Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/11/2024, 11:53

General

  • Target

    a079d26aafb8e6cef0b6e42c99fb01682872cb8251cb49f8a6bc9d35a0e8726f.exe

  • Size

    470KB

  • MD5

    30c35755b18e6a166b7a853d167247d7

  • SHA1

    bcce0c6fa842ca459b1699b0ac9474de9f8b8f52

  • SHA256

    a079d26aafb8e6cef0b6e42c99fb01682872cb8251cb49f8a6bc9d35a0e8726f

  • SHA512

    a9e36803d63a22ca18a7601316783b4dbc996fb55f8199e5568b607f315925a638d04e0134ac87cdd90f2a32c3a643f278b86ddcb4488b8afd88cf243c8f59b4

  • SSDEEP

    6144:wSp0yN90QEZ2TFi65/vwQb7G8mkh5wh7+QbaQbayikk17W8GVdr9gfUJwCNKLFe:Yy90zk0Yg2o+QbRbg7WRD9RvWFe

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 2 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a079d26aafb8e6cef0b6e42c99fb01682872cb8251cb49f8a6bc9d35a0e8726f.exe
    "C:\Users\Admin\AppData\Local\Temp\a079d26aafb8e6cef0b6e42c99fb01682872cb8251cb49f8a6bc9d35a0e8726f.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4868
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\it678475.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\it678475.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:912
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jr221164.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jr221164.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:3080

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\it678475.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jr221164.exe

    Filesize

    486KB

    MD5

    8891429ba76f28de84eb2130cebcbfe7

    SHA1

    b2a12bbdc8bca8f2928d85b72ba30faef26a218c

    SHA256

    f96be8fe9cbb22266fbfeb7e6fabbfc5f20498c584641d9ed6b0c95eade08385

    SHA512

    93e841208ab4fd2e28aec4db7294125ce359777fc56bd98a4d9959d1561b33830dcc592ae74e61145409a3c23ca3818c4b22e5590c6cab8459a1fb6e28c31bc6

