Analysis

  • max time kernel
    117s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-11-2024 13:25

General

  • Target

    567c2ab1eeeed12dead682bafde8507e1c87b196944f82e8a0fe41cf9c44302e.exe

  • Size

    1.2MB

  • MD5

    ff7f6e28c50f781cec366fb192eb882b

  • SHA1

    1c8a9e73301d9712ad5801cbecf32cb4e0405c0c

  • SHA256

    567c2ab1eeeed12dead682bafde8507e1c87b196944f82e8a0fe41cf9c44302e

  • SHA512

    1b56ce5062a5cd675dc770487837ac9557e71dec6a779d9cc75c671fc0570b0c892a3005d1270320f9183cda0638f6f4634fb6ffd04122281f21f7878b70a6ce

  • SSDEEP

    24576:BymlYIvwuciefKoR9s6GgcOedcHQUOzL30XE0i0:0MhvEicGgjedwLeL3GbX

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\567c2ab1eeeed12dead682bafde8507e1c87b196944f82e8a0fe41cf9c44302e.exe
    "C:\Users\Admin\AppData\Local\Temp\567c2ab1eeeed12dead682bafde8507e1c87b196944f82e8a0fe41cf9c44302e.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3540
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ki926604.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ki926604.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3648
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ki855669.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ki855669.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1460
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ki469893.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ki469893.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4488
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\az497544.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\az497544.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:744
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu130948.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu130948.exe
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:4864

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ki926604.exe

    Filesize

    1.1MB

    MD5

    3d6013a18df2d7c20f5e3c88a783744a

    SHA1

    80c13ad8ad5d3afc37960b4898a306da7f665e5b

    SHA256

    8964176a3dfda5740258046dfafd35a688784206a1605e0191a31d2037d4e3db

    SHA512

    883de2ab0073e7b1e71a0e140217fbb0992cf8630a263f357571e1418b07381d268b511d2422cd1ccb1614cdaf9e519040e869c8fd244809dcbf8ef078563a32

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ki855669.exe

    Filesize

    806KB

    MD5

    4b8945a2aa8d7819341b780eee26b552

    SHA1

    3514f8afbfd234b6c64261afb0174e2b27fe1126

    SHA256

    903fa2df752525b0b35d11726af3cac7d8cbf6a4bbd68ee864b6d1d9a068b6ec

    SHA512

    1a4d3bc3955ebb05c7d3e90f7eba0100167bb760d464d0e88cf0a2ccd3654efc73bd9dffabe5802b0c99b54b8bcbae9958adcae9f67c2128b71714e6cacf1d24

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ki469893.exe

    Filesize

    470KB

    MD5

    09f98df348ba735c38bdff6605490181

    SHA1

    c57a2b01cc9d26286c16a8712038150e0463e79c

    SHA256

    89abf9c528f7deea1464adffdc540d1b92b1279ec38e8437fb8d3cb860debdbb

    SHA512

    cb580ae6c5392414c16bab2a418d4d4fb80c152a78980a0a8b41db6a36ee161b42d550b9ad99be936189f31827dc0c7793b0a63564b3290b86ae7129ac3bb481

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\az497544.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu130948.exe

    Filesize

    486KB

    MD5

    6363374e957fbf9180fd3a59aa0c7903

    SHA1

    2f638a15c4037787047146c77b8698b24a0a94a5

    SHA256

    98f3b640f1e76b2a49c5cef7625b2e0f540d1501cfa38f0b20cd38452296d096

    SHA512

    743e91eefb7fb843ca3e8a7c42a7d3728aa5fae7fc99315d7bf636355e0e9944d20ce4061575f0834c44b6385f7ac1746d7d1b34a581c865f9d45821992e5e13

  • memory/744-28-0x0000000000700000-0x000000000070A000-memory.dmp

    Filesize

    40KB

  • memory/4864-88-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/4864-78-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/4864-36-0x0000000004DF0000-0x0000000004E2A000-memory.dmp

    Filesize

    232KB

  • memory/4864-42-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/4864-94-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/4864-72-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/4864-60-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/4864-48-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/4864-40-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/4864-38-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/4864-37-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/4864-100-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/4864-98-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/4864-96-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/4864-92-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/4864-90-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/4864-34-0x0000000002720000-0x000000000275C000-memory.dmp

    Filesize

    240KB

  • memory/4864-86-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/4864-84-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/4864-82-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/4864-80-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/4864-35-0x0000000004F00000-0x00000000054A4000-memory.dmp

    Filesize

    5.6MB

  • memory/4864-76-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/4864-74-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/4864-70-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/4864-68-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/4864-66-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/4864-64-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/4864-62-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/4864-58-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/4864-56-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/4864-54-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/4864-52-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/4864-50-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/4864-46-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/4864-44-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/4864-829-0x0000000007930000-0x0000000007F48000-memory.dmp

    Filesize

    6.1MB

  • memory/4864-830-0x0000000007FA0000-0x0000000007FB2000-memory.dmp

    Filesize

    72KB

  • memory/4864-831-0x0000000007FC0000-0x00000000080CA000-memory.dmp

    Filesize

    1.0MB

  • memory/4864-832-0x00000000080E0000-0x000000000811C000-memory.dmp

    Filesize

    240KB

  • memory/4864-833-0x0000000002880000-0x00000000028CC000-memory.dmp

    Filesize

    304KB