Analysis

  • max time kernel
    141s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 02:15

General

  • Target

    23310167e01d64791219d318b6e172b3023194ae4600a405b7e80170e79d71a2.exe

  • Size

    564KB

  • MD5

    4b5a8b93a0b34664d8a47a77bb6fb1eb

  • SHA1

    0a0fa6c1d24dcf42d11a406cd20eec70b016628a

  • SHA256

    23310167e01d64791219d318b6e172b3023194ae4600a405b7e80170e79d71a2

  • SHA512

    4da5a6b5cf412f8e679b7029da0a143726be02a827c89c0479afa9af5b361a88cf9759f70acab505f8281ff6f7efd3ae5c85e9248d516a20d974a0565c590eb8

  • SSDEEP

    12288:Vy905xxhVkIBsQ9YCjByn5mIh5zP0LMqnM22ZJWm86:Vy4xNkIB79kn5bB8LMWR3R6

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\23310167e01d64791219d318b6e172b3023194ae4600a405b7e80170e79d71a2.exe
    "C:\Users\Admin\AppData\Local\Temp\23310167e01d64791219d318b6e172b3023194ae4600a405b7e80170e79d71a2.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4236
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zikl6224.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zikl6224.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1292
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it337841.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it337841.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2844
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp126345.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp126345.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1640

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zikl6224.exe

    Filesize

    409KB

    MD5

    e316d0a829ad2af65698d1602d2d3957

    SHA1

    af01b065f1e06aaaafaa912e4d0ba2567fc73624

    SHA256

    221d7d19309035c168ae80df5080362a6e7a6e2505b9ae0937f707a9c87c7c84

    SHA512

    5dcc115ab4316a3b4f4f54687254a04727dffe94ff8296f5e95390cb7ce23ad8ca9d287c0d4bfdc4373a018c2a13fdbb2aa0068208e2483b559205f29e5484e0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it337841.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp126345.exe

    Filesize

    361KB

    MD5

    24b4817459c1f0e1f7af89abc4dccd3b

    SHA1

    0f7d8f30f971f870d2f6033b280665ed608383a3

    SHA256

    1e39603e89d0d508fba8966e0773fb705607778655ec3dfa7e17ce15aa88e2d4

    SHA512

    8882a774a38c6338b85e3db67ec114d67ce4bfbf367a3b084866b0bf2c82b431ff7e07f53234f0716bb85b8efe61a5274b266a9031a5b2dcc1cc8a47963f4aa6

  • memory/1640-64-0x0000000007790000-0x00000000077C5000-memory.dmp

    Filesize

    212KB

  • memory/1640-22-0x0000000004BC0000-0x0000000004BFC000-memory.dmp

    Filesize

    240KB

  • memory/1640-821-0x0000000004880000-0x00000000048CC000-memory.dmp

    Filesize

    304KB

  • memory/1640-58-0x0000000007790000-0x00000000077C5000-memory.dmp

    Filesize

    212KB

  • memory/1640-23-0x00000000071E0000-0x0000000007784000-memory.dmp

    Filesize

    5.6MB

  • memory/1640-24-0x0000000007790000-0x00000000077CA000-memory.dmp

    Filesize

    232KB

  • memory/1640-25-0x0000000007790000-0x00000000077C5000-memory.dmp

    Filesize

    212KB

  • memory/1640-34-0x0000000007790000-0x00000000077C5000-memory.dmp

    Filesize

    212KB

  • memory/1640-88-0x0000000007790000-0x00000000077C5000-memory.dmp

    Filesize

    212KB

  • memory/1640-84-0x0000000007790000-0x00000000077C5000-memory.dmp

    Filesize

    212KB

  • memory/1640-62-0x0000000007790000-0x00000000077C5000-memory.dmp

    Filesize

    212KB

  • memory/1640-81-0x0000000007790000-0x00000000077C5000-memory.dmp

    Filesize

    212KB

  • memory/1640-56-0x0000000007790000-0x00000000077C5000-memory.dmp

    Filesize

    212KB

  • memory/1640-76-0x0000000007790000-0x00000000077C5000-memory.dmp

    Filesize

    212KB

  • memory/1640-74-0x0000000007790000-0x00000000077C5000-memory.dmp

    Filesize

    212KB

  • memory/1640-72-0x0000000007790000-0x00000000077C5000-memory.dmp

    Filesize

    212KB

  • memory/1640-70-0x0000000007790000-0x00000000077C5000-memory.dmp

    Filesize

    212KB

  • memory/1640-68-0x0000000007790000-0x00000000077C5000-memory.dmp

    Filesize

    212KB

  • memory/1640-66-0x0000000007790000-0x00000000077C5000-memory.dmp

    Filesize

    212KB

  • memory/1640-820-0x000000000A490000-0x000000000A4CC000-memory.dmp

    Filesize

    240KB

  • memory/1640-82-0x0000000007790000-0x00000000077C5000-memory.dmp

    Filesize

    212KB

  • memory/1640-819-0x000000000A370000-0x000000000A47A000-memory.dmp

    Filesize

    1.0MB

  • memory/1640-78-0x0000000007790000-0x00000000077C5000-memory.dmp

    Filesize

    212KB

  • memory/1640-54-0x0000000007790000-0x00000000077C5000-memory.dmp

    Filesize

    212KB

  • memory/1640-52-0x0000000007790000-0x00000000077C5000-memory.dmp

    Filesize

    212KB

  • memory/1640-51-0x0000000007790000-0x00000000077C5000-memory.dmp

    Filesize

    212KB

  • memory/1640-48-0x0000000007790000-0x00000000077C5000-memory.dmp

    Filesize

    212KB

  • memory/1640-46-0x0000000007790000-0x00000000077C5000-memory.dmp

    Filesize

    212KB

  • memory/1640-44-0x0000000007790000-0x00000000077C5000-memory.dmp

    Filesize

    212KB

  • memory/1640-42-0x0000000007790000-0x00000000077C5000-memory.dmp

    Filesize

    212KB

  • memory/1640-40-0x0000000007790000-0x00000000077C5000-memory.dmp

    Filesize

    212KB

  • memory/1640-38-0x0000000007790000-0x00000000077C5000-memory.dmp

    Filesize

    212KB

  • memory/1640-36-0x0000000007790000-0x00000000077C5000-memory.dmp

    Filesize

    212KB

  • memory/1640-32-0x0000000007790000-0x00000000077C5000-memory.dmp

    Filesize

    212KB

  • memory/1640-30-0x0000000007790000-0x00000000077C5000-memory.dmp

    Filesize

    212KB

  • memory/1640-28-0x0000000007790000-0x00000000077C5000-memory.dmp

    Filesize

    212KB

  • memory/1640-26-0x0000000007790000-0x00000000077C5000-memory.dmp

    Filesize

    212KB

  • memory/1640-86-0x0000000007790000-0x00000000077C5000-memory.dmp

    Filesize

    212KB

  • memory/1640-60-0x0000000007790000-0x00000000077C5000-memory.dmp

    Filesize

    212KB

  • memory/1640-817-0x0000000009C90000-0x000000000A2A8000-memory.dmp

    Filesize

    6.1MB

  • memory/1640-818-0x000000000A350000-0x000000000A362000-memory.dmp

    Filesize

    72KB

  • memory/2844-16-0x00007FFC2FA93000-0x00007FFC2FA95000-memory.dmp

    Filesize

    8KB

  • memory/2844-14-0x00007FFC2FA93000-0x00007FFC2FA95000-memory.dmp

    Filesize

    8KB

  • memory/2844-15-0x0000000000B60000-0x0000000000B6A000-memory.dmp

    Filesize

    40KB