Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 02:01

General

  • Target

    e048ffdc3d14cef90ff26ecb7763f300a89d8e85d36ac138a1da1addf0dbdce7.exe

  • Size

    563KB

  • MD5

    6566453221cdbb44493751640a490d36

  • SHA1

    99cfe3235ec01b400006e68ed5b092e4a1be4e5a

  • SHA256

    e048ffdc3d14cef90ff26ecb7763f300a89d8e85d36ac138a1da1addf0dbdce7

  • SHA512

    8b5368a766753d8411012a779b08ae556b9ce1ed0725781c0da4eeba644e2bcf29b05e3870d38387efa3a0dc02a74c3bd91059c249185065aa112443ea73a8bd

  • SSDEEP

    12288:ty90fa7yq3yM/v3GGa5mEfkpRN+0rEeaN3Ypix/:tyN+WyM/fZgmEfGRbvaoUZ

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e048ffdc3d14cef90ff26ecb7763f300a89d8e85d36ac138a1da1addf0dbdce7.exe
    "C:\Users\Admin\AppData\Local\Temp\e048ffdc3d14cef90ff26ecb7763f300a89d8e85d36ac138a1da1addf0dbdce7.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3992
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYx1282.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYx1282.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5096
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it353259.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it353259.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1924
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp269521.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp269521.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYx1282.exe

    Filesize

    409KB

    MD5

    8f5976455d1b81617a4930c2baffe73c

    SHA1

    f4bf613b10a33fd5c5155a72897120e29301092f

    SHA256

    51078229e44500f45e56c8a4fd7a0d03d41035932d781c006eb25f512beed3f7

    SHA512

    2535f046b0040260841abcc4795c8e5c54357013729ab93f07479e0706987d930a6ca583a30413034197049e7c7a3bbde3fa25334763a8e66a1bb46f34038c9f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it353259.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp269521.exe

    Filesize

    360KB

    MD5

    66b32c38fe11f6e3b97fa97e6189665a

    SHA1

    7691d89a1a86882c91a76c5cd395d14c9f48ddb8

    SHA256

    de3d5d01de93685990811604b23330a769fc3b7ac5454c627a77dbe464f712ce

    SHA512

    2067e09fb323af3d1f5541dde2e176869b83066bc2d2206919d915cfd541a96c35f62771a7260a8b91098ead6a3d50f1795321b319be9721cb3b6e12c746457e

