Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-11-2024 17:24

General

  • Target

    7919233398bd5b021f15cd844ec2d539c432d96a13b26e8168a25a25fefd46f3.exe

  • Size

    623KB

  • MD5

    872e064116819a3bd49194884be6fee2

  • SHA1

    4e8030c28f355326e4325180ab39ea9eeef58d09

  • SHA256

    7919233398bd5b021f15cd844ec2d539c432d96a13b26e8168a25a25fefd46f3

  • SHA512

    d145ae26cdc9d0cbfed83230948f9b7b21fde9efa9029ecc90cc155c1b4774f4f83b25179b167098df7306adbc665d870004bcb569189f2f0e6d1e66eab3b1c8

  • SSDEEP

    12288:ky90Uk6edJ5VhGkvbrH+MXDoDxWAYRDOmsDMK8AYrLSbMDAB2VBkRFtzS:ky1k6eXhZ7X8xaO5DTfYrLiM42DWFtzS

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7919233398bd5b021f15cd844ec2d539c432d96a13b26e8168a25a25fefd46f3.exe
    "C:\Users\Admin\AppData\Local\Temp\7919233398bd5b021f15cd844ec2d539c432d96a13b26e8168a25a25fefd46f3.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4804
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziGd7764.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziGd7764.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4820
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it902640.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it902640.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1616
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr873951.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr873951.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:3936

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziGd7764.exe

    Filesize

    469KB

    MD5

    979a044170c267d6262bd2e3d78ad14f

    SHA1

    71c9311922801ce5cb8b7e6ba4e207c936b3a626

    SHA256

    82f7510d19e303a9f3e2f7436145370b236a7d843d9c0fddc47718a22da34f1f

    SHA512

    ba8961bfe206a7028250039a677a3f281f6fb75a725d253262b8a7aaee34c41038c43e050ad6b0e0050688712705339e40aae8e8c17f18c82103df3cce82f003

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it902640.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr873951.exe

    Filesize

    485KB

    MD5

    583306e35cd2407c83d895d21133435e

    SHA1

    e9cb7f395201629c16bb8e36a5b60c16696005ee

    SHA256

    74562c87f99f183c5c5f3974dcc17674d8ab41a6f57799faa3a33000237ca2a4

    SHA512

    d66762cc8b565addbbef0d779234e3caaffff3f13b101576ce961dfc493276da16a766d466b966c1ea156255f8f3107aafdd0442c8ca65f33bba92c82b79fe82

  • memory/1616-14-0x00007FF8BDEF3000-0x00007FF8BDEF5000-memory.dmp

    Filesize

    8KB

  • memory/1616-15-0x0000000000E10000-0x0000000000E1A000-memory.dmp

    Filesize

    40KB

  • memory/3936-61-0x00000000029F0000-0x0000000002A25000-memory.dmp

    Filesize

    212KB

  • memory/3936-49-0x00000000029F0000-0x0000000002A25000-memory.dmp

    Filesize

    212KB

  • memory/3936-23-0x00000000029F0000-0x0000000002A2A000-memory.dmp

    Filesize

    232KB

  • memory/3936-41-0x00000000029F0000-0x0000000002A25000-memory.dmp

    Filesize

    212KB

  • memory/3936-51-0x00000000029F0000-0x0000000002A25000-memory.dmp

    Filesize

    212KB

  • memory/3936-87-0x00000000029F0000-0x0000000002A25000-memory.dmp

    Filesize

    212KB

  • memory/3936-85-0x00000000029F0000-0x0000000002A25000-memory.dmp

    Filesize

    212KB

  • memory/3936-83-0x00000000029F0000-0x0000000002A25000-memory.dmp

    Filesize

    212KB

  • memory/3936-81-0x00000000029F0000-0x0000000002A25000-memory.dmp

    Filesize

    212KB

  • memory/3936-79-0x00000000029F0000-0x0000000002A25000-memory.dmp

    Filesize

    212KB

  • memory/3936-77-0x00000000029F0000-0x0000000002A25000-memory.dmp

    Filesize

    212KB

  • memory/3936-75-0x00000000029F0000-0x0000000002A25000-memory.dmp

    Filesize

    212KB

  • memory/3936-73-0x00000000029F0000-0x0000000002A25000-memory.dmp

    Filesize

    212KB

  • memory/3936-71-0x00000000029F0000-0x0000000002A25000-memory.dmp

    Filesize

    212KB

  • memory/3936-69-0x00000000029F0000-0x0000000002A25000-memory.dmp

    Filesize

    212KB

  • memory/3936-67-0x00000000029F0000-0x0000000002A25000-memory.dmp

    Filesize

    212KB

  • memory/3936-63-0x00000000029F0000-0x0000000002A25000-memory.dmp

    Filesize

    212KB

  • memory/3936-21-0x0000000002860000-0x000000000289C000-memory.dmp

    Filesize

    240KB

  • memory/3936-59-0x00000000029F0000-0x0000000002A25000-memory.dmp

    Filesize

    212KB

  • memory/3936-57-0x00000000029F0000-0x0000000002A25000-memory.dmp

    Filesize

    212KB

  • memory/3936-55-0x00000000029F0000-0x0000000002A25000-memory.dmp

    Filesize

    212KB

  • memory/3936-22-0x0000000005040000-0x00000000055E4000-memory.dmp

    Filesize

    5.6MB

  • memory/3936-47-0x00000000029F0000-0x0000000002A25000-memory.dmp

    Filesize

    212KB

  • memory/3936-45-0x00000000029F0000-0x0000000002A25000-memory.dmp

    Filesize

    212KB

  • memory/3936-43-0x00000000029F0000-0x0000000002A25000-memory.dmp

    Filesize

    212KB

  • memory/3936-39-0x00000000029F0000-0x0000000002A25000-memory.dmp

    Filesize

    212KB

  • memory/3936-37-0x00000000029F0000-0x0000000002A25000-memory.dmp

    Filesize

    212KB

  • memory/3936-36-0x00000000029F0000-0x0000000002A25000-memory.dmp

    Filesize

    212KB

  • memory/3936-33-0x00000000029F0000-0x0000000002A25000-memory.dmp

    Filesize

    212KB

  • memory/3936-31-0x00000000029F0000-0x0000000002A25000-memory.dmp

    Filesize

    212KB

  • memory/3936-29-0x00000000029F0000-0x0000000002A25000-memory.dmp

    Filesize

    212KB

  • memory/3936-28-0x00000000029F0000-0x0000000002A25000-memory.dmp

    Filesize

    212KB

  • memory/3936-65-0x00000000029F0000-0x0000000002A25000-memory.dmp

    Filesize

    212KB

  • memory/3936-53-0x00000000029F0000-0x0000000002A25000-memory.dmp

    Filesize

    212KB

  • memory/3936-25-0x00000000029F0000-0x0000000002A25000-memory.dmp

    Filesize

    212KB

  • memory/3936-24-0x00000000029F0000-0x0000000002A25000-memory.dmp

    Filesize

    212KB

  • memory/3936-816-0x0000000007970000-0x0000000007F88000-memory.dmp

    Filesize

    6.1MB

  • memory/3936-817-0x0000000007FA0000-0x0000000007FB2000-memory.dmp

    Filesize

    72KB

  • memory/3936-818-0x0000000007FC0000-0x00000000080CA000-memory.dmp

    Filesize

    1.0MB

  • memory/3936-819-0x00000000080E0000-0x000000000811C000-memory.dmp

    Filesize

    240KB

  • memory/3936-820-0x00000000028E0000-0x000000000292C000-memory.dmp

    Filesize

    304KB