Analysis

  • max time kernel
    147s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    22-08-2023 23:51

General

  • Target

    0f44ce948fb795200e49a385da663fdf.exe

  • Size

    828KB

  • MD5

    0f44ce948fb795200e49a385da663fdf

  • SHA1

    9d9efbc7a363f5ebda0e8b70dca669712aa20c34

  • SHA256

    b27a6d841380f2dc3e011b8dc60fd30524898675d5fe3f0070d594330b3ea5f4

  • SHA512

    cb569b3761c46c7f5bb6108e95d365de02b91f31e0c90acf008ac4c56d58e79765ca9099196a6d205c043dc25c82e79c73eed469403d4654494b613474373d57

  • SSDEEP

    24576:gyvFGW10ijG8t9hqB285b/4wW/vbBWIvdM3:ntGW6L8tnq0Mi/jBtvy

Malware Config

Extracted

Family

redline

Botnet

rota

C2

77.91.124.73:19071

Attributes
  • auth_value

    320c7daa59eb9b82e20a15162392a756

Signatures

  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 13 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f44ce948fb795200e49a385da663fdf.exe
    "C:\Users\Admin\AppData\Local\Temp\0f44ce948fb795200e49a385da663fdf.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2660
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0062399.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0062399.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2600
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9482544.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9482544.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2072
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4804613.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4804613.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2940
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v6132357.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v6132357.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2956
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a9684430.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a9684430.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2944
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b1903169.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b1903169.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:2544
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c7353275.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c7353275.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:2008

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0062399.exe

    Filesize

    723KB

    MD5

    648b45bac0ef22a4aa5de901eddaeb93

    SHA1

    a522a63106478acb89d4cac593a8924b2076dcc5

    SHA256

    883690d9dbe95f8f2ec325b642245ca4f9229399188d524252496096115c0a90

    SHA512

    e0879623b95d3e200204fb86c6d2ad801c7c4b1bffd131385d7878bc4516783943b261a503f20e3a3bfa8b8bcab05ca3b294e42d61e1a1493d2928e661b6c45c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0062399.exe

    Filesize

    723KB

    MD5

    648b45bac0ef22a4aa5de901eddaeb93

    SHA1

    a522a63106478acb89d4cac593a8924b2076dcc5

    SHA256

    883690d9dbe95f8f2ec325b642245ca4f9229399188d524252496096115c0a90

    SHA512

    e0879623b95d3e200204fb86c6d2ad801c7c4b1bffd131385d7878bc4516783943b261a503f20e3a3bfa8b8bcab05ca3b294e42d61e1a1493d2928e661b6c45c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9482544.exe

    Filesize

    497KB

    MD5

    01ecbf2471c02eae5ee403b6585d1db6

    SHA1

    01dcb743fcc21cc14e4d9e62a14b9cd2adaa8b14

    SHA256

    1717a2329c6246b1c4b855a05ec394f50dd1da780e3a584172f46d44f5bdf818

    SHA512

    b5ce3679e35cba0056382ed2916aea778cb4917d2c436fbf2bb3f6e87c8c0fb6f2caaffdebc107c684de33c04403d994c4d8470cd4fbae29059fb4eabe0330cb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9482544.exe

    Filesize

    497KB

    MD5

    01ecbf2471c02eae5ee403b6585d1db6

    SHA1

    01dcb743fcc21cc14e4d9e62a14b9cd2adaa8b14

    SHA256

    1717a2329c6246b1c4b855a05ec394f50dd1da780e3a584172f46d44f5bdf818

    SHA512

    b5ce3679e35cba0056382ed2916aea778cb4917d2c436fbf2bb3f6e87c8c0fb6f2caaffdebc107c684de33c04403d994c4d8470cd4fbae29059fb4eabe0330cb

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4804613.exe

    Filesize

    372KB

    MD5

    45742acbe5e4205dd38a44e3aff49c79

    SHA1

    0defc21f77c715e4023be5602611b15006adbe22

    SHA256

    55867012651de6ff836de85c28dd95c3085b8e319ed9b2b99dcd48726e57d5eb

    SHA512

    f0d9d4b2ba97e8df1aeb0faa6d7244f2e75d79d339dfd33d8dc833ea1ae344bc9b482707f8b5395d5e13e257720f547086c3447a526911e28d0513785acacf06

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4804613.exe

    Filesize

    372KB

    MD5

    45742acbe5e4205dd38a44e3aff49c79

    SHA1

    0defc21f77c715e4023be5602611b15006adbe22

    SHA256

    55867012651de6ff836de85c28dd95c3085b8e319ed9b2b99dcd48726e57d5eb

    SHA512

    f0d9d4b2ba97e8df1aeb0faa6d7244f2e75d79d339dfd33d8dc833ea1ae344bc9b482707f8b5395d5e13e257720f547086c3447a526911e28d0513785acacf06

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c7353275.exe

    Filesize

    174KB

    MD5

    50c192550539bcb1faeb0f0261d0a630

    SHA1

    fd8278cf1dfe38efd85b4e0e6b73361a25cb6089

    SHA256

    008cae4ecd034cd616a156e3d1cf9dacbb73dfa26a85e0f10299900685c55a30

    SHA512

    cfdefa04d5b2dc2b3316c8c67f766a066513d62d7ca13c59f698e5d7a55a27815a0fa545d5a8e93a3f81d1a56a954f28d71d32d9e3ee72ff1f4eb9d69e99bc9b

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c7353275.exe

    Filesize

    174KB

    MD5

    50c192550539bcb1faeb0f0261d0a630

    SHA1

    fd8278cf1dfe38efd85b4e0e6b73361a25cb6089

    SHA256

    008cae4ecd034cd616a156e3d1cf9dacbb73dfa26a85e0f10299900685c55a30

    SHA512

    cfdefa04d5b2dc2b3316c8c67f766a066513d62d7ca13c59f698e5d7a55a27815a0fa545d5a8e93a3f81d1a56a954f28d71d32d9e3ee72ff1f4eb9d69e99bc9b

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v6132357.exe

    Filesize

    216KB

    MD5

    c5cf12838cb21e51ba6011b134b18314

    SHA1

    cbcd8f438c8ef8aa0786b1f43437feff0eacf35b

    SHA256

    b353890c49640dfa9dd677a313a6c2571d24a8180ba1f8b5bdfb1a74d61c05c4

    SHA512

    83010f8afbe3a9ecaf3690a1d97af0c234647a5a6b915191169ded49f7d105484ab15d65bcdd017af442450dbde1fb5a980a85e7b494a35830e5f58efd635170

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v6132357.exe

    Filesize

    216KB

    MD5

    c5cf12838cb21e51ba6011b134b18314

    SHA1

    cbcd8f438c8ef8aa0786b1f43437feff0eacf35b

    SHA256

    b353890c49640dfa9dd677a313a6c2571d24a8180ba1f8b5bdfb1a74d61c05c4

    SHA512

    83010f8afbe3a9ecaf3690a1d97af0c234647a5a6b915191169ded49f7d105484ab15d65bcdd017af442450dbde1fb5a980a85e7b494a35830e5f58efd635170

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a9684430.exe

    Filesize

    12KB

    MD5

    8d2dbd550c2bb46da77407b87fd48007

    SHA1

    214413865fbbc796dd550f46bf93b54f492a9697

    SHA256

    8bf63a8fb8526a3028d0870d825dd1ff86a9671b26581f1c39f1bede3048c5e4

    SHA512

    0d90104b9775f59f606a8d4d7d526af57e369df178a93fa757614c4f2b7ea43da307bd0bc63aef9222708dd09838966efe697a9477117adf532481d3ef19cd9b

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a9684430.exe

    Filesize

    12KB

    MD5

    8d2dbd550c2bb46da77407b87fd48007

    SHA1

    214413865fbbc796dd550f46bf93b54f492a9697

    SHA256

    8bf63a8fb8526a3028d0870d825dd1ff86a9671b26581f1c39f1bede3048c5e4

    SHA512

    0d90104b9775f59f606a8d4d7d526af57e369df178a93fa757614c4f2b7ea43da307bd0bc63aef9222708dd09838966efe697a9477117adf532481d3ef19cd9b

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b1903169.exe

    Filesize

    140KB

    MD5

    1f12fc2fe096c25f67ad988356ed2e5d

    SHA1

    fcea968954bed3916923191abe629bdfae0d2bf6

    SHA256

    80205d48b2878121445a846f9e6bd473886d702b44e8c84a10143ad8f11b4faa

    SHA512

    ce4ead4b0cfa7ba5c1d5ab2d45a8c17516cea6fb503d8c15ece1abe57304f20aaad76f2b994a6c0faf94739447c01f2dd6b91a73f09ae8b0bf5beb08768ed540

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b1903169.exe

    Filesize

    140KB

    MD5

    1f12fc2fe096c25f67ad988356ed2e5d

    SHA1

    fcea968954bed3916923191abe629bdfae0d2bf6

    SHA256

    80205d48b2878121445a846f9e6bd473886d702b44e8c84a10143ad8f11b4faa

    SHA512

    ce4ead4b0cfa7ba5c1d5ab2d45a8c17516cea6fb503d8c15ece1abe57304f20aaad76f2b994a6c0faf94739447c01f2dd6b91a73f09ae8b0bf5beb08768ed540

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v0062399.exe

    Filesize

    723KB

    MD5

    648b45bac0ef22a4aa5de901eddaeb93

    SHA1

    a522a63106478acb89d4cac593a8924b2076dcc5

    SHA256

    883690d9dbe95f8f2ec325b642245ca4f9229399188d524252496096115c0a90

    SHA512

    e0879623b95d3e200204fb86c6d2ad801c7c4b1bffd131385d7878bc4516783943b261a503f20e3a3bfa8b8bcab05ca3b294e42d61e1a1493d2928e661b6c45c

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v0062399.exe

    Filesize

    723KB

    MD5

    648b45bac0ef22a4aa5de901eddaeb93

    SHA1

    a522a63106478acb89d4cac593a8924b2076dcc5

    SHA256

    883690d9dbe95f8f2ec325b642245ca4f9229399188d524252496096115c0a90

    SHA512

    e0879623b95d3e200204fb86c6d2ad801c7c4b1bffd131385d7878bc4516783943b261a503f20e3a3bfa8b8bcab05ca3b294e42d61e1a1493d2928e661b6c45c

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v9482544.exe

    Filesize

    497KB

    MD5

    01ecbf2471c02eae5ee403b6585d1db6

    SHA1

    01dcb743fcc21cc14e4d9e62a14b9cd2adaa8b14

    SHA256

    1717a2329c6246b1c4b855a05ec394f50dd1da780e3a584172f46d44f5bdf818

    SHA512

    b5ce3679e35cba0056382ed2916aea778cb4917d2c436fbf2bb3f6e87c8c0fb6f2caaffdebc107c684de33c04403d994c4d8470cd4fbae29059fb4eabe0330cb

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v9482544.exe

    Filesize

    497KB

    MD5

    01ecbf2471c02eae5ee403b6585d1db6

    SHA1

    01dcb743fcc21cc14e4d9e62a14b9cd2adaa8b14

    SHA256

    1717a2329c6246b1c4b855a05ec394f50dd1da780e3a584172f46d44f5bdf818

    SHA512

    b5ce3679e35cba0056382ed2916aea778cb4917d2c436fbf2bb3f6e87c8c0fb6f2caaffdebc107c684de33c04403d994c4d8470cd4fbae29059fb4eabe0330cb

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v4804613.exe

    Filesize

    372KB

    MD5

    45742acbe5e4205dd38a44e3aff49c79

    SHA1

    0defc21f77c715e4023be5602611b15006adbe22

    SHA256

    55867012651de6ff836de85c28dd95c3085b8e319ed9b2b99dcd48726e57d5eb

    SHA512

    f0d9d4b2ba97e8df1aeb0faa6d7244f2e75d79d339dfd33d8dc833ea1ae344bc9b482707f8b5395d5e13e257720f547086c3447a526911e28d0513785acacf06

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v4804613.exe

    Filesize

    372KB

    MD5

    45742acbe5e4205dd38a44e3aff49c79

    SHA1

    0defc21f77c715e4023be5602611b15006adbe22

    SHA256

    55867012651de6ff836de85c28dd95c3085b8e319ed9b2b99dcd48726e57d5eb

    SHA512

    f0d9d4b2ba97e8df1aeb0faa6d7244f2e75d79d339dfd33d8dc833ea1ae344bc9b482707f8b5395d5e13e257720f547086c3447a526911e28d0513785acacf06

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\c7353275.exe

    Filesize

    174KB

    MD5

    50c192550539bcb1faeb0f0261d0a630

    SHA1

    fd8278cf1dfe38efd85b4e0e6b73361a25cb6089

    SHA256

    008cae4ecd034cd616a156e3d1cf9dacbb73dfa26a85e0f10299900685c55a30

    SHA512

    cfdefa04d5b2dc2b3316c8c67f766a066513d62d7ca13c59f698e5d7a55a27815a0fa545d5a8e93a3f81d1a56a954f28d71d32d9e3ee72ff1f4eb9d69e99bc9b

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\c7353275.exe

    Filesize

    174KB

    MD5

    50c192550539bcb1faeb0f0261d0a630

    SHA1

    fd8278cf1dfe38efd85b4e0e6b73361a25cb6089

    SHA256

    008cae4ecd034cd616a156e3d1cf9dacbb73dfa26a85e0f10299900685c55a30

    SHA512

    cfdefa04d5b2dc2b3316c8c67f766a066513d62d7ca13c59f698e5d7a55a27815a0fa545d5a8e93a3f81d1a56a954f28d71d32d9e3ee72ff1f4eb9d69e99bc9b

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v6132357.exe

    Filesize

    216KB

    MD5

    c5cf12838cb21e51ba6011b134b18314

    SHA1

    cbcd8f438c8ef8aa0786b1f43437feff0eacf35b

    SHA256

    b353890c49640dfa9dd677a313a6c2571d24a8180ba1f8b5bdfb1a74d61c05c4

    SHA512

    83010f8afbe3a9ecaf3690a1d97af0c234647a5a6b915191169ded49f7d105484ab15d65bcdd017af442450dbde1fb5a980a85e7b494a35830e5f58efd635170

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v6132357.exe

    Filesize

    216KB

    MD5

    c5cf12838cb21e51ba6011b134b18314

    SHA1

    cbcd8f438c8ef8aa0786b1f43437feff0eacf35b

    SHA256

    b353890c49640dfa9dd677a313a6c2571d24a8180ba1f8b5bdfb1a74d61c05c4

    SHA512

    83010f8afbe3a9ecaf3690a1d97af0c234647a5a6b915191169ded49f7d105484ab15d65bcdd017af442450dbde1fb5a980a85e7b494a35830e5f58efd635170

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a9684430.exe

    Filesize

    12KB

    MD5

    8d2dbd550c2bb46da77407b87fd48007

    SHA1

    214413865fbbc796dd550f46bf93b54f492a9697

    SHA256

    8bf63a8fb8526a3028d0870d825dd1ff86a9671b26581f1c39f1bede3048c5e4

    SHA512

    0d90104b9775f59f606a8d4d7d526af57e369df178a93fa757614c4f2b7ea43da307bd0bc63aef9222708dd09838966efe697a9477117adf532481d3ef19cd9b

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b1903169.exe

    Filesize

    140KB

    MD5

    1f12fc2fe096c25f67ad988356ed2e5d

    SHA1

    fcea968954bed3916923191abe629bdfae0d2bf6

    SHA256

    80205d48b2878121445a846f9e6bd473886d702b44e8c84a10143ad8f11b4faa

    SHA512

    ce4ead4b0cfa7ba5c1d5ab2d45a8c17516cea6fb503d8c15ece1abe57304f20aaad76f2b994a6c0faf94739447c01f2dd6b91a73f09ae8b0bf5beb08768ed540

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b1903169.exe

    Filesize

    140KB

    MD5

    1f12fc2fe096c25f67ad988356ed2e5d

    SHA1

    fcea968954bed3916923191abe629bdfae0d2bf6

    SHA256

    80205d48b2878121445a846f9e6bd473886d702b44e8c84a10143ad8f11b4faa

    SHA512

    ce4ead4b0cfa7ba5c1d5ab2d45a8c17516cea6fb503d8c15ece1abe57304f20aaad76f2b994a6c0faf94739447c01f2dd6b91a73f09ae8b0bf5beb08768ed540

  • memory/2008-118-0x00000000011D0000-0x0000000001200000-memory.dmp

    Filesize

    192KB

  • memory/2008-119-0x0000000000360000-0x0000000000366000-memory.dmp

    Filesize

    24KB

  • memory/2944-105-0x000007FEF58B0000-0x000007FEF629C000-memory.dmp

    Filesize

    9.9MB

  • memory/2944-104-0x000007FEF58B0000-0x000007FEF629C000-memory.dmp

    Filesize

    9.9MB

  • memory/2944-103-0x000007FEF58B0000-0x000007FEF629C000-memory.dmp

    Filesize

    9.9MB

  • memory/2944-102-0x0000000000B70000-0x0000000000B7A000-memory.dmp

    Filesize

    40KB