Analysis

  • max time kernel
    130s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    14/07/2023, 19:24

General

  • Target

    file.exe

  • Size

    1.0MB

  • MD5

    7204a6231fc24c37d0d6147661cc2922

  • SHA1

    b0e0ae0512c2f6bb76ef1583e13eb2d3c610cf99

  • SHA256

    99a169fb1e9f2396ff8ff2c55b1910c8e0439ab5dada0fe2f1b15189010c3b09

  • SHA512

    81f035937fd0f89a269ce3841605b55f67166f38df064121f193586c92b861986fdf40777764b0a9c21c9449b5b32d9b4ef37f9073d23eda35bfd4c1200709f4

  • SSDEEP

    24576:zyA/hDAcqoKMheuQgIkqfNOlSaJiHNeUucyOnmOWsC/rg:GuhsXMefc5KNeh7GC/r

Malware Config

Extracted

Family

redline

Botnet

masha

C2

77.91.68.48:19071

Attributes
  • auth_value

    55b9b39a0dae383196a4b8d79e5bb805

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 13 IoCs
  • Windows security modification 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2536
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5883774.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5883774.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2480
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3124113.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3124113.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1464
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c1532811.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c1532811.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1400
  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1488288.exe
    C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1488288.exe
    1⤵
    • Modifies Windows Defender Real-time Protection settings
    • Executes dropped EXE
    • Loads dropped DLL
    • Windows security modification
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2976
  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6044357.exe
    C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6044357.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3000
    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b9342036.exe
      C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b9342036.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2704

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5883774.exe

    Filesize

    906KB

    MD5

    19483b3b8c7e87bd56a3d4418e4d4f8c

    SHA1

    09a5ac8f747868eb94a3c1ce0836861e98a606b5

    SHA256

    66e28a3d7d11427a70a4253ad9eea4df651117fcc6e91c8103816cef51429095

    SHA512

    a316b15bccd0df8af62507b158e78931257f1a089047ba190d2817e3bbd5a7c4361ec4aa0bf8e187223a34226b865a75de0201246077074b663f9449a2fdab98

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5883774.exe

    Filesize

    906KB

    MD5

    19483b3b8c7e87bd56a3d4418e4d4f8c

    SHA1

    09a5ac8f747868eb94a3c1ce0836861e98a606b5

    SHA256

    66e28a3d7d11427a70a4253ad9eea4df651117fcc6e91c8103816cef51429095

    SHA512

    a316b15bccd0df8af62507b158e78931257f1a089047ba190d2817e3bbd5a7c4361ec4aa0bf8e187223a34226b865a75de0201246077074b663f9449a2fdab98

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3124113.exe

    Filesize

    723KB

    MD5

    2efd54e8627850ef86988d8df7ff5eac

    SHA1

    cc996cd6bd0bce74e462516d21df5c49437bb5a3

    SHA256

    cc61805ba6a55c743c0bf9d5d50e7e9a81bc890049d2fc4efad2240478190742

    SHA512

    7496ceb4a2b8ea23031d0c1d16e7078c60526a1919706f8446e67b74ffac61db5a62ef64da8ba3306d12a7a8f2e8229a11c3d74572662f2d89e23946db6f79a1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3124113.exe

    Filesize

    723KB

    MD5

    2efd54e8627850ef86988d8df7ff5eac

    SHA1

    cc996cd6bd0bce74e462516d21df5c49437bb5a3

    SHA256

    cc61805ba6a55c743c0bf9d5d50e7e9a81bc890049d2fc4efad2240478190742

    SHA512

    7496ceb4a2b8ea23031d0c1d16e7078c60526a1919706f8446e67b74ffac61db5a62ef64da8ba3306d12a7a8f2e8229a11c3d74572662f2d89e23946db6f79a1

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c1532811.exe

    Filesize

    492KB

    MD5

    099315af32c71c3507e741de62478d3f

    SHA1

    fcb50c082a08bc63bee720e63654eb774008d159

    SHA256

    e31607724e8e83747637d45c93534f8e1c78f849f75eb5aa9d92e04fba84621a

    SHA512

    70aedbf67398daf7ecfb4c1a0193c5228250b6e5825487a3159888c28a486cd66256b1ba670dc029aeebc725fa29fc33a2200ca5bdfa97161c769767f6a37706

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c1532811.exe

    Filesize

    492KB

    MD5

    099315af32c71c3507e741de62478d3f

    SHA1

    fcb50c082a08bc63bee720e63654eb774008d159

    SHA256

    e31607724e8e83747637d45c93534f8e1c78f849f75eb5aa9d92e04fba84621a

    SHA512

    70aedbf67398daf7ecfb4c1a0193c5228250b6e5825487a3159888c28a486cd66256b1ba670dc029aeebc725fa29fc33a2200ca5bdfa97161c769767f6a37706

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c1532811.exe

    Filesize

    492KB

    MD5

    099315af32c71c3507e741de62478d3f

    SHA1

    fcb50c082a08bc63bee720e63654eb774008d159

    SHA256

    e31607724e8e83747637d45c93534f8e1c78f849f75eb5aa9d92e04fba84621a

    SHA512

    70aedbf67398daf7ecfb4c1a0193c5228250b6e5825487a3159888c28a486cd66256b1ba670dc029aeebc725fa29fc33a2200ca5bdfa97161c769767f6a37706

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6044357.exe

    Filesize

    325KB

    MD5

    4bb9654fc03a7578a3745075f9790ef7

    SHA1

    3ef4ccdf68923e0945da1e02b96f2b4e0eb050ea

    SHA256

    0921d3ea42f38e918882353aa946a4fa5bf569dab5bfcb7ec87c11d313115e84

    SHA512

    4e2c333fcf6fb161db3e4274979a40b748d8c7691b9db49d148d08ab5d44d187af814642992815de37ee45abf8fe913946d1bf354e49f6c190d843b2fe9b9345

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6044357.exe

    Filesize

    325KB

    MD5

    4bb9654fc03a7578a3745075f9790ef7

    SHA1

    3ef4ccdf68923e0945da1e02b96f2b4e0eb050ea

    SHA256

    0921d3ea42f38e918882353aa946a4fa5bf569dab5bfcb7ec87c11d313115e84

    SHA512

    4e2c333fcf6fb161db3e4274979a40b748d8c7691b9db49d148d08ab5d44d187af814642992815de37ee45abf8fe913946d1bf354e49f6c190d843b2fe9b9345

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1488288.exe

    Filesize

    295KB

    MD5

    c43d5e5261f12ab2bbb4b561823d1e66

    SHA1

    b9eeaa4c1d90c00dc1fd977c9dd3d7a6020a8c23

    SHA256

    643d81e90c17d504c40da66ad083bb4d0b3908b26229fd9e11147c9faab26bea

    SHA512

    ac6b3f2eb7e3b1ddce8499f0c1b8cf711241b78455c9a44027636f496561b57285d0aa5637d46c4b3d5d3bedb1743a52fa119f0fc8fea27641fa9bca1cd5a055

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1488288.exe

    Filesize

    295KB

    MD5

    c43d5e5261f12ab2bbb4b561823d1e66

    SHA1

    b9eeaa4c1d90c00dc1fd977c9dd3d7a6020a8c23

    SHA256

    643d81e90c17d504c40da66ad083bb4d0b3908b26229fd9e11147c9faab26bea

    SHA512

    ac6b3f2eb7e3b1ddce8499f0c1b8cf711241b78455c9a44027636f496561b57285d0aa5637d46c4b3d5d3bedb1743a52fa119f0fc8fea27641fa9bca1cd5a055

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1488288.exe

    Filesize

    295KB

    MD5

    c43d5e5261f12ab2bbb4b561823d1e66

    SHA1

    b9eeaa4c1d90c00dc1fd977c9dd3d7a6020a8c23

    SHA256

    643d81e90c17d504c40da66ad083bb4d0b3908b26229fd9e11147c9faab26bea

    SHA512

    ac6b3f2eb7e3b1ddce8499f0c1b8cf711241b78455c9a44027636f496561b57285d0aa5637d46c4b3d5d3bedb1743a52fa119f0fc8fea27641fa9bca1cd5a055

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b9342036.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b9342036.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v5883774.exe

    Filesize

    906KB

    MD5

    19483b3b8c7e87bd56a3d4418e4d4f8c

    SHA1

    09a5ac8f747868eb94a3c1ce0836861e98a606b5

    SHA256

    66e28a3d7d11427a70a4253ad9eea4df651117fcc6e91c8103816cef51429095

    SHA512

    a316b15bccd0df8af62507b158e78931257f1a089047ba190d2817e3bbd5a7c4361ec4aa0bf8e187223a34226b865a75de0201246077074b663f9449a2fdab98

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v5883774.exe

    Filesize

    906KB

    MD5

    19483b3b8c7e87bd56a3d4418e4d4f8c

    SHA1

    09a5ac8f747868eb94a3c1ce0836861e98a606b5

    SHA256

    66e28a3d7d11427a70a4253ad9eea4df651117fcc6e91c8103816cef51429095

    SHA512

    a316b15bccd0df8af62507b158e78931257f1a089047ba190d2817e3bbd5a7c4361ec4aa0bf8e187223a34226b865a75de0201246077074b663f9449a2fdab98

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v3124113.exe

    Filesize

    723KB

    MD5

    2efd54e8627850ef86988d8df7ff5eac

    SHA1

    cc996cd6bd0bce74e462516d21df5c49437bb5a3

    SHA256

    cc61805ba6a55c743c0bf9d5d50e7e9a81bc890049d2fc4efad2240478190742

    SHA512

    7496ceb4a2b8ea23031d0c1d16e7078c60526a1919706f8446e67b74ffac61db5a62ef64da8ba3306d12a7a8f2e8229a11c3d74572662f2d89e23946db6f79a1

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v3124113.exe

    Filesize

    723KB

    MD5

    2efd54e8627850ef86988d8df7ff5eac

    SHA1

    cc996cd6bd0bce74e462516d21df5c49437bb5a3

    SHA256

    cc61805ba6a55c743c0bf9d5d50e7e9a81bc890049d2fc4efad2240478190742

    SHA512

    7496ceb4a2b8ea23031d0c1d16e7078c60526a1919706f8446e67b74ffac61db5a62ef64da8ba3306d12a7a8f2e8229a11c3d74572662f2d89e23946db6f79a1

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\c1532811.exe

    Filesize

    492KB

    MD5

    099315af32c71c3507e741de62478d3f

    SHA1

    fcb50c082a08bc63bee720e63654eb774008d159

    SHA256

    e31607724e8e83747637d45c93534f8e1c78f849f75eb5aa9d92e04fba84621a

    SHA512

    70aedbf67398daf7ecfb4c1a0193c5228250b6e5825487a3159888c28a486cd66256b1ba670dc029aeebc725fa29fc33a2200ca5bdfa97161c769767f6a37706

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\c1532811.exe

    Filesize

    492KB

    MD5

    099315af32c71c3507e741de62478d3f

    SHA1

    fcb50c082a08bc63bee720e63654eb774008d159

    SHA256

    e31607724e8e83747637d45c93534f8e1c78f849f75eb5aa9d92e04fba84621a

    SHA512

    70aedbf67398daf7ecfb4c1a0193c5228250b6e5825487a3159888c28a486cd66256b1ba670dc029aeebc725fa29fc33a2200ca5bdfa97161c769767f6a37706

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\c1532811.exe

    Filesize

    492KB

    MD5

    099315af32c71c3507e741de62478d3f

    SHA1

    fcb50c082a08bc63bee720e63654eb774008d159

    SHA256

    e31607724e8e83747637d45c93534f8e1c78f849f75eb5aa9d92e04fba84621a

    SHA512

    70aedbf67398daf7ecfb4c1a0193c5228250b6e5825487a3159888c28a486cd66256b1ba670dc029aeebc725fa29fc33a2200ca5bdfa97161c769767f6a37706

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v6044357.exe

    Filesize

    325KB

    MD5

    4bb9654fc03a7578a3745075f9790ef7

    SHA1

    3ef4ccdf68923e0945da1e02b96f2b4e0eb050ea

    SHA256

    0921d3ea42f38e918882353aa946a4fa5bf569dab5bfcb7ec87c11d313115e84

    SHA512

    4e2c333fcf6fb161db3e4274979a40b748d8c7691b9db49d148d08ab5d44d187af814642992815de37ee45abf8fe913946d1bf354e49f6c190d843b2fe9b9345

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v6044357.exe

    Filesize

    325KB

    MD5

    4bb9654fc03a7578a3745075f9790ef7

    SHA1

    3ef4ccdf68923e0945da1e02b96f2b4e0eb050ea

    SHA256

    0921d3ea42f38e918882353aa946a4fa5bf569dab5bfcb7ec87c11d313115e84

    SHA512

    4e2c333fcf6fb161db3e4274979a40b748d8c7691b9db49d148d08ab5d44d187af814642992815de37ee45abf8fe913946d1bf354e49f6c190d843b2fe9b9345

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a1488288.exe

    Filesize

    295KB

    MD5

    c43d5e5261f12ab2bbb4b561823d1e66

    SHA1

    b9eeaa4c1d90c00dc1fd977c9dd3d7a6020a8c23

    SHA256

    643d81e90c17d504c40da66ad083bb4d0b3908b26229fd9e11147c9faab26bea

    SHA512

    ac6b3f2eb7e3b1ddce8499f0c1b8cf711241b78455c9a44027636f496561b57285d0aa5637d46c4b3d5d3bedb1743a52fa119f0fc8fea27641fa9bca1cd5a055

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a1488288.exe

    Filesize

    295KB

    MD5

    c43d5e5261f12ab2bbb4b561823d1e66

    SHA1

    b9eeaa4c1d90c00dc1fd977c9dd3d7a6020a8c23

    SHA256

    643d81e90c17d504c40da66ad083bb4d0b3908b26229fd9e11147c9faab26bea

    SHA512

    ac6b3f2eb7e3b1ddce8499f0c1b8cf711241b78455c9a44027636f496561b57285d0aa5637d46c4b3d5d3bedb1743a52fa119f0fc8fea27641fa9bca1cd5a055

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a1488288.exe

    Filesize

    295KB

    MD5

    c43d5e5261f12ab2bbb4b561823d1e66

    SHA1

    b9eeaa4c1d90c00dc1fd977c9dd3d7a6020a8c23

    SHA256

    643d81e90c17d504c40da66ad083bb4d0b3908b26229fd9e11147c9faab26bea

    SHA512

    ac6b3f2eb7e3b1ddce8499f0c1b8cf711241b78455c9a44027636f496561b57285d0aa5637d46c4b3d5d3bedb1743a52fa119f0fc8fea27641fa9bca1cd5a055

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\b9342036.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • memory/1400-124-0x0000000000480000-0x000000000050C000-memory.dmp

    Filesize

    560KB

  • memory/1400-125-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1400-131-0x0000000000480000-0x000000000050C000-memory.dmp

    Filesize

    560KB

  • memory/1400-133-0x0000000002100000-0x0000000002106000-memory.dmp

    Filesize

    24KB

  • memory/1400-134-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2704-116-0x000007FEF5CB0000-0x000007FEF669C000-memory.dmp

    Filesize

    9.9MB

  • memory/2704-113-0x000007FEF5CB0000-0x000007FEF669C000-memory.dmp

    Filesize

    9.9MB

  • memory/2704-112-0x0000000000BB0000-0x0000000000BBA000-memory.dmp

    Filesize

    40KB

  • memory/2976-106-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2976-105-0x0000000000C00000-0x0000000000C01000-memory.dmp

    Filesize

    4KB

  • memory/2976-104-0x00000000005E0000-0x000000000061E000-memory.dmp

    Filesize

    248KB

  • memory/2976-97-0x00000000005E0000-0x000000000061E000-memory.dmp

    Filesize

    248KB

  • memory/2976-98-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB