Analysis

  • max time kernel
    144s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    10/07/2023, 10:37

General

  • Target

    3e38fc3346016e3361c3cface4238670.exe

  • Size

    805KB

  • MD5

    3e38fc3346016e3361c3cface4238670

  • SHA1

    e50ece4e8eb0d7e7d748c7caf9ab5e7bddc685f6

  • SHA256

    4371b14d85369b8db7326aaea4126e973ed350e36081ff7b704cee2519622d2b

  • SHA512

    610fc1b33863097d91da2c79e9cb86e64ba649b7ecf4fea911c9e970ab3d088765a8cd5e492c830d28fc84a899cfcac6351e38ecfd9e603f5ded3ade05a351eb

  • SSDEEP

    24576:2e47ONf2LpTDS54ec4JgG1tm2/6JVO0NIIOk:2eqOJ2N2K1aFtZyJVZS1k

Malware Config

Extracted

Family

redline

Botnet

masha

C2

77.91.68.48:19071

Attributes
  • auth_value

    55b9b39a0dae383196a4b8d79e5bb805

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 13 IoCs
  • Windows security modification 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3e38fc3346016e3361c3cface4238670.exe
    "C:\Users\Admin\AppData\Local\Temp\3e38fc3346016e3361c3cface4238670.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3048
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4567810.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4567810.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2072
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8474028.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8474028.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2148
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8510058.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8510058.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2240
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a8546892.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a8546892.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:908
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b6581097.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b6581097.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2068
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c7251345.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c7251345.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2928

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4567810.exe

          Filesize

          528KB

          MD5

          a8cc3d80e36247481703cec5caab38a2

          SHA1

          5e64d9b72752c455808a28b81820bd7ca003b4ae

          SHA256

          cb3d3bf97584b8a846b9e6c7b6488da216c60f2e276ebdd5462629c9fb870ea7

          SHA512

          8f0373431d511637a1d5a688e1861a09bb56a72a718506eebcbf2cc8acc391ddf500668c9f8a7c2f9d4424ab95f79a7738f2c8b0da49bdd75a9d8d2da0aacea8

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4567810.exe

          Filesize

          528KB

          MD5

          a8cc3d80e36247481703cec5caab38a2

          SHA1

          5e64d9b72752c455808a28b81820bd7ca003b4ae

          SHA256

          cb3d3bf97584b8a846b9e6c7b6488da216c60f2e276ebdd5462629c9fb870ea7

          SHA512

          8f0373431d511637a1d5a688e1861a09bb56a72a718506eebcbf2cc8acc391ddf500668c9f8a7c2f9d4424ab95f79a7738f2c8b0da49bdd75a9d8d2da0aacea8

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8474028.exe

          Filesize

          405KB

          MD5

          672fc6739cf989c17acfd73ab57761ed

          SHA1

          7cd59c86856923155842fbbfb4ed43fabddd3a6f

          SHA256

          d49d7822da66937dfc6dd7ec0c0832ae5d96bfdb81aa81cd8c0e942125465490

          SHA512

          7ee2586265aa8fd929e951c4f418215fee22cae4d5a561456fc44208c2714f8277e8d9a31fe1ba6890b80d6865014d7fab62d7775528cd944940e240650cb68a

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8474028.exe

          Filesize

          405KB

          MD5

          672fc6739cf989c17acfd73ab57761ed

          SHA1

          7cd59c86856923155842fbbfb4ed43fabddd3a6f

          SHA256

          d49d7822da66937dfc6dd7ec0c0832ae5d96bfdb81aa81cd8c0e942125465490

          SHA512

          7ee2586265aa8fd929e951c4f418215fee22cae4d5a561456fc44208c2714f8277e8d9a31fe1ba6890b80d6865014d7fab62d7775528cd944940e240650cb68a

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c7251345.exe

          Filesize

          266KB

          MD5

          3cb5c4743c0fb21252e66cac526f789d

          SHA1

          062ae9a92dc99d5230e3940b658739b2c9954771

          SHA256

          130c47df89ceb30c4ba87d12d549a76e56d2b58dfeef24a35e7842c8547ff45f

          SHA512

          9c9e3561939c14257314b6aa9d17bfd09937fdce9c653b96aecf78978872301d2c4a0e75ae626a2d64c2688d9bf1c6ed0453b324d59aa859168e48b492e40b03

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c7251345.exe

          Filesize

          266KB

          MD5

          3cb5c4743c0fb21252e66cac526f789d

          SHA1

          062ae9a92dc99d5230e3940b658739b2c9954771

          SHA256

          130c47df89ceb30c4ba87d12d549a76e56d2b58dfeef24a35e7842c8547ff45f

          SHA512

          9c9e3561939c14257314b6aa9d17bfd09937fdce9c653b96aecf78978872301d2c4a0e75ae626a2d64c2688d9bf1c6ed0453b324d59aa859168e48b492e40b03

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c7251345.exe

          Filesize

          266KB

          MD5

          3cb5c4743c0fb21252e66cac526f789d

          SHA1

          062ae9a92dc99d5230e3940b658739b2c9954771

          SHA256

          130c47df89ceb30c4ba87d12d549a76e56d2b58dfeef24a35e7842c8547ff45f

          SHA512

          9c9e3561939c14257314b6aa9d17bfd09937fdce9c653b96aecf78978872301d2c4a0e75ae626a2d64c2688d9bf1c6ed0453b324d59aa859168e48b492e40b03

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8510058.exe

          Filesize

          201KB

          MD5

          0f3b441505e12154404b55ef3b6d3e38

          SHA1

          1517032e4cea81aac42df8378f454ba97875bfa2

          SHA256

          6fff0413660f7525e3760de19a8a5ba3ee4948464c9b91954bf1722c9eff5816

          SHA512

          da25f9f7c0ae6e95188ac659582133fa53e97678511050ff5969baf5d81b4b12b96e1571d9f365c7ffdec43cbcd4a6a4790c0baa98e5691d580e67c425cacaa5

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8510058.exe

          Filesize

          201KB

          MD5

          0f3b441505e12154404b55ef3b6d3e38

          SHA1

          1517032e4cea81aac42df8378f454ba97875bfa2

          SHA256

          6fff0413660f7525e3760de19a8a5ba3ee4948464c9b91954bf1722c9eff5816

          SHA512

          da25f9f7c0ae6e95188ac659582133fa53e97678511050ff5969baf5d81b4b12b96e1571d9f365c7ffdec43cbcd4a6a4790c0baa98e5691d580e67c425cacaa5

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a8546892.exe

          Filesize

          104KB

          MD5

          55021899e10b25f990508907cfcd3920

          SHA1

          bf0739994461cb013e2b2e51f041b976e43a538d

          SHA256

          0ad0e607ee8d9aa5da8bf89ec8cb751898be59226b6fe4b24e2f681c0171ac1d

          SHA512

          bd1a90a00c46921448cddd2f3c5be17475cc1124eda4e13f9c103a91abd67ee63d55fedfd92cd14f7865557524cc6a600888aebca82b112030bdb07967e9c45e

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a8546892.exe

          Filesize

          104KB

          MD5

          55021899e10b25f990508907cfcd3920

          SHA1

          bf0739994461cb013e2b2e51f041b976e43a538d

          SHA256

          0ad0e607ee8d9aa5da8bf89ec8cb751898be59226b6fe4b24e2f681c0171ac1d

          SHA512

          bd1a90a00c46921448cddd2f3c5be17475cc1124eda4e13f9c103a91abd67ee63d55fedfd92cd14f7865557524cc6a600888aebca82b112030bdb07967e9c45e

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a8546892.exe

          Filesize

          104KB

          MD5

          55021899e10b25f990508907cfcd3920

          SHA1

          bf0739994461cb013e2b2e51f041b976e43a538d

          SHA256

          0ad0e607ee8d9aa5da8bf89ec8cb751898be59226b6fe4b24e2f681c0171ac1d

          SHA512

          bd1a90a00c46921448cddd2f3c5be17475cc1124eda4e13f9c103a91abd67ee63d55fedfd92cd14f7865557524cc6a600888aebca82b112030bdb07967e9c45e

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b6581097.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b6581097.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v4567810.exe

          Filesize

          528KB

          MD5

          a8cc3d80e36247481703cec5caab38a2

          SHA1

          5e64d9b72752c455808a28b81820bd7ca003b4ae

          SHA256

          cb3d3bf97584b8a846b9e6c7b6488da216c60f2e276ebdd5462629c9fb870ea7

          SHA512

          8f0373431d511637a1d5a688e1861a09bb56a72a718506eebcbf2cc8acc391ddf500668c9f8a7c2f9d4424ab95f79a7738f2c8b0da49bdd75a9d8d2da0aacea8

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v4567810.exe

          Filesize

          528KB

          MD5

          a8cc3d80e36247481703cec5caab38a2

          SHA1

          5e64d9b72752c455808a28b81820bd7ca003b4ae

          SHA256

          cb3d3bf97584b8a846b9e6c7b6488da216c60f2e276ebdd5462629c9fb870ea7

          SHA512

          8f0373431d511637a1d5a688e1861a09bb56a72a718506eebcbf2cc8acc391ddf500668c9f8a7c2f9d4424ab95f79a7738f2c8b0da49bdd75a9d8d2da0aacea8

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v8474028.exe

          Filesize

          405KB

          MD5

          672fc6739cf989c17acfd73ab57761ed

          SHA1

          7cd59c86856923155842fbbfb4ed43fabddd3a6f

          SHA256

          d49d7822da66937dfc6dd7ec0c0832ae5d96bfdb81aa81cd8c0e942125465490

          SHA512

          7ee2586265aa8fd929e951c4f418215fee22cae4d5a561456fc44208c2714f8277e8d9a31fe1ba6890b80d6865014d7fab62d7775528cd944940e240650cb68a

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v8474028.exe

          Filesize

          405KB

          MD5

          672fc6739cf989c17acfd73ab57761ed

          SHA1

          7cd59c86856923155842fbbfb4ed43fabddd3a6f

          SHA256

          d49d7822da66937dfc6dd7ec0c0832ae5d96bfdb81aa81cd8c0e942125465490

          SHA512

          7ee2586265aa8fd929e951c4f418215fee22cae4d5a561456fc44208c2714f8277e8d9a31fe1ba6890b80d6865014d7fab62d7775528cd944940e240650cb68a

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\c7251345.exe

          Filesize

          266KB

          MD5

          3cb5c4743c0fb21252e66cac526f789d

          SHA1

          062ae9a92dc99d5230e3940b658739b2c9954771

          SHA256

          130c47df89ceb30c4ba87d12d549a76e56d2b58dfeef24a35e7842c8547ff45f

          SHA512

          9c9e3561939c14257314b6aa9d17bfd09937fdce9c653b96aecf78978872301d2c4a0e75ae626a2d64c2688d9bf1c6ed0453b324d59aa859168e48b492e40b03

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\c7251345.exe

          Filesize

          266KB

          MD5

          3cb5c4743c0fb21252e66cac526f789d

          SHA1

          062ae9a92dc99d5230e3940b658739b2c9954771

          SHA256

          130c47df89ceb30c4ba87d12d549a76e56d2b58dfeef24a35e7842c8547ff45f

          SHA512

          9c9e3561939c14257314b6aa9d17bfd09937fdce9c653b96aecf78978872301d2c4a0e75ae626a2d64c2688d9bf1c6ed0453b324d59aa859168e48b492e40b03

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\c7251345.exe

          Filesize

          266KB

          MD5

          3cb5c4743c0fb21252e66cac526f789d

          SHA1

          062ae9a92dc99d5230e3940b658739b2c9954771

          SHA256

          130c47df89ceb30c4ba87d12d549a76e56d2b58dfeef24a35e7842c8547ff45f

          SHA512

          9c9e3561939c14257314b6aa9d17bfd09937fdce9c653b96aecf78978872301d2c4a0e75ae626a2d64c2688d9bf1c6ed0453b324d59aa859168e48b492e40b03

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v8510058.exe

          Filesize

          201KB

          MD5

          0f3b441505e12154404b55ef3b6d3e38

          SHA1

          1517032e4cea81aac42df8378f454ba97875bfa2

          SHA256

          6fff0413660f7525e3760de19a8a5ba3ee4948464c9b91954bf1722c9eff5816

          SHA512

          da25f9f7c0ae6e95188ac659582133fa53e97678511050ff5969baf5d81b4b12b96e1571d9f365c7ffdec43cbcd4a6a4790c0baa98e5691d580e67c425cacaa5

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v8510058.exe

          Filesize

          201KB

          MD5

          0f3b441505e12154404b55ef3b6d3e38

          SHA1

          1517032e4cea81aac42df8378f454ba97875bfa2

          SHA256

          6fff0413660f7525e3760de19a8a5ba3ee4948464c9b91954bf1722c9eff5816

          SHA512

          da25f9f7c0ae6e95188ac659582133fa53e97678511050ff5969baf5d81b4b12b96e1571d9f365c7ffdec43cbcd4a6a4790c0baa98e5691d580e67c425cacaa5

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a8546892.exe

          Filesize

          104KB

          MD5

          55021899e10b25f990508907cfcd3920

          SHA1

          bf0739994461cb013e2b2e51f041b976e43a538d

          SHA256

          0ad0e607ee8d9aa5da8bf89ec8cb751898be59226b6fe4b24e2f681c0171ac1d

          SHA512

          bd1a90a00c46921448cddd2f3c5be17475cc1124eda4e13f9c103a91abd67ee63d55fedfd92cd14f7865557524cc6a600888aebca82b112030bdb07967e9c45e

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a8546892.exe

          Filesize

          104KB

          MD5

          55021899e10b25f990508907cfcd3920

          SHA1

          bf0739994461cb013e2b2e51f041b976e43a538d

          SHA256

          0ad0e607ee8d9aa5da8bf89ec8cb751898be59226b6fe4b24e2f681c0171ac1d

          SHA512

          bd1a90a00c46921448cddd2f3c5be17475cc1124eda4e13f9c103a91abd67ee63d55fedfd92cd14f7865557524cc6a600888aebca82b112030bdb07967e9c45e

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a8546892.exe

          Filesize

          104KB

          MD5

          55021899e10b25f990508907cfcd3920

          SHA1

          bf0739994461cb013e2b2e51f041b976e43a538d

          SHA256

          0ad0e607ee8d9aa5da8bf89ec8cb751898be59226b6fe4b24e2f681c0171ac1d

          SHA512

          bd1a90a00c46921448cddd2f3c5be17475cc1124eda4e13f9c103a91abd67ee63d55fedfd92cd14f7865557524cc6a600888aebca82b112030bdb07967e9c45e

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\b6581097.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • memory/908-103-0x0000000000020000-0x000000000002A000-memory.dmp

          Filesize

          40KB

        • memory/2068-112-0x00000000009E0000-0x00000000009EA000-memory.dmp

          Filesize

          40KB

        • memory/2928-122-0x00000000002C0000-0x00000000002F0000-memory.dmp

          Filesize

          192KB

        • memory/2928-126-0x00000000004D0000-0x00000000004D6000-memory.dmp

          Filesize

          24KB

        • memory/2928-127-0x0000000004790000-0x00000000047D0000-memory.dmp

          Filesize

          256KB

        • memory/2928-128-0x0000000004790000-0x00000000047D0000-memory.dmp

          Filesize

          256KB

        • memory/3048-54-0x0000000000220000-0x00000000002D7000-memory.dmp

          Filesize

          732KB