Analysis

  • max time kernel
    144s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    07/07/2023, 20:26

General

  • Target

    589663abea8108ec363031ffd.exe

  • Size

    784KB

  • MD5

    589663abea8108ec363031ffd154f7f8

  • SHA1

    265348031aa42552591046bab16387cb14e22ce8

  • SHA256

    8186a9fa53725a8f57b0375cd218229780e15553ae3229024ac0ec9e4d6ccee3

  • SHA512

    6be9b5c36cfd26e5c9f8123892bf74347217a1fb1648cae43c894825b779b4f7b03835b8a542a462a79ba51eddce0c33270c0818890c5b6e8f655c8c907bcbff

  • SSDEEP

    24576:NBcgHAvD82gdopERgBw7q4Hl/5g26hUUs:NB5gQ/opEqCbl/5gDs

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.68.70:19073

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 13 IoCs
  • Windows security modification 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\589663abea8108ec363031ffd.exe
    "C:\Users\Admin\AppData\Local\Temp\589663abea8108ec363031ffd.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:296
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7993225.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7993225.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2244
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8615335.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8615335.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2028
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4285211.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4285211.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1660
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a3312575.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a3312575.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2036
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2119938.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2119938.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2408
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c6528360.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c6528360.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2056

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7993225.exe

          Filesize

          518KB

          MD5

          bd1f3fa39b64311b23623de7277b9aba

          SHA1

          0a5b8683d09ac7314eaae0bc14d8eddcee018c77

          SHA256

          0f5bdf737e2e3056c69a9cbd521ef4d830917742165e805244a1cdab10090fb6

          SHA512

          7eaad32fb1adcd3691627b18555d64c40dd5550e8192cef622124f260cda8186d71e917c81a1100898f6c5a3e1577ca0f8a03c8e1e1ae3679ac4d97db2075de6

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7993225.exe

          Filesize

          518KB

          MD5

          bd1f3fa39b64311b23623de7277b9aba

          SHA1

          0a5b8683d09ac7314eaae0bc14d8eddcee018c77

          SHA256

          0f5bdf737e2e3056c69a9cbd521ef4d830917742165e805244a1cdab10090fb6

          SHA512

          7eaad32fb1adcd3691627b18555d64c40dd5550e8192cef622124f260cda8186d71e917c81a1100898f6c5a3e1577ca0f8a03c8e1e1ae3679ac4d97db2075de6

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8615335.exe

          Filesize

          393KB

          MD5

          38b2bead61a685ccd7b00c71ecb0b49d

          SHA1

          6046dfc1d75c780f3a21da015e3d3a73ffe3bd17

          SHA256

          867fd59b4bef3c1c4af58fabdc3ea685bca5e317f218979bf14872c92344dc3d

          SHA512

          1aa8e83759103a879542589aeb6711cfff1cc2fa2cb8dd76ad287e9090e595c3e69d3ccdd71289dbdbdfb42cfcaa28fb7d745f00ae195c7cd8edd0366a324582

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8615335.exe

          Filesize

          393KB

          MD5

          38b2bead61a685ccd7b00c71ecb0b49d

          SHA1

          6046dfc1d75c780f3a21da015e3d3a73ffe3bd17

          SHA256

          867fd59b4bef3c1c4af58fabdc3ea685bca5e317f218979bf14872c92344dc3d

          SHA512

          1aa8e83759103a879542589aeb6711cfff1cc2fa2cb8dd76ad287e9090e595c3e69d3ccdd71289dbdbdfb42cfcaa28fb7d745f00ae195c7cd8edd0366a324582

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c6528360.exe

          Filesize

          255KB

          MD5

          e74afc0f02d55119238fc4f2864ef82a

          SHA1

          200f4bd21af4756ee041ed243406ea4e8abec90f

          SHA256

          ecbf08ea3c9042481d1a3941127eaa733ec09b7f01b66c245858d3cde76c209f

          SHA512

          f5dfb07b3b43a162f12b3e40201c0132252fe59805204b975c7814d5138375d1c90c5055b8ba7e6c66f763cabff4ca3ed001a86c52ed5b7f7c194c4b27258476

