Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    26/08/2023, 17:15

General

  • Target

    tmp.exe

  • Size

    830KB

  • MD5

    8ad7a8ac610e46a94a620b066c64f0ae

  • SHA1

    5997df33f611c7aa048314aa1b90403de4f7ede8

  • SHA256

    c731cabe05e29c11c325c5f5bceed4ff7b5939b232a8aee6ab225bbb777eabe0

  • SHA512

    fb782e94b4a297b8d4bc5c89406cd33823e46fbe5548d4169891450c25b415d8df896543aa91a9d4c2b26c222a1240d56e92e271f541462b81a2cbaa578be60f

  • SSDEEP

    24576:4yHFAH8yUi05GO7fv1gN12532iKolEytPOW6pyE:/lAc005HQ2429O

Malware Config

Extracted

Family

redline

Botnet

jaja

C2

77.91.124.73:19071

Attributes
  • auth_value

    3670179d176ca399ed08e7914610b43c

Signatures

  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 13 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2184
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0704264.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0704264.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2500
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2142698.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2142698.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2316
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5529912.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5529912.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1700
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1147594.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1147594.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2944
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a7286346.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a7286346.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3068
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b8532106.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b8532106.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:2912
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c6349253.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c6349253.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:2784

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0704264.exe

    Filesize

    723KB

    MD5

    c6427764c7d1a36b1cd3d829d00d261b

    SHA1

    358aeb20f519a7c7948c37e721e9373b19e7a373

    SHA256

    2e5943b4537dd9cb5fa6967dfbdaf427a26778088b53e55a208bae422a4f4db5

    SHA512

    b079782b181db0298dc11c54c1bfe31357e136191c72749e09331a6046bfcba6dba6c9baad8141f0bb21f152aa0c4fb85288aa4eff30b733ca9d7bc1ed8c9988

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0704264.exe

    Filesize

    723KB

    MD5

    c6427764c7d1a36b1cd3d829d00d261b

    SHA1

    358aeb20f519a7c7948c37e721e9373b19e7a373

    SHA256

    2e5943b4537dd9cb5fa6967dfbdaf427a26778088b53e55a208bae422a4f4db5

    SHA512

    b079782b181db0298dc11c54c1bfe31357e136191c72749e09331a6046bfcba6dba6c9baad8141f0bb21f152aa0c4fb85288aa4eff30b733ca9d7bc1ed8c9988

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2142698.exe

    Filesize

    497KB

    MD5

    654f36dc0a9a8b2f89f91fc29f827061

    SHA1

    2eafbe618daf035240ac14b74c39fffe441d5fd0

    SHA256

    feef6922b0392411d0f00f961427dd06f53976e965dd220ea2022f791e01822f

    SHA512

    3ead997bc8c653c2c52c606fe0ce646da5900e291a67383ab446e30ff3ef829b921f57fe8ba55a8665b579cdc28301fa8b8dbf672ed7bbaf368967017afa66cd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2142698.exe

    Filesize

    497KB

    MD5

    654f36dc0a9a8b2f89f91fc29f827061

    SHA1

    2eafbe618daf035240ac14b74c39fffe441d5fd0

    SHA256

    feef6922b0392411d0f00f961427dd06f53976e965dd220ea2022f791e01822f

    SHA512

    3ead997bc8c653c2c52c606fe0ce646da5900e291a67383ab446e30ff3ef829b921f57fe8ba55a8665b579cdc28301fa8b8dbf672ed7bbaf368967017afa66cd

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5529912.exe

    Filesize

    373KB

    MD5

    16028db92ee6d0c878d49b4fe41c8bdd

    SHA1

    855c51fe3f05a5596ec3e317b7e1b34c32b498be

    SHA256

    16d2c8f7a76f2ff8052b92b51e9d0b143df2fac1875d0317aa5dd32e13284046

    SHA512

    c26276c27dc3229e5fd63c83c156682c9a233055dcdbe20baba08a9e9466f0cc141e052b85a5381bf7afdae604a465132e060a92fdde43b036d97cc9c871aa77

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5529912.exe

    Filesize

    373KB

    MD5

    16028db92ee6d0c878d49b4fe41c8bdd

    SHA1

    855c51fe3f05a5596ec3e317b7e1b34c32b498be

    SHA256

    16d2c8f7a76f2ff8052b92b51e9d0b143df2fac1875d0317aa5dd32e13284046

    SHA512

    c26276c27dc3229e5fd63c83c156682c9a233055dcdbe20baba08a9e9466f0cc141e052b85a5381bf7afdae604a465132e060a92fdde43b036d97cc9c871aa77

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c6349253.exe

    Filesize

    174KB

    MD5

    4a5bfb69adc0b3ae65613eff0bbb69a7

    SHA1

    af192f8bcf23b1620ceac030c1e6b5f18ea904ab

    SHA256

    d941cd8d9a778e55d7847f36181be998370e3c2e4171a957edd84a72c17bca5c

    SHA512

    320912e1f3256a077eddcc13084f3bb2a4f153fa1c5c086744cf7b44797c076fa5bb6c82a5f92284228412c640ac1857139d0a1d709d1b2f18e024e66b26e252

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c6349253.exe

    Filesize

    174KB

    MD5

    4a5bfb69adc0b3ae65613eff0bbb69a7

    SHA1

    af192f8bcf23b1620ceac030c1e6b5f18ea904ab

    SHA256

    d941cd8d9a778e55d7847f36181be998370e3c2e4171a957edd84a72c17bca5c

    SHA512

    320912e1f3256a077eddcc13084f3bb2a4f153fa1c5c086744cf7b44797c076fa5bb6c82a5f92284228412c640ac1857139d0a1d709d1b2f18e024e66b26e252

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1147594.exe

    Filesize

    217KB

    MD5

    2962cc188a1bc6627f27e3fb05f3b17d

    SHA1

    737519d1544ab9762ec30e7df5c430a1b8563b57

    SHA256

    9f121f2e5f550c3038c5d04dbab5d337272505eb944db9eea50e9670a0579a5a

    SHA512

    cafd035462588db05fbb9adb13f1139a52041580425629a62255a36b160b3bfccd5d95995bc8573cefa58c49b79910343aee42e1385d9d718ae4af00af53a7b6

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1147594.exe

    Filesize

    217KB

    MD5

    2962cc188a1bc6627f27e3fb05f3b17d

    SHA1

    737519d1544ab9762ec30e7df5c430a1b8563b57

    SHA256

    9f121f2e5f550c3038c5d04dbab5d337272505eb944db9eea50e9670a0579a5a

    SHA512

    cafd035462588db05fbb9adb13f1139a52041580425629a62255a36b160b3bfccd5d95995bc8573cefa58c49b79910343aee42e1385d9d718ae4af00af53a7b6

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a7286346.exe

    Filesize

    14KB

    MD5

    f7b1d95da5b37c5522ce8853337ed16d

    SHA1

    5abfb30081d344ba19a5321cb7817f3d56d2d9fe

    SHA256

    56afb8c6a123cf0690b430b4adf9ff443ab186bf4b5607071d5eb6f5d5c3dc9f

    SHA512

    3109ff8dcee87b44eef11a59ee5c9b7dfea52b99036b143eb620d69aa86df5f27f3cfd31cadf5a954982db52c57b4920d848a74c73a589fe4a2b0672b29b5289

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a7286346.exe

    Filesize

    14KB

    MD5

    f7b1d95da5b37c5522ce8853337ed16d

    SHA1

    5abfb30081d344ba19a5321cb7817f3d56d2d9fe

    SHA256

    56afb8c6a123cf0690b430b4adf9ff443ab186bf4b5607071d5eb6f5d5c3dc9f

    SHA512

    3109ff8dcee87b44eef11a59ee5c9b7dfea52b99036b143eb620d69aa86df5f27f3cfd31cadf5a954982db52c57b4920d848a74c73a589fe4a2b0672b29b5289

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b8532106.exe

    Filesize

    141KB

    MD5

    6d3d55fccc91fd241a29b3d4105f0b28

    SHA1

    54fb33ed2d5ad7bc136ae35f2b8b80ff24936b86

    SHA256

    0f500071aded2e2b442545e090eb6f6a7060d53129c95dab2f06d37dd09f12a5

    SHA512

    34bed7aa00be04286ad9c7c73318764cf9fba06247403d13f9c1674e45444f9349362e1f8009f0752610b8c794878c9a5c443cea0f3dab7ed602689ac0269443

