Analysis

  • max time kernel
    144s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    09-07-2023 16:11

General

  • Target

    9bd2e3861f0212f7699ae6106.exe

  • Size

    791KB

  • MD5

    9bd2e3861f0212f7699ae6106e351e7f

  • SHA1

    9bfb302bf6b894bc6ae8e4abb50ac5bf572758b0

  • SHA256

    f0973087f07ee4faf94702201cea5c775cd1887709bb57d624bbd5597fa95a24

  • SHA512

    388496bac144f234068417dfb75530b7d6c97de00d925e99016e8a3b94eaadb5c656ca7d37dc5673948b778205da643ec16a5f006ef75450699e7941a0ae6808

  • SSDEEP

    24576:aj1qjvX82gN1xKrza+l71d2GJTqrG+YuaXJKR:aj8kZxKHFn2GFgG5uMJU

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.68.70:19073

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 13 IoCs
  • Windows security modification 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9bd2e3861f0212f7699ae6106.exe
    "C:\Users\Admin\AppData\Local\Temp\9bd2e3861f0212f7699ae6106.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1364
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4195675.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4195675.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1112
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4646208.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4646208.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2960
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8914821.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8914821.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2044
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a3109954.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a3109954.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1744
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2747503.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2747503.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2236
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c1976995.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c1976995.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1700

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4195675.exe

    Filesize

    522KB

    MD5

    7ac2e4fc52f17f9d5838d6b2341b4943

    SHA1

    0b8c065bfdff191193172878e7f5c5f4857c1d24

    SHA256

    740978bda1c14903a1c51af879340e95d2fbe894d8601b393aa7bc955e4540ce

    SHA512

    5cb1e31afa43d64bfc18550431106f9d4fee1563bbdaf4a478886ea863d4d9e2a0a7cf5fb96d412bca1823ebb5427730ea4805d22985756ce724bf795c90cbb5

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4195675.exe

    Filesize

    522KB

    MD5

    7ac2e4fc52f17f9d5838d6b2341b4943

    SHA1

    0b8c065bfdff191193172878e7f5c5f4857c1d24

    SHA256

    740978bda1c14903a1c51af879340e95d2fbe894d8601b393aa7bc955e4540ce

    SHA512

    5cb1e31afa43d64bfc18550431106f9d4fee1563bbdaf4a478886ea863d4d9e2a0a7cf5fb96d412bca1823ebb5427730ea4805d22985756ce724bf795c90cbb5

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4646208.exe

    Filesize

    397KB

    MD5

    4fcf01eb14f9fac3db009ca1553debdf

    SHA1

    9c0fc7f249d8733fadb75a054a467c265e5891c9

    SHA256

    2f0906be938987c1144f1d0327cc14ce73b2ea1f7da5117d80fb216f564a5196

    SHA512

    aa144ecfff824016bf413e1ff6985839119474460415e28d18fd01819966cc314dec5f99cde36e754e8776ef74f51c6782224b06c6bc22ef61233df7a2441713

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4646208.exe

    Filesize

    397KB

    MD5

    4fcf01eb14f9fac3db009ca1553debdf

    SHA1

    9c0fc7f249d8733fadb75a054a467c265e5891c9

    SHA256

    2f0906be938987c1144f1d0327cc14ce73b2ea1f7da5117d80fb216f564a5196

    SHA512

    aa144ecfff824016bf413e1ff6985839119474460415e28d18fd01819966cc314dec5f99cde36e754e8776ef74f51c6782224b06c6bc22ef61233df7a2441713

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c1976995.exe

    Filesize

    258KB

    MD5

    e650fcdb2892f2fb044f8eb7c54b7197

    SHA1

    d2cfdac5098e36a79309663b71e60f1f2c748aa4

    SHA256

    cc3cc0bb83a8e632ca964322acae58686bc0d7c711b631c47959ccb6a913aa6e

    SHA512

    3fd8da488d400bebf65a525c05cc52bd60efff09ec1b4e0d288b15f504bc5fc47008e57547d5f659ad05515f447c30f94fb13a07f49eca7fd58b972f9db4acf5

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c1976995.exe

    Filesize

    258KB

    MD5

    e650fcdb2892f2fb044f8eb7c54b7197

    SHA1

    d2cfdac5098e36a79309663b71e60f1f2c748aa4

    SHA256

    cc3cc0bb83a8e632ca964322acae58686bc0d7c711b631c47959ccb6a913aa6e

    SHA512

    3fd8da488d400bebf65a525c05cc52bd60efff09ec1b4e0d288b15f504bc5fc47008e57547d5f659ad05515f447c30f94fb13a07f49eca7fd58b972f9db4acf5

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c1976995.exe

    Filesize

    258KB

    MD5

    e650fcdb2892f2fb044f8eb7c54b7197

    SHA1

    d2cfdac5098e36a79309663b71e60f1f2c748aa4

    SHA256

    cc3cc0bb83a8e632ca964322acae58686bc0d7c711b631c47959ccb6a913aa6e

    SHA512

    3fd8da488d400bebf65a525c05cc52bd60efff09ec1b4e0d288b15f504bc5fc47008e57547d5f659ad05515f447c30f94fb13a07f49eca7fd58b972f9db4acf5

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8914821.exe

    Filesize

    197KB

    MD5

    31e52a4567103945bb66cbed5f2d0efc

    SHA1

    6f7587b99ba5238f2c3ed2ace902e907d82fdf3e

    SHA256

    d214ea5a58623424b2da54754c4fbf35e7624fc23a29858532d642560b776454

    SHA512

    cab5bea24cadcb09d7c63a6c38c7d12489215736eebdf47f2b15a0496297b3c49cc5182db03057238d35716fbfa46aad31f305134e585b5518af14aa3654c1a3

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8914821.exe

    Filesize

    197KB

    MD5

    31e52a4567103945bb66cbed5f2d0efc

    SHA1

    6f7587b99ba5238f2c3ed2ace902e907d82fdf3e

    SHA256

    d214ea5a58623424b2da54754c4fbf35e7624fc23a29858532d642560b776454

    SHA512

    cab5bea24cadcb09d7c63a6c38c7d12489215736eebdf47f2b15a0496297b3c49cc5182db03057238d35716fbfa46aad31f305134e585b5518af14aa3654c1a3

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a3109954.exe

    Filesize

    96KB

    MD5

    9b4970661b2ca69c7150ac54ab97de66

    SHA1

    569cb4ff00d180c3109b9aa04b40410555f0020b

    SHA256

    aa73e6f49f1005cdcf7b06b259ad9796b779822315fc314cce2cac0ce1e39dcb

    SHA512

    964d887e1c5d326f80fd4b96415f8f38a744cf50bc61907a024006da175dd759154fd416188cff610d4a7062c5d00bc45b45cdbe335cde2ceeb8d530d2d34a23

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a3109954.exe

    Filesize

    96KB

    MD5

    9b4970661b2ca69c7150ac54ab97de66

    SHA1

    569cb4ff00d180c3109b9aa04b40410555f0020b

    SHA256

    aa73e6f49f1005cdcf7b06b259ad9796b779822315fc314cce2cac0ce1e39dcb

    SHA512

    964d887e1c5d326f80fd4b96415f8f38a744cf50bc61907a024006da175dd759154fd416188cff610d4a7062c5d00bc45b45cdbe335cde2ceeb8d530d2d34a23

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a3109954.exe

    Filesize

    96KB

    MD5

    9b4970661b2ca69c7150ac54ab97de66

    SHA1

    569cb4ff00d180c3109b9aa04b40410555f0020b

    SHA256

    aa73e6f49f1005cdcf7b06b259ad9796b779822315fc314cce2cac0ce1e39dcb

    SHA512

    964d887e1c5d326f80fd4b96415f8f38a744cf50bc61907a024006da175dd759154fd416188cff610d4a7062c5d00bc45b45cdbe335cde2ceeb8d530d2d34a23

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2747503.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2747503.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v4195675.exe

    Filesize

    522KB

    MD5

    7ac2e4fc52f17f9d5838d6b2341b4943

    SHA1

    0b8c065bfdff191193172878e7f5c5f4857c1d24

    SHA256

    740978bda1c14903a1c51af879340e95d2fbe894d8601b393aa7bc955e4540ce

    SHA512

    5cb1e31afa43d64bfc18550431106f9d4fee1563bbdaf4a478886ea863d4d9e2a0a7cf5fb96d412bca1823ebb5427730ea4805d22985756ce724bf795c90cbb5

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v4195675.exe

    Filesize

    522KB

    MD5

    7ac2e4fc52f17f9d5838d6b2341b4943

    SHA1

    0b8c065bfdff191193172878e7f5c5f4857c1d24

    SHA256

    740978bda1c14903a1c51af879340e95d2fbe894d8601b393aa7bc955e4540ce

    SHA512

    5cb1e31afa43d64bfc18550431106f9d4fee1563bbdaf4a478886ea863d4d9e2a0a7cf5fb96d412bca1823ebb5427730ea4805d22985756ce724bf795c90cbb5

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v4646208.exe

    Filesize

    397KB

    MD5

    4fcf01eb14f9fac3db009ca1553debdf

    SHA1

    9c0fc7f249d8733fadb75a054a467c265e5891c9

    SHA256

    2f0906be938987c1144f1d0327cc14ce73b2ea1f7da5117d80fb216f564a5196

    SHA512

    aa144ecfff824016bf413e1ff6985839119474460415e28d18fd01819966cc314dec5f99cde36e754e8776ef74f51c6782224b06c6bc22ef61233df7a2441713

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v4646208.exe

    Filesize

    397KB

    MD5

    4fcf01eb14f9fac3db009ca1553debdf

    SHA1

    9c0fc7f249d8733fadb75a054a467c265e5891c9

    SHA256

    2f0906be938987c1144f1d0327cc14ce73b2ea1f7da5117d80fb216f564a5196

    SHA512

    aa144ecfff824016bf413e1ff6985839119474460415e28d18fd01819966cc314dec5f99cde36e754e8776ef74f51c6782224b06c6bc22ef61233df7a2441713

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\c1976995.exe

    Filesize

    258KB

    MD5

    e650fcdb2892f2fb044f8eb7c54b7197

    SHA1

    d2cfdac5098e36a79309663b71e60f1f2c748aa4

    SHA256

    cc3cc0bb83a8e632ca964322acae58686bc0d7c711b631c47959ccb6a913aa6e

    SHA512

    3fd8da488d400bebf65a525c05cc52bd60efff09ec1b4e0d288b15f504bc5fc47008e57547d5f659ad05515f447c30f94fb13a07f49eca7fd58b972f9db4acf5

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\c1976995.exe

    Filesize

    258KB

    MD5

    e650fcdb2892f2fb044f8eb7c54b7197

    SHA1

    d2cfdac5098e36a79309663b71e60f1f2c748aa4

    SHA256

    cc3cc0bb83a8e632ca964322acae58686bc0d7c711b631c47959ccb6a913aa6e

    SHA512

    3fd8da488d400bebf65a525c05cc52bd60efff09ec1b4e0d288b15f504bc5fc47008e57547d5f659ad05515f447c30f94fb13a07f49eca7fd58b972f9db4acf5

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\c1976995.exe

    Filesize

    258KB

    MD5

    e650fcdb2892f2fb044f8eb7c54b7197

    SHA1

    d2cfdac5098e36a79309663b71e60f1f2c748aa4

    SHA256

    cc3cc0bb83a8e632ca964322acae58686bc0d7c711b631c47959ccb6a913aa6e

    SHA512

    3fd8da488d400bebf65a525c05cc52bd60efff09ec1b4e0d288b15f504bc5fc47008e57547d5f659ad05515f447c30f94fb13a07f49eca7fd58b972f9db4acf5

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v8914821.exe

    Filesize

    197KB

    MD5

    31e52a4567103945bb66cbed5f2d0efc

    SHA1

    6f7587b99ba5238f2c3ed2ace902e907d82fdf3e

    SHA256

    d214ea5a58623424b2da54754c4fbf35e7624fc23a29858532d642560b776454

    SHA512

    cab5bea24cadcb09d7c63a6c38c7d12489215736eebdf47f2b15a0496297b3c49cc5182db03057238d35716fbfa46aad31f305134e585b5518af14aa3654c1a3

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v8914821.exe

    Filesize

    197KB

    MD5

    31e52a4567103945bb66cbed5f2d0efc

    SHA1

    6f7587b99ba5238f2c3ed2ace902e907d82fdf3e

    SHA256

    d214ea5a58623424b2da54754c4fbf35e7624fc23a29858532d642560b776454

    SHA512

    cab5bea24cadcb09d7c63a6c38c7d12489215736eebdf47f2b15a0496297b3c49cc5182db03057238d35716fbfa46aad31f305134e585b5518af14aa3654c1a3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a3109954.exe

    Filesize

    96KB

    MD5

    9b4970661b2ca69c7150ac54ab97de66

    SHA1

    569cb4ff00d180c3109b9aa04b40410555f0020b

    SHA256

    aa73e6f49f1005cdcf7b06b259ad9796b779822315fc314cce2cac0ce1e39dcb

    SHA512

    964d887e1c5d326f80fd4b96415f8f38a744cf50bc61907a024006da175dd759154fd416188cff610d4a7062c5d00bc45b45cdbe335cde2ceeb8d530d2d34a23

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a3109954.exe

    Filesize

    96KB

    MD5

    9b4970661b2ca69c7150ac54ab97de66

    SHA1

    569cb4ff00d180c3109b9aa04b40410555f0020b

    SHA256

    aa73e6f49f1005cdcf7b06b259ad9796b779822315fc314cce2cac0ce1e39dcb

    SHA512

    964d887e1c5d326f80fd4b96415f8f38a744cf50bc61907a024006da175dd759154fd416188cff610d4a7062c5d00bc45b45cdbe335cde2ceeb8d530d2d34a23

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a3109954.exe

    Filesize

    96KB

    MD5

    9b4970661b2ca69c7150ac54ab97de66

    SHA1

    569cb4ff00d180c3109b9aa04b40410555f0020b

    SHA256

    aa73e6f49f1005cdcf7b06b259ad9796b779822315fc314cce2cac0ce1e39dcb

    SHA512

    964d887e1c5d326f80fd4b96415f8f38a744cf50bc61907a024006da175dd759154fd416188cff610d4a7062c5d00bc45b45cdbe335cde2ceeb8d530d2d34a23

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\b2747503.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • memory/1364-54-0x00000000006C0000-0x0000000000775000-memory.dmp

    Filesize

    724KB

  • memory/1700-128-0x0000000004B70000-0x0000000004BB0000-memory.dmp

    Filesize

    256KB

  • memory/1700-127-0x0000000004B70000-0x0000000004BB0000-memory.dmp

    Filesize

    256KB

  • memory/1700-122-0x0000000000310000-0x0000000000340000-memory.dmp

    Filesize

    192KB

  • memory/1700-126-0x0000000000B80000-0x0000000000B86000-memory.dmp

    Filesize

    24KB

  • memory/1744-103-0x0000000000020000-0x000000000002A000-memory.dmp

    Filesize

    40KB

  • memory/2236-112-0x0000000001230000-0x000000000123A000-memory.dmp

    Filesize

    40KB