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c6528360.exe

          Filesize

          255KB

          MD5

          e74afc0f02d55119238fc4f2864ef82a

          SHA1

          200f4bd21af4756ee041ed243406ea4e8abec90f

          SHA256

          ecbf08ea3c9042481d1a3941127eaa733ec09b7f01b66c245858d3cde76c209f

          SHA512

          f5dfb07b3b43a162f12b3e40201c0132252fe59805204b975c7814d5138375d1c90c5055b8ba7e6c66f763cabff4ca3ed001a86c52ed5b7f7c194c4b27258476

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c6528360.exe

          Filesize

          255KB

          MD5

          e74afc0f02d55119238fc4f2864ef82a

          SHA1

          200f4bd21af4756ee041ed243406ea4e8abec90f

          SHA256

          ecbf08ea3c9042481d1a3941127eaa733ec09b7f01b66c245858d3cde76c209f

          SHA512

          f5dfb07b3b43a162f12b3e40201c0132252fe59805204b975c7814d5138375d1c90c5055b8ba7e6c66f763cabff4ca3ed001a86c52ed5b7f7c194c4b27258476

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4285211.exe

          Filesize

          195KB

          MD5

          54faec35e5aa37c6176541968dded2e8

          SHA1

          b905a0fc971f9c280373bef9b9d3e478e0e91caa

          SHA256

          7499943f4c7c0286826036154271afad05c620d4e145d212530d580ba2bb9cf9

          SHA512

          40b4149290faf0ac454505827b3a4221ea4391e55206406198daee42cf9f0710d9c83e51c050b1e4ce10e250d751282d4334f221e5d8a9306899563c6cbc233d

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4285211.exe

          Filesize

          195KB

          MD5

          54faec35e5aa37c6176541968dded2e8

          SHA1

          b905a0fc971f9c280373bef9b9d3e478e0e91caa

          SHA256

          7499943f4c7c0286826036154271afad05c620d4e145d212530d580ba2bb9cf9

          SHA512

          40b4149290faf0ac454505827b3a4221ea4391e55206406198daee42cf9f0710d9c83e51c050b1e4ce10e250d751282d4334f221e5d8a9306899563c6cbc233d

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a3312575.exe

          Filesize

          94KB

          MD5

          c4c3fd2ee829367c26b6480de480b9dd

          SHA1

          99a499b57b7e73d609ee58797beaf1409a9db8a7

          SHA256

          aeec8780bdade38ebb5c4c328d20c0efe9f9791682b9c14ff0d233b860f9b312

          SHA512

          a279a22fe7e5758f49c1235900d095dcc13e3280c4350625586d66cfe9e6f9ac5ddf5e28625f4142e67b62a7a4ed2c977d296e410c8e870b8ccb2c2b391999ff

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a3312575.exe

          Filesize

          94KB

          MD5

          c4c3fd2ee829367c26b6480de480b9dd

          SHA1

          99a499b57b7e73d609ee58797beaf1409a9db8a7

          SHA256

          aeec8780bdade38ebb5c4c328d20c0efe9f9791682b9c14ff0d233b860f9b312

          SHA512

          a279a22fe7e5758f49c1235900d095dcc13e3280c4350625586d66cfe9e6f9ac5ddf5e28625f4142e67b62a7a4ed2c977d296e410c8e870b8ccb2c2b391999ff

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a3312575.exe

          Filesize

          94KB

          MD5

          c4c3fd2ee829367c26b6480de480b9dd

          SHA1

          99a499b57b7e73d609ee58797beaf1409a9db8a7

          SHA256

          aeec8780bdade38ebb5c4c328d20c0efe9f9791682b9c14ff0d233b860f9b312

          SHA512

          a279a22fe7e5758f49c1235900d095dcc13e3280c4350625586d66cfe9e6f9ac5ddf5e28625f4142e67b62a7a4ed2c977d296e410c8e870b8ccb2c2b391999ff

