Analysis

  • max time kernel
    142s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    10/07/2023, 13:22

General

  • Target

    98f2e317722f7b49b4621cc8f.exe

  • Size

    805KB

  • MD5

    98f2e317722f7b49b4621cc8f9a13057

  • SHA1

    f2b9cd1d85849fc6ef5fb1d81c9b4842e0561d4e

  • SHA256

    e6050ee86f6fd1d9e26f5094ab9e2ba52975d875f0e275e1278c44a9789745c0

  • SHA512

    97968627e6572c16c1e07e8d7bfd38a951706773d8794712215339cb8d870e70f201f3b2150e8a1ebd7be608670ffd1ffc1b53349a3ed4bcea06a3f3195a1cb1

  • SSDEEP

    24576:4p047hktBZ9cexH7LabO+EmUk0I3+alhES:4p0qOoexbLXLsthES

Malware Config

Extracted

Family

redline

Botnet

masha

C2

77.91.68.48:19071

Attributes
  • auth_value

    55b9b39a0dae383196a4b8d79e5bb805

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 13 IoCs
  • Windows security modification 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\98f2e317722f7b49b4621cc8f.exe
    "C:\Users\Admin\AppData\Local\Temp\98f2e317722f7b49b4621cc8f.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2996
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2579008.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2579008.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:880
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8788374.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8788374.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:956
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2138146.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2138146.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2888
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a9791824.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a9791824.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2932
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2777186.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2777186.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2212
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c9339751.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c9339751.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2140

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2579008.exe

    Filesize

    529KB

    MD5

    2533997b85671fd4833812d3990ae963

    SHA1

    e42b64b93c7056f47636297e1784f4262bb6f0e9

    SHA256

    3936bea250db891c121eb24c9f93850d0f1ac13c8443d0f7ee4b5a96dd0a4793

    SHA512

    7baab87465f0844d316c34b1ce073649546f146a27c173ff68f2211c7522bac0fcabf9b40dc6dd3321d9e26cacb67a536fba043a6a82aaf343f803902eb813d1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2579008.exe

    Filesize

    529KB

    MD5

    2533997b85671fd4833812d3990ae963

    SHA1

    e42b64b93c7056f47636297e1784f4262bb6f0e9

    SHA256

    3936bea250db891c121eb24c9f93850d0f1ac13c8443d0f7ee4b5a96dd0a4793

    SHA512

    7baab87465f0844d316c34b1ce073649546f146a27c173ff68f2211c7522bac0fcabf9b40dc6dd3321d9e26cacb67a536fba043a6a82aaf343f803902eb813d1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8788374.exe

    Filesize

    405KB

    MD5

    67576fdd6212678b5bad55f770ee0bf8

    SHA1

    3705bbbda843913d48000e8e5a379cd960eaa585

    SHA256

    502b608a338be40a7651144d89f9c5828150f3f66f44b2f402a84c8f1afcead4

    SHA512

    40d3b1318850224f4a9bda9bacfddda735b7c3c8a6ee14db0b201fd9385b94af57b077c0f590856cf33d16638bc8d8f35192dd2d3598bb4e7db9e555564682b6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8788374.exe

    Filesize

    405KB

    MD5

    67576fdd6212678b5bad55f770ee0bf8

    SHA1

    3705bbbda843913d48000e8e5a379cd960eaa585

    SHA256

    502b608a338be40a7651144d89f9c5828150f3f66f44b2f402a84c8f1afcead4

    SHA512

    40d3b1318850224f4a9bda9bacfddda735b7c3c8a6ee14db0b201fd9385b94af57b077c0f590856cf33d16638bc8d8f35192dd2d3598bb4e7db9e555564682b6

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c9339751.exe

    Filesize

    266KB

    MD5

    acee4fe5ee25a4bae585a78a4c88bdd2

    SHA1

    a594d88eb516bbdf8dbc4537d13575b70e2d1d27

    SHA256

    f603766d43c75863cc266dbab1305f574874c3457889676cfd8ab41a576a8ad2

    SHA512

    ab61092cfeac02e0583f8a00e8840d0f6a768401d227e1ae8a54711e0414a3e5c2545b81a55c7862b384fa9790e64671673b848e9edd5235d5404a9910b07453

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c9339751.exe

    Filesize

    266KB

    MD5

    acee4fe5ee25a4bae585a78a4c88bdd2

    SHA1

    a594d88eb516bbdf8dbc4537d13575b70e2d1d27

    SHA256

    f603766d43c75863cc266dbab1305f574874c3457889676cfd8ab41a576a8ad2

    SHA512

    ab61092cfeac02e0583f8a00e8840d0f6a768401d227e1ae8a54711e0414a3e5c2545b81a55c7862b384fa9790e64671673b848e9edd5235d5404a9910b07453

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c9339751.exe

    Filesize

    266KB

    MD5

    acee4fe5ee25a4bae585a78a4c88bdd2

    SHA1

    a594d88eb516bbdf8dbc4537d13575b70e2d1d27

    SHA256

    f603766d43c75863cc266dbab1305f574874c3457889676cfd8ab41a576a8ad2

    SHA512

    ab61092cfeac02e0583f8a00e8840d0f6a768401d227e1ae8a54711e0414a3e5c2545b81a55c7862b384fa9790e64671673b848e9edd5235d5404a9910b07453

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2138146.exe

    Filesize

    201KB

    MD5

    2e83e3f1d16d462931326c7f99780c77

    SHA1

    8789020f71f15964ae7777a92e6d62154c074b56

    SHA256

    74e8a439740e20e6c2e83fee57f35196cd0c0915bc5f3e691d5d261e0f865a14

    SHA512

    c7940a0f5967939c9d89df620c4a5c6d83f502b06de29f6d43e76ba57cb391721ee342903d56153b6a37f4b52ce815ff8aa00c06a3562808d44533d5a80c448b

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2138146.exe

    Filesize

    201KB

    MD5

    2e83e3f1d16d462931326c7f99780c77

    SHA1

    8789020f71f15964ae7777a92e6d62154c074b56

    SHA256

    74e8a439740e20e6c2e83fee57f35196cd0c0915bc5f3e691d5d261e0f865a14

    SHA512

    c7940a0f5967939c9d89df620c4a5c6d83f502b06de29f6d43e76ba57cb391721ee342903d56153b6a37f4b52ce815ff8aa00c06a3562808d44533d5a80c448b

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a9791824.exe

    Filesize

    104KB

    MD5

    c6193799f4f7affa2b4163bcdd29e0ca

    SHA1

    736e1376420bb0bcf430ac0e270509331f53f1ea

    SHA256

    e1311d7145cfb4eee31181f4a6c4a7c79e8cecdc7fcca84b954865aa9007a2cc

    SHA512

    b30457e8ba4f2b82dc22d1a393a12bcf27f44e3fb3edd73e01d071d9f82c11ac6041f6ac5176aaad79e58a311869199152bbcb4d14a3ba8f0048ea7de3997bda

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a9791824.exe

    Filesize

    104KB

    MD5

    c6193799f4f7affa2b4163bcdd29e0ca

    SHA1

    736e1376420bb0bcf430ac0e270509331f53f1ea

    SHA256

    e1311d7145cfb4eee31181f4a6c4a7c79e8cecdc7fcca84b954865aa9007a2cc

    SHA512

    b30457e8ba4f2b82dc22d1a393a12bcf27f44e3fb3edd73e01d071d9f82c11ac6041f6ac5176aaad79e58a311869199152bbcb4d14a3ba8f0048ea7de3997bda

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a9791824.exe

    Filesize

    104KB

    MD5

    c6193799f4f7affa2b4163bcdd29e0ca

    SHA1

    736e1376420bb0bcf430ac0e270509331f53f1ea

    SHA256

    e1311d7145cfb4eee31181f4a6c4a7c79e8cecdc7fcca84b954865aa9007a2cc

    SHA512

    b30457e8ba4f2b82dc22d1a393a12bcf27f44e3fb3edd73e01d071d9f82c11ac6041f6ac5176aaad79e58a311869199152bbcb4d14a3ba8f0048ea7de3997bda

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2777186.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2777186.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v2579008.exe

    Filesize

    529KB

    MD5

    2533997b85671fd4833812d3990ae963

    SHA1

    e42b64b93c7056f47636297e1784f4262bb6f0e9

    SHA256

    3936bea250db891c121eb24c9f93850d0f1ac13c8443d0f7ee4b5a96dd0a4793

    SHA512

    7baab87465f0844d316c34b1ce073649546f146a27c173ff68f2211c7522bac0fcabf9b40dc6dd3321d9e26cacb67a536fba043a6a82aaf343f803902eb813d1

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v2579008.exe

    Filesize

    529KB

    MD5

    2533997b85671fd4833812d3990ae963

    SHA1

    e42b64b93c7056f47636297e1784f4262bb6f0e9

    SHA256

    3936bea250db891c121eb24c9f93850d0f1ac13c8443d0f7ee4b5a96dd0a4793

    SHA512

    7baab87465f0844d316c34b1ce073649546f146a27c173ff68f2211c7522bac0fcabf9b40dc6dd3321d9e26cacb67a536fba043a6a82aaf343f803902eb813d1

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v8788374.exe

    Filesize

    405KB

    MD5

    67576fdd6212678b5bad55f770ee0bf8

    SHA1

    3705bbbda843913d48000e8e5a379cd960eaa585

    SHA256

    502b608a338be40a7651144d89f9c5828150f3f66f44b2f402a84c8f1afcead4

    SHA512

    40d3b1318850224f4a9bda9bacfddda735b7c3c8a6ee14db0b201fd9385b94af57b077c0f590856cf33d16638bc8d8f35192dd2d3598bb4e7db9e555564682b6

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v8788374.exe

    Filesize

    405KB

    MD5

    67576fdd6212678b5bad55f770ee0bf8

    SHA1

    3705bbbda843913d48000e8e5a379cd960eaa585

    SHA256

    502b608a338be40a7651144d89f9c5828150f3f66f44b2f402a84c8f1afcead4

    SHA512

    40d3b1318850224f4a9bda9bacfddda735b7c3c8a6ee14db0b201fd9385b94af57b077c0f590856cf33d16638bc8d8f35192dd2d3598bb4e7db9e555564682b6

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\c9339751.exe

    Filesize

    266KB

    MD5

    acee4fe5ee25a4bae585a78a4c88bdd2

    SHA1

    a594d88eb516bbdf8dbc4537d13575b70e2d1d27

    SHA256

    f603766d43c75863cc266dbab1305f574874c3457889676cfd8ab41a576a8ad2

    SHA512

    ab61092cfeac02e0583f8a00e8840d0f6a768401d227e1ae8a54711e0414a3e5c2545b81a55c7862b384fa9790e64671673b848e9edd5235d5404a9910b07453

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\c9339751.exe

    Filesize

    266KB

    MD5

    acee4fe5ee25a4bae585a78a4c88bdd2

    SHA1

    a594d88eb516bbdf8dbc4537d13575b70e2d1d27

    SHA256

    f603766d43c75863cc266dbab1305f574874c3457889676cfd8ab41a576a8ad2

    SHA512

    ab61092cfeac02e0583f8a00e8840d0f6a768401d227e1ae8a54711e0414a3e5c2545b81a55c7862b384fa9790e64671673b848e9edd5235d5404a9910b07453

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\c9339751.exe

    Filesize

    266KB

    MD5

    acee4fe5ee25a4bae585a78a4c88bdd2

    SHA1

    a594d88eb516bbdf8dbc4537d13575b70e2d1d27

    SHA256

    f603766d43c75863cc266dbab1305f574874c3457889676cfd8ab41a576a8ad2

    SHA512

    ab61092cfeac02e0583f8a00e8840d0f6a768401d227e1ae8a54711e0414a3e5c2545b81a55c7862b384fa9790e64671673b848e9edd5235d5404a9910b07453

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v2138146.exe

    Filesize

    201KB

    MD5

    2e83e3f1d16d462931326c7f99780c77

    SHA1

    8789020f71f15964ae7777a92e6d62154c074b56

    SHA256

    74e8a439740e20e6c2e83fee57f35196cd0c0915bc5f3e691d5d261e0f865a14

    SHA512

    c7940a0f5967939c9d89df620c4a5c6d83f502b06de29f6d43e76ba57cb391721ee342903d56153b6a37f4b52ce815ff8aa00c06a3562808d44533d5a80c448b

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v2138146.exe

    Filesize

    201KB

    MD5

    2e83e3f1d16d462931326c7f99780c77

    SHA1

    8789020f71f15964ae7777a92e6d62154c074b56

    SHA256

    74e8a439740e20e6c2e83fee57f35196cd0c0915bc5f3e691d5d261e0f865a14

    SHA512

    c7940a0f5967939c9d89df620c4a5c6d83f502b06de29f6d43e76ba57cb391721ee342903d56153b6a37f4b52ce815ff8aa00c06a3562808d44533d5a80c448b

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a9791824.exe

    Filesize

    104KB

    MD5

    c6193799f4f7affa2b4163bcdd29e0ca

    SHA1

    736e1376420bb0bcf430ac0e270509331f53f1ea

    SHA256

    e1311d7145cfb4eee31181f4a6c4a7c79e8cecdc7fcca84b954865aa9007a2cc

    SHA512

    b30457e8ba4f2b82dc22d1a393a12bcf27f44e3fb3edd73e01d071d9f82c11ac6041f6ac5176aaad79e58a311869199152bbcb4d14a3ba8f0048ea7de3997bda

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a9791824.exe

    Filesize

    104KB

    MD5

    c6193799f4f7affa2b4163bcdd29e0ca

    SHA1

    736e1376420bb0bcf430ac0e270509331f53f1ea

    SHA256

    e1311d7145cfb4eee31181f4a6c4a7c79e8cecdc7fcca84b954865aa9007a2cc

    SHA512

    b30457e8ba4f2b82dc22d1a393a12bcf27f44e3fb3edd73e01d071d9f82c11ac6041f6ac5176aaad79e58a311869199152bbcb4d14a3ba8f0048ea7de3997bda

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a9791824.exe

    Filesize

    104KB

    MD5

    c6193799f4f7affa2b4163bcdd29e0ca

    SHA1

    736e1376420bb0bcf430ac0e270509331f53f1ea

    SHA256

    e1311d7145cfb4eee31181f4a6c4a7c79e8cecdc7fcca84b954865aa9007a2cc

    SHA512

    b30457e8ba4f2b82dc22d1a393a12bcf27f44e3fb3edd73e01d071d9f82c11ac6041f6ac5176aaad79e58a311869199152bbcb4d14a3ba8f0048ea7de3997bda

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\b2777186.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • memory/2140-122-0x00000000003D0000-0x0000000000400000-memory.dmp

    Filesize

    192KB

  • memory/2140-126-0x0000000000820000-0x0000000000826000-memory.dmp

    Filesize

    24KB

  • memory/2140-127-0x0000000000D60000-0x0000000000DA0000-memory.dmp

    Filesize

    256KB

  • memory/2140-128-0x0000000000D60000-0x0000000000DA0000-memory.dmp

    Filesize

    256KB

  • memory/2212-112-0x0000000000890000-0x000000000089A000-memory.dmp

    Filesize

    40KB

  • memory/2932-103-0x0000000000020000-0x000000000002A000-memory.dmp

    Filesize

    40KB

  • memory/2996-54-0x0000000000220000-0x00000000002D7000-memory.dmp

    Filesize

    732KB