Analysis

  • max time kernel
    141s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 02:44

General

  • Target

    6303b8ac7b417dd568c53fa51713029aeba39a76b18a0cd7bf8865e9cf1283a4.exe

  • Size

    1.5MB

  • MD5

    f17d59006472c72a9532b57c3c0ded5b

  • SHA1

    1cf962c0880c0940f310c3507e3be5fcdcb1a3ef

  • SHA256

    6303b8ac7b417dd568c53fa51713029aeba39a76b18a0cd7bf8865e9cf1283a4

  • SHA512

    e720b5034c42ce1bb6bc1d82ff3620d3a79b5f4c3be66ad7081e673e7f06b3aae1c663b32a91f7905dfe48fefb9fd26c60e19dfb5b68abbc49e6f9d3749bc656

  • SSDEEP

    24576:MyG3z4/LZxMMk2jlk+pF/5Ep3K5sRB69BT4V4IpasHCIckjA:7T/LZGr2jlBKPR0r4uIp/iIr

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 6 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6303b8ac7b417dd568c53fa51713029aeba39a76b18a0cd7bf8865e9cf1283a4.exe
    "C:\Users\Admin\AppData\Local\Temp\6303b8ac7b417dd568c53fa51713029aeba39a76b18a0cd7bf8865e9cf1283a4.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1708
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ki960443.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ki960443.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5048
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ki210290.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ki210290.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2836
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ki481072.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ki481072.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1772
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ki711170.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ki711170.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3772
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\az732685.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\az732685.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:212
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\bu831218.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\bu831218.exe
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              PID:5056
  • C:\Windows\system32\sc.exe
    C:\Windows\system32\sc.exe start wuauserv
    1⤵
    • Launches sc.exe
    PID:4884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ki960443.exe

    Filesize

    1.2MB

    MD5

    b796e48528e0f434f9dc1c86a7562acf

    SHA1

    ed581043343d1b6222762a356331f8f6f4f1643e

    SHA256

    f524f6899b43b75d2c33034bf44f1be687f0e0aac61d952264f8f454483a9718

    SHA512

    9e7b79b8c89dd427761c0831c992167bfab63764378c12dfe2a556081bfa27887827026701c630019035799609a37c238becddafed46a99614dc358e8392c9d3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ki210290.exe

    Filesize

    1.0MB

    MD5

    f5709a44cb6b161671d2c58b9d7a6900

    SHA1

    0fdfa06a9f2e53ef35283b910a7fb4bf24e1c117

    SHA256

    5f03084d948ec02a4d9054beb3b0bd4b78e5807b72ffd1055bb2e2a0baf12e72

    SHA512

    5c844db27393e6d14bf25c4a5b626e55aac662ce9dd987d4e6fbc1742bfb5f01bbeee9cfb12e3117f0ce8bbcafa12c7066321817294530404a188d6855f07f1a

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ki481072.exe

    Filesize

    787KB

    MD5

    9881cc22397cb5dfca472aff856b8ae2

    SHA1

    7a9d4cb18172a64a697d1cf25fd85fe389eb77b1

    SHA256

    b9f7b0a2190251b0df4ee95aa79b496f523ad2bf121cc50b31aeda65d70f76d2

    SHA512

    2cea9487616d7a4e1849f2d3cd8175731ce62f5a8001759d8bc80a22978b84afb53307ef1860ecaa1676552233f95902e5bbf396df06c7e24eb80689fb24134f

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ki711170.exe

    Filesize

    460KB

    MD5

    16baa912ae823ccf3fd60f509cf0e242

    SHA1

    f7a15dd33c2e83009f17a30e55c338f219561bc2

    SHA256

    1b04d4ac59bc54907d2b2ea4340611549b9f0630df07b047de4013b1a0b3377d

    SHA512

    11b09501c1370bc1e70ae6ca207feb525646fa84092f427a0f543adaa9e8681899fa1201909ea97a7c088c84b4144aca3629f2c7b639051088c543ad08536050

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\az732685.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\bu831218.exe

    Filesize

    472KB

    MD5

    78d5914b752ce08f5d39b146f0849a03

    SHA1

    fda17e80b841180490bc5da7ea6d41e03290fd69

    SHA256

    7cda4d1fc6c19bd202ac3a836f11f7064d51aefda1ff7558c48b714efc2d30df

    SHA512

    5b595301b2612c535f6caf93a0ef549f8f8e5ac578f16e7a7627147d80e7084963ddf42ed118d7c1d3b875926d55d37f8c36a20e5dd1ae3a5033fd6b5aadd7f3

  • memory/212-35-0x0000000000A50000-0x0000000000A5A000-memory.dmp

    Filesize

    40KB

  • memory/5056-75-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/5056-67-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/5056-43-0x0000000004DF0000-0x0000000004E2A000-memory.dmp

    Filesize

    232KB

  • memory/5056-107-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/5056-105-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/5056-103-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/5056-101-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/5056-99-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/5056-97-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/5056-95-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/5056-93-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/5056-91-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/5056-87-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/5056-85-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/5056-83-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/5056-81-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/5056-79-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/5056-41-0x00000000026F0000-0x000000000272C000-memory.dmp

    Filesize

    240KB

  • memory/5056-73-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/5056-71-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/5056-70-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/5056-42-0x0000000004EA0000-0x0000000005444000-memory.dmp

    Filesize

    5.6MB

  • memory/5056-66-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/5056-63-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/5056-61-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/5056-57-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/5056-55-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/5056-53-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/5056-51-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/5056-89-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/5056-77-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/5056-59-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/5056-49-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/5056-47-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/5056-45-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/5056-44-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/5056-836-0x0000000007910000-0x0000000007F28000-memory.dmp

    Filesize

    6.1MB

  • memory/5056-837-0x0000000007FA0000-0x0000000007FB2000-memory.dmp

    Filesize

    72KB

  • memory/5056-838-0x0000000007FC0000-0x00000000080CA000-memory.dmp

    Filesize

    1.0MB

  • memory/5056-839-0x00000000080E0000-0x000000000811C000-memory.dmp

    Filesize

    240KB

  • memory/5056-840-0x00000000027C0000-0x000000000280C000-memory.dmp

    Filesize

    304KB