Analysis

  • max time kernel
    141s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-11-2024 00:25

General

  • Target

    6263a7265dfe9f73116f855e7575d4ff1d846c448110010c5f1694850be53818.exe

  • Size

    568KB

  • MD5

    cd520397a76f946d11b0ae0e2fed6f8c

  • SHA1

    3db3d14d0b378772c561b5ef45f2d3b6d0166278

  • SHA256

    6263a7265dfe9f73116f855e7575d4ff1d846c448110010c5f1694850be53818

  • SHA512

    ea2d71fba4288ae991b70c848c31d8e576f50a24bf42e30861b9707023bbfd563238d11a58074eff9b889f87d972cc85515ca597ba219d94229173823ad483b5

  • SSDEEP

    6144:r0p0yN90QECodl17ONZJfXmNodG5+TDDEBasPfF+pWKrdJ7NHd6BpB05C37XgdaX:hy908oF7wZJfKkG5WmDwHOqIwgX

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6263a7265dfe9f73116f855e7575d4ff1d846c448110010c5f1694850be53818.exe
    "C:\Users\Admin\AppData\Local\Temp\6263a7265dfe9f73116f855e7575d4ff1d846c448110010c5f1694850be53818.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:32
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziFB3261.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziFB3261.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3600
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it747631.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it747631.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2056
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr703152.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr703152.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4128

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziFB3261.exe

    Filesize

    414KB

    MD5

    bc59d2db4cd6b44a31720d17519e2ae2

    SHA1

    5fb9a459b5d67ac39e455e9ae8d006174c2a74ba

    SHA256

    2649c0e43731270b8d4f9707815614f3aaf8991ce7d67365ae6a2892ea569f2d

    SHA512

    d004d1fea6317b08f53a59e5d2adbfeb3ac065bf327f528c72f735f4ebae9d32ec4a2418cdb48a88e6878991cbd5049be8e29f00207aaf9af5e0c3671c332d39

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it747631.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr703152.exe

    Filesize

    359KB

    MD5

    cfdc7432338ba74c8c652e247783c2e3

    SHA1

    7d430e4d919a2d659ad1f4fe9848c366f81ff8e2

    SHA256

    e2b786ad3efca09e3f495ba8f95f4ed7eceaf41e533e82aad6d9b4b60ab281b7

    SHA512

    c3005cd63a3b89a3d8bb70c76ef9794e1607043b3fc45ea42dcbcd8ffb67d1747d23ea7d4718b1405ddcdd7a4bb91a0d20912bb261b07368a5af31fe2adae838

  • memory/2056-14-0x00007FF8C10F3000-0x00007FF8C10F5000-memory.dmp

    Filesize

    8KB

  • memory/2056-15-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2056-16-0x00007FF8C10F3000-0x00007FF8C10F5000-memory.dmp

    Filesize

    8KB

  • memory/4128-76-0x0000000007780000-0x00000000077B5000-memory.dmp

    Filesize

    212KB

  • memory/4128-66-0x0000000007780000-0x00000000077B5000-memory.dmp

    Filesize

    212KB

  • memory/4128-24-0x0000000007780000-0x00000000077BA000-memory.dmp

    Filesize

    232KB

  • memory/4128-28-0x0000000007780000-0x00000000077B5000-memory.dmp

    Filesize

    212KB

  • memory/4128-36-0x0000000007780000-0x00000000077B5000-memory.dmp

    Filesize

    212KB

  • memory/4128-88-0x0000000007780000-0x00000000077B5000-memory.dmp

    Filesize

    212KB

  • memory/4128-86-0x0000000007780000-0x00000000077B5000-memory.dmp

    Filesize

    212KB

  • memory/4128-84-0x0000000007780000-0x00000000077B5000-memory.dmp

    Filesize

    212KB

  • memory/4128-82-0x0000000007780000-0x00000000077B5000-memory.dmp

    Filesize

    212KB

  • memory/4128-819-0x000000000A360000-0x000000000A46A000-memory.dmp

    Filesize

    1.0MB

  • memory/4128-820-0x000000000A480000-0x000000000A4BC000-memory.dmp

    Filesize

    240KB

  • memory/4128-821-0x00000000049B0000-0x00000000049FC000-memory.dmp

    Filesize

    304KB

  • memory/4128-818-0x000000000A340000-0x000000000A352000-memory.dmp

    Filesize

    72KB

  • memory/4128-817-0x0000000009C80000-0x000000000A298000-memory.dmp

    Filesize

    6.1MB

  • memory/4128-80-0x0000000007780000-0x00000000077B5000-memory.dmp

    Filesize

    212KB

  • memory/4128-78-0x0000000007780000-0x00000000077B5000-memory.dmp

    Filesize

    212KB

  • memory/4128-22-0x0000000004BA0000-0x0000000004BDC000-memory.dmp

    Filesize

    240KB

  • memory/4128-74-0x0000000007780000-0x00000000077B5000-memory.dmp

    Filesize

    212KB

  • memory/4128-72-0x0000000007780000-0x00000000077B5000-memory.dmp

    Filesize

    212KB

  • memory/4128-70-0x0000000007780000-0x00000000077B5000-memory.dmp

    Filesize

    212KB

  • memory/4128-68-0x0000000007780000-0x00000000077B5000-memory.dmp

    Filesize

    212KB

  • memory/4128-23-0x00000000071D0000-0x0000000007774000-memory.dmp

    Filesize

    5.6MB

  • memory/4128-64-0x0000000007780000-0x00000000077B5000-memory.dmp

    Filesize

    212KB

  • memory/4128-60-0x0000000007780000-0x00000000077B5000-memory.dmp

    Filesize

    212KB

  • memory/4128-58-0x0000000007780000-0x00000000077B5000-memory.dmp

    Filesize

    212KB

  • memory/4128-56-0x0000000007780000-0x00000000077B5000-memory.dmp

    Filesize

    212KB

  • memory/4128-54-0x0000000007780000-0x00000000077B5000-memory.dmp

    Filesize

    212KB

  • memory/4128-52-0x0000000007780000-0x00000000077B5000-memory.dmp

    Filesize

    212KB

  • memory/4128-50-0x0000000007780000-0x00000000077B5000-memory.dmp

    Filesize

    212KB

  • memory/4128-48-0x0000000007780000-0x00000000077B5000-memory.dmp

    Filesize

    212KB

  • memory/4128-46-0x0000000007780000-0x00000000077B5000-memory.dmp

    Filesize

    212KB

  • memory/4128-44-0x0000000007780000-0x00000000077B5000-memory.dmp

    Filesize

    212KB

  • memory/4128-42-0x0000000007780000-0x00000000077B5000-memory.dmp

    Filesize

    212KB

  • memory/4128-40-0x0000000007780000-0x00000000077B5000-memory.dmp

    Filesize

    212KB

  • memory/4128-38-0x0000000007780000-0x00000000077B5000-memory.dmp

    Filesize

    212KB

  • memory/4128-34-0x0000000007780000-0x00000000077B5000-memory.dmp

    Filesize

    212KB

  • memory/4128-32-0x0000000007780000-0x00000000077B5000-memory.dmp

    Filesize

    212KB

  • memory/4128-30-0x0000000007780000-0x00000000077B5000-memory.dmp

    Filesize

    212KB

  • memory/4128-62-0x0000000007780000-0x00000000077B5000-memory.dmp

    Filesize

    212KB

  • memory/4128-26-0x0000000007780000-0x00000000077B5000-memory.dmp

    Filesize

    212KB

  • memory/4128-25-0x0000000007780000-0x00000000077B5000-memory.dmp

    Filesize

    212KB