Analysis

  • max time kernel
    149s
  • max time network
    163s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    08-07-2023 08:38

General

  • Target

    2e88144163915f2e62a5ad9b05d1e0e5.exe

  • Size

    791KB

  • MD5

    2e88144163915f2e62a5ad9b05d1e0e5

  • SHA1

    1f23787d31bbd8b2cc5a5fbeeadea1688e09502c

  • SHA256

    9fb2817fe1508ac672701e6733dbbd930f6c87e641ea8686ed874ba25a86a451

  • SHA512

    cbbb1df2e1afc8b3c25b2fd8ca49e6dffc56fe2059214c9db7001c85bf0bd8fcc05385d92213535e8134e6c39044be490320aef624f43c13b72bf576ee0f8623

  • SSDEEP

    12288:D/48fvjaRdnQgtS/nQ/e4TFHE4Zi0OPadQbVCJZoeyVgQlgDc4SzfvR2FN1G:D/4Wvj82gtgz4hk4Z/ObWu0A/x2M

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.68.70:19073

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Signatures

  • Detects Healer an antivirus disabler dropper 6 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 13 IoCs
  • Windows security modification 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2e88144163915f2e62a5ad9b05d1e0e5.exe
    "C:\Users\Admin\AppData\Local\Temp\2e88144163915f2e62a5ad9b05d1e0e5.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1356
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8164498.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8164498.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2932
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5783051.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5783051.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3032
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6682303.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6682303.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2884
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a7156130.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a7156130.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:568
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b4258095.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b4258095.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1480
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c8402628.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c8402628.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2056

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8164498.exe

    Filesize

    522KB

    MD5

    4ad904e4249ba957b76394c687136e0b

    SHA1

    b8d632b1f8656aef1ce6cf389384dd7760e6b6fc

    SHA256

    95d3db4d4c2e102e813455406b2c3a5cd277f3ab02744462832556e6c1406293

    SHA512

    fb2eaf6176ea5565cff570c3c04b28be4f21ab702c034b1f6da10642099fa23928d32d0b499f05baf06fbecc69d7ccd4eec2d013cf15db070ab38cddc984d782

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8164498.exe

    Filesize

    522KB

    MD5

    4ad904e4249ba957b76394c687136e0b

    SHA1

    b8d632b1f8656aef1ce6cf389384dd7760e6b6fc

    SHA256

    95d3db4d4c2e102e813455406b2c3a5cd277f3ab02744462832556e6c1406293

    SHA512

    fb2eaf6176ea5565cff570c3c04b28be4f21ab702c034b1f6da10642099fa23928d32d0b499f05baf06fbecc69d7ccd4eec2d013cf15db070ab38cddc984d782

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5783051.exe

    Filesize

    397KB

    MD5

    b0b989799a1f4df95d976d795c524db2

    SHA1

    2672db6069f871aee3fd49e3ee331f13bcd21523

    SHA256

    283a898e75ad263b7e04a23df01d3ebefea7c1ac6942bd46eace75749e33c782

    SHA512

    bdb795d7941b8ef866d5de69cf5f0f8d642f01b992b42dcedc3b78132d46259f1cc0e4cc619d0407de2bc854211b1251aa7b1078b7cb462808d1222a7145ada6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5783051.exe

    Filesize

    397KB

    MD5

    b0b989799a1f4df95d976d795c524db2

    SHA1

    2672db6069f871aee3fd49e3ee331f13bcd21523

    SHA256

    283a898e75ad263b7e04a23df01d3ebefea7c1ac6942bd46eace75749e33c782

    SHA512

    bdb795d7941b8ef866d5de69cf5f0f8d642f01b992b42dcedc3b78132d46259f1cc0e4cc619d0407de2bc854211b1251aa7b1078b7cb462808d1222a7145ada6

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c8402628.exe

    Filesize

    258KB

    MD5

    0d85ff34516aee59f4ae23476d117c0f

    SHA1

    c129060ffddcc2d262ffe3d7c02c22febb834e6c

    SHA256

    b68055c15315dacca7e51ddbbdcebc908176f0d18185bedd0664f7b0b52f2fd7

    SHA512

    e918fcd0ea9519b9f2e3cbb5918797498a058269820ce35a7658d311ec5d74e77d18d344c808a5f2c4a21d37787f405ba81925db08fc5f41b1459b4cf9258ebc

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c8402628.exe

    Filesize

    258KB

    MD5

    0d85ff34516aee59f4ae23476d117c0f

    SHA1

    c129060ffddcc2d262ffe3d7c02c22febb834e6c

    SHA256

    b68055c15315dacca7e51ddbbdcebc908176f0d18185bedd0664f7b0b52f2fd7

    SHA512

    e918fcd0ea9519b9f2e3cbb5918797498a058269820ce35a7658d311ec5d74e77d18d344c808a5f2c4a21d37787f405ba81925db08fc5f41b1459b4cf9258ebc

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c8402628.exe

    Filesize

    258KB

    MD5

    0d85ff34516aee59f4ae23476d117c0f

    SHA1

    c129060ffddcc2d262ffe3d7c02c22febb834e6c

    SHA256

    b68055c15315dacca7e51ddbbdcebc908176f0d18185bedd0664f7b0b52f2fd7

    SHA512

    e918fcd0ea9519b9f2e3cbb5918797498a058269820ce35a7658d311ec5d74e77d18d344c808a5f2c4a21d37787f405ba81925db08fc5f41b1459b4cf9258ebc

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6682303.exe

    Filesize

    197KB

    MD5

    54261d3bb4f2a1103070e39c05413718

    SHA1

    3eb395c8a83f062a179fcaac437a8aaffe98c8a0

    SHA256

    de0224b705cd8ddf33bcc9386db8ea890279a7267079bde17eac734f5c74ee07

    SHA512

    bbb14bc348a04981c9111ff37210034c880d9ce32f4cb66bc97099df22ef7e2cc0d65a5ba71f2e572f32a33aa1c08105b2aca900bc96a79e3efe450ded05afc9

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6682303.exe

    Filesize

    197KB

    MD5

    54261d3bb4f2a1103070e39c05413718

    SHA1

    3eb395c8a83f062a179fcaac437a8aaffe98c8a0

    SHA256

    de0224b705cd8ddf33bcc9386db8ea890279a7267079bde17eac734f5c74ee07

    SHA512

    bbb14bc348a04981c9111ff37210034c880d9ce32f4cb66bc97099df22ef7e2cc0d65a5ba71f2e572f32a33aa1c08105b2aca900bc96a79e3efe450ded05afc9

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a7156130.exe

    Filesize

    96KB

    MD5

    c4eb36fa9a3985f3365c1d72c2203597

    SHA1

    cd310bbe01530ac5cbdb9846226b34682cf90211

    SHA256

    4829458dd7e6e0c57b92d76e0b8f1e63cbf9e1766831baf81f44e3e6ace7f26f

    SHA512

    4728ff3a7d4fa9580208e908523d51ee6cbf346d87f6830cba3b9691c151d09feb76bc01a173e6b4b405c55fb7ba6ce8d737162df7e7e45983b9450b6062b461

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a7156130.exe

    Filesize

    96KB

    MD5

    c4eb36fa9a3985f3365c1d72c2203597

    SHA1

    cd310bbe01530ac5cbdb9846226b34682cf90211

    SHA256

    4829458dd7e6e0c57b92d76e0b8f1e63cbf9e1766831baf81f44e3e6ace7f26f

    SHA512

    4728ff3a7d4fa9580208e908523d51ee6cbf346d87f6830cba3b9691c151d09feb76bc01a173e6b4b405c55fb7ba6ce8d737162df7e7e45983b9450b6062b461

