Analysis

  • max time kernel
    141s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    08-07-2023 16:32

General

  • Target

    4ea33101e00efef155d2d9502.exe

  • Size

    789KB

  • MD5

    4ea33101e00efef155d2d9502fadd80a

  • SHA1

    c79d6ea8440e888487a4d924edb613f2fedddd4b

  • SHA256

    0cde2ae47477da9400df4efe747235267b58b4e0fb534227ad351108aaf96d2b

  • SHA512

    0354296694bfd8c0148f682b04d27aff232ea181fbd6a74a2b8aa63a4be98e3029bf7eeb0ee053ca01bf8a8d6b5fa9c0f044de72b3027caea6553f0ce18cceb9

  • SSDEEP

    24576:mEEFovx82gZG3AoiNIL2XoeGy95qTJkMsR+fPQ/F:mhqO70AlNIyXhqyFRWA

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.68.70:19073

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 13 IoCs
  • Windows security modification 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ea33101e00efef155d2d9502.exe
    "C:\Users\Admin\AppData\Local\Temp\4ea33101e00efef155d2d9502.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2332
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1735337.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1735337.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2292
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8160856.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8160856.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2064
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5813455.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5813455.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1360
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a4716545.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a4716545.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2044
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2471695.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2471695.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1260
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c7519976.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c7519976.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2972

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1735337.exe

    Filesize

    522KB

    MD5

    597b6057853917573c4220b88252e0d2

    SHA1

    2c9384e9f95ad9745c0ace58e824bb7bafb5edb6

    SHA256

    892e1af38fbe9095724fcb33e6ee9d801aad2b73d28118431f23a787afe7ce21

    SHA512

    3c407e7782dc743feb2b5240eb6e31a7cf8d6c7f1a145815673da0a0e1733eb9eee56b62cb0bfb552b1ff03a8ce2774024a949e68e289f646c9f5f7ddd3af708

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1735337.exe

    Filesize

    522KB

    MD5

    597b6057853917573c4220b88252e0d2

    SHA1

    2c9384e9f95ad9745c0ace58e824bb7bafb5edb6

    SHA256

    892e1af38fbe9095724fcb33e6ee9d801aad2b73d28118431f23a787afe7ce21

    SHA512

    3c407e7782dc743feb2b5240eb6e31a7cf8d6c7f1a145815673da0a0e1733eb9eee56b62cb0bfb552b1ff03a8ce2774024a949e68e289f646c9f5f7ddd3af708

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8160856.exe

    Filesize

    397KB

    MD5

    c300f30a4bb20110e53738c886066c02

    SHA1

    3e4978dbb0df6c28cdaff5da82a8c8158380dab2

    SHA256

    6f49951777cf837880555497d9e78782e41992da01108ed2ca0c1a7fc38c5a32

    SHA512

    c2bfd1161f6396c4711782e160bfd8c22aa4f0b88946e07bf61862c0174adfbea2d9e000f7d5ad52e5a9fea208cdb7a2023a3e9feae63e4de14390c664183053

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8160856.exe

    Filesize

    397KB

    MD5

    c300f30a4bb20110e53738c886066c02

    SHA1

    3e4978dbb0df6c28cdaff5da82a8c8158380dab2

    SHA256

    6f49951777cf837880555497d9e78782e41992da01108ed2ca0c1a7fc38c5a32

    SHA512

    c2bfd1161f6396c4711782e160bfd8c22aa4f0b88946e07bf61862c0174adfbea2d9e000f7d5ad52e5a9fea208cdb7a2023a3e9feae63e4de14390c664183053

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c7519976.exe

    Filesize

    258KB

    MD5

    682a9345799d3743bc42d4675d2f2dab

    SHA1

    d4bdbfcef6417a6b3b06c4df1150f803d789bf8e

    SHA256

    0609709fecb084b2fc349091f74e24bc5984f19ff010a52e0eef1d9babc6e576

    SHA512

    6f395dee9732072b4b6a1cf67be503c84ee05abf6e5fbbe0ccf35512cb7e470f5417d310222434fe07bc806ae5aef8c99217ee0ee68e8704a7e49f14a5d236ec

