Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-11-2024 01:26

General

  • Target

    8118956954cd4c55aec70898805a5ec8df3d95dee51478129e34b249856f9d36.exe

  • Size

    1.1MB

  • MD5

    61b01d32cff96028325c3796a83ec98f

  • SHA1

    160e8ae834d9a3a2f8b63b7bf2e27efeba7e47b0

  • SHA256

    8118956954cd4c55aec70898805a5ec8df3d95dee51478129e34b249856f9d36

  • SHA512

    99f3ed9889b2b5c2b7e3fe8dd9585a09930852a5498b54c555ecab8feeeec3785d48ae276c7327eb72a251534adbe83cb57944a21a671599c008a89a915c8fb6

  • SSDEEP

    24576:KyrHaRryJ1kVpZgkPRFioaBuGbcE0T/SwwxLyomI4T:RTaRrsqPhaBFbxo/Zwx/+

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8118956954cd4c55aec70898805a5ec8df3d95dee51478129e34b249856f9d36.exe
    "C:\Users\Admin\AppData\Local\Temp\8118956954cd4c55aec70898805a5ec8df3d95dee51478129e34b249856f9d36.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4764
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ki195872.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ki195872.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4748
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ki410094.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ki410094.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:5044
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ki660904.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ki660904.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2180
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\az599829.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\az599829.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1984
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu716515.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu716515.exe
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:4724

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ki195872.exe

    Filesize

    917KB

    MD5

    497ccb7b7085505719051421edbf03ab

    SHA1

    66fd6b9a3826f24d329d432f50a572fc3b2a2513

    SHA256

    cf9fc6a445beac1d2028d287ce434bee3e79cfe89ea96cc221fa972db47beb74

    SHA512

    c5d099e874a73d446ff7f39f9f8603a4ba70dc2adb14650e9617593578e73dc90b8fed7dc6bedeb96bc3a85bc489769c381b7d3c1d745da48ff96148145c689d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ki410094.exe

    Filesize

    695KB

    MD5

    84b02872c543f94c4b2c4a7411229aa1

    SHA1

    a339d0ccd38aaf7b065b94b9864d3a224dd8ac81

    SHA256

    0534263b0c947bfc913ae6a07c39fc5d09e811903530ce3ca767b23bb145e131

    SHA512

    a64880df1905a428f4b09e2b1fd939007bd9e2475f9c8db941d7960f294b3744f02374d971f3d3a6244523d664ff1b92e5c3cd50766f0998cdae20aa0a0eedfa

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ki660904.exe

    Filesize

    414KB

    MD5

    b26e403ee4499b493a9af18b0cfef7a9

    SHA1

    4a665812fae380d2ce6c76b3773710db19c00f60

    SHA256

    4feb078d78f6ec894fb122baaf8eac045bd481da4e13ee1a86490ef3817fa24a

    SHA512

    b6ab55b2d11bb155914bf7ea0057565b669b072a09715c987384d0235c1df9ad96b917490272a5747d5c909194368a1effc3cde3f15d41ccf23a70b1a3e8c5eb

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\az599829.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu716515.exe

    Filesize

    359KB

    MD5

    63fc8942108c8f797d9881ac152fba74

    SHA1

    4e7aee490248bdc6b62cd53c8a2aa98d6b8e5903

    SHA256

    7e7bd3b613f2555962e1a196d3cc3f06fb5b4cd6ad6757042c2654c7d979f8e9

    SHA512

    7a9aab20ede0fb405f8b760debe0867c88b86e3662302c5484a7e6ff8aec7f883db8c4912a7542aa5981c3c2d474fc41076b3ba304be116b71b9c9078b96b19a

