Analysis

  • max time kernel
    140s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-11-2024 00:21

General

  • Target

    6263a7265dfe9f73116f855e7575d4ff1d846c448110010c5f1694850be53818.exe

  • Size

    568KB

  • MD5

    cd520397a76f946d11b0ae0e2fed6f8c

  • SHA1

    3db3d14d0b378772c561b5ef45f2d3b6d0166278

  • SHA256

    6263a7265dfe9f73116f855e7575d4ff1d846c448110010c5f1694850be53818

  • SHA512

    ea2d71fba4288ae991b70c848c31d8e576f50a24bf42e30861b9707023bbfd563238d11a58074eff9b889f87d972cc85515ca597ba219d94229173823ad483b5

  • SSDEEP

    6144:r0p0yN90QECodl17ONZJfXmNodG5+TDDEBasPfF+pWKrdJ7NHd6BpB05C37XgdaX:hy908oF7wZJfKkG5WmDwHOqIwgX

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6263a7265dfe9f73116f855e7575d4ff1d846c448110010c5f1694850be53818.exe
    "C:\Users\Admin\AppData\Local\Temp\6263a7265dfe9f73116f855e7575d4ff1d846c448110010c5f1694850be53818.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3632
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziFB3261.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziFB3261.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4544
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it747631.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it747631.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5052
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr703152.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr703152.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:3620

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziFB3261.exe

    Filesize

    414KB

    MD5

    bc59d2db4cd6b44a31720d17519e2ae2

    SHA1

    5fb9a459b5d67ac39e455e9ae8d006174c2a74ba

    SHA256

    2649c0e43731270b8d4f9707815614f3aaf8991ce7d67365ae6a2892ea569f2d

    SHA512

    d004d1fea6317b08f53a59e5d2adbfeb3ac065bf327f528c72f735f4ebae9d32ec4a2418cdb48a88e6878991cbd5049be8e29f00207aaf9af5e0c3671c332d39

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it747631.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr703152.exe

    Filesize

    359KB

    MD5

    cfdc7432338ba74c8c652e247783c2e3

    SHA1

    7d430e4d919a2d659ad1f4fe9848c366f81ff8e2

    SHA256

    e2b786ad3efca09e3f495ba8f95f4ed7eceaf41e533e82aad6d9b4b60ab281b7

    SHA512

    c3005cd63a3b89a3d8bb70c76ef9794e1607043b3fc45ea42dcbcd8ffb67d1747d23ea7d4718b1405ddcdd7a4bb91a0d20912bb261b07368a5af31fe2adae838

  • memory/3620-84-0x00000000071F0000-0x0000000007225000-memory.dmp

    Filesize

    212KB

  • memory/3620-22-0x0000000004C60000-0x0000000004C9C000-memory.dmp

    Filesize

    240KB

  • memory/3620-821-0x0000000006CE0000-0x0000000006D2C000-memory.dmp

    Filesize

    304KB

  • memory/3620-80-0x00000000071F0000-0x0000000007225000-memory.dmp

    Filesize

    212KB

  • memory/3620-23-0x0000000007310000-0x00000000078B4000-memory.dmp

    Filesize

    5.6MB

  • memory/3620-24-0x00000000071F0000-0x000000000722A000-memory.dmp

    Filesize

    232KB

  • memory/3620-36-0x00000000071F0000-0x0000000007225000-memory.dmp

    Filesize

    212KB

  • memory/3620-34-0x00000000071F0000-0x0000000007225000-memory.dmp

    Filesize

    212KB

  • memory/3620-32-0x00000000071F0000-0x0000000007225000-memory.dmp

    Filesize

    212KB

  • memory/3620-30-0x00000000071F0000-0x0000000007225000-memory.dmp

    Filesize

    212KB

  • memory/3620-82-0x00000000071F0000-0x0000000007225000-memory.dmp

    Filesize

    212KB

  • memory/3620-76-0x00000000071F0000-0x0000000007225000-memory.dmp

    Filesize

    212KB

  • memory/3620-78-0x00000000071F0000-0x0000000007225000-memory.dmp

    Filesize

    212KB

  • memory/3620-52-0x00000000071F0000-0x0000000007225000-memory.dmp

    Filesize

    212KB

  • memory/3620-28-0x00000000071F0000-0x0000000007225000-memory.dmp

    Filesize

    212KB

  • memory/3620-26-0x00000000071F0000-0x0000000007225000-memory.dmp

    Filesize

    212KB

  • memory/3620-25-0x00000000071F0000-0x0000000007225000-memory.dmp

    Filesize

    212KB

  • memory/3620-38-0x00000000071F0000-0x0000000007225000-memory.dmp

    Filesize

    212KB

  • memory/3620-89-0x00000000071F0000-0x0000000007225000-memory.dmp

    Filesize

    212KB

  • memory/3620-820-0x000000000A480000-0x000000000A4BC000-memory.dmp

    Filesize

    240KB

  • memory/3620-86-0x00000000071F0000-0x0000000007225000-memory.dmp

    Filesize

    212KB

  • memory/3620-819-0x000000000A360000-0x000000000A46A000-memory.dmp

    Filesize

    1.0MB

  • memory/3620-72-0x00000000071F0000-0x0000000007225000-memory.dmp

    Filesize

    212KB

  • memory/3620-74-0x00000000071F0000-0x0000000007225000-memory.dmp

    Filesize

    212KB

  • memory/3620-70-0x00000000071F0000-0x0000000007225000-memory.dmp

    Filesize

    212KB

  • memory/3620-68-0x00000000071F0000-0x0000000007225000-memory.dmp

    Filesize

    212KB

  • memory/3620-66-0x00000000071F0000-0x0000000007225000-memory.dmp

    Filesize

    212KB

  • memory/3620-64-0x00000000071F0000-0x0000000007225000-memory.dmp

    Filesize

    212KB

  • memory/3620-62-0x00000000071F0000-0x0000000007225000-memory.dmp

    Filesize

    212KB

  • memory/3620-60-0x00000000071F0000-0x0000000007225000-memory.dmp

    Filesize

    212KB

  • memory/3620-58-0x00000000071F0000-0x0000000007225000-memory.dmp

    Filesize

    212KB

  • memory/3620-56-0x00000000071F0000-0x0000000007225000-memory.dmp

    Filesize

    212KB

  • memory/3620-54-0x00000000071F0000-0x0000000007225000-memory.dmp

    Filesize

    212KB

  • memory/3620-50-0x00000000071F0000-0x0000000007225000-memory.dmp

    Filesize

    212KB

  • memory/3620-48-0x00000000071F0000-0x0000000007225000-memory.dmp

    Filesize

    212KB

  • memory/3620-46-0x00000000071F0000-0x0000000007225000-memory.dmp

    Filesize

    212KB

  • memory/3620-44-0x00000000071F0000-0x0000000007225000-memory.dmp

    Filesize

    212KB

  • memory/3620-42-0x00000000071F0000-0x0000000007225000-memory.dmp

    Filesize

    212KB

  • memory/3620-40-0x00000000071F0000-0x0000000007225000-memory.dmp

    Filesize

    212KB

  • memory/3620-817-0x0000000009D40000-0x000000000A358000-memory.dmp

    Filesize

    6.1MB

  • memory/3620-818-0x00000000072E0000-0x00000000072F2000-memory.dmp

    Filesize

    72KB

  • memory/5052-16-0x00007FFF8AC73000-0x00007FFF8AC75000-memory.dmp

    Filesize

    8KB

  • memory/5052-14-0x00007FFF8AC73000-0x00007FFF8AC75000-memory.dmp

    Filesize

    8KB

  • memory/5052-15-0x0000000000D70000-0x0000000000D7A000-memory.dmp

    Filesize

    40KB