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c7519976.exe

    Filesize

    258KB

    MD5

    682a9345799d3743bc42d4675d2f2dab

    SHA1

    d4bdbfcef6417a6b3b06c4df1150f803d789bf8e

    SHA256

    0609709fecb084b2fc349091f74e24bc5984f19ff010a52e0eef1d9babc6e576

    SHA512

    6f395dee9732072b4b6a1cf67be503c84ee05abf6e5fbbe0ccf35512cb7e470f5417d310222434fe07bc806ae5aef8c99217ee0ee68e8704a7e49f14a5d236ec

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c7519976.exe

    Filesize

    258KB

    MD5

    682a9345799d3743bc42d4675d2f2dab

    SHA1

    d4bdbfcef6417a6b3b06c4df1150f803d789bf8e

    SHA256

    0609709fecb084b2fc349091f74e24bc5984f19ff010a52e0eef1d9babc6e576

    SHA512

    6f395dee9732072b4b6a1cf67be503c84ee05abf6e5fbbe0ccf35512cb7e470f5417d310222434fe07bc806ae5aef8c99217ee0ee68e8704a7e49f14a5d236ec

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5813455.exe

    Filesize

    197KB

    MD5

    9f3c6ad4284d79c9290fbaa4d56b1d0b

    SHA1

    504fc85e461894e61fca0030e2424218f643c96b

    SHA256

    f48271cff4a9dca06af5db7d24856dd3895a5711094bbec5ca07b6bc81026033

    SHA512

    5eec870bbc58c414585c870e89be288408c7b9bb087328482ed6c941046aa5da94ec67c5c365aa3496bff3c847daf93ddec5b17df651209bdb59130a8e699946

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5813455.exe

    Filesize

    197KB

    MD5

    9f3c6ad4284d79c9290fbaa4d56b1d0b

    SHA1

    504fc85e461894e61fca0030e2424218f643c96b

    SHA256

    f48271cff4a9dca06af5db7d24856dd3895a5711094bbec5ca07b6bc81026033

    SHA512

    5eec870bbc58c414585c870e89be288408c7b9bb087328482ed6c941046aa5da94ec67c5c365aa3496bff3c847daf93ddec5b17df651209bdb59130a8e699946

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a4716545.exe

    Filesize

    96KB

    MD5

    8b07a3a2210f7f89066c3edd165d9348

    SHA1

    29bf40a6811239ed6e71712ce980e1d2510e64cd

    SHA256

    3160569d472d0aab39ad22c088201fabcffdcd32d2dd8c546926b8228a4dc2fa

    SHA512

    99d77897880091f40bff482d3d5182fcc7aa92137772c8fbe28be6e63fcd2e48ba5c83be24b97e024afa6885ba21e289f68a2f2d35133a2e7828d7a82a4fe6fd

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a4716545.exe

    Filesize

    96KB

    MD5

    8b07a3a2210f7f89066c3edd165d9348

    SHA1

    29bf40a6811239ed6e71712ce980e1d2510e64cd

    SHA256

    3160569d472d0aab39ad22c088201fabcffdcd32d2dd8c546926b8228a4dc2fa

    SHA512

    99d77897880091f40bff482d3d5182fcc7aa92137772c8fbe28be6e63fcd2e48ba5c83be24b97e024afa6885ba21e289f68a2f2d35133a2e7828d7a82a4fe6fd

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a4716545.exe

    Filesize

    96KB

    MD5

    8b07a3a2210f7f89066c3edd165d9348

    SHA1

    29bf40a6811239ed6e71712ce980e1d2510e64cd

    SHA256

    3160569d472d0aab39ad22c088201fabcffdcd32d2dd8c546926b8228a4dc2fa

    SHA512

    99d77897880091f40bff482d3d5182fcc7aa92137772c8fbe28be6e63fcd2e48ba5c83be24b97e024afa6885ba21e289f68a2f2d35133a2e7828d7a82a4fe6fd

