Analysis

  • max time kernel
    142s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    09/07/2023, 11:10

General

  • Target

    8b6d9499a1c8734cd8ecf0652.exe

  • Size

    783KB

  • MD5

    8b6d9499a1c8734cd8ecf06523bc94a7

  • SHA1

    8eec3ed216856bcabd413e81f895cca07dcba614

  • SHA256

    40466ed58c6e1c69bd8a5e5b9863f5de08058c15b40861fbc28f983ca43417b4

  • SHA512

    6dc9cca915b59b46a8fa793efbc254632cab5f865ac81ba7b6cd122cab92c7856a03fecf3bbb6b2c2cd8b2e5517c1c4f6acc21ba517ca947f873bc21204d775a

  • SSDEEP

    24576:iIucxvp82gAh6jHwRgj0vKZZ9jMiK6o/D:3uQ2ChMb3rKv

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.68.70:19073

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 13 IoCs
  • Windows security modification 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8b6d9499a1c8734cd8ecf0652.exe
    "C:\Users\Admin\AppData\Local\Temp\8b6d9499a1c8734cd8ecf0652.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1860
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4791442.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4791442.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1028
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7172701.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7172701.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1064
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7893018.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7893018.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3032
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5855193.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5855193.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1744
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b6782949.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b6782949.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2312
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c8864241.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c8864241.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2212

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4791442.exe

          Filesize

          517KB

          MD5

          dc4ded2e57a0cc9a854dbeb51ee6e776

          SHA1

          355089fffa26a93d79e3e91c8dfb343767794831

          SHA256

          b7ae24ba7685884b35d6ab3be88d154454a6f36ffbf00d36bee974d8d581f9df

          SHA512

          6c21c419b346161c79f8684a63f37e9ab658065ad40ac8cb722d3549d9d263c2fbaa6cc206b7e3769b3aaed4d4718da3656bc57b1c469a6a7291c265948b3236

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4791442.exe

          Filesize

          517KB

          MD5

          dc4ded2e57a0cc9a854dbeb51ee6e776

          SHA1

          355089fffa26a93d79e3e91c8dfb343767794831

          SHA256

          b7ae24ba7685884b35d6ab3be88d154454a6f36ffbf00d36bee974d8d581f9df

          SHA512

          6c21c419b346161c79f8684a63f37e9ab658065ad40ac8cb722d3549d9d263c2fbaa6cc206b7e3769b3aaed4d4718da3656bc57b1c469a6a7291c265948b3236

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7172701.exe

          Filesize

          393KB

          MD5

          89609691765692ad1ce164b4bcb032f3

          SHA1

          ab806573d920d4cfdd6ecbdf47fbe140d036909e

          SHA256

          a556f59010f4b12573fb76c2e0987b520e2027e5627cedbbbcf07edcdcb8e9be

          SHA512

          62d4bae15f7f2ddea4e0936f37170f7d9730e98fed66d2c5516f884d035d3ef6f6e0b6ace5f6a2256c20f5b90e679acd0ae3479c98d31dbc50e138e925fe1c8b

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7172701.exe

          Filesize

          393KB

          MD5

          89609691765692ad1ce164b4bcb032f3

          SHA1

          ab806573d920d4cfdd6ecbdf47fbe140d036909e

          SHA256

          a556f59010f4b12573fb76c2e0987b520e2027e5627cedbbbcf07edcdcb8e9be

          SHA512

          62d4bae15f7f2ddea4e0936f37170f7d9730e98fed66d2c5516f884d035d3ef6f6e0b6ace5f6a2256c20f5b90e679acd0ae3479c98d31dbc50e138e925fe1c8b

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c8864241.exe

          Filesize

          255KB

          MD5

          ec41c1bb2ec8ed7d3812f7b1710eee8e

          SHA1

          9ccabd158c1851ede1f9aa785156d213b5bda1f0

          SHA256

          8d66bb5e1d11e2131a912d889d7b94b075e97c08ef3cb0b2406659a1ee621ccb

          SHA512

          25af273ffad2814734c8267de08309060cd8d93759d22b8e8df7623d8a0457e21ca9308e37ee578ead882f8b566513d614cd88d265d2d0ebd8c2b8b584249bc2

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c8864241.exe

          Filesize

          255KB

          MD5

          ec41c1bb2ec8ed7d3812f7b1710eee8e

          SHA1

          9ccabd158c1851ede1f9aa785156d213b5bda1f0

          SHA256

          8d66bb5e1d11e2131a912d889d7b94b075e97c08ef3cb0b2406659a1ee621ccb

          SHA512

          25af273ffad2814734c8267de08309060cd8d93759d22b8e8df7623d8a0457e21ca9308e37ee578ead882f8b566513d614cd88d265d2d0ebd8c2b8b584249bc2

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c8864241.exe

          Filesize

          255KB

          MD5

          ec41c1bb2ec8ed7d3812f7b1710eee8e

          SHA1

          9ccabd158c1851ede1f9aa785156d213b5bda1f0

          SHA256

          8d66bb5e1d11e2131a912d889d7b94b075e97c08ef3cb0b2406659a1ee621ccb

          SHA512

          25af273ffad2814734c8267de08309060cd8d93759d22b8e8df7623d8a0457e21ca9308e37ee578ead882f8b566513d614cd88d265d2d0ebd8c2b8b584249bc2

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7893018.exe

          Filesize

          195KB

          MD5

          3638347f545a94c85244dbd1907d32e4

          SHA1

          81c0f7b0d11e76be4e84474e249964f7097fa5e8

          SHA256

          d3619103e3bbeeef5bb6a48f6f8c5b59fac798632ad2ad0f155018ab711c483a

          SHA512

          6770da8bc67db436c72b459e4da323e0e1b02705b91a06436047eee8786d768e682f59883c41ca8c1647aaa1dcadc22571bf5bd966c62824da9c86f7c8c86407

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7893018.exe

          Filesize

          195KB

          MD5

          3638347f545a94c85244dbd1907d32e4

          SHA1

          81c0f7b0d11e76be4e84474e249964f7097fa5e8

          SHA256

          d3619103e3bbeeef5bb6a48f6f8c5b59fac798632ad2ad0f155018ab711c483a

          SHA512

          6770da8bc67db436c72b459e4da323e0e1b02705b91a06436047eee8786d768e682f59883c41ca8c1647aaa1dcadc22571bf5bd966c62824da9c86f7c8c86407

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5855193.exe

          Filesize

          93KB

          MD5

          28a2c57644dc67b06bca7b2781030729

          SHA1

          28536e8f9d28e5f2898d68ee483fbdf119d6704b

          SHA256

          cd16ea0e82b8d9017b0e924b2b5de5cfa8472b9c3924d2c760908f10bad4ce73

          SHA512

          4d006f7f76e00ee706c94dcc7a1d8fc15bbe927a1d7aa33d6bfe3ecbb34917716ab0241e3352ce47cc6b689aec5a5dc668fa16d36108d8c9d80ac73f05ebda97

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5855193.exe

          Filesize

          93KB

          MD5

          28a2c57644dc67b06bca7b2781030729

          SHA1

          28536e8f9d28e5f2898d68ee483fbdf119d6704b

          SHA256

          cd16ea0e82b8d9017b0e924b2b5de5cfa8472b9c3924d2c760908f10bad4ce73

          SHA512

          4d006f7f76e00ee706c94dcc7a1d8fc15bbe927a1d7aa33d6bfe3ecbb34917716ab0241e3352ce47cc6b689aec5a5dc668fa16d36108d8c9d80ac73f05ebda97

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5855193.exe

          Filesize

          93KB

          MD5

          28a2c57644dc67b06bca7b2781030729

          SHA1

          28536e8f9d28e5f2898d68ee483fbdf119d6704b

          SHA256

          cd16ea0e82b8d9017b0e924b2b5de5cfa8472b9c3924d2c760908f10bad4ce73

          SHA512

          4d006f7f76e00ee706c94dcc7a1d8fc15bbe927a1d7aa33d6bfe3ecbb34917716ab0241e3352ce47cc6b689aec5a5dc668fa16d36108d8c9d80ac73f05ebda97

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b6782949.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b6782949.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v4791442.exe

          Filesize

          517KB

          MD5

          dc4ded2e57a0cc9a854dbeb51ee6e776

          SHA1

          355089fffa26a93d79e3e91c8dfb343767794831

          SHA256

          b7ae24ba7685884b35d6ab3be88d154454a6f36ffbf00d36bee974d8d581f9df

          SHA512

          6c21c419b346161c79f8684a63f37e9ab658065ad40ac8cb722d3549d9d263c2fbaa6cc206b7e3769b3aaed4d4718da3656bc57b1c469a6a7291c265948b3236

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v4791442.exe

          Filesize

          517KB

          MD5

          dc4ded2e57a0cc9a854dbeb51ee6e776

          SHA1

          355089fffa26a93d79e3e91c8dfb343767794831

          SHA256

          b7ae24ba7685884b35d6ab3be88d154454a6f36ffbf00d36bee974d8d581f9df

          SHA512

          6c21c419b346161c79f8684a63f37e9ab658065ad40ac8cb722d3549d9d263c2fbaa6cc206b7e3769b3aaed4d4718da3656bc57b1c469a6a7291c265948b3236

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v7172701.exe

          Filesize

          393KB

          MD5

          89609691765692ad1ce164b4bcb032f3

          SHA1

          ab806573d920d4cfdd6ecbdf47fbe140d036909e

          SHA256

          a556f59010f4b12573fb76c2e0987b520e2027e5627cedbbbcf07edcdcb8e9be

          SHA512

          62d4bae15f7f2ddea4e0936f37170f7d9730e98fed66d2c5516f884d035d3ef6f6e0b6ace5f6a2256c20f5b90e679acd0ae3479c98d31dbc50e138e925fe1c8b

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v7172701.exe

          Filesize

          393KB

          MD5

          89609691765692ad1ce164b4bcb032f3

          SHA1

          ab806573d920d4cfdd6ecbdf47fbe140d036909e

          SHA256

          a556f59010f4b12573fb76c2e0987b520e2027e5627cedbbbcf07edcdcb8e9be

          SHA512

          62d4bae15f7f2ddea4e0936f37170f7d9730e98fed66d2c5516f884d035d3ef6f6e0b6ace5f6a2256c20f5b90e679acd0ae3479c98d31dbc50e138e925fe1c8b

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\c8864241.exe

          Filesize

          255KB

          MD5

          ec41c1bb2ec8ed7d3812f7b1710eee8e

          SHA1

          9ccabd158c1851ede1f9aa785156d213b5bda1f0

          SHA256

          8d66bb5e1d11e2131a912d889d7b94b075e97c08ef3cb0b2406659a1ee621ccb

          SHA512

          25af273ffad2814734c8267de08309060cd8d93759d22b8e8df7623d8a0457e21ca9308e37ee578ead882f8b566513d614cd88d265d2d0ebd8c2b8b584249bc2

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\c8864241.exe

          Filesize

          255KB

          MD5

          ec41c1bb2ec8ed7d3812f7b1710eee8e

          SHA1

          9ccabd158c1851ede1f9aa785156d213b5bda1f0

          SHA256

          8d66bb5e1d11e2131a912d889d7b94b075e97c08ef3cb0b2406659a1ee621ccb

          SHA512

          25af273ffad2814734c8267de08309060cd8d93759d22b8e8df7623d8a0457e21ca9308e37ee578ead882f8b566513d614cd88d265d2d0ebd8c2b8b584249bc2

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\c8864241.exe

          Filesize

          255KB

          MD5

          ec41c1bb2ec8ed7d3812f7b1710eee8e

          SHA1

          9ccabd158c1851ede1f9aa785156d213b5bda1f0

          SHA256

          8d66bb5e1d11e2131a912d889d7b94b075e97c08ef3cb0b2406659a1ee621ccb

          SHA512

          25af273ffad2814734c8267de08309060cd8d93759d22b8e8df7623d8a0457e21ca9308e37ee578ead882f8b566513d614cd88d265d2d0ebd8c2b8b584249bc2

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v7893018.exe

          Filesize

          195KB

          MD5

          3638347f545a94c85244dbd1907d32e4

          SHA1

          81c0f7b0d11e76be4e84474e249964f7097fa5e8

          SHA256

          d3619103e3bbeeef5bb6a48f6f8c5b59fac798632ad2ad0f155018ab711c483a

          SHA512

          6770da8bc67db436c72b459e4da323e0e1b02705b91a06436047eee8786d768e682f59883c41ca8c1647aaa1dcadc22571bf5bd966c62824da9c86f7c8c86407

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v7893018.exe

          Filesize

          195KB

          MD5

          3638347f545a94c85244dbd1907d32e4

          SHA1

          81c0f7b0d11e76be4e84474e249964f7097fa5e8

          SHA256

          d3619103e3bbeeef5bb6a48f6f8c5b59fac798632ad2ad0f155018ab711c483a

          SHA512

          6770da8bc67db436c72b459e4da323e0e1b02705b91a06436047eee8786d768e682f59883c41ca8c1647aaa1dcadc22571bf5bd966c62824da9c86f7c8c86407

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a5855193.exe

          Filesize

          93KB

          MD5

          28a2c57644dc67b06bca7b2781030729

          SHA1

          28536e8f9d28e5f2898d68ee483fbdf119d6704b

          SHA256

          cd16ea0e82b8d9017b0e924b2b5de5cfa8472b9c3924d2c760908f10bad4ce73

          SHA512

          4d006f7f76e00ee706c94dcc7a1d8fc15bbe927a1d7aa33d6bfe3ecbb34917716ab0241e3352ce47cc6b689aec5a5dc668fa16d36108d8c9d80ac73f05ebda97

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a5855193.exe

          Filesize

          93KB

          MD5

          28a2c57644dc67b06bca7b2781030729

          SHA1

          28536e8f9d28e5f2898d68ee483fbdf119d6704b

          SHA256

          cd16ea0e82b8d9017b0e924b2b5de5cfa8472b9c3924d2c760908f10bad4ce73

          SHA512

          4d006f7f76e00ee706c94dcc7a1d8fc15bbe927a1d7aa33d6bfe3ecbb34917716ab0241e3352ce47cc6b689aec5a5dc668fa16d36108d8c9d80ac73f05ebda97

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a5855193.exe

          Filesize

          93KB

          MD5

          28a2c57644dc67b06bca7b2781030729

          SHA1

          28536e8f9d28e5f2898d68ee483fbdf119d6704b

          SHA256

          cd16ea0e82b8d9017b0e924b2b5de5cfa8472b9c3924d2c760908f10bad4ce73

          SHA512

          4d006f7f76e00ee706c94dcc7a1d8fc15bbe927a1d7aa33d6bfe3ecbb34917716ab0241e3352ce47cc6b689aec5a5dc668fa16d36108d8c9d80ac73f05ebda97

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\b6782949.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • memory/1744-103-0x0000000000020000-0x000000000002A000-memory.dmp

          Filesize

          40KB

        • memory/1860-54-0x00000000004D0000-0x0000000000584000-memory.dmp

          Filesize

          720KB

        • memory/2212-122-0x0000000000250000-0x0000000000280000-memory.dmp

          Filesize

          192KB

        • memory/2212-126-0x00000000007D0000-0x00000000007D6000-memory.dmp

          Filesize

          24KB

        • memory/2212-127-0x00000000049D0000-0x0000000004A10000-memory.dmp

          Filesize

          256KB

        • memory/2212-128-0x00000000049D0000-0x0000000004A10000-memory.dmp

          Filesize

          256KB

        • memory/2312-112-0x0000000000960000-0x000000000096A000-memory.dmp

          Filesize

          40KB