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a7156130.exe

    Filesize

    96KB

    MD5

    c4eb36fa9a3985f3365c1d72c2203597

    SHA1

    cd310bbe01530ac5cbdb9846226b34682cf90211

    SHA256

    4829458dd7e6e0c57b92d76e0b8f1e63cbf9e1766831baf81f44e3e6ace7f26f

    SHA512

    4728ff3a7d4fa9580208e908523d51ee6cbf346d87f6830cba3b9691c151d09feb76bc01a173e6b4b405c55fb7ba6ce8d737162df7e7e45983b9450b6062b461

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b4258095.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b4258095.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v8164498.exe

    Filesize

    522KB

    MD5

    4ad904e4249ba957b76394c687136e0b

    SHA1

    b8d632b1f8656aef1ce6cf389384dd7760e6b6fc

    SHA256

    95d3db4d4c2e102e813455406b2c3a5cd277f3ab02744462832556e6c1406293

    SHA512

    fb2eaf6176ea5565cff570c3c04b28be4f21ab702c034b1f6da10642099fa23928d32d0b499f05baf06fbecc69d7ccd4eec2d013cf15db070ab38cddc984d782

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v8164498.exe

    Filesize

    522KB

    MD5

    4ad904e4249ba957b76394c687136e0b

    SHA1

    b8d632b1f8656aef1ce6cf389384dd7760e6b6fc

    SHA256

    95d3db4d4c2e102e813455406b2c3a5cd277f3ab02744462832556e6c1406293

    SHA512

    fb2eaf6176ea5565cff570c3c04b28be4f21ab702c034b1f6da10642099fa23928d32d0b499f05baf06fbecc69d7ccd4eec2d013cf15db070ab38cddc984d782

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v5783051.exe

    Filesize

    397KB

    MD5

    b0b989799a1f4df95d976d795c524db2

    SHA1

    2672db6069f871aee3fd49e3ee331f13bcd21523

    SHA256

    283a898e75ad263b7e04a23df01d3ebefea7c1ac6942bd46eace75749e33c782

    SHA512

    bdb795d7941b8ef866d5de69cf5f0f8d642f01b992b42dcedc3b78132d46259f1cc0e4cc619d0407de2bc854211b1251aa7b1078b7cb462808d1222a7145ada6

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v5783051.exe

    Filesize

    397KB

    MD5

    b0b989799a1f4df95d976d795c524db2

    SHA1

    2672db6069f871aee3fd49e3ee331f13bcd21523

    SHA256

    283a898e75ad263b7e04a23df01d3ebefea7c1ac6942bd46eace75749e33c782

    SHA512

    bdb795d7941b8ef866d5de69cf5f0f8d642f01b992b42dcedc3b78132d46259f1cc0e4cc619d0407de2bc854211b1251aa7b1078b7cb462808d1222a7145ada6

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\c8402628.exe

    Filesize

    258KB

    MD5

    0d85ff34516aee59f4ae23476d117c0f

    SHA1

    c129060ffddcc2d262ffe3d7c02c22febb834e6c

    SHA256

    b68055c15315dacca7e51ddbbdcebc908176f0d18185bedd0664f7b0b52f2fd7

    SHA512

    e918fcd0ea9519b9f2e3cbb5918797498a058269820ce35a7658d311ec5d74e77d18d344c808a5f2c4a21d37787f405ba81925db08fc5f41b1459b4cf9258ebc

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\c8402628.exe

    Filesize

    258KB

    MD5

    0d85ff34516aee59f4ae23476d117c0f

    SHA1

    c129060ffddcc2d262ffe3d7c02c22febb834e6c

    SHA256

    b68055c15315dacca7e51ddbbdcebc908176f0d18185bedd0664f7b0b52f2fd7

    SHA512

    e918fcd0ea9519b9f2e3cbb5918797498a058269820ce35a7658d311ec5d74e77d18d344c808a5f2c4a21d37787f405ba81925db08fc5f41b1459b4cf9258ebc