  • memory/912-7-0x00007FF929873000-0x00007FF929875000-memory.dmp

    Filesize

    8KB

  • memory/912-8-0x0000000000AC0000-0x0000000000ACA000-memory.dmp

    Filesize

    40KB

  • memory/912-9-0x00007FF929873000-0x00007FF929875000-memory.dmp

    Filesize

    8KB

  • memory/3080-15-0x0000000000970000-0x0000000000A70000-memory.dmp

    Filesize

    1024KB

  • memory/3080-16-0x00000000008E0000-0x0000000000926000-memory.dmp

    Filesize

    280KB

  • memory/3080-17-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB

  • memory/3080-18-0x0000000002660000-0x000000000269C000-memory.dmp

    Filesize

    240KB

  • memory/3080-19-0x0000000004EB0000-0x0000000005454000-memory.dmp

    Filesize

    5.6MB

  • memory/3080-20-0x0000000002A90000-0x0000000002ACA000-memory.dmp

    Filesize

    232KB

  • memory/3080-40-0x0000000002A90000-0x0000000002AC5000-memory.dmp

    Filesize

    212KB

  • memory/3080-24-0x0000000002A90000-0x0000000002AC5000-memory.dmp

    Filesize

    212KB

  • memory/3080-22-0x0000000002A90000-0x0000000002AC5000-memory.dmp

    Filesize

    212KB

  • memory/3080-21-0x0000000002A90000-0x0000000002AC5000-memory.dmp

    Filesize

    212KB

  • memory/3080-52-0x0000000002A90000-0x0000000002AC5000-memory.dmp

    Filesize

    212KB

  • memory/3080-84-0x0000000002A90000-0x0000000002AC5000-memory.dmp

    Filesize

    212KB

  • memory/3080-82-0x0000000002A90000-0x0000000002AC5000-memory.dmp

    Filesize

    212KB

  • memory/3080-81-0x0000000002A90000-0x0000000002AC5000-memory.dmp

    Filesize

    212KB

  • memory/3080-78-0x0000000002A90000-0x0000000002AC5000-memory.dmp

    Filesize

    212KB

  • memory/3080-76-0x0000000002A90000-0x0000000002AC5000-memory.dmp

    Filesize

    212KB

  • memory/3080-74-0x0000000002A90000-0x0000000002AC5000-memory.dmp

    Filesize

    212KB

  • memory/3080-72-0x0000000002A90000-0x0000000002AC5000-memory.dmp

    Filesize

    212KB

  • memory/3080-70-0x0000000002A90000-0x0000000002AC5000-memory.dmp

    Filesize

    212KB

  • memory/3080-66-0x0000000002A90000-0x0000000002AC5000-memory.dmp

    Filesize

    212KB

  • memory/3080-64-0x0000000002A90000-0x0000000002AC5000-memory.dmp

    Filesize

    212KB

  • memory/3080-62-0x0000000002A90000-0x0000000002AC5000-memory.dmp

    Filesize

    212KB

  • memory/3080-60-0x0000000002A90000-0x0000000002AC5000-memory.dmp

    Filesize

    212KB

  • memory/3080-58-0x0000000002A90000-0x0000000002AC5000-memory.dmp

    Filesize

    212KB

  • memory/3080-56-0x0000000002A90000-0x0000000002AC5000-memory.dmp

    Filesize

    212KB

  • memory/3080-54-0x0000000002A90000-0x0000000002AC5000-memory.dmp

    Filesize

    212KB

  • memory/3080-50-0x0000000002A90000-0x0000000002AC5000-memory.dmp

    Filesize

    212KB

  • memory/3080-48-0x0000000002A90000-0x0000000002AC5000-memory.dmp

    Filesize

    212KB

  • memory/3080-46-0x0000000002A90000-0x0000000002AC5000-memory.dmp

    Filesize

    212KB

  • memory/3080-44-0x0000000002A90000-0x0000000002AC5000-memory.dmp

    Filesize

    212KB

  • memory/3080-42-0x0000000002A90000-0x0000000002AC5000-memory.dmp

    Filesize

    212KB

  • memory/3080-38-0x0000000002A90000-0x0000000002AC5000-memory.dmp

    Filesize

    212KB

  • memory/3080-36-0x0000000002A90000-0x0000000002AC5000-memory.dmp

    Filesize

    212KB

  • memory/3080-35-0x0000000002A90000-0x0000000002AC5000-memory.dmp

    Filesize

    212KB

  • memory/3080-814-0x0000000007F90000-0x0000000007FA2000-memory.dmp

    Filesize

    72KB

  • memory/3080-813-0x00000000078E0000-0x0000000007EF8000-memory.dmp

    Filesize

    6.1MB

  • memory/3080-32-0x0000000002A90000-0x0000000002AC5000-memory.dmp

    Filesize

    212KB

  • memory/3080-30-0x0000000002A90000-0x0000000002AC5000-memory.dmp

    Filesize

    212KB

  • memory/3080-28-0x0000000002A90000-0x0000000002AC5000-memory.dmp

    Filesize

    212KB

  • memory/3080-26-0x0000000002A90000-0x0000000002AC5000-memory.dmp

    Filesize

    212KB

  • memory/3080-68-0x0000000002A90000-0x0000000002AC5000-memory.dmp

    Filesize

    212KB

  • memory/3080-815-0x0000000007FB0000-0x00000000080BA000-memory.dmp

    Filesize

    1.0MB

  • memory/3080-816-0x00000000080D0000-0x000000000810C000-memory.dmp

    Filesize

    240KB

  • memory/3080-817-0x00000000025D0000-0x000000000261C000-memory.dmp

    Filesize

    304KB

  • memory/3080-818-0x0000000000970000-0x0000000000A70000-memory.dmp

    Filesize

    1024KB

  • memory/3080-819-0x00000000008E0000-0x0000000000926000-memory.dmp

    Filesize

    280KB

  • memory/3080-821-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB