Analysis

  • max time kernel
    143s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    08/07/2023, 16:33

General

  • Target

    5e8c6b74b84eb147f10b49514.exe

  • Size

    784KB

  • MD5

    5e8c6b74b84eb147f10b4951414da10d

  • SHA1

    9b1bfab99ccd8ab89124ac009852f2eca1ccb03e

  • SHA256

    f5944a619c4bc3aafd2e57d990c36fb65732d4dc05800517f159c945465d6bc5

  • SHA512

    a4ea3509b3ceb47a06e1b4579c3faccf312e14984c8128e5ea40370decda464e118b95221dba7c29fc77cb244842318e6a71eca1d1dcbc61c6e4f95d9efac9f5

  • SSDEEP

    24576:J/8HZv182g5ianvJv9mOmWCFjxtMwpbEVgvxYhTah:J/85i6QvJFmfFjxtBaVMYgh

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.68.70:19073

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 13 IoCs
  • Windows security modification 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5e8c6b74b84eb147f10b49514.exe
    "C:\Users\Admin\AppData\Local\Temp\5e8c6b74b84eb147f10b49514.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2256
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2915765.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2915765.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2148
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2380663.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2380663.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2852
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3380401.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3380401.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:656
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a9207888.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a9207888.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2452
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2765338.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2765338.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2848
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c5745662.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c5745662.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2140

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2915765.exe

          Filesize

          518KB

          MD5

          7d19a4b8ef8873793b18c9ae017dee05

          SHA1

          2c91a5a98f378fef487cb13ba302ce5ca3f62dc5

          SHA256

          7cf373b2622e936c24bb81bc40b4cc5284a61bb8af456c55f29d63a126b4b2ee

          SHA512

          3e5c4bd1d301e9c022ffed7cbe5d4e0798f5f55c7d8f44200b92857f5764a98e58e9d7607e222bdbdb5a648fd510eed69aa413217dcf6c215f82cc9428375eb0

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2915765.exe

          Filesize

          518KB

          MD5

          7d19a4b8ef8873793b18c9ae017dee05

          SHA1

          2c91a5a98f378fef487cb13ba302ce5ca3f62dc5

          SHA256

          7cf373b2622e936c24bb81bc40b4cc5284a61bb8af456c55f29d63a126b4b2ee

          SHA512

          3e5c4bd1d301e9c022ffed7cbe5d4e0798f5f55c7d8f44200b92857f5764a98e58e9d7607e222bdbdb5a648fd510eed69aa413217dcf6c215f82cc9428375eb0

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2380663.exe

          Filesize

          394KB

          MD5

          6530292c13d7c4fe196f559d7cc18dd5

          SHA1

          74a4608724c29a3739a3c0e21f14bebd8c688b84

          SHA256

          0c5a2ea907c4abdea544ddc878223b89e763f3958a5b7e46bfba074da083fe48

          SHA512

          a95e6166007a4017803938e23b10e58131dcf6d4cea375e9092d605a3516c818f753cc27601e714705b57f9a42e7e3a89d37d7b849d00052660e9cb221cd98ab

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2380663.exe

          Filesize

          394KB

          MD5

          6530292c13d7c4fe196f559d7cc18dd5

          SHA1

          74a4608724c29a3739a3c0e21f14bebd8c688b84

          SHA256

          0c5a2ea907c4abdea544ddc878223b89e763f3958a5b7e46bfba074da083fe48

          SHA512

          a95e6166007a4017803938e23b10e58131dcf6d4cea375e9092d605a3516c818f753cc27601e714705b57f9a42e7e3a89d37d7b849d00052660e9cb221cd98ab

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c5745662.exe

          Filesize

          255KB

          MD5

          d67882b4dcd64a529085039b372c8027

          SHA1

          4c4e3b875ff452a96eaaffb55142ed5b2f648701

          SHA256

          ae313bc6c1f810d463b3edb295d5f9848de18c6fe66d7f894672bae5e2233c5f

          SHA512

          3dca71eb2c47f8ed27563e0fb8d54f7347f7a1b577b9cac99d8be579799f6e7bbad2e61967b86ea71ec5cc401589a689ccef52fd6d6dcac3fda9158667dcecb9

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c5745662.exe

          Filesize

          255KB

          MD5

          d67882b4dcd64a529085039b372c8027

          SHA1

          4c4e3b875ff452a96eaaffb55142ed5b2f648701

          SHA256

          ae313bc6c1f810d463b3edb295d5f9848de18c6fe66d7f894672bae5e2233c5f

          SHA512

          3dca71eb2c47f8ed27563e0fb8d54f7347f7a1b577b9cac99d8be579799f6e7bbad2e61967b86ea71ec5cc401589a689ccef52fd6d6dcac3fda9158667dcecb9

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c5745662.exe

          Filesize

          255KB

          MD5

          d67882b4dcd64a529085039b372c8027

          SHA1

          4c4e3b875ff452a96eaaffb55142ed5b2f648701

          SHA256

          ae313bc6c1f810d463b3edb295d5f9848de18c6fe66d7f894672bae5e2233c5f

          SHA512

          3dca71eb2c47f8ed27563e0fb8d54f7347f7a1b577b9cac99d8be579799f6e7bbad2e61967b86ea71ec5cc401589a689ccef52fd6d6dcac3fda9158667dcecb9

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3380401.exe

          Filesize

          196KB

          MD5

          af999c03a545bb79bb8174efe20528ca

          SHA1

          6596c678589b58aae45c5f75e4443b1e2ac6eaea

          SHA256

          d7e083095963d85e7899cc4d339f187cdf385ec312a71c836282374675db241c

          SHA512

          a681040e9c40e40f4de9388d852c208870461924f8d03e65182ecb676e2821a2f915950b887fa1feb729a02477d67fd427a29d288e7a1421950bebfd96b9e708

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3380401.exe

          Filesize

          196KB

          MD5

          af999c03a545bb79bb8174efe20528ca

          SHA1

          6596c678589b58aae45c5f75e4443b1e2ac6eaea

          SHA256

          d7e083095963d85e7899cc4d339f187cdf385ec312a71c836282374675db241c

          SHA512

          a681040e9c40e40f4de9388d852c208870461924f8d03e65182ecb676e2821a2f915950b887fa1feb729a02477d67fd427a29d288e7a1421950bebfd96b9e708

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a9207888.exe

          Filesize

          94KB

          MD5

          2c17ab39b20a683b230ba2f9afbf8a18

          SHA1

          59a97c9fe4496bf5349adde7ba2fdd372193509b

          SHA256

          a0f4b7c1ec54de65cd0bcb838a9f56e2a59623693314f480cacc0866520ea955

          SHA512

          09935254ea5a15e68d9ccc7f46ca0bba4e91e6dee7c8ef828108d7ce0f91fd929a05e6b84f5cb7acf199f30869df20a2718ff5a1f26ccb546660afaaa5922736

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a9207888.exe

          Filesize

          94KB

          MD5

          2c17ab39b20a683b230ba2f9afbf8a18

          SHA1

          59a97c9fe4496bf5349adde7ba2fdd372193509b

          SHA256

          a0f4b7c1ec54de65cd0bcb838a9f56e2a59623693314f480cacc0866520ea955

          SHA512

          09935254ea5a15e68d9ccc7f46ca0bba4e91e6dee7c8ef828108d7ce0f91fd929a05e6b84f5cb7acf199f30869df20a2718ff5a1f26ccb546660afaaa5922736

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a9207888.exe

          Filesize

          94KB

          MD5

          2c17ab39b20a683b230ba2f9afbf8a18

          SHA1

          59a97c9fe4496bf5349adde7ba2fdd372193509b

          SHA256

          a0f4b7c1ec54de65cd0bcb838a9f56e2a59623693314f480cacc0866520ea955

          SHA512

          09935254ea5a15e68d9ccc7f46ca0bba4e91e6dee7c8ef828108d7ce0f91fd929a05e6b84f5cb7acf199f30869df20a2718ff5a1f26ccb546660afaaa5922736

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2765338.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2765338.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v2915765.exe

          Filesize

          518KB

          MD5

          7d19a4b8ef8873793b18c9ae017dee05

          SHA1

          2c91a5a98f378fef487cb13ba302ce5ca3f62dc5

          SHA256

          7cf373b2622e936c24bb81bc40b4cc5284a61bb8af456c55f29d63a126b4b2ee

          SHA512

          3e5c4bd1d301e9c022ffed7cbe5d4e0798f5f55c7d8f44200b92857f5764a98e58e9d7607e222bdbdb5a648fd510eed69aa413217dcf6c215f82cc9428375eb0

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v2915765.exe

          Filesize

          518KB

          MD5

          7d19a4b8ef8873793b18c9ae017dee05

          SHA1

          2c91a5a98f378fef487cb13ba302ce5ca3f62dc5

          SHA256

          7cf373b2622e936c24bb81bc40b4cc5284a61bb8af456c55f29d63a126b4b2ee

          SHA512

          3e5c4bd1d301e9c022ffed7cbe5d4e0798f5f55c7d8f44200b92857f5764a98e58e9d7607e222bdbdb5a648fd510eed69aa413217dcf6c215f82cc9428375eb0

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v2380663.exe

          Filesize

          394KB

          MD5

          6530292c13d7c4fe196f559d7cc18dd5

          SHA1

          74a4608724c29a3739a3c0e21f14bebd8c688b84

          SHA256

          0c5a2ea907c4abdea544ddc878223b89e763f3958a5b7e46bfba074da083fe48

          SHA512

          a95e6166007a4017803938e23b10e58131dcf6d4cea375e9092d605a3516c818f753cc27601e714705b57f9a42e7e3a89d37d7b849d00052660e9cb221cd98ab

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v2380663.exe

          Filesize

          394KB

          MD5

          6530292c13d7c4fe196f559d7cc18dd5

          SHA1

          74a4608724c29a3739a3c0e21f14bebd8c688b84

          SHA256

          0c5a2ea907c4abdea544ddc878223b89e763f3958a5b7e46bfba074da083fe48

          SHA512

          a95e6166007a4017803938e23b10e58131dcf6d4cea375e9092d605a3516c818f753cc27601e714705b57f9a42e7e3a89d37d7b849d00052660e9cb221cd98ab

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\c5745662.exe

          Filesize

          255KB

          MD5

          d67882b4dcd64a529085039b372c8027

          SHA1

          4c4e3b875ff452a96eaaffb55142ed5b2f648701

          SHA256

          ae313bc6c1f810d463b3edb295d5f9848de18c6fe66d7f894672bae5e2233c5f

          SHA512

          3dca71eb2c47f8ed27563e0fb8d54f7347f7a1b577b9cac99d8be579799f6e7bbad2e61967b86ea71ec5cc401589a689ccef52fd6d6dcac3fda9158667dcecb9

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\c5745662.exe

          Filesize

          255KB

          MD5

          d67882b4dcd64a529085039b372c8027

          SHA1

          4c4e3b875ff452a96eaaffb55142ed5b2f648701

          SHA256

          ae313bc6c1f810d463b3edb295d5f9848de18c6fe66d7f894672bae5e2233c5f

          SHA512

          3dca71eb2c47f8ed27563e0fb8d54f7347f7a1b577b9cac99d8be579799f6e7bbad2e61967b86ea71ec5cc401589a689ccef52fd6d6dcac3fda9158667dcecb9

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\c5745662.exe

          Filesize

          255KB

          MD5

          d67882b4dcd64a529085039b372c8027

          SHA1

          4c4e3b875ff452a96eaaffb55142ed5b2f648701

          SHA256

          ae313bc6c1f810d463b3edb295d5f9848de18c6fe66d7f894672bae5e2233c5f

          SHA512

          3dca71eb2c47f8ed27563e0fb8d54f7347f7a1b577b9cac99d8be579799f6e7bbad2e61967b86ea71ec5cc401589a689ccef52fd6d6dcac3fda9158667dcecb9

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v3380401.exe

          Filesize

          196KB

          MD5

          af999c03a545bb79bb8174efe20528ca

          SHA1

          6596c678589b58aae45c5f75e4443b1e2ac6eaea

          SHA256

          d7e083095963d85e7899cc4d339f187cdf385ec312a71c836282374675db241c

          SHA512

          a681040e9c40e40f4de9388d852c208870461924f8d03e65182ecb676e2821a2f915950b887fa1feb729a02477d67fd427a29d288e7a1421950bebfd96b9e708

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v3380401.exe

          Filesize

          196KB

          MD5

          af999c03a545bb79bb8174efe20528ca

          SHA1

          6596c678589b58aae45c5f75e4443b1e2ac6eaea

          SHA256

          d7e083095963d85e7899cc4d339f187cdf385ec312a71c836282374675db241c

          SHA512

          a681040e9c40e40f4de9388d852c208870461924f8d03e65182ecb676e2821a2f915950b887fa1feb729a02477d67fd427a29d288e7a1421950bebfd96b9e708

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a9207888.exe

          Filesize

          94KB

          MD5

          2c17ab39b20a683b230ba2f9afbf8a18

          SHA1

          59a97c9fe4496bf5349adde7ba2fdd372193509b

          SHA256

          a0f4b7c1ec54de65cd0bcb838a9f56e2a59623693314f480cacc0866520ea955

          SHA512

          09935254ea5a15e68d9ccc7f46ca0bba4e91e6dee7c8ef828108d7ce0f91fd929a05e6b84f5cb7acf199f30869df20a2718ff5a1f26ccb546660afaaa5922736

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a9207888.exe

          Filesize

          94KB

          MD5

          2c17ab39b20a683b230ba2f9afbf8a18

          SHA1

          59a97c9fe4496bf5349adde7ba2fdd372193509b

          SHA256

          a0f4b7c1ec54de65cd0bcb838a9f56e2a59623693314f480cacc0866520ea955

          SHA512

          09935254ea5a15e68d9ccc7f46ca0bba4e91e6dee7c8ef828108d7ce0f91fd929a05e6b84f5cb7acf199f30869df20a2718ff5a1f26ccb546660afaaa5922736

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a9207888.exe

          Filesize

          94KB

          MD5

          2c17ab39b20a683b230ba2f9afbf8a18

          SHA1

          59a97c9fe4496bf5349adde7ba2fdd372193509b

          SHA256

          a0f4b7c1ec54de65cd0bcb838a9f56e2a59623693314f480cacc0866520ea955

          SHA512

          09935254ea5a15e68d9ccc7f46ca0bba4e91e6dee7c8ef828108d7ce0f91fd929a05e6b84f5cb7acf199f30869df20a2718ff5a1f26ccb546660afaaa5922736

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\b2765338.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • memory/2140-122-0x0000000000860000-0x0000000000890000-memory.dmp

          Filesize

          192KB

        • memory/2140-126-0x0000000000AC0000-0x0000000000AC6000-memory.dmp

          Filesize

          24KB

        • memory/2140-127-0x0000000004930000-0x0000000004970000-memory.dmp

          Filesize

          256KB

        • memory/2140-128-0x0000000004930000-0x0000000004970000-memory.dmp

          Filesize

          256KB

        • memory/2256-54-0x0000000000300000-0x00000000003B5000-memory.dmp

          Filesize

          724KB

        • memory/2452-103-0x0000000000020000-0x000000000002A000-memory.dmp

          Filesize

          40KB

        • memory/2848-112-0x0000000000120000-0x000000000012A000-memory.dmp

          Filesize

          40KB