Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 01:44

General

  • Target

    8ed5287a117b28588a59e919c71ae6feb187c16ae5ac6b4e9706213cf195366f.exe

  • Size

    558KB

  • MD5

    d59ca0005b5685c03eaa430952dec64d

  • SHA1

    d0983d6d1070308394b73291ad53ba9e22622f82

  • SHA256

    8ed5287a117b28588a59e919c71ae6feb187c16ae5ac6b4e9706213cf195366f

  • SHA512

    de80814daa9f08afbc648a16e4c01d5440313138281998f9fc9ab6d67b80b4332dfb2192bd36e6cd1da1d82b723c41774f6cc1030198753dfecf67c3296953ac

  • SSDEEP

    12288:gy90E+REWIbD9tCvtgy7N1fB706Kpc/EZQcWXNQ1ZRf:gyt+KWIbyF1pQ6KpIEZtrf

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ed5287a117b28588a59e919c71ae6feb187c16ae5ac6b4e9706213cf195366f.exe
    "C:\Users\Admin\AppData\Local\Temp\8ed5287a117b28588a59e919c71ae6feb187c16ae5ac6b4e9706213cf195366f.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3736
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziMz6321.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziMz6321.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3688
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it962069.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it962069.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3852
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp031262.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp031262.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2588

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziMz6321.exe

    Filesize

    404KB

    MD5

    5f54574718feb8a750583d147b43de92

    SHA1

    dc7961b4ff6feef7c9b871e4202e646c7d63c56d

    SHA256

    ae4a5f933d5101051d2d3b412c0f88359a7728079e3d227720404f984f44f0b5

    SHA512

    04eb0e9668433c15736970b69c6083a521bf0e5a9565b0f364569eaf23661e5fd6cd9a5181da072e09a5796e73f83d0a684edbe585ab811db48231e33a73dbd3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it962069.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp031262.exe

    Filesize

    360KB

    MD5

    c841a5dc74612f73c034f12d8cc86fa8

    SHA1

    c9659e31c19c0c560c467ce7fb8dc44a4933cf2e

    SHA256

    c5ba552dd58b01921abaf35128ad486424abb9430eb809dacc3443b780c1d8de

    SHA512

    551e074fdc42e5a337311c60422ebd3a187c335c65cb4f1a81ba393b94d58a3c3ea8c6ba3679c176850b0cf2155c4cde5b4fff820bf17752f710ae0dfdc3e3a1

  • memory/2588-64-0x00000000071B0000-0x00000000071E5000-memory.dmp

    Filesize

    212KB

  • memory/2588-22-0x0000000004B10000-0x0000000004B4C000-memory.dmp

    Filesize

    240KB

  • memory/2588-821-0x0000000006CA0000-0x0000000006CEC000-memory.dmp

    Filesize

    304KB

  • memory/2588-60-0x00000000071B0000-0x00000000071E5000-memory.dmp

    Filesize

    212KB

  • memory/2588-23-0x0000000007300000-0x00000000078A4000-memory.dmp

    Filesize

    5.6MB

  • memory/2588-24-0x00000000071B0000-0x00000000071EA000-memory.dmp

    Filesize

    232KB

  • memory/2588-28-0x00000000071B0000-0x00000000071E5000-memory.dmp

    Filesize

    212KB

  • memory/2588-45-0x00000000071B0000-0x00000000071E5000-memory.dmp

    Filesize

    212KB

  • memory/2588-88-0x00000000071B0000-0x00000000071E5000-memory.dmp

    Filesize

    212KB

  • memory/2588-87-0x00000000071B0000-0x00000000071E5000-memory.dmp

    Filesize

    212KB

  • memory/2588-62-0x00000000071B0000-0x00000000071E5000-memory.dmp

    Filesize

    212KB

  • memory/2588-82-0x00000000071B0000-0x00000000071E5000-memory.dmp

    Filesize

    212KB

  • memory/2588-58-0x00000000071B0000-0x00000000071E5000-memory.dmp

    Filesize

    212KB

  • memory/2588-78-0x00000000071B0000-0x00000000071E5000-memory.dmp

    Filesize

    212KB

  • memory/2588-76-0x00000000071B0000-0x00000000071E5000-memory.dmp

    Filesize

    212KB

  • memory/2588-74-0x00000000071B0000-0x00000000071E5000-memory.dmp

    Filesize

    212KB

  • memory/2588-72-0x00000000071B0000-0x00000000071E5000-memory.dmp

    Filesize

    212KB

  • memory/2588-70-0x00000000071B0000-0x00000000071E5000-memory.dmp

    Filesize

    212KB

  • memory/2588-66-0x00000000071B0000-0x00000000071E5000-memory.dmp

    Filesize

    212KB

  • memory/2588-820-0x000000000A4A0000-0x000000000A4DC000-memory.dmp

    Filesize

    240KB

  • memory/2588-84-0x00000000071B0000-0x00000000071E5000-memory.dmp

    Filesize

    212KB

  • memory/2588-819-0x000000000A370000-0x000000000A47A000-memory.dmp

    Filesize

    1.0MB

  • memory/2588-80-0x00000000071B0000-0x00000000071E5000-memory.dmp

    Filesize

    212KB

  • memory/2588-56-0x00000000071B0000-0x00000000071E5000-memory.dmp

    Filesize

    212KB

  • memory/2588-54-0x00000000071B0000-0x00000000071E5000-memory.dmp

    Filesize

    212KB

  • memory/2588-52-0x00000000071B0000-0x00000000071E5000-memory.dmp

    Filesize

    212KB

  • memory/2588-50-0x00000000071B0000-0x00000000071E5000-memory.dmp

    Filesize

    212KB

  • memory/2588-46-0x00000000071B0000-0x00000000071E5000-memory.dmp

    Filesize

    212KB

  • memory/2588-42-0x00000000071B0000-0x00000000071E5000-memory.dmp

    Filesize

    212KB

  • memory/2588-40-0x00000000071B0000-0x00000000071E5000-memory.dmp

    Filesize

    212KB

  • memory/2588-39-0x00000000071B0000-0x00000000071E5000-memory.dmp

    Filesize

    212KB

  • memory/2588-36-0x00000000071B0000-0x00000000071E5000-memory.dmp

    Filesize

    212KB

  • memory/2588-34-0x00000000071B0000-0x00000000071E5000-memory.dmp

    Filesize

    212KB

  • memory/2588-32-0x00000000071B0000-0x00000000071E5000-memory.dmp

    Filesize

    212KB

  • memory/2588-30-0x00000000071B0000-0x00000000071E5000-memory.dmp

    Filesize

    212KB

  • memory/2588-68-0x00000000071B0000-0x00000000071E5000-memory.dmp

    Filesize

    212KB

  • memory/2588-48-0x00000000071B0000-0x00000000071E5000-memory.dmp

    Filesize

    212KB

  • memory/2588-26-0x00000000071B0000-0x00000000071E5000-memory.dmp

    Filesize

    212KB

  • memory/2588-25-0x00000000071B0000-0x00000000071E5000-memory.dmp

    Filesize

    212KB

  • memory/2588-817-0x0000000009D30000-0x000000000A348000-memory.dmp

    Filesize

    6.1MB

  • memory/2588-818-0x000000000A350000-0x000000000A362000-memory.dmp

    Filesize

    72KB

  • memory/3852-16-0x00007FF8DF2D3000-0x00007FF8DF2D5000-memory.dmp

    Filesize

    8KB

  • memory/3852-14-0x00007FF8DF2D3000-0x00007FF8DF2D5000-memory.dmp

    Filesize

    8KB

  • memory/3852-15-0x0000000000770000-0x000000000077A000-memory.dmp

    Filesize

    40KB