Analysis

  • max time kernel
    141s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 02:39

General

  • Target

    9527be4d5a558190ea4aeb8ab94397f1e2e80729eec028e80ddd3d8cad46bc4b.exe

  • Size

    827KB

  • MD5

    c24b9215589f2a237c6708146d04a31d

  • SHA1

    8760b44c21e912dc51f0b02760ba9df8cee477fa

  • SHA256

    9527be4d5a558190ea4aeb8ab94397f1e2e80729eec028e80ddd3d8cad46bc4b

  • SHA512

    40f29c64ca4f2255db2985101f1070ce024cc11eb85376e90e90f5de923aa9cfcb8bec912c32b7b1bb61b5ae09b3c6d24c8f3f7ebec63641227ad1b1bdfcc70a

  • SSDEEP

    12288:Wy90cgSp2KeyOVYTtExL4o6V9zrFiFyOen7N+NI3G+XhnpihIZ5pO:Wyw+2K/yYeJ4DoFyJn82XhCIvpO

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 4 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9527be4d5a558190ea4aeb8ab94397f1e2e80729eec028e80ddd3d8cad46bc4b.exe
    "C:\Users\Admin\AppData\Local\Temp\9527be4d5a558190ea4aeb8ab94397f1e2e80729eec028e80ddd3d8cad46bc4b.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2936
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziir9995.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziir9995.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2256
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziqr2408.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziqr2408.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1504
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it001302.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it001302.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3988
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr017087.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr017087.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:1940

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziir9995.exe

    Filesize

    568KB

    MD5

    b1c2b192940f5e32f6a3571acb20dd06

    SHA1

    f02aa3c8629d30ac437b11d4de4740ae7e7e339a

    SHA256

    61ef4f2825039593fc033badf904874ad1f267eb13d41fdab90fa6b03972363a

    SHA512

    5063214beb7f8a9042be8e14404a5f125aa40de8d63d0b155d46784d8036379987adbd5e36282994055813af826c9a2be00b7353560f64a9e493c62a74277771

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziqr2408.exe

    Filesize

    414KB

    MD5

    dbb00aaea2cd4318546c240d2c9bcee6

    SHA1

    3f4d8ba9cf88517d885ff754fa562b015468caa7

    SHA256

    2f71fd5464da7b07bfb28059b7420f9d58138ed6bced0371bf4d79e19565e956

    SHA512

    9d47d13ea9de64ae49395c86f42e2d7de2e1af9c2f985527b51f456848cc74076d00ebd4f1b3fe6f9dfe01668feb06f2304d2b708948a3596cedd8f92cddb4ab

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it001302.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr017087.exe

    Filesize

    381KB

    MD5

    8b238d5de240f54a5f4e2ec73630ac77

    SHA1

    f0135a30f35ae13825c490f8df800d453ae1792b

    SHA256

    76d45928d31df9f21759974122af43e335448bd442707515e03022cf2ddf0a01

    SHA512

    b74929d67f074f2f986beafd099b1d81c61cb3822bc4f1fb1607f6ccd2d58adcada0e2cc5a2d6646ed282c5ddb04704a70610efa68e1da8e0f75288fca2f1856

  • memory/1940-71-0x00000000078D0000-0x0000000007905000-memory.dmp

    Filesize

    212KB

  • memory/1940-29-0x0000000004E10000-0x0000000004E4C000-memory.dmp

    Filesize

    240KB

  • memory/1940-828-0x0000000004AF0000-0x0000000004B3C000-memory.dmp

    Filesize

    304KB

  • memory/1940-69-0x00000000078D0000-0x0000000007905000-memory.dmp

    Filesize

    212KB

  • memory/1940-30-0x0000000007320000-0x00000000078C4000-memory.dmp

    Filesize

    5.6MB

  • memory/1940-31-0x00000000078D0000-0x000000000790A000-memory.dmp

    Filesize

    232KB

  • memory/1940-41-0x00000000078D0000-0x0000000007905000-memory.dmp

    Filesize

    212KB

  • memory/1940-39-0x00000000078D0000-0x0000000007905000-memory.dmp

    Filesize

    212KB

  • memory/1940-95-0x00000000078D0000-0x0000000007905000-memory.dmp

    Filesize

    212KB

  • memory/1940-93-0x00000000078D0000-0x0000000007905000-memory.dmp

    Filesize

    212KB

  • memory/1940-827-0x000000000A5E0000-0x000000000A61C000-memory.dmp

    Filesize

    240KB

  • memory/1940-89-0x00000000078D0000-0x0000000007905000-memory.dmp

    Filesize

    212KB

  • memory/1940-67-0x00000000078D0000-0x0000000007905000-memory.dmp

    Filesize

    212KB

  • memory/1940-85-0x00000000078D0000-0x0000000007905000-memory.dmp

    Filesize

    212KB

  • memory/1940-83-0x00000000078D0000-0x0000000007905000-memory.dmp

    Filesize

    212KB

  • memory/1940-81-0x00000000078D0000-0x0000000007905000-memory.dmp

    Filesize

    212KB

  • memory/1940-79-0x00000000078D0000-0x0000000007905000-memory.dmp

    Filesize

    212KB

  • memory/1940-77-0x00000000078D0000-0x0000000007905000-memory.dmp

    Filesize

    212KB

  • memory/1940-75-0x00000000078D0000-0x0000000007905000-memory.dmp

    Filesize

    212KB

  • memory/1940-73-0x00000000078D0000-0x0000000007905000-memory.dmp

    Filesize

    212KB

  • memory/1940-91-0x00000000078D0000-0x0000000007905000-memory.dmp

    Filesize

    212KB

  • memory/1940-826-0x000000000A4B0000-0x000000000A5BA000-memory.dmp

    Filesize

    1.0MB

  • memory/1940-87-0x00000000078D0000-0x0000000007905000-memory.dmp

    Filesize

    212KB

  • memory/1940-65-0x00000000078D0000-0x0000000007905000-memory.dmp

    Filesize

    212KB

  • memory/1940-61-0x00000000078D0000-0x0000000007905000-memory.dmp

    Filesize

    212KB

  • memory/1940-59-0x00000000078D0000-0x0000000007905000-memory.dmp

    Filesize

    212KB

  • memory/1940-57-0x00000000078D0000-0x0000000007905000-memory.dmp

    Filesize

    212KB

  • memory/1940-55-0x00000000078D0000-0x0000000007905000-memory.dmp

    Filesize

    212KB

  • memory/1940-53-0x00000000078D0000-0x0000000007905000-memory.dmp

    Filesize

    212KB

  • memory/1940-51-0x00000000078D0000-0x0000000007905000-memory.dmp

    Filesize

    212KB

  • memory/1940-49-0x00000000078D0000-0x0000000007905000-memory.dmp

    Filesize

    212KB

  • memory/1940-47-0x00000000078D0000-0x0000000007905000-memory.dmp

    Filesize

    212KB

  • memory/1940-45-0x00000000078D0000-0x0000000007905000-memory.dmp

    Filesize

    212KB

  • memory/1940-43-0x00000000078D0000-0x0000000007905000-memory.dmp

    Filesize

    212KB

  • memory/1940-63-0x00000000078D0000-0x0000000007905000-memory.dmp

    Filesize

    212KB

  • memory/1940-37-0x00000000078D0000-0x0000000007905000-memory.dmp

    Filesize

    212KB

  • memory/1940-35-0x00000000078D0000-0x0000000007905000-memory.dmp

    Filesize

    212KB

  • memory/1940-33-0x00000000078D0000-0x0000000007905000-memory.dmp

    Filesize

    212KB

  • memory/1940-32-0x00000000078D0000-0x0000000007905000-memory.dmp

    Filesize

    212KB

  • memory/1940-824-0x0000000009DD0000-0x000000000A3E8000-memory.dmp

    Filesize

    6.1MB

  • memory/1940-825-0x000000000A490000-0x000000000A4A2000-memory.dmp

    Filesize

    72KB

  • memory/3988-23-0x00007FF97BA13000-0x00007FF97BA15000-memory.dmp

    Filesize

    8KB

  • memory/3988-21-0x00007FF97BA13000-0x00007FF97BA15000-memory.dmp

    Filesize

    8KB

  • memory/3988-22-0x0000000000FD0000-0x0000000000FDA000-memory.dmp

    Filesize

    40KB