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2471695.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2471695.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v1735337.exe

    Filesize

    522KB

    MD5

    597b6057853917573c4220b88252e0d2

    SHA1

    2c9384e9f95ad9745c0ace58e824bb7bafb5edb6

    SHA256

    892e1af38fbe9095724fcb33e6ee9d801aad2b73d28118431f23a787afe7ce21

    SHA512

    3c407e7782dc743feb2b5240eb6e31a7cf8d6c7f1a145815673da0a0e1733eb9eee56b62cb0bfb552b1ff03a8ce2774024a949e68e289f646c9f5f7ddd3af708

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v1735337.exe

    Filesize

    522KB

    MD5

    597b6057853917573c4220b88252e0d2

    SHA1

    2c9384e9f95ad9745c0ace58e824bb7bafb5edb6

    SHA256

    892e1af38fbe9095724fcb33e6ee9d801aad2b73d28118431f23a787afe7ce21

    SHA512

    3c407e7782dc743feb2b5240eb6e31a7cf8d6c7f1a145815673da0a0e1733eb9eee56b62cb0bfb552b1ff03a8ce2774024a949e68e289f646c9f5f7ddd3af708

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v8160856.exe

    Filesize

    397KB

    MD5

    c300f30a4bb20110e53738c886066c02

    SHA1

    3e4978dbb0df6c28cdaff5da82a8c8158380dab2

    SHA256

    6f49951777cf837880555497d9e78782e41992da01108ed2ca0c1a7fc38c5a32

    SHA512

    c2bfd1161f6396c4711782e160bfd8c22aa4f0b88946e07bf61862c0174adfbea2d9e000f7d5ad52e5a9fea208cdb7a2023a3e9feae63e4de14390c664183053

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v8160856.exe

    Filesize

    397KB

    MD5

    c300f30a4bb20110e53738c886066c02

    SHA1

    3e4978dbb0df6c28cdaff5da82a8c8158380dab2

    SHA256

    6f49951777cf837880555497d9e78782e41992da01108ed2ca0c1a7fc38c5a32

    SHA512

    c2bfd1161f6396c4711782e160bfd8c22aa4f0b88946e07bf61862c0174adfbea2d9e000f7d5ad52e5a9fea208cdb7a2023a3e9feae63e4de14390c664183053

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\c7519976.exe

    Filesize

    258KB

    MD5

    682a9345799d3743bc42d4675d2f2dab

    SHA1

    d4bdbfcef6417a6b3b06c4df1150f803d789bf8e

    SHA256

    0609709fecb084b2fc349091f74e24bc5984f19ff010a52e0eef1d9babc6e576

    SHA512

    6f395dee9732072b4b6a1cf67be503c84ee05abf6e5fbbe0ccf35512cb7e470f5417d310222434fe07bc806ae5aef8c99217ee0ee68e8704a7e49f14a5d236ec

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\c7519976.exe

    Filesize

    258KB

    MD5

    682a9345799d3743bc42d4675d2f2dab

    SHA1

    d4bdbfcef6417a6b3b06c4df1150f803d789bf8e

    SHA256

    0609709fecb084b2fc349091f74e24bc5984f19ff010a52e0eef1d9babc6e576

    SHA512

    6f395dee9732072b4b6a1cf67be503c84ee05abf6e5fbbe0ccf35512cb7e470f5417d310222434fe07bc806ae5aef8c99217ee0ee68e8704a7e49f14a5d236ec

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\c7519976.exe

    Filesize

    258KB

    MD5

    682a9345799d3743bc42d4675d2f2dab

    SHA1

    d4bdbfcef6417a6b3b06c4df1150f803d789bf8e

    SHA256

    0609709fecb084b2fc349091f74e24bc5984f19ff010a52e0eef1d9babc6e576

    SHA512

    6f395dee9732072b4b6a1cf67be503c84ee05abf6e5fbbe0ccf35512cb7e470f5417d310222434fe07bc806ae5aef8c99217ee0ee68e8704a7e49f14a5d236ec

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v5813455.exe

    Filesize

    197KB

    MD5

    9f3c6ad4284d79c9290fbaa4d56b1d0b

    SHA1

    504fc85e461894e61fca0030e2424218f643c96b

    SHA256

    f48271cff4a9dca06af5db7d24856dd3895a5711094bbec5ca07b6bc81026033

    SHA512

    5eec870bbc58c414585c870e89be288408c7b9bb087328482ed6c941046aa5da94ec67c5c365aa3496bff3c847daf93ddec5b17df651209bdb59130a8e699946

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v5813455.exe

    Filesize

    197KB

    MD5

    9f3c6ad4284d79c9290fbaa4d56b1d0b

    SHA1

    504fc85e461894e61fca0030e2424218f643c96b

    SHA256

    f48271cff4a9dca06af5db7d24856dd3895a5711094bbec5ca07b6bc81026033

    SHA512

    5eec870bbc58c414585c870e89be288408c7b9bb087328482ed6c941046aa5da94ec67c5c365aa3496bff3c847daf93ddec5b17df651209bdb59130a8e699946

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a4716545.exe

    Filesize

    96KB

    MD5

    8b07a3a2210f7f89066c3edd165d9348

    SHA1

    29bf40a6811239ed6e71712ce980e1d2510e64cd

    SHA256

    3160569d472d0aab39ad22c088201fabcffdcd32d2dd8c546926b8228a4dc2fa

    SHA512

    99d77897880091f40bff482d3d5182fcc7aa92137772c8fbe28be6e63fcd2e48ba5c83be24b97e024afa6885ba21e289f68a2f2d35133a2e7828d7a82a4fe6fd

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a4716545.exe

    Filesize

    96KB

    MD5

    8b07a3a2210f7f89066c3edd165d9348

    SHA1

    29bf40a6811239ed6e71712ce980e1d2510e64cd

    SHA256

    3160569d472d0aab39ad22c088201fabcffdcd32d2dd8c546926b8228a4dc2fa

    SHA512

    99d77897880091f40bff482d3d5182fcc7aa92137772c8fbe28be6e63fcd2e48ba5c83be24b97e024afa6885ba21e289f68a2f2d35133a2e7828d7a82a4fe6fd

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a4716545.exe

    Filesize

    96KB

    MD5

    8b07a3a2210f7f89066c3edd165d9348

    SHA1

    29bf40a6811239ed6e71712ce980e1d2510e64cd

    SHA256

    3160569d472d0aab39ad22c088201fabcffdcd32d2dd8c546926b8228a4dc2fa

    SHA512

    99d77897880091f40bff482d3d5182fcc7aa92137772c8fbe28be6e63fcd2e48ba5c83be24b97e024afa6885ba21e289f68a2f2d35133a2e7828d7a82a4fe6fd

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\b2471695.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • memory/1260-112-0x0000000001370000-0x000000000137A000-memory.dmp

    Filesize

    40KB

  • memory/2044-103-0x0000000000020000-0x000000000002A000-memory.dmp

    Filesize

    40KB

  • memory/2332-54-0x0000000000660000-0x0000000000715000-memory.dmp

    Filesize

    724KB

  • memory/2972-122-0x00000000002A0000-0x00000000002D0000-memory.dmp

    Filesize

    192KB

  • memory/2972-126-0x00000000020D0000-0x00000000020D6000-memory.dmp

    Filesize

    24KB

  • memory/2972-127-0x0000000004A70000-0x0000000004AB0000-memory.dmp

    Filesize

    256KB

  • memory/2972-128-0x0000000004A70000-0x0000000004AB0000-memory.dmp

    Filesize

    256KB