Analysis

  • max time kernel
    141s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/11/2024, 13:38

General

  • Target

    b46c06ef225e7cdec3b9977ab77a23259ce2e4fb225b418ab124d0480ca2bea7.exe

  • Size

    1.2MB

  • MD5

    b40ae8a5bee3c12ee419be3e8d49d028

  • SHA1

    1de925549d8fd2a7be02a9d8be141c2762832845

  • SHA256

    b46c06ef225e7cdec3b9977ab77a23259ce2e4fb225b418ab124d0480ca2bea7

  • SHA512

    ecba095d8c1cccdacd251b0a1b38801cdece5adeb9362d83b35fa4e5b96e4a1f7fa5c4fbbcdfe2e8f15de2ef74da3c8340e2269b12df2cd405f7014dc712e4e6

  • SSDEEP

    24576:hygCTN3NWwdaHjRUoQA+YXapFaEQRh/8gs5iw0QjepezaKMzncGPj/:UgaNIwdQjRUHA+mDEsh/8gqZewzGznBL

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b46c06ef225e7cdec3b9977ab77a23259ce2e4fb225b418ab124d0480ca2bea7.exe
    "C:\Users\Admin\AppData\Local\Temp\b46c06ef225e7cdec3b9977ab77a23259ce2e4fb225b418ab124d0480ca2bea7.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:884
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ki772860.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ki772860.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2340
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ki246975.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ki246975.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4040
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ki045248.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ki045248.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1140
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\az413844.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\az413844.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:556
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu017518.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu017518.exe
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:3244

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ki772860.exe

    Filesize

    1.1MB

    MD5

    491abb9e56290628a0883d160e567c0c

    SHA1

    bbd76830a2b858d41c8624b28880cfb5d3feb764

    SHA256

    ddcb2fdd724268a5a7b549a3eb65bc7ed98a7bb95a49417c28789a35b515a737

    SHA512

    964789a4300dbb060b8c2db77ae12c1fde71b331dfcaaa58e249fcec8dc7481b48010b8926142fab48e5a1a2ed9981b915ae64fda702403613a469fac3408d2f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ki246975.exe

    Filesize

    806KB

    MD5

    289c9a2d72140a3bcd59b7d4e2609037

    SHA1

    04c6e6c8f4f3db4f236579965a5696116e225318

    SHA256

    3726dffbed255412e1b0e245c45831645d427d4ccdac3e99d80ffd07742f65ff

    SHA512

    a79ff2a5e75b353c8548cae55e2f26c1997cc56188af4e6ee4b743ab4e0fef82a28869ad38ad063d9547202c0c40b6a1acf6ff80c1df9c55204212449b061431

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ki045248.exe

    Filesize

    469KB

    MD5

    c231b7fe8a177d9742ea8a6addff88dd

    SHA1

    d3cdda2fb659c8e2c8aabd2726f42c206b3c0d4d

    SHA256

    566365c9944138993be5bb03392242e882c4e0550c872129f9b2235e2141a9c4

    SHA512

    73631da3b9b71aa2c25f1593bff712b0f564bcc86fd26afb6b75bfb7c558f7d4c415184be28955cddb263732f633b503462bb7f9e2a9e770702c56e8655aef66

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\az413844.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu017518.exe

    Filesize

    487KB

    MD5

    86ad33286eb11d6b83095060b3d67890

    SHA1

    41cb7016f69c0cc5f70b10464577a017cfce493c

    SHA256

    23aa445e160954099d1d321bd30572a01aaf4a5708e5341c2c5ab746c6a391c8

    SHA512

    42c2251f447543e5c708b364079339775a26d285efdba854f26d1630b8981f4bb33c616a03ccff9da8fa192bfc2aab418d22a2ac7b06804a7f4fa24157c0a311

