Analysis

  • max time kernel
    130s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    09/07/2023, 16:11

General

  • Target

    9fdf81de3e3b6e2409a05ec10.exe

  • Size

    523KB

  • MD5

    9fdf81de3e3b6e2409a05ec104de7767

  • SHA1

    0e702d335041afdcbb45b49da120fd432cb4870c

  • SHA256

    367f78aa041693b4080834fb6a2f72fe36afd5189073a143f319bbe6624ccaf6

  • SHA512

    0f2179d8ff256ea70b5f808b65ef3f8f8327bbc90e973814c468b61cfd8a6e8b064b6ea6a5236942f42601d54bd16c168d65c66aec2cf519a248a9c1b9809d56

  • SSDEEP

    12288:S9JU8JafvQaRdnQgMmcy90DJScJRQTWg8/b0Fz7GznqhA:SU8JwvQ82g/sJXJRhAQTqm

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • Detects Healer an antivirus disabler dropper 1 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9fdf81de3e3b6e2409a05ec10.exe
    "C:\Users\Admin\AppData\Local\Temp\9fdf81de3e3b6e2409a05ec10.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:284
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5987748.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5987748.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2204
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k8853654.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k8853654.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1740
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l7149138.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l7149138.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2944

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5987748.exe

    Filesize

    257KB

    MD5

    6166316497a862f78fe07812baa98ccf

    SHA1

    522af18c6c559e4d3b5d86e30dcf1582179dc223

    SHA256

    6638febdde23eb1603190f3f701c0c6b79d22d64d40261c59135f3a5291ecbd2

    SHA512

    819926259a34b1329dc9af025c2df277a4d5558281362a1b7f9ce0592934fb28541c130c48482c4c04a7c962cb5694b055fa3c5543c82a8bb37292a96a5a5657

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5987748.exe

    Filesize

    257KB

    MD5

    6166316497a862f78fe07812baa98ccf

    SHA1

    522af18c6c559e4d3b5d86e30dcf1582179dc223

    SHA256

    6638febdde23eb1603190f3f701c0c6b79d22d64d40261c59135f3a5291ecbd2

    SHA512

    819926259a34b1329dc9af025c2df277a4d5558281362a1b7f9ce0592934fb28541c130c48482c4c04a7c962cb5694b055fa3c5543c82a8bb37292a96a5a5657

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k8853654.exe

    Filesize

    93KB

    MD5

    b8f7bd36e143cd6a9bddcde73f0f1c45

    SHA1

    617ab7d8194fdffa8a1c74e6851aadc28d9de158

    SHA256

    085cf3ce7e917283ec9dc601c4a190ae1385095ab383d149103fe7a07be96fa6

    SHA512

    41fd20a093a1b5df47c2179a6c00778706226815ba9c43130582957916a2498e344deac1f5c57f216ce256bf10428fbd1db88c0588db2bd957eb3cfac65621d4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k8853654.exe

    Filesize

    93KB

    MD5

    b8f7bd36e143cd6a9bddcde73f0f1c45

    SHA1

    617ab7d8194fdffa8a1c74e6851aadc28d9de158

    SHA256

    085cf3ce7e917283ec9dc601c4a190ae1385095ab383d149103fe7a07be96fa6

    SHA512

    41fd20a093a1b5df47c2179a6c00778706226815ba9c43130582957916a2498e344deac1f5c57f216ce256bf10428fbd1db88c0588db2bd957eb3cfac65621d4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k8853654.exe

    Filesize

    93KB

    MD5

    b8f7bd36e143cd6a9bddcde73f0f1c45

    SHA1

    617ab7d8194fdffa8a1c74e6851aadc28d9de158

    SHA256

    085cf3ce7e917283ec9dc601c4a190ae1385095ab383d149103fe7a07be96fa6

    SHA512

    41fd20a093a1b5df47c2179a6c00778706226815ba9c43130582957916a2498e344deac1f5c57f216ce256bf10428fbd1db88c0588db2bd957eb3cfac65621d4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l7149138.exe

    Filesize

    255KB

    MD5

    8cfb4de744f5b345c7397bf24258b42c

    SHA1

    02f1627dddad8889e8d4d2877b4b7eef88950bd7

    SHA256

    8523e22769be8d129de632ead17c8c4a9af9da7145765b58c1cb09916cf0b43d

    SHA512

    ce83acb3071464ebdd60e37ca41c1c280d83742d2c6beb90d6e32ac771a8950acae645086800570362fe8e38e74548f996bc99619e773f5284feb4d9fe5c38e3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l7149138.exe

    Filesize

    255KB

    MD5

    8cfb4de744f5b345c7397bf24258b42c

    SHA1

    02f1627dddad8889e8d4d2877b4b7eef88950bd7

    SHA256

    8523e22769be8d129de632ead17c8c4a9af9da7145765b58c1cb09916cf0b43d

    SHA512

    ce83acb3071464ebdd60e37ca41c1c280d83742d2c6beb90d6e32ac771a8950acae645086800570362fe8e38e74548f996bc99619e773f5284feb4d9fe5c38e3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l7149138.exe

    Filesize

    255KB

    MD5

    8cfb4de744f5b345c7397bf24258b42c

    SHA1

    02f1627dddad8889e8d4d2877b4b7eef88950bd7

    SHA256

    8523e22769be8d129de632ead17c8c4a9af9da7145765b58c1cb09916cf0b43d

    SHA512

    ce83acb3071464ebdd60e37ca41c1c280d83742d2c6beb90d6e32ac771a8950acae645086800570362fe8e38e74548f996bc99619e773f5284feb4d9fe5c38e3

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\y5987748.exe

    Filesize

    257KB

    MD5

    6166316497a862f78fe07812baa98ccf

    SHA1

    522af18c6c559e4d3b5d86e30dcf1582179dc223

    SHA256

    6638febdde23eb1603190f3f701c0c6b79d22d64d40261c59135f3a5291ecbd2

    SHA512

    819926259a34b1329dc9af025c2df277a4d5558281362a1b7f9ce0592934fb28541c130c48482c4c04a7c962cb5694b055fa3c5543c82a8bb37292a96a5a5657

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\y5987748.exe

    Filesize

    257KB

    MD5

    6166316497a862f78fe07812baa98ccf

    SHA1

    522af18c6c559e4d3b5d86e30dcf1582179dc223

    SHA256

    6638febdde23eb1603190f3f701c0c6b79d22d64d40261c59135f3a5291ecbd2

    SHA512

    819926259a34b1329dc9af025c2df277a4d5558281362a1b7f9ce0592934fb28541c130c48482c4c04a7c962cb5694b055fa3c5543c82a8bb37292a96a5a5657

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\k8853654.exe

    Filesize

    93KB

    MD5

    b8f7bd36e143cd6a9bddcde73f0f1c45

    SHA1

    617ab7d8194fdffa8a1c74e6851aadc28d9de158

    SHA256

    085cf3ce7e917283ec9dc601c4a190ae1385095ab383d149103fe7a07be96fa6

    SHA512

    41fd20a093a1b5df47c2179a6c00778706226815ba9c43130582957916a2498e344deac1f5c57f216ce256bf10428fbd1db88c0588db2bd957eb3cfac65621d4

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\k8853654.exe

    Filesize

    93KB

    MD5

    b8f7bd36e143cd6a9bddcde73f0f1c45

    SHA1

    617ab7d8194fdffa8a1c74e6851aadc28d9de158

    SHA256

    085cf3ce7e917283ec9dc601c4a190ae1385095ab383d149103fe7a07be96fa6

    SHA512

    41fd20a093a1b5df47c2179a6c00778706226815ba9c43130582957916a2498e344deac1f5c57f216ce256bf10428fbd1db88c0588db2bd957eb3cfac65621d4

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\k8853654.exe

    Filesize

    93KB

    MD5

    b8f7bd36e143cd6a9bddcde73f0f1c45

    SHA1

    617ab7d8194fdffa8a1c74e6851aadc28d9de158

    SHA256

    085cf3ce7e917283ec9dc601c4a190ae1385095ab383d149103fe7a07be96fa6

    SHA512

    41fd20a093a1b5df47c2179a6c00778706226815ba9c43130582957916a2498e344deac1f5c57f216ce256bf10428fbd1db88c0588db2bd957eb3cfac65621d4

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\l7149138.exe

    Filesize

    255KB

    MD5

    8cfb4de744f5b345c7397bf24258b42c

    SHA1

    02f1627dddad8889e8d4d2877b4b7eef88950bd7

    SHA256

    8523e22769be8d129de632ead17c8c4a9af9da7145765b58c1cb09916cf0b43d

    SHA512

    ce83acb3071464ebdd60e37ca41c1c280d83742d2c6beb90d6e32ac771a8950acae645086800570362fe8e38e74548f996bc99619e773f5284feb4d9fe5c38e3

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\l7149138.exe

    Filesize

    255KB

    MD5

    8cfb4de744f5b345c7397bf24258b42c

    SHA1

    02f1627dddad8889e8d4d2877b4b7eef88950bd7

    SHA256

    8523e22769be8d129de632ead17c8c4a9af9da7145765b58c1cb09916cf0b43d

    SHA512

    ce83acb3071464ebdd60e37ca41c1c280d83742d2c6beb90d6e32ac771a8950acae645086800570362fe8e38e74548f996bc99619e773f5284feb4d9fe5c38e3

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\l7149138.exe

    Filesize

    255KB

    MD5

    8cfb4de744f5b345c7397bf24258b42c

    SHA1

    02f1627dddad8889e8d4d2877b4b7eef88950bd7

    SHA256

    8523e22769be8d129de632ead17c8c4a9af9da7145765b58c1cb09916cf0b43d

    SHA512

    ce83acb3071464ebdd60e37ca41c1c280d83742d2c6beb90d6e32ac771a8950acae645086800570362fe8e38e74548f996bc99619e773f5284feb4d9fe5c38e3

  • memory/284-54-0x00000000004E0000-0x0000000000553000-memory.dmp

    Filesize

    460KB

  • memory/1740-83-0x0000000000020000-0x000000000002A000-memory.dmp

    Filesize

    40KB

  • memory/2944-97-0x00000000002E0000-0x0000000000310000-memory.dmp

    Filesize

    192KB

  • memory/2944-101-0x0000000002210000-0x0000000002216000-memory.dmp

    Filesize

    24KB

  • memory/2944-102-0x00000000048B0000-0x00000000048F0000-memory.dmp

    Filesize

    256KB

  • memory/2944-103-0x00000000048B0000-0x00000000048F0000-memory.dmp

    Filesize

    256KB