Analysis

  • max time kernel
    143s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    08/07/2023, 20:30

General

  • Target

    830c1541e3e6f5d88535ecccf.exe

  • Size

    791KB

  • MD5

    830c1541e3e6f5d88535ecccf3595f30

  • SHA1

    4b6b70bc0f1dedb877b64c1434b40de0dc07c234

  • SHA256

    d193c6fd72d8dcfee33c140632ed320d9709b0ab4e1f85b44c37daa5a180aaba

  • SHA512

    9e433903518b28333e9375534b7a8f77524258370d1f8f01af86b07b099525fe99632d35e3fd0d15fc480a88faa5022b6ef7549d224bf52e25f52e87f480681c

  • SSDEEP

    24576:V+dvvE82gagBtRchO/fPI7rHrGYxTKX1mGCz:V+xVggB7c8Q7rV/

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.68.70:19073

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 13 IoCs
  • Windows security modification 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\830c1541e3e6f5d88535ecccf.exe
    "C:\Users\Admin\AppData\Local\Temp\830c1541e3e6f5d88535ecccf.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:996
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6577252.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6577252.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3032
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5545042.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5545042.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2196
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2491674.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2491674.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2068
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a3442432.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a3442432.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2692
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b9833783.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b9833783.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2036
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c9655757.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c9655757.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2124

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6577252.exe

    Filesize

    522KB

    MD5

    d0ff59b9affdf221a5055be0fa446bdf

    SHA1

    077180246eedf892076bc2ff3261ad7e67828512

    SHA256

    95040b398b23dfedc735a1c1c9b6279f70a286d7bc6637d9481f9ced97e10ec0

    SHA512

    18145eb91382f289193f12426af2d7969e8598032f9091bbc5e00a79fba794f3984668b543d67ab38ad866e2b9bc9d3632c00940bafb1ac03c3da8a8bb2f200c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6577252.exe

    Filesize

    522KB

    MD5

    d0ff59b9affdf221a5055be0fa446bdf

    SHA1

    077180246eedf892076bc2ff3261ad7e67828512

    SHA256

    95040b398b23dfedc735a1c1c9b6279f70a286d7bc6637d9481f9ced97e10ec0

    SHA512

    18145eb91382f289193f12426af2d7969e8598032f9091bbc5e00a79fba794f3984668b543d67ab38ad866e2b9bc9d3632c00940bafb1ac03c3da8a8bb2f200c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5545042.exe

    Filesize

    397KB

    MD5

    355423169071fc95dc5b962f978800da

    SHA1

    d067df37f39ee34a18c7f07f5b3a6f6417504d91

    SHA256

    057c6ec91f80dd059fea70b05bcbce4eb2c902279d3ec24c70f79f4499c16665

    SHA512

    010d251dff5fada39ed1d87816a69dffeda9fc40cd5d08ee50ee9bb7058289bc11a7c3dba71447c0578c8505300e109618b1c256b2df66ff4d21dadf58f1da70

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5545042.exe

    Filesize

    397KB

    MD5

    355423169071fc95dc5b962f978800da

    SHA1

    d067df37f39ee34a18c7f07f5b3a6f6417504d91

    SHA256

    057c6ec91f80dd059fea70b05bcbce4eb2c902279d3ec24c70f79f4499c16665

    SHA512

    010d251dff5fada39ed1d87816a69dffeda9fc40cd5d08ee50ee9bb7058289bc11a7c3dba71447c0578c8505300e109618b1c256b2df66ff4d21dadf58f1da70

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c9655757.exe

    Filesize

    258KB

    MD5

    d4c1d09fbcf79eced272b92211111df2

    SHA1

    5959f9faaf7f6ac8e51b017d05c5aec96298a7f9

    SHA256

    b45b666966c1bd4fe974f3384564092c57a8b9ec22200f2c520b60280462ac97

    SHA512

    6c919bf16838c79fd96541379b7a796789d47d8de3fa694c19971c3e90b439612ceaa9e80ef1a94ef713242c46afd4b4db1cfdefbe006e269340c0bf15373fcf