  • memory/556-28-0x0000000000070000-0x000000000007A000-memory.dmp

    Filesize

    40KB

  • memory/3244-76-0x0000000002AA0000-0x0000000002AD5000-memory.dmp

    Filesize

    212KB

  • memory/3244-67-0x0000000002AA0000-0x0000000002AD5000-memory.dmp

    Filesize

    212KB

  • memory/3244-36-0x0000000002AA0000-0x0000000002ADA000-memory.dmp

    Filesize

    232KB

  • memory/3244-38-0x0000000002AA0000-0x0000000002AD5000-memory.dmp

    Filesize

    212KB

  • memory/3244-37-0x0000000002AA0000-0x0000000002AD5000-memory.dmp

    Filesize

    212KB

  • memory/3244-100-0x0000000002AA0000-0x0000000002AD5000-memory.dmp

    Filesize

    212KB

  • memory/3244-98-0x0000000002AA0000-0x0000000002AD5000-memory.dmp

    Filesize

    212KB

  • memory/3244-96-0x0000000002AA0000-0x0000000002AD5000-memory.dmp

    Filesize

    212KB

  • memory/3244-95-0x0000000002AA0000-0x0000000002AD5000-memory.dmp

    Filesize

    212KB

  • memory/3244-92-0x0000000002AA0000-0x0000000002AD5000-memory.dmp

    Filesize

    212KB

  • memory/3244-90-0x0000000002AA0000-0x0000000002AD5000-memory.dmp

    Filesize

    212KB

  • memory/3244-86-0x0000000002AA0000-0x0000000002AD5000-memory.dmp

    Filesize

    212KB

  • memory/3244-84-0x0000000002AA0000-0x0000000002AD5000-memory.dmp

    Filesize

    212KB

  • memory/3244-82-0x0000000002AA0000-0x0000000002AD5000-memory.dmp

    Filesize

    212KB

  • memory/3244-80-0x0000000002AA0000-0x0000000002AD5000-memory.dmp

    Filesize

    212KB

  • memory/3244-78-0x0000000002AA0000-0x0000000002AD5000-memory.dmp

    Filesize

    212KB

  • memory/3244-34-0x00000000028B0000-0x00000000028EC000-memory.dmp

    Filesize

    240KB

  • memory/3244-74-0x0000000002AA0000-0x0000000002AD5000-memory.dmp

    Filesize

    212KB

  • memory/3244-73-0x0000000002AA0000-0x0000000002AD5000-memory.dmp

    Filesize

    212KB

  • memory/3244-70-0x0000000002AA0000-0x0000000002AD5000-memory.dmp

    Filesize

    212KB

  • memory/3244-68-0x0000000002AA0000-0x0000000002AD5000-memory.dmp

    Filesize

    212KB

  • memory/3244-35-0x0000000005050000-0x00000000055F4000-memory.dmp

    Filesize

    5.6MB

  • memory/3244-62-0x0000000002AA0000-0x0000000002AD5000-memory.dmp

    Filesize

    212KB

  • memory/3244-60-0x0000000002AA0000-0x0000000002AD5000-memory.dmp

    Filesize

    212KB

  • memory/3244-58-0x0000000002AA0000-0x0000000002AD5000-memory.dmp

    Filesize

    212KB

  • memory/3244-56-0x0000000002AA0000-0x0000000002AD5000-memory.dmp

    Filesize

    212KB

  • memory/3244-54-0x0000000002AA0000-0x0000000002AD5000-memory.dmp

    Filesize

    212KB

  • memory/3244-53-0x0000000002AA0000-0x0000000002AD5000-memory.dmp

    Filesize

    212KB

  • memory/3244-50-0x0000000002AA0000-0x0000000002AD5000-memory.dmp

    Filesize

    212KB

  • memory/3244-48-0x0000000002AA0000-0x0000000002AD5000-memory.dmp

    Filesize

    212KB

  • memory/3244-46-0x0000000002AA0000-0x0000000002AD5000-memory.dmp

    Filesize

    212KB

  • memory/3244-44-0x0000000002AA0000-0x0000000002AD5000-memory.dmp

    Filesize

    212KB

  • memory/3244-88-0x0000000002AA0000-0x0000000002AD5000-memory.dmp

    Filesize

    212KB

  • memory/3244-64-0x0000000002AA0000-0x0000000002AD5000-memory.dmp

    Filesize

    212KB

  • memory/3244-42-0x0000000002AA0000-0x0000000002AD5000-memory.dmp

    Filesize

    212KB

  • memory/3244-40-0x0000000002AA0000-0x0000000002AD5000-memory.dmp

    Filesize

    212KB

  • memory/3244-829-0x0000000007980000-0x0000000007F98000-memory.dmp

    Filesize

    6.1MB

  • memory/3244-830-0x0000000007FA0000-0x0000000007FB2000-memory.dmp

    Filesize

    72KB

  • memory/3244-831-0x0000000007FC0000-0x00000000080CA000-memory.dmp

    Filesize

    1.0MB

  • memory/3244-832-0x00000000080E0000-0x000000000811C000-memory.dmp

    Filesize

    240KB

  • memory/3244-833-0x00000000025D0000-0x000000000261C000-memory.dmp

    Filesize

    304KB