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2119938.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2119938.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v7993225.exe

          Filesize

          518KB

          MD5

          bd1f3fa39b64311b23623de7277b9aba

          SHA1

          0a5b8683d09ac7314eaae0bc14d8eddcee018c77

          SHA256

          0f5bdf737e2e3056c69a9cbd521ef4d830917742165e805244a1cdab10090fb6

          SHA512

          7eaad32fb1adcd3691627b18555d64c40dd5550e8192cef622124f260cda8186d71e917c81a1100898f6c5a3e1577ca0f8a03c8e1e1ae3679ac4d97db2075de6

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v7993225.exe

          Filesize

          518KB

          MD5

          bd1f3fa39b64311b23623de7277b9aba

          SHA1

          0a5b8683d09ac7314eaae0bc14d8eddcee018c77

          SHA256

          0f5bdf737e2e3056c69a9cbd521ef4d830917742165e805244a1cdab10090fb6

          SHA512

          7eaad32fb1adcd3691627b18555d64c40dd5550e8192cef622124f260cda8186d71e917c81a1100898f6c5a3e1577ca0f8a03c8e1e1ae3679ac4d97db2075de6

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v8615335.exe

          Filesize

          393KB

          MD5

          38b2bead61a685ccd7b00c71ecb0b49d

          SHA1

          6046dfc1d75c780f3a21da015e3d3a73ffe3bd17

          SHA256

          867fd59b4bef3c1c4af58fabdc3ea685bca5e317f218979bf14872c92344dc3d

          SHA512

          1aa8e83759103a879542589aeb6711cfff1cc2fa2cb8dd76ad287e9090e595c3e69d3ccdd71289dbdbdfb42cfcaa28fb7d745f00ae195c7cd8edd0366a324582

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v8615335.exe

          Filesize

          393KB

          MD5

          38b2bead61a685ccd7b00c71ecb0b49d

          SHA1

          6046dfc1d75c780f3a21da015e3d3a73ffe3bd17

          SHA256

          867fd59b4bef3c1c4af58fabdc3ea685bca5e317f218979bf14872c92344dc3d

          SHA512

          1aa8e83759103a879542589aeb6711cfff1cc2fa2cb8dd76ad287e9090e595c3e69d3ccdd71289dbdbdfb42cfcaa28fb7d745f00ae195c7cd8edd0366a324582

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\c6528360.exe

          Filesize

          255KB

          MD5

          e74afc0f02d55119238fc4f2864ef82a

          SHA1

          200f4bd21af4756ee041ed243406ea4e8abec90f

          SHA256

          ecbf08ea3c9042481d1a3941127eaa733ec09b7f01b66c245858d3cde76c209f

          SHA512

          f5dfb07b3b43a162f12b3e40201c0132252fe59805204b975c7814d5138375d1c90c5055b8ba7e6c66f763cabff4ca3ed001a86c52ed5b7f7c194c4b27258476

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\c6528360.exe

          Filesize

          255KB

          MD5

          e74afc0f02d55119238fc4f2864ef82a

          SHA1

          200f4bd21af4756ee041ed243406ea4e8abec90f

          SHA256

          ecbf08ea3c9042481d1a3941127eaa733ec09b7f01b66c245858d3cde76c209f

          SHA512

          f5dfb07b3b43a162f12b3e40201c0132252fe59805204b975c7814d5138375d1c90c5055b8ba7e6c66f763cabff4ca3ed001a86c52ed5b7f7c194c4b27258476

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\c6528360.exe

          Filesize

          255KB

          MD5

          e74afc0f02d55119238fc4f2864ef82a

          SHA1

          200f4bd21af4756ee041ed243406ea4e8abec90f

          SHA256

          ecbf08ea3c9042481d1a3941127eaa733ec09b7f01b66c245858d3cde76c209f

          SHA512

          f5dfb07b3b43a162f12b3e40201c0132252fe59805204b975c7814d5138375d1c90c5055b8ba7e6c66f763cabff4ca3ed001a86c52ed5b7f7c194c4b27258476

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v4285211.exe

          Filesize

          195KB

          MD5

          54faec35e5aa37c6176541968dded2e8

          SHA1

          b905a0fc971f9c280373bef9b9d3e478e0e91caa

          SHA256

          7499943f4c7c0286826036154271afad05c620d4e145d212530d580ba2bb9cf9

          SHA512

          40b4149290faf0ac454505827b3a4221ea4391e55206406198daee42cf9f0710d9c83e51c050b1e4ce10e250d751282d4334f221e5d8a9306899563c6cbc233d

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v4285211.exe

          Filesize

          195KB

          MD5

          54faec35e5aa37c6176541968dded2e8

          SHA1

          b905a0fc971f9c280373bef9b9d3e478e0e91caa

          SHA256

          7499943f4c7c0286826036154271afad05c620d4e145d212530d580ba2bb9cf9

          SHA512

          40b4149290faf0ac454505827b3a4221ea4391e55206406198daee42cf9f0710d9c83e51c050b1e4ce10e250d751282d4334f221e5d8a9306899563c6cbc233d

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a3312575.exe

          Filesize

          94KB

          MD5

          c4c3fd2ee829367c26b6480de480b9dd

          SHA1

          99a499b57b7e73d609ee58797beaf1409a9db8a7

          SHA256

          aeec8780bdade38ebb5c4c328d20c0efe9f9791682b9c14ff0d233b860f9b312

          SHA512

          a279a22fe7e5758f49c1235900d095dcc13e3280c4350625586d66cfe9e6f9ac5ddf5e28625f4142e67b62a7a4ed2c977d296e410c8e870b8ccb2c2b391999ff

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a3312575.exe

          Filesize

          94KB

          MD5

          c4c3fd2ee829367c26b6480de480b9dd

          SHA1

          99a499b57b7e73d609ee58797beaf1409a9db8a7

          SHA256

          aeec8780bdade38ebb5c4c328d20c0efe9f9791682b9c14ff0d233b860f9b312

          SHA512

          a279a22fe7e5758f49c1235900d095dcc13e3280c4350625586d66cfe9e6f9ac5ddf5e28625f4142e67b62a7a4ed2c977d296e410c8e870b8ccb2c2b391999ff

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a3312575.exe

          Filesize

          94KB

          MD5

          c4c3fd2ee829367c26b6480de480b9dd

          SHA1

          99a499b57b7e73d609ee58797beaf1409a9db8a7

          SHA256

          aeec8780bdade38ebb5c4c328d20c0efe9f9791682b9c14ff0d233b860f9b312

          SHA512

          a279a22fe7e5758f49c1235900d095dcc13e3280c4350625586d66cfe9e6f9ac5ddf5e28625f4142e67b62a7a4ed2c977d296e410c8e870b8ccb2c2b391999ff

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\b2119938.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • memory/296-54-0x0000000000560000-0x0000000000614000-memory.dmp

          Filesize

          720KB

        • memory/2036-103-0x0000000000020000-0x000000000002A000-memory.dmp

          Filesize

          40KB

        • memory/2056-122-0x0000000000260000-0x0000000000290000-memory.dmp

          Filesize

          192KB

        • memory/2056-126-0x0000000000690000-0x0000000000696000-memory.dmp

          Filesize

          24KB

        • memory/2056-127-0x0000000004890000-0x00000000048D0000-memory.dmp

          Filesize

          256KB

        • memory/2056-128-0x0000000004890000-0x00000000048D0000-memory.dmp

          Filesize

          256KB

        • memory/2408-112-0x0000000000CC0000-0x0000000000CCA000-memory.dmp

          Filesize

          40KB