  • memory/1688-60-0x00000000071C0000-0x00000000071F5000-memory.dmp

    Filesize

    212KB

  • memory/1688-22-0x0000000007140000-0x000000000717C000-memory.dmp

    Filesize

    240KB

  • memory/1688-821-0x00000000049E0000-0x0000000004A2C000-memory.dmp

    Filesize

    304KB

  • memory/1688-54-0x00000000071C0000-0x00000000071F5000-memory.dmp

    Filesize

    212KB

  • memory/1688-23-0x0000000007230000-0x00000000077D4000-memory.dmp

    Filesize

    5.6MB

  • memory/1688-24-0x00000000071C0000-0x00000000071FA000-memory.dmp

    Filesize

    232KB

  • memory/1688-80-0x00000000071C0000-0x00000000071F5000-memory.dmp

    Filesize

    212KB

  • memory/1688-88-0x00000000071C0000-0x00000000071F5000-memory.dmp

    Filesize

    212KB

  • memory/1688-86-0x00000000071C0000-0x00000000071F5000-memory.dmp

    Filesize

    212KB

  • memory/1688-84-0x00000000071C0000-0x00000000071F5000-memory.dmp

    Filesize

    212KB

  • memory/1688-58-0x00000000071C0000-0x00000000071F5000-memory.dmp

    Filesize

    212KB

  • memory/1688-78-0x00000000071C0000-0x00000000071F5000-memory.dmp

    Filesize

    212KB

  • memory/1688-52-0x00000000071C0000-0x00000000071F5000-memory.dmp

    Filesize

    212KB

  • memory/1688-74-0x00000000071C0000-0x00000000071F5000-memory.dmp

    Filesize

    212KB

  • memory/1688-72-0x00000000071C0000-0x00000000071F5000-memory.dmp

    Filesize

    212KB

  • memory/1688-70-0x00000000071C0000-0x00000000071F5000-memory.dmp

    Filesize

    212KB

  • memory/1688-68-0x00000000071C0000-0x00000000071F5000-memory.dmp

    Filesize

    212KB

  • memory/1688-66-0x00000000071C0000-0x00000000071F5000-memory.dmp

    Filesize

    212KB

  • memory/1688-62-0x00000000071C0000-0x00000000071F5000-memory.dmp

    Filesize

    212KB

  • memory/1688-820-0x000000000A490000-0x000000000A4CC000-memory.dmp

    Filesize

    240KB

  • memory/1688-82-0x00000000071C0000-0x00000000071F5000-memory.dmp

    Filesize

    212KB

  • memory/1688-819-0x000000000A370000-0x000000000A47A000-memory.dmp

    Filesize

    1.0MB

  • memory/1688-76-0x00000000071C0000-0x00000000071F5000-memory.dmp

    Filesize

    212KB

  • memory/1688-50-0x00000000071C0000-0x00000000071F5000-memory.dmp

    Filesize

    212KB

  • memory/1688-48-0x00000000071C0000-0x00000000071F5000-memory.dmp

    Filesize

    212KB

  • memory/1688-46-0x00000000071C0000-0x00000000071F5000-memory.dmp

    Filesize

    212KB

  • memory/1688-44-0x00000000071C0000-0x00000000071F5000-memory.dmp

    Filesize

    212KB

  • memory/1688-42-0x00000000071C0000-0x00000000071F5000-memory.dmp

    Filesize

    212KB

  • memory/1688-38-0x00000000071C0000-0x00000000071F5000-memory.dmp

    Filesize

    212KB

  • memory/1688-36-0x00000000071C0000-0x00000000071F5000-memory.dmp

    Filesize

    212KB

  • memory/1688-34-0x00000000071C0000-0x00000000071F5000-memory.dmp

    Filesize

    212KB

  • memory/1688-64-0x00000000071C0000-0x00000000071F5000-memory.dmp

    Filesize

    212KB

  • memory/1688-56-0x00000000071C0000-0x00000000071F5000-memory.dmp

    Filesize

    212KB

  • memory/1688-40-0x00000000071C0000-0x00000000071F5000-memory.dmp

    Filesize

    212KB

  • memory/1688-32-0x00000000071C0000-0x00000000071F5000-memory.dmp

    Filesize

    212KB

  • memory/1688-30-0x00000000071C0000-0x00000000071F5000-memory.dmp

    Filesize

    212KB

  • memory/1688-28-0x00000000071C0000-0x00000000071F5000-memory.dmp

    Filesize

    212KB

  • memory/1688-26-0x00000000071C0000-0x00000000071F5000-memory.dmp

    Filesize

    212KB

  • memory/1688-25-0x00000000071C0000-0x00000000071F5000-memory.dmp

    Filesize

    212KB

  • memory/1688-817-0x0000000009CA0000-0x000000000A2B8000-memory.dmp

    Filesize

    6.1MB

  • memory/1688-818-0x000000000A350000-0x000000000A362000-memory.dmp

    Filesize

    72KB

  • memory/1924-16-0x00007FFEF5CB3000-0x00007FFEF5CB5000-memory.dmp

    Filesize

    8KB

  • memory/1924-14-0x00007FFEF5CB3000-0x00007FFEF5CB5000-memory.dmp

    Filesize

    8KB

  • memory/1924-15-0x0000000000110000-0x000000000011A000-memory.dmp

    Filesize

    40KB