6.1MB

  • memory/4708-72-0x00000000071E0000-0x0000000007215000-memory.dmp

    Filesize

    212KB

  • memory/4708-71-0x00000000071E0000-0x0000000007215000-memory.dmp

    Filesize

    212KB

  • memory/4708-68-0x00000000071E0000-0x0000000007215000-memory.dmp

    Filesize

    212KB

  • memory/4708-67-0x00000000071E0000-0x0000000007215000-memory.dmp

    Filesize

    212KB

  • memory/4708-64-0x00000000071E0000-0x0000000007215000-memory.dmp

    Filesize

    212KB

  • memory/4708-62-0x00000000071E0000-0x0000000007215000-memory.dmp

    Filesize

    212KB

  • memory/4708-60-0x00000000071E0000-0x0000000007215000-memory.dmp

    Filesize

    212KB

  • memory/4708-58-0x00000000071E0000-0x0000000007215000-memory.dmp

    Filesize

    212KB

  • memory/4708-56-0x00000000071E0000-0x0000000007215000-memory.dmp

    Filesize

    212KB

  • memory/4708-54-0x00000000071E0000-0x0000000007215000-memory.dmp

    Filesize

    212KB

  • memory/4708-52-0x00000000071E0000-0x0000000007215000-memory.dmp

    Filesize

    212KB

  • memory/4708-50-0x00000000071E0000-0x0000000007215000-memory.dmp

    Filesize

    212KB

  • memory/4708-48-0x00000000071E0000-0x0000000007215000-memory.dmp

    Filesize

    212KB

  • memory/4708-46-0x00000000071E0000-0x0000000007215000-memory.dmp

    Filesize

    212KB

  • memory/4708-44-0x00000000071E0000-0x0000000007215000-memory.dmp

    Filesize

    212KB

  • memory/4708-42-0x00000000071E0000-0x0000000007215000-memory.dmp

    Filesize

    212KB

  • memory/4708-40-0x00000000071E0000-0x0000000007215000-memory.dmp

    Filesize

    212KB

  • memory/4708-38-0x00000000071E0000-0x0000000007215000-memory.dmp

    Filesize

    212KB

  • memory/4708-36-0x00000000071E0000-0x0000000007215000-memory.dmp

    Filesize

    212KB

  • memory/4708-34-0x00000000071E0000-0x0000000007215000-memory.dmp

    Filesize

    212KB

  • memory/4708-32-0x00000000071E0000-0x0000000007215000-memory.dmp

    Filesize

    212KB

  • memory/4708-30-0x00000000071E0000-0x0000000007215000-memory.dmp

    Filesize

    212KB

  • memory/4708-28-0x00000000071E0000-0x0000000007215000-memory.dmp

    Filesize

    212KB

  • memory/4708-24-0x00000000071E0000-0x0000000007215000-memory.dmp

    Filesize

    212KB

  • memory/4708-22-0x00000000071E0000-0x0000000007215000-memory.dmp

    Filesize

    212KB

  • memory/4708-21-0x00000000071E0000-0x0000000007215000-memory.dmp

    Filesize

    212KB

  • memory/4708-818-0x0000000002F30000-0x0000000003030000-memory.dmp

    Filesize

    1024KB

  • memory/4708-820-0x0000000002CA0000-0x0000000002CE6000-memory.dmp

    Filesize

    280KB

  • memory/4708-821-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB