Analysis

  • max time kernel
    276s
  • max time network
    288s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    15/08/2023, 04:17

General

  • Target

    45fb68022179c2c5d61be8146e2aaac99a1a31a68568fdd15b38b6b97df5d167.exe

  • Size

    505KB

  • MD5

    27b369e601f49befe18d89c5a43260c9

  • SHA1

    c803fc92f00bede17b1bfb4f83f0c639a1f45211

  • SHA256

    45fb68022179c2c5d61be8146e2aaac99a1a31a68568fdd15b38b6b97df5d167

  • SHA512

    6b4037822a45121276afdb194afdf1e304e8aa7fed03d9f0b4bd9aa15934044b3adc21f2eef25b44dc844a1531a73cf6ef6c2239fc92f55e4f858ecf48987331

  • SSDEEP

    12288:WMrsy9050Jd2BTH2O0dkUxg4Vwo2s25Hj69H:CyNMBTdgxZ2s25DK

Malware Config

Extracted

Family

redline

Botnet

meson

C2

77.91.124.54:19071

Attributes
  • auth_value

    47ca57ebe5c142c9ad4650f71bf57877

Signatures

  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 9 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\45fb68022179c2c5d61be8146e2aaac99a1a31a68568fdd15b38b6b97df5d167.exe
    "C:\Users\Admin\AppData\Local\Temp\45fb68022179c2c5d61be8146e2aaac99a1a31a68568fdd15b38b6b97df5d167.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2912
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0764705.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0764705.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2128
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4916701.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4916701.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:704
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g5489334.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g5489334.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:3000
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h3230407.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h3230407.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2888
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i6326735.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i6326735.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2896

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0764705.exe

    Filesize

    373KB

    MD5

    2a3455738447a59f7fda368c2e161f8e

    SHA1

    55cda366bf0d459822380641bc11c4fe457edad9

    SHA256

    bbd376de73886e61780abd45b0b40515de7fb2a9cf4af7ecd397362568b5385b

    SHA512

    a975ac3b5edd352e786594c3ac10d88fb0ffb07584823f0bcd3570d24ff7e88fff93fb34fcb6cf3f82faf5d374b8d02b0bc4c35598da87d2f446e367a76ab2aa

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0764705.exe

    Filesize

    373KB

    MD5

    2a3455738447a59f7fda368c2e161f8e

    SHA1

    55cda366bf0d459822380641bc11c4fe457edad9

    SHA256

    bbd376de73886e61780abd45b0b40515de7fb2a9cf4af7ecd397362568b5385b

    SHA512

    a975ac3b5edd352e786594c3ac10d88fb0ffb07584823f0bcd3570d24ff7e88fff93fb34fcb6cf3f82faf5d374b8d02b0bc4c35598da87d2f446e367a76ab2aa

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i6326735.exe

    Filesize

    174KB

    MD5

    63b68bd0325d42d61061cc423d454376

    SHA1

    77d5ea861f4553fe99e8581fb69a109185c56dec

    SHA256

    070b9999b3967fa795c24111aee5328cf927f846f7a2c7530c1481756f1108bf

    SHA512

    9c38ddee57707fcea7e5ce6f1d932eeb3cc8c0b01f06c278ba2bc1f493d27b03b48a030f3345fd0dc174dd4d169b3320d1c3d7c5c12625ea1ffa5988a7ae82d7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i6326735.exe

    Filesize

    174KB

    MD5

    63b68bd0325d42d61061cc423d454376

    SHA1

    77d5ea861f4553fe99e8581fb69a109185c56dec

    SHA256

    070b9999b3967fa795c24111aee5328cf927f846f7a2c7530c1481756f1108bf

    SHA512

    9c38ddee57707fcea7e5ce6f1d932eeb3cc8c0b01f06c278ba2bc1f493d27b03b48a030f3345fd0dc174dd4d169b3320d1c3d7c5c12625ea1ffa5988a7ae82d7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4916701.exe

    Filesize

    217KB

    MD5

    1117c4f864fcbec2db4b46840c6ec057

    SHA1

    95d6e22210b7a99cda6f91c0d9be8f836b624872

    SHA256

    019781de23537fb3bdea1f21b770057d23ddbf752c89d350b7f18e7e6731f879

    SHA512

    033ed490efc2bb0906c73ab9cfdab9301b85996d776ba45af392829bb92118e559e19e2fefb230d3f06f598c61e16fba850a7b1152450f50d36f8a84a83a13d7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4916701.exe

    Filesize

    217KB

    MD5

    1117c4f864fcbec2db4b46840c6ec057

    SHA1

    95d6e22210b7a99cda6f91c0d9be8f836b624872

    SHA256

    019781de23537fb3bdea1f21b770057d23ddbf752c89d350b7f18e7e6731f879

    SHA512

    033ed490efc2bb0906c73ab9cfdab9301b85996d776ba45af392829bb92118e559e19e2fefb230d3f06f598c61e16fba850a7b1152450f50d36f8a84a83a13d7

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g5489334.exe

    Filesize

    140KB

    MD5

    3d94c590d66633f6d6b716828ee2f3e6

    SHA1

    f7785d585c25452927f23d90148c631397b93c91

    SHA256

    fc47c5b28c40cff4782a1cf61b8e51f265720e766983bc31c6dca5ad25a08910

    SHA512

    43987194e3895a2736e44c8e63725acfa4f3d5f1a754444424eb1ad07383793183c262f7f18602191a2f697fca0202f64008a02bfa8db01cb4470a0d9ac5d94b

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g5489334.exe

    Filesize

    140KB

    MD5

    3d94c590d66633f6d6b716828ee2f3e6

    SHA1

    f7785d585c25452927f23d90148c631397b93c91

    SHA256

    fc47c5b28c40cff4782a1cf61b8e51f265720e766983bc31c6dca5ad25a08910

    SHA512

    43987194e3895a2736e44c8e63725acfa4f3d5f1a754444424eb1ad07383793183c262f7f18602191a2f697fca0202f64008a02bfa8db01cb4470a0d9ac5d94b

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h3230407.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h3230407.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x0764705.exe

    Filesize

    373KB

    MD5

    2a3455738447a59f7fda368c2e161f8e

    SHA1

    55cda366bf0d459822380641bc11c4fe457edad9

    SHA256

    bbd376de73886e61780abd45b0b40515de7fb2a9cf4af7ecd397362568b5385b

    SHA512

    a975ac3b5edd352e786594c3ac10d88fb0ffb07584823f0bcd3570d24ff7e88fff93fb34fcb6cf3f82faf5d374b8d02b0bc4c35598da87d2f446e367a76ab2aa

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x0764705.exe

    Filesize

    373KB

    MD5

    2a3455738447a59f7fda368c2e161f8e

    SHA1

    55cda366bf0d459822380641bc11c4fe457edad9

    SHA256

    bbd376de73886e61780abd45b0b40515de7fb2a9cf4af7ecd397362568b5385b

    SHA512

    a975ac3b5edd352e786594c3ac10d88fb0ffb07584823f0bcd3570d24ff7e88fff93fb34fcb6cf3f82faf5d374b8d02b0bc4c35598da87d2f446e367a76ab2aa

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\i6326735.exe

    Filesize

    174KB

    MD5

    63b68bd0325d42d61061cc423d454376

    SHA1

    77d5ea861f4553fe99e8581fb69a109185c56dec

    SHA256

    070b9999b3967fa795c24111aee5328cf927f846f7a2c7530c1481756f1108bf

    SHA512

    9c38ddee57707fcea7e5ce6f1d932eeb3cc8c0b01f06c278ba2bc1f493d27b03b48a030f3345fd0dc174dd4d169b3320d1c3d7c5c12625ea1ffa5988a7ae82d7

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\i6326735.exe

    Filesize

    174KB

    MD5

    63b68bd0325d42d61061cc423d454376

    SHA1

    77d5ea861f4553fe99e8581fb69a109185c56dec

    SHA256

    070b9999b3967fa795c24111aee5328cf927f846f7a2c7530c1481756f1108bf

    SHA512

    9c38ddee57707fcea7e5ce6f1d932eeb3cc8c0b01f06c278ba2bc1f493d27b03b48a030f3345fd0dc174dd4d169b3320d1c3d7c5c12625ea1ffa5988a7ae82d7

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x4916701.exe

    Filesize

    217KB

    MD5

    1117c4f864fcbec2db4b46840c6ec057

    SHA1

    95d6e22210b7a99cda6f91c0d9be8f836b624872

    SHA256

    019781de23537fb3bdea1f21b770057d23ddbf752c89d350b7f18e7e6731f879

    SHA512

    033ed490efc2bb0906c73ab9cfdab9301b85996d776ba45af392829bb92118e559e19e2fefb230d3f06f598c61e16fba850a7b1152450f50d36f8a84a83a13d7

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x4916701.exe

    Filesize

    217KB

    MD5

    1117c4f864fcbec2db4b46840c6ec057

    SHA1

    95d6e22210b7a99cda6f91c0d9be8f836b624872

    SHA256

    019781de23537fb3bdea1f21b770057d23ddbf752c89d350b7f18e7e6731f879

    SHA512

    033ed490efc2bb0906c73ab9cfdab9301b85996d776ba45af392829bb92118e559e19e2fefb230d3f06f598c61e16fba850a7b1152450f50d36f8a84a83a13d7

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\g5489334.exe

    Filesize

    140KB

    MD5

    3d94c590d66633f6d6b716828ee2f3e6

    SHA1

    f7785d585c25452927f23d90148c631397b93c91

    SHA256

    fc47c5b28c40cff4782a1cf61b8e51f265720e766983bc31c6dca5ad25a08910

    SHA512

    43987194e3895a2736e44c8e63725acfa4f3d5f1a754444424eb1ad07383793183c262f7f18602191a2f697fca0202f64008a02bfa8db01cb4470a0d9ac5d94b

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\g5489334.exe

    Filesize

    140KB

    MD5

    3d94c590d66633f6d6b716828ee2f3e6

    SHA1

    f7785d585c25452927f23d90148c631397b93c91

    SHA256

    fc47c5b28c40cff4782a1cf61b8e51f265720e766983bc31c6dca5ad25a08910

    SHA512

    43987194e3895a2736e44c8e63725acfa4f3d5f1a754444424eb1ad07383793183c262f7f18602191a2f697fca0202f64008a02bfa8db01cb4470a0d9ac5d94b

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\h3230407.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • memory/2888-87-0x0000000000300000-0x000000000030A000-memory.dmp

    Filesize

    40KB

  • memory/2888-88-0x000007FEF53D0000-0x000007FEF5DBC000-memory.dmp

    Filesize

    9.9MB

  • memory/2888-89-0x000007FEF53D0000-0x000007FEF5DBC000-memory.dmp

    Filesize

    9.9MB

  • memory/2896-96-0x00000000010E0000-0x0000000001110000-memory.dmp

    Filesize

    192KB

  • memory/2896-97-0x00000000002A0000-0x00000000002A6000-memory.dmp

    Filesize

    24KB