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c9655757.exe

    Filesize

    258KB

    MD5

    d4c1d09fbcf79eced272b92211111df2

    SHA1

    5959f9faaf7f6ac8e51b017d05c5aec96298a7f9

    SHA256

    b45b666966c1bd4fe974f3384564092c57a8b9ec22200f2c520b60280462ac97

    SHA512

    6c919bf16838c79fd96541379b7a796789d47d8de3fa694c19971c3e90b439612ceaa9e80ef1a94ef713242c46afd4b4db1cfdefbe006e269340c0bf15373fcf

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c9655757.exe

    Filesize

    258KB

    MD5

    d4c1d09fbcf79eced272b92211111df2

    SHA1

    5959f9faaf7f6ac8e51b017d05c5aec96298a7f9

    SHA256

    b45b666966c1bd4fe974f3384564092c57a8b9ec22200f2c520b60280462ac97

    SHA512

    6c919bf16838c79fd96541379b7a796789d47d8de3fa694c19971c3e90b439612ceaa9e80ef1a94ef713242c46afd4b4db1cfdefbe006e269340c0bf15373fcf

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2491674.exe

    Filesize

    197KB

    MD5

    45655627d1a255761a59ebde4f6b1b91

    SHA1

    0b4aa62b109b5d1dabaeb966a42a398f4f9d42bf

    SHA256

    609864473d9137f7a5d5fd69da4818d6af4dd80a5ea3337990234bbbe10ffb31

    SHA512

    65ff12ebf2808617fa81392e311c9b8d1aef366dee9a9b583bfbe8d721c55bf449d9735f3891ea80ce82ed6b7a5bf47625b38078045e04cf35ae22d86360b6d7

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2491674.exe

    Filesize

    197KB

    MD5

    45655627d1a255761a59ebde4f6b1b91

    SHA1

    0b4aa62b109b5d1dabaeb966a42a398f4f9d42bf

    SHA256

    609864473d9137f7a5d5fd69da4818d6af4dd80a5ea3337990234bbbe10ffb31

    SHA512

    65ff12ebf2808617fa81392e311c9b8d1aef366dee9a9b583bfbe8d721c55bf449d9735f3891ea80ce82ed6b7a5bf47625b38078045e04cf35ae22d86360b6d7

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a3442432.exe

    Filesize

    96KB

    MD5

    c949463ac1cf564521aa339e1c90b3ed

    SHA1

    4b44ffe6d51b3329d7649e84c3daf4a53c9156bb

    SHA256

    9eb6b47dee4d90ea8dd312cbd111e76f584ca1b183e67d4ec0bd226b0d5c5a9e

    SHA512

    88c4c826ef3c72905588bc7bd23cf52600443fe7e3272043404a786f685685755d50af1022cff21104f21905b67b931ad8b9c7831f769e4c08f6401c5b7f3012

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a3442432.exe

    Filesize

    96KB

    MD5

    c949463ac1cf564521aa339e1c90b3ed

    SHA1

    4b44ffe6d51b3329d7649e84c3daf4a53c9156bb

    SHA256

    9eb6b47dee4d90ea8dd312cbd111e76f584ca1b183e67d4ec0bd226b0d5c5a9e

    SHA512

    88c4c826ef3c72905588bc7bd23cf52600443fe7e3272043404a786f685685755d50af1022cff21104f21905b67b931ad8b9c7831f769e4c08f6401c5b7f3012

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a3442432.exe

    Filesize

    96KB

    MD5

    c949463ac1cf564521aa339e1c90b3ed

    SHA1

    4b44ffe6d51b3329d7649e84c3daf4a53c9156bb

    SHA256

    9eb6b47dee4d90ea8dd312cbd111e76f584ca1b183e67d4ec0bd226b0d5c5a9e

    SHA512

    88c4c826ef3c72905588bc7bd23cf52600443fe7e3272043404a786f685685755d50af1022cff21104f21905b67b931ad8b9c7831f769e4c08f6401c5b7f3012

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b9833783.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b9833783.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v6577252.exe

    Filesize

    522KB

    MD5

    d0ff59b9affdf221a5055be0fa446bdf

    SHA1

    077180246eedf892076bc2ff3261ad7e67828512

    SHA256

    95040b398b23dfedc735a1c1c9b6279f70a286d7bc6637d9481f9ced97e10ec0

    SHA512

    18145eb91382f289193f12426af2d7969e8598032f9091bbc5e00a79fba794f3984668b543d67ab38ad866e2b9bc9d3632c00940bafb1ac03c3da8a8bb2f200c

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v6577252.exe

    Filesize

    522KB

    MD5

    d0ff59b9affdf221a5055be0fa446bdf

    SHA1

    077180246eedf892076bc2ff3261ad7e67828512

    SHA256

    95040b398b23dfedc735a1c1c9b6279f70a286d7bc6637d9481f9ced97e10ec0

    SHA512

    18145eb91382f289193f12426af2d7969e8598032f9091bbc5e00a79fba794f3984668b543d67ab38ad866e2b9bc9d3632c00940bafb1ac03c3da8a8bb2f200c

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v5545042.exe

    Filesize

    397KB

    MD5

    355423169071fc95dc5b962f978800da

    SHA1

    d067df37f39ee34a18c7f07f5b3a6f6417504d91

    SHA256

    057c6ec91f80dd059fea70b05bcbce4eb2c902279d3ec24c70f79f4499c16665

    SHA512

    010d251dff5fada39ed1d87816a69dffeda9fc40cd5d08ee50ee9bb7058289bc11a7c3dba71447c0578c8505300e109618b1c256b2df66ff4d21dadf58f1da70

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v5545042.exe

    Filesize

    397KB

    MD5

    355423169071fc95dc5b962f978800da

    SHA1

    d067df37f39ee34a18c7f07f5b3a6f6417504d91

    SHA256

    057c6ec91f80dd059fea70b05bcbce4eb2c902279d3ec24c70f79f4499c16665

    SHA512

    010d251dff5fada39ed1d87816a69dffeda9fc40cd5d08ee50ee9bb7058289bc11a7c3dba71447c0578c8505300e109618b1c256b2df66ff4d21dadf58f1da70

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\c9655757.exe

    Filesize

    258KB

    MD5

    d4c1d09fbcf79eced272b92211111df2

    SHA1

    5959f9faaf7f6ac8e51b017d05c5aec96298a7f9

    SHA256

    b45b666966c1bd4fe974f3384564092c57a8b9ec22200f2c520b60280462ac97

    SHA512

    6c919bf16838c79fd96541379b7a796789d47d8de3fa694c19971c3e90b439612ceaa9e80ef1a94ef713242c46afd4b4db1cfdefbe006e269340c0bf15373fcf

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\c9655757.exe

    Filesize

    258KB

    MD5

    d4c1d09fbcf79eced272b92211111df2

    SHA1

    5959f9faaf7f6ac8e51b017d05c5aec96298a7f9

    SHA256

    b45b666966c1bd4fe974f3384564092c57a8b9ec22200f2c520b60280462ac97

    SHA512

    6c919bf16838c79fd96541379b7a796789d47d8de3fa694c19971c3e90b439612ceaa9e80ef1a94ef713242c46afd4b4db1cfdefbe006e269340c0bf15373fcf

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\c9655757.exe

    Filesize

    258KB

    MD5

    d4c1d09fbcf79eced272b92211111df2

    SHA1

    5959f9faaf7f6ac8e51b017d05c5aec96298a7f9

    SHA256

    b45b666966c1bd4fe974f3384564092c57a8b9ec22200f2c520b60280462ac97

    SHA512

    6c919bf16838c79fd96541379b7a796789d47d8de3fa694c19971c3e90b439612ceaa9e80ef1a94ef713242c46afd4b4db1cfdefbe006e269340c0bf15373fcf

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v2491674.exe

    Filesize

    197KB

    MD5

    45655627d1a255761a59ebde4f6b1b91

    SHA1

    0b4aa62b109b5d1dabaeb966a42a398f4f9d42bf

    SHA256

    609864473d9137f7a5d5fd69da4818d6af4dd80a5ea3337990234bbbe10ffb31

    SHA512

    65ff12ebf2808617fa81392e311c9b8d1aef366dee9a9b583bfbe8d721c55bf449d9735f3891ea80ce82ed6b7a5bf47625b38078045e04cf35ae22d86360b6d7

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v2491674.exe

    Filesize

    197KB

    MD5

    45655627d1a255761a59ebde4f6b1b91

    SHA1

    0b4aa62b109b5d1dabaeb966a42a398f4f9d42bf

    SHA256

    609864473d9137f7a5d5fd69da4818d6af4dd80a5ea3337990234bbbe10ffb31

    SHA512

    65ff12ebf2808617fa81392e311c9b8d1aef366dee9a9b583bfbe8d721c55bf449d9735f3891ea80ce82ed6b7a5bf47625b38078045e04cf35ae22d86360b6d7

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a3442432.exe

    Filesize

    96KB

    MD5

    c949463ac1cf564521aa339e1c90b3ed

    SHA1

    4b44ffe6d51b3329d7649e84c3daf4a53c9156bb

    SHA256

    9eb6b47dee4d90ea8dd312cbd111e76f584ca1b183e67d4ec0bd226b0d5c5a9e

    SHA512

    88c4c826ef3c72905588bc7bd23cf52600443fe7e3272043404a786f685685755d50af1022cff21104f21905b67b931ad8b9c7831f769e4c08f6401c5b7f3012

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a3442432.exe

    Filesize

    96KB

    MD5

    c949463ac1cf564521aa339e1c90b3ed

    SHA1

    4b44ffe6d51b3329d7649e84c3daf4a53c9156bb

    SHA256

    9eb6b47dee4d90ea8dd312cbd111e76f584ca1b183e67d4ec0bd226b0d5c5a9e

    SHA512

    88c4c826ef3c72905588bc7bd23cf52600443fe7e3272043404a786f685685755d50af1022cff21104f21905b67b931ad8b9c7831f769e4c08f6401c5b7f3012

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a3442432.exe

    Filesize

    96KB

    MD5

    c949463ac1cf564521aa339e1c90b3ed

    SHA1

    4b44ffe6d51b3329d7649e84c3daf4a53c9156bb

    SHA256

    9eb6b47dee4d90ea8dd312cbd111e76f584ca1b183e67d4ec0bd226b0d5c5a9e

    SHA512

    88c4c826ef3c72905588bc7bd23cf52600443fe7e3272043404a786f685685755d50af1022cff21104f21905b67b931ad8b9c7831f769e4c08f6401c5b7f3012

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\b9833783.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • memory/996-54-0x0000000000710000-0x00000000007C6000-memory.dmp

    Filesize

    728KB

  • memory/2036-112-0x00000000009C0000-0x00000000009CA000-memory.dmp

    Filesize

    40KB

  • memory/2124-122-0x00000000002C0000-0x00000000002F0000-memory.dmp

    Filesize

    192KB

  • memory/2124-126-0x0000000000600000-0x0000000000606000-memory.dmp

    Filesize

    24KB

  • memory/2124-127-0x0000000004BD0000-0x0000000004C10000-memory.dmp

    Filesize

    256KB

  • memory/2124-128-0x0000000004BD0000-0x0000000004C10000-memory.dmp

    Filesize

    256KB

  • memory/2692-103-0x0000000000020000-0x000000000002A000-memory.dmp

    Filesize

    40KB