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\c8402628.exe

    Filesize

    258KB

    MD5

    0d85ff34516aee59f4ae23476d117c0f

    SHA1

    c129060ffddcc2d262ffe3d7c02c22febb834e6c

    SHA256

    b68055c15315dacca7e51ddbbdcebc908176f0d18185bedd0664f7b0b52f2fd7

    SHA512

    e918fcd0ea9519b9f2e3cbb5918797498a058269820ce35a7658d311ec5d74e77d18d344c808a5f2c4a21d37787f405ba81925db08fc5f41b1459b4cf9258ebc

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v6682303.exe

    Filesize

    197KB

    MD5

    54261d3bb4f2a1103070e39c05413718

    SHA1

    3eb395c8a83f062a179fcaac437a8aaffe98c8a0

    SHA256

    de0224b705cd8ddf33bcc9386db8ea890279a7267079bde17eac734f5c74ee07

    SHA512

    bbb14bc348a04981c9111ff37210034c880d9ce32f4cb66bc97099df22ef7e2cc0d65a5ba71f2e572f32a33aa1c08105b2aca900bc96a79e3efe450ded05afc9

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v6682303.exe

    Filesize

    197KB

    MD5

    54261d3bb4f2a1103070e39c05413718

    SHA1

    3eb395c8a83f062a179fcaac437a8aaffe98c8a0

    SHA256

    de0224b705cd8ddf33bcc9386db8ea890279a7267079bde17eac734f5c74ee07

    SHA512

    bbb14bc348a04981c9111ff37210034c880d9ce32f4cb66bc97099df22ef7e2cc0d65a5ba71f2e572f32a33aa1c08105b2aca900bc96a79e3efe450ded05afc9

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a7156130.exe

    Filesize

    96KB

    MD5

    c4eb36fa9a3985f3365c1d72c2203597

    SHA1

    cd310bbe01530ac5cbdb9846226b34682cf90211

    SHA256

    4829458dd7e6e0c57b92d76e0b8f1e63cbf9e1766831baf81f44e3e6ace7f26f

    SHA512

    4728ff3a7d4fa9580208e908523d51ee6cbf346d87f6830cba3b9691c151d09feb76bc01a173e6b4b405c55fb7ba6ce8d737162df7e7e45983b9450b6062b461

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a7156130.exe

    Filesize

    96KB

    MD5

    c4eb36fa9a3985f3365c1d72c2203597

    SHA1

    cd310bbe01530ac5cbdb9846226b34682cf90211

    SHA256

    4829458dd7e6e0c57b92d76e0b8f1e63cbf9e1766831baf81f44e3e6ace7f26f

    SHA512

    4728ff3a7d4fa9580208e908523d51ee6cbf346d87f6830cba3b9691c151d09feb76bc01a173e6b4b405c55fb7ba6ce8d737162df7e7e45983b9450b6062b461

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a7156130.exe

    Filesize

    96KB

    MD5

    c4eb36fa9a3985f3365c1d72c2203597

    SHA1

    cd310bbe01530ac5cbdb9846226b34682cf90211

    SHA256

    4829458dd7e6e0c57b92d76e0b8f1e63cbf9e1766831baf81f44e3e6ace7f26f

    SHA512

    4728ff3a7d4fa9580208e908523d51ee6cbf346d87f6830cba3b9691c151d09feb76bc01a173e6b4b405c55fb7ba6ce8d737162df7e7e45983b9450b6062b461

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\b4258095.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • memory/568-103-0x0000000000020000-0x000000000002A000-memory.dmp

    Filesize

    40KB

  • memory/1356-54-0x0000000000760000-0x0000000000816000-memory.dmp

    Filesize

    728KB

  • memory/1480-112-0x0000000000E10000-0x0000000000E1A000-memory.dmp

    Filesize

    40KB

  • memory/2056-122-0x0000000000290000-0x00000000002C0000-memory.dmp

    Filesize

    192KB

  • memory/2056-126-0x0000000000AF0000-0x0000000000AF6000-memory.dmp

    Filesize

    24KB

  • memory/2056-127-0x0000000004C20000-0x0000000004C60000-memory.dmp

    Filesize

    256KB

  • memory/2056-128-0x0000000004C20000-0x0000000004C60000-memory.dmp

    Filesize

    256KB