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b8532106.exe

    Filesize

    141KB

    MD5

    6d3d55fccc91fd241a29b3d4105f0b28

    SHA1

    54fb33ed2d5ad7bc136ae35f2b8b80ff24936b86

    SHA256

    0f500071aded2e2b442545e090eb6f6a7060d53129c95dab2f06d37dd09f12a5

    SHA512

    34bed7aa00be04286ad9c7c73318764cf9fba06247403d13f9c1674e45444f9349362e1f8009f0752610b8c794878c9a5c443cea0f3dab7ed602689ac0269443

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v0704264.exe

    Filesize

    723KB

    MD5

    c6427764c7d1a36b1cd3d829d00d261b

    SHA1

    358aeb20f519a7c7948c37e721e9373b19e7a373

    SHA256

    2e5943b4537dd9cb5fa6967dfbdaf427a26778088b53e55a208bae422a4f4db5

    SHA512

    b079782b181db0298dc11c54c1bfe31357e136191c72749e09331a6046bfcba6dba6c9baad8141f0bb21f152aa0c4fb85288aa4eff30b733ca9d7bc1ed8c9988

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v0704264.exe

    Filesize

    723KB

    MD5

    c6427764c7d1a36b1cd3d829d00d261b

    SHA1

    358aeb20f519a7c7948c37e721e9373b19e7a373

    SHA256

    2e5943b4537dd9cb5fa6967dfbdaf427a26778088b53e55a208bae422a4f4db5

    SHA512

    b079782b181db0298dc11c54c1bfe31357e136191c72749e09331a6046bfcba6dba6c9baad8141f0bb21f152aa0c4fb85288aa4eff30b733ca9d7bc1ed8c9988

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v2142698.exe

    Filesize

    497KB

    MD5

    654f36dc0a9a8b2f89f91fc29f827061

    SHA1

    2eafbe618daf035240ac14b74c39fffe441d5fd0

    SHA256

    feef6922b0392411d0f00f961427dd06f53976e965dd220ea2022f791e01822f

    SHA512

    3ead997bc8c653c2c52c606fe0ce646da5900e291a67383ab446e30ff3ef829b921f57fe8ba55a8665b579cdc28301fa8b8dbf672ed7bbaf368967017afa66cd

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v2142698.exe

    Filesize

    497KB

    MD5

    654f36dc0a9a8b2f89f91fc29f827061

    SHA1

    2eafbe618daf035240ac14b74c39fffe441d5fd0

    SHA256

    feef6922b0392411d0f00f961427dd06f53976e965dd220ea2022f791e01822f

    SHA512

    3ead997bc8c653c2c52c606fe0ce646da5900e291a67383ab446e30ff3ef829b921f57fe8ba55a8665b579cdc28301fa8b8dbf672ed7bbaf368967017afa66cd

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v5529912.exe

    Filesize

    373KB

    MD5

    16028db92ee6d0c878d49b4fe41c8bdd

    SHA1

    855c51fe3f05a5596ec3e317b7e1b34c32b498be

    SHA256

    16d2c8f7a76f2ff8052b92b51e9d0b143df2fac1875d0317aa5dd32e13284046

    SHA512

    c26276c27dc3229e5fd63c83c156682c9a233055dcdbe20baba08a9e9466f0cc141e052b85a5381bf7afdae604a465132e060a92fdde43b036d97cc9c871aa77

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v5529912.exe

    Filesize

    373KB

    MD5

    16028db92ee6d0c878d49b4fe41c8bdd

    SHA1

    855c51fe3f05a5596ec3e317b7e1b34c32b498be

    SHA256

    16d2c8f7a76f2ff8052b92b51e9d0b143df2fac1875d0317aa5dd32e13284046

    SHA512

    c26276c27dc3229e5fd63c83c156682c9a233055dcdbe20baba08a9e9466f0cc141e052b85a5381bf7afdae604a465132e060a92fdde43b036d97cc9c871aa77

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\c6349253.exe

    Filesize

    174KB

    MD5

    4a5bfb69adc0b3ae65613eff0bbb69a7

    SHA1

    af192f8bcf23b1620ceac030c1e6b5f18ea904ab

    SHA256

    d941cd8d9a778e55d7847f36181be998370e3c2e4171a957edd84a72c17bca5c

    SHA512

    320912e1f3256a077eddcc13084f3bb2a4f153fa1c5c086744cf7b44797c076fa5bb6c82a5f92284228412c640ac1857139d0a1d709d1b2f18e024e66b26e252

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\c6349253.exe

    Filesize

    174KB

    MD5

    4a5bfb69adc0b3ae65613eff0bbb69a7

    SHA1

    af192f8bcf23b1620ceac030c1e6b5f18ea904ab

    SHA256

    d941cd8d9a778e55d7847f36181be998370e3c2e4171a957edd84a72c17bca5c

    SHA512

    320912e1f3256a077eddcc13084f3bb2a4f153fa1c5c086744cf7b44797c076fa5bb6c82a5f92284228412c640ac1857139d0a1d709d1b2f18e024e66b26e252

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v1147594.exe

    Filesize

    217KB

    MD5

    2962cc188a1bc6627f27e3fb05f3b17d

    SHA1

    737519d1544ab9762ec30e7df5c430a1b8563b57

    SHA256

    9f121f2e5f550c3038c5d04dbab5d337272505eb944db9eea50e9670a0579a5a

    SHA512

    cafd035462588db05fbb9adb13f1139a52041580425629a62255a36b160b3bfccd5d95995bc8573cefa58c49b79910343aee42e1385d9d718ae4af00af53a7b6

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v1147594.exe

    Filesize

    217KB

    MD5

    2962cc188a1bc6627f27e3fb05f3b17d

    SHA1

    737519d1544ab9762ec30e7df5c430a1b8563b57

    SHA256

    9f121f2e5f550c3038c5d04dbab5d337272505eb944db9eea50e9670a0579a5a

    SHA512

    cafd035462588db05fbb9adb13f1139a52041580425629a62255a36b160b3bfccd5d95995bc8573cefa58c49b79910343aee42e1385d9d718ae4af00af53a7b6

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a7286346.exe

    Filesize

    14KB

    MD5

    f7b1d95da5b37c5522ce8853337ed16d

    SHA1

    5abfb30081d344ba19a5321cb7817f3d56d2d9fe

    SHA256

    56afb8c6a123cf0690b430b4adf9ff443ab186bf4b5607071d5eb6f5d5c3dc9f

    SHA512

    3109ff8dcee87b44eef11a59ee5c9b7dfea52b99036b143eb620d69aa86df5f27f3cfd31cadf5a954982db52c57b4920d848a74c73a589fe4a2b0672b29b5289

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b8532106.exe

    Filesize

    141KB

    MD5

    6d3d55fccc91fd241a29b3d4105f0b28

    SHA1

    54fb33ed2d5ad7bc136ae35f2b8b80ff24936b86

    SHA256

    0f500071aded2e2b442545e090eb6f6a7060d53129c95dab2f06d37dd09f12a5

    SHA512

    34bed7aa00be04286ad9c7c73318764cf9fba06247403d13f9c1674e45444f9349362e1f8009f0752610b8c794878c9a5c443cea0f3dab7ed602689ac0269443

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b8532106.exe

    Filesize

    141KB

    MD5

    6d3d55fccc91fd241a29b3d4105f0b28

    SHA1

    54fb33ed2d5ad7bc136ae35f2b8b80ff24936b86

    SHA256

    0f500071aded2e2b442545e090eb6f6a7060d53129c95dab2f06d37dd09f12a5

    SHA512

    34bed7aa00be04286ad9c7c73318764cf9fba06247403d13f9c1674e45444f9349362e1f8009f0752610b8c794878c9a5c443cea0f3dab7ed602689ac0269443

  • memory/2784-64-0x0000000000C10000-0x0000000000C40000-memory.dmp

    Filesize

    192KB

  • memory/2784-65-0x0000000000480000-0x0000000000486000-memory.dmp

    Filesize

    24KB

  • memory/3068-48-0x0000000001070000-0x000000000107A000-memory.dmp

    Filesize

    40KB

  • memory/3068-51-0x000007FEF5460000-0x000007FEF5E4C000-memory.dmp

    Filesize

    9.9MB

  • memory/3068-50-0x000007FEF5460000-0x000007FEF5E4C000-memory.dmp

    Filesize

    9.9MB

  • memory/3068-49-0x000007FEF5460000-0x000007FEF5E4C000-memory.dmp

    Filesize

    9.9MB