  • memory/1984-28-0x0000000000D20000-0x0000000000D2A000-memory.dmp

    Filesize

    40KB

  • memory/4724-76-0x00000000072D0000-0x0000000007305000-memory.dmp

    Filesize

    212KB

  • memory/4724-64-0x00000000072D0000-0x0000000007305000-memory.dmp

    Filesize

    212KB

  • memory/4724-36-0x00000000072D0000-0x000000000730A000-memory.dmp

    Filesize

    232KB

  • memory/4724-50-0x00000000072D0000-0x0000000007305000-memory.dmp

    Filesize

    212KB

  • memory/4724-52-0x00000000072D0000-0x0000000007305000-memory.dmp

    Filesize

    212KB

  • memory/4724-100-0x00000000072D0000-0x0000000007305000-memory.dmp

    Filesize

    212KB

  • memory/4724-98-0x00000000072D0000-0x0000000007305000-memory.dmp

    Filesize

    212KB

  • memory/4724-96-0x00000000072D0000-0x0000000007305000-memory.dmp

    Filesize

    212KB

  • memory/4724-94-0x00000000072D0000-0x0000000007305000-memory.dmp

    Filesize

    212KB

  • memory/4724-92-0x00000000072D0000-0x0000000007305000-memory.dmp

    Filesize

    212KB

  • memory/4724-90-0x00000000072D0000-0x0000000007305000-memory.dmp

    Filesize

    212KB

  • memory/4724-88-0x00000000072D0000-0x0000000007305000-memory.dmp

    Filesize

    212KB

  • memory/4724-84-0x00000000072D0000-0x0000000007305000-memory.dmp

    Filesize

    212KB

  • memory/4724-82-0x00000000072D0000-0x0000000007305000-memory.dmp

    Filesize

    212KB

  • memory/4724-80-0x00000000072D0000-0x0000000007305000-memory.dmp

    Filesize

    212KB

  • memory/4724-78-0x00000000072D0000-0x0000000007305000-memory.dmp

    Filesize

    212KB

  • memory/4724-34-0x0000000007230000-0x000000000726C000-memory.dmp

    Filesize

    240KB

  • memory/4724-74-0x00000000072D0000-0x0000000007305000-memory.dmp

    Filesize

    212KB

  • memory/4724-72-0x00000000072D0000-0x0000000007305000-memory.dmp

    Filesize

    212KB

  • memory/4724-70-0x00000000072D0000-0x0000000007305000-memory.dmp

    Filesize

    212KB

  • memory/4724-68-0x00000000072D0000-0x0000000007305000-memory.dmp

    Filesize

    212KB

  • memory/4724-35-0x00000000073B0000-0x0000000007954000-memory.dmp

    Filesize

    5.6MB

  • memory/4724-62-0x00000000072D0000-0x0000000007305000-memory.dmp

    Filesize

    212KB

  • memory/4724-60-0x00000000072D0000-0x0000000007305000-memory.dmp

    Filesize

    212KB

  • memory/4724-58-0x00000000072D0000-0x0000000007305000-memory.dmp

    Filesize

    212KB

  • memory/4724-56-0x00000000072D0000-0x0000000007305000-memory.dmp

    Filesize

    212KB

  • memory/4724-54-0x00000000072D0000-0x0000000007305000-memory.dmp

    Filesize

    212KB

  • memory/4724-48-0x00000000072D0000-0x0000000007305000-memory.dmp

    Filesize

    212KB

  • memory/4724-46-0x00000000072D0000-0x0000000007305000-memory.dmp

    Filesize

    212KB

  • memory/4724-44-0x00000000072D0000-0x0000000007305000-memory.dmp

    Filesize

    212KB

  • memory/4724-86-0x00000000072D0000-0x0000000007305000-memory.dmp

    Filesize

    212KB

  • memory/4724-66-0x00000000072D0000-0x0000000007305000-memory.dmp

    Filesize

    212KB

  • memory/4724-42-0x00000000072D0000-0x0000000007305000-memory.dmp

    Filesize

    212KB

  • memory/4724-40-0x00000000072D0000-0x0000000007305000-memory.dmp

    Filesize

    212KB

  • memory/4724-38-0x00000000072D0000-0x0000000007305000-memory.dmp

    Filesize

    212KB

  • memory/4724-37-0x00000000072D0000-0x0000000007305000-memory.dmp

    Filesize

    212KB

  • memory/4724-829-0x0000000009DE0000-0x000000000A3F8000-memory.dmp

    Filesize

    6.1MB

  • memory/4724-830-0x000000000A480000-0x000000000A492000-memory.dmp

    Filesize

    72KB

  • memory/4724-831-0x000000000A4A0000-0x000000000A5AA000-memory.dmp

    Filesize

    1.0MB

  • memory/4724-832-0x000000000A5C0000-0x000000000A5FC000-memory.dmp

    Filesize

    240KB

  • memory/4724-833-0x0000000006D60000-0x0000000006DAC000-memory.dmp

    Filesize

    304KB