Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20230705-en
  • resource tags

    arch:x64arch:x86image:win7-20230705-enlocale:en-usos:windows7-x64system
  • submitted
    11/07/2023, 17:16

General

  • Target

    fedb0713cdb73c4fa6a0e8f0b.exe

  • Size

    790KB

  • MD5

    fedb0713cdb73c4fa6a0e8f0bf122663

  • SHA1

    e1ed0bfc5b13fe7ca04e017b57efd2a38a81c6b0

  • SHA256

    9854574d6eab5cfb0285efd15734d6c166a3527aa50f801b75726a017993f450

  • SHA512

    9dcecefe5b5333a1be29561254536bbae2b35e6817f5426917fb58847a781d0254eeffbd7de6bbf2e85790d76d7cdd91875758993aac91a7e277df8766e58bfa

  • SSDEEP

    12288:M6Qufv3aRdnQgxh7dVOlU6OA9kJy3xv1fN6wqrAsUYx5obLnEYmtYfm9:M6Q0v382gvd+BOA9Xh36SAx5oEY+ug

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.68.70:19073

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 13 IoCs
  • Windows security modification 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fedb0713cdb73c4fa6a0e8f0b.exe
    "C:\Users\Admin\AppData\Local\Temp\fedb0713cdb73c4fa6a0e8f0b.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2968
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3728833.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3728833.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2260
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6656511.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6656511.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3024
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4781558.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4781558.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2884
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a7013074.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a7013074.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2724
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2873270.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2873270.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2792
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c9983586.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c9983586.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1716

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3728833.exe

          Filesize

          522KB

          MD5

          deb29d75b6784b14fe34e88e31e64ff9

          SHA1

          e804e82ea78e0caab1326357ce6ca7b6795725a0

          SHA256

          dc0dd937d42986d4cbbbd7bea4fbf0a4bec95b50ef632fdc3002aa114b50712a

          SHA512

          0abab06d744d9d48bdf572859eac9520900530b2dd3c72cb4b830b1c987e5c4d41bfc6476c6104c23d989ff30a545579564b24d4e43749abc7eebbaac0cc9ec3

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3728833.exe

          Filesize

          522KB

          MD5

          deb29d75b6784b14fe34e88e31e64ff9

          SHA1

          e804e82ea78e0caab1326357ce6ca7b6795725a0

          SHA256

          dc0dd937d42986d4cbbbd7bea4fbf0a4bec95b50ef632fdc3002aa114b50712a

          SHA512

          0abab06d744d9d48bdf572859eac9520900530b2dd3c72cb4b830b1c987e5c4d41bfc6476c6104c23d989ff30a545579564b24d4e43749abc7eebbaac0cc9ec3

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6656511.exe

          Filesize

          397KB

          MD5

          c965b5e640186da847ba22c5e9b61119

          SHA1

          f1427b3a98dc24b38a4c6875db472eb4f8d337ea

          SHA256

          25051923c777f60d1748c9bb022f66482afaf1b6295c3b7e55dcd2bc04122371

          SHA512

          22020014709cbe8b5815543cc0c18c35cfa8d16aab8258ea9eb90e294f3f85160f94ab14fa2f9f3d39381ce53d437fd278162fcaad0589900ccd49c965239a44

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6656511.exe

          Filesize

          397KB

          MD5

          c965b5e640186da847ba22c5e9b61119

          SHA1

          f1427b3a98dc24b38a4c6875db472eb4f8d337ea

          SHA256

          25051923c777f60d1748c9bb022f66482afaf1b6295c3b7e55dcd2bc04122371

          SHA512

          22020014709cbe8b5815543cc0c18c35cfa8d16aab8258ea9eb90e294f3f85160f94ab14fa2f9f3d39381ce53d437fd278162fcaad0589900ccd49c965239a44

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c9983586.exe

          Filesize

          258KB

          MD5

          9b8369cbded1ae371b53e7751e987694

          SHA1

          3ac257f46853811ba010e86f7465fd28872ad0c0

          SHA256

          a3e2eb36ea80cdd81135c458178015f8e4367f984c39c88361c6f72317ec977a

          SHA512

          a5a6d248869862152f227bf815341a8f51363b5295cb0370d29605397fe971e7d7697b0ae90dc4969112cec163f587e5346fa386904b9cf2a3a4077b065705aa

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c9983586.exe

          Filesize

          258KB

          MD5

          9b8369cbded1ae371b53e7751e987694

          SHA1

          3ac257f46853811ba010e86f7465fd28872ad0c0

          SHA256

          a3e2eb36ea80cdd81135c458178015f8e4367f984c39c88361c6f72317ec977a

          SHA512

          a5a6d248869862152f227bf815341a8f51363b5295cb0370d29605397fe971e7d7697b0ae90dc4969112cec163f587e5346fa386904b9cf2a3a4077b065705aa

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c9983586.exe

          Filesize

          258KB

          MD5

          9b8369cbded1ae371b53e7751e987694

          SHA1

          3ac257f46853811ba010e86f7465fd28872ad0c0

          SHA256

          a3e2eb36ea80cdd81135c458178015f8e4367f984c39c88361c6f72317ec977a

          SHA512

          a5a6d248869862152f227bf815341a8f51363b5295cb0370d29605397fe971e7d7697b0ae90dc4969112cec163f587e5346fa386904b9cf2a3a4077b065705aa

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4781558.exe

          Filesize

          197KB

          MD5

          5a7533b8fcb5452d340166057b9f1d32

          SHA1

          7bec5aa2605d6e089235084bb4020531e03bce3f

          SHA256

          794c776bdc2305d1ace032235171fa3a1866821eea3305a19ba277be3709e380

          SHA512

          09209a1180a2da3c20058291639e4e4ed70c325bb25ab6efa24f1b06c69d308ccf6b2f5cdc8253ded28109b5572fe4799647fb0b3f2583f6fdfd97362031373d

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4781558.exe

          Filesize

          197KB

          MD5

          5a7533b8fcb5452d340166057b9f1d32

          SHA1

          7bec5aa2605d6e089235084bb4020531e03bce3f

          SHA256

          794c776bdc2305d1ace032235171fa3a1866821eea3305a19ba277be3709e380

          SHA512

          09209a1180a2da3c20058291639e4e4ed70c325bb25ab6efa24f1b06c69d308ccf6b2f5cdc8253ded28109b5572fe4799647fb0b3f2583f6fdfd97362031373d

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a7013074.exe

          Filesize

          96KB

          MD5

          39e5228a3e0d3ce786ca973bd4760151

          SHA1

          12113f18012844dc945fa53fb328ca0fd2de11a5

          SHA256

          56586d445723b2bb5b925a933aaf2d26bfbba6c1fb558aa03226828086a7ce1f

          SHA512

          778b93fe186dc274eb4859974e57fdd7ea6cf4e9a84affd27c85da314d81af9cd2d73a7ced831a4aed3e995ee6738aa0e683b00463a0c707c79ae969b0443a99

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a7013074.exe

          Filesize

          96KB

          MD5

          39e5228a3e0d3ce786ca973bd4760151

          SHA1

          12113f18012844dc945fa53fb328ca0fd2de11a5

          SHA256

          56586d445723b2bb5b925a933aaf2d26bfbba6c1fb558aa03226828086a7ce1f

          SHA512

          778b93fe186dc274eb4859974e57fdd7ea6cf4e9a84affd27c85da314d81af9cd2d73a7ced831a4aed3e995ee6738aa0e683b00463a0c707c79ae969b0443a99

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a7013074.exe

          Filesize

          96KB

          MD5

          39e5228a3e0d3ce786ca973bd4760151

          SHA1

          12113f18012844dc945fa53fb328ca0fd2de11a5

          SHA256

          56586d445723b2bb5b925a933aaf2d26bfbba6c1fb558aa03226828086a7ce1f

          SHA512

          778b93fe186dc274eb4859974e57fdd7ea6cf4e9a84affd27c85da314d81af9cd2d73a7ced831a4aed3e995ee6738aa0e683b00463a0c707c79ae969b0443a99

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2873270.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2873270.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v3728833.exe

          Filesize

          522KB

          MD5

          deb29d75b6784b14fe34e88e31e64ff9

          SHA1

          e804e82ea78e0caab1326357ce6ca7b6795725a0

          SHA256

          dc0dd937d42986d4cbbbd7bea4fbf0a4bec95b50ef632fdc3002aa114b50712a

          SHA512

          0abab06d744d9d48bdf572859eac9520900530b2dd3c72cb4b830b1c987e5c4d41bfc6476c6104c23d989ff30a545579564b24d4e43749abc7eebbaac0cc9ec3

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v3728833.exe

          Filesize

          522KB

          MD5

          deb29d75b6784b14fe34e88e31e64ff9

          SHA1

          e804e82ea78e0caab1326357ce6ca7b6795725a0

          SHA256

          dc0dd937d42986d4cbbbd7bea4fbf0a4bec95b50ef632fdc3002aa114b50712a

          SHA512

          0abab06d744d9d48bdf572859eac9520900530b2dd3c72cb4b830b1c987e5c4d41bfc6476c6104c23d989ff30a545579564b24d4e43749abc7eebbaac0cc9ec3

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v6656511.exe

          Filesize

          397KB

          MD5

          c965b5e640186da847ba22c5e9b61119

          SHA1

          f1427b3a98dc24b38a4c6875db472eb4f8d337ea

          SHA256

          25051923c777f60d1748c9bb022f66482afaf1b6295c3b7e55dcd2bc04122371

          SHA512

          22020014709cbe8b5815543cc0c18c35cfa8d16aab8258ea9eb90e294f3f85160f94ab14fa2f9f3d39381ce53d437fd278162fcaad0589900ccd49c965239a44

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v6656511.exe

          Filesize

          397KB

          MD5

          c965b5e640186da847ba22c5e9b61119

          SHA1

          f1427b3a98dc24b38a4c6875db472eb4f8d337ea

          SHA256

          25051923c777f60d1748c9bb022f66482afaf1b6295c3b7e55dcd2bc04122371

          SHA512

          22020014709cbe8b5815543cc0c18c35cfa8d16aab8258ea9eb90e294f3f85160f94ab14fa2f9f3d39381ce53d437fd278162fcaad0589900ccd49c965239a44

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\c9983586.exe

          Filesize

          258KB

          MD5

          9b8369cbded1ae371b53e7751e987694

          SHA1

          3ac257f46853811ba010e86f7465fd28872ad0c0

          SHA256

          a3e2eb36ea80cdd81135c458178015f8e4367f984c39c88361c6f72317ec977a

          SHA512

          a5a6d248869862152f227bf815341a8f51363b5295cb0370d29605397fe971e7d7697b0ae90dc4969112cec163f587e5346fa386904b9cf2a3a4077b065705aa

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\c9983586.exe

          Filesize

          258KB

          MD5

          9b8369cbded1ae371b53e7751e987694

          SHA1

          3ac257f46853811ba010e86f7465fd28872ad0c0

          SHA256

          a3e2eb36ea80cdd81135c458178015f8e4367f984c39c88361c6f72317ec977a

          SHA512

          a5a6d248869862152f227bf815341a8f51363b5295cb0370d29605397fe971e7d7697b0ae90dc4969112cec163f587e5346fa386904b9cf2a3a4077b065705aa

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\c9983586.exe

          Filesize

          258KB

          MD5

          9b8369cbded1ae371b53e7751e987694

          SHA1

          3ac257f46853811ba010e86f7465fd28872ad0c0

          SHA256

          a3e2eb36ea80cdd81135c458178015f8e4367f984c39c88361c6f72317ec977a

          SHA512

          a5a6d248869862152f227bf815341a8f51363b5295cb0370d29605397fe971e7d7697b0ae90dc4969112cec163f587e5346fa386904b9cf2a3a4077b065705aa

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v4781558.exe

          Filesize

          197KB

          MD5

          5a7533b8fcb5452d340166057b9f1d32

          SHA1

          7bec5aa2605d6e089235084bb4020531e03bce3f

          SHA256

          794c776bdc2305d1ace032235171fa3a1866821eea3305a19ba277be3709e380

          SHA512

          09209a1180a2da3c20058291639e4e4ed70c325bb25ab6efa24f1b06c69d308ccf6b2f5cdc8253ded28109b5572fe4799647fb0b3f2583f6fdfd97362031373d

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v4781558.exe

          Filesize

          197KB

          MD5

          5a7533b8fcb5452d340166057b9f1d32

          SHA1

          7bec5aa2605d6e089235084bb4020531e03bce3f

          SHA256

          794c776bdc2305d1ace032235171fa3a1866821eea3305a19ba277be3709e380

          SHA512

          09209a1180a2da3c20058291639e4e4ed70c325bb25ab6efa24f1b06c69d308ccf6b2f5cdc8253ded28109b5572fe4799647fb0b3f2583f6fdfd97362031373d

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a7013074.exe

          Filesize

          96KB

          MD5

          39e5228a3e0d3ce786ca973bd4760151

          SHA1

          12113f18012844dc945fa53fb328ca0fd2de11a5

          SHA256

          56586d445723b2bb5b925a933aaf2d26bfbba6c1fb558aa03226828086a7ce1f

          SHA512

          778b93fe186dc274eb4859974e57fdd7ea6cf4e9a84affd27c85da314d81af9cd2d73a7ced831a4aed3e995ee6738aa0e683b00463a0c707c79ae969b0443a99

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a7013074.exe

          Filesize

          96KB

          MD5

          39e5228a3e0d3ce786ca973bd4760151

          SHA1

          12113f18012844dc945fa53fb328ca0fd2de11a5

          SHA256

          56586d445723b2bb5b925a933aaf2d26bfbba6c1fb558aa03226828086a7ce1f

          SHA512

          778b93fe186dc274eb4859974e57fdd7ea6cf4e9a84affd27c85da314d81af9cd2d73a7ced831a4aed3e995ee6738aa0e683b00463a0c707c79ae969b0443a99

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a7013074.exe

          Filesize

          96KB

          MD5

          39e5228a3e0d3ce786ca973bd4760151

          SHA1

          12113f18012844dc945fa53fb328ca0fd2de11a5

          SHA256

          56586d445723b2bb5b925a933aaf2d26bfbba6c1fb558aa03226828086a7ce1f

          SHA512

          778b93fe186dc274eb4859974e57fdd7ea6cf4e9a84affd27c85da314d81af9cd2d73a7ced831a4aed3e995ee6738aa0e683b00463a0c707c79ae969b0443a99

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\b2873270.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • memory/1716-122-0x00000000002B0000-0x00000000002E0000-memory.dmp

          Filesize

          192KB

        • memory/1716-126-0x00000000005F0000-0x00000000005F6000-memory.dmp

          Filesize

          24KB

        • memory/1716-127-0x0000000004C60000-0x0000000004CA0000-memory.dmp

          Filesize

          256KB

        • memory/1716-128-0x0000000004C60000-0x0000000004CA0000-memory.dmp

          Filesize

          256KB

        • memory/2724-103-0x0000000000020000-0x000000000002A000-memory.dmp

          Filesize

          40KB

        • memory/2792-112-0x0000000000C00000-0x0000000000C0A000-memory.dmp

          Filesize

          40KB

        • memory/2968-54-0x0000000000260000-0x0000000000315000-memory.dmp

          Filesize

          724KB