Analysis

  • max time kernel
    125s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20230824-en
  • resource tags

    arch:x64arch:x86image:win7-20230824-enlocale:en-usos:windows7-x64system
  • submitted
    27-08-2023 07:48

General

  • Target

    ac7c2a321198c7727efa33dad41d910f.exe

  • Size

    929KB

  • MD5

    ac7c2a321198c7727efa33dad41d910f

  • SHA1

    4233a6efbaaf30b1ea9ad8cf35034747c429e145

  • SHA256

    92d0f994eca55a5b0f90fb99a3dc85cc566ae426cb5f568b2b2a4e08f5cf540a

  • SHA512

    46f53e9e15d4af7259187e70f02632de01a2a6cd811f6e085bb0d72517359e573fc0b092420af1a67628d95e224803cb1466674fe4310e86099f7559795c827c

  • SSDEEP

    12288:2MrBy900v3//il7T/kDEPQdLnUkx1/Mf4TDsgQppEkw7JBtEkij79HvC13ndKhf:7yfG2cQdLnp4VPpoKhf

Malware Config

Extracted

Family

redline

Botnet

nrava

C2

77.91.124.82:19071

Attributes
  • auth_value

    43fe50e9ee6afb85588e03ac9676e2f7

Signatures

  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 13 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ac7c2a321198c7727efa33dad41d910f.exe
    "C:\Users\Admin\AppData\Local\Temp\ac7c2a321198c7727efa33dad41d910f.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2292
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1432191.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1432191.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2520
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6946812.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6946812.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2388
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6390493.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6390493.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2268
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8869303.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8869303.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2256
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2547496.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2547496.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1364
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r7368628.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r7368628.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:2892
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s8863227.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s8863227.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:2652

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1432191.exe

    Filesize

    824KB

    MD5

    2451d76e26faa8f1b75ca967185530d0

    SHA1

    52c451e5835dd64d6ad0f5b9db7a7cf9d87f73ff

    SHA256

    23ffa30280ab451ec6cb8c129dd45a9c922ccd64a8054fb6ac35075aaaf52249

    SHA512

    c28340796fb59505cef0234fa52df00419579ef61a49f22b37288c2a5c61d64ec894775324dc73361c7e29e6905555414eec7a8087008cf6e915dfc2b557573e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1432191.exe

    Filesize

    824KB

    MD5

    2451d76e26faa8f1b75ca967185530d0

    SHA1

    52c451e5835dd64d6ad0f5b9db7a7cf9d87f73ff

    SHA256

    23ffa30280ab451ec6cb8c129dd45a9c922ccd64a8054fb6ac35075aaaf52249

    SHA512

    c28340796fb59505cef0234fa52df00419579ef61a49f22b37288c2a5c61d64ec894775324dc73361c7e29e6905555414eec7a8087008cf6e915dfc2b557573e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6946812.exe

    Filesize

    598KB

    MD5

    f5576682d3f025a402f20221664cc8df

    SHA1

    afab46891cab3bff5d61f6d7984303e680281b06

    SHA256

    1493aecbe78795358bfdb19e1a281787a9cf6aea4194c8495b27ea2b72d1e28f

    SHA512

    db643d307087d8708e7feac35a08bf6b6c396e37ce965dc2408383993c35afaf4e28d2544ff41ac6094f6c194ead17ad634375b426871911e58f83a600d5cd24

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6946812.exe

    Filesize

    598KB

    MD5

    f5576682d3f025a402f20221664cc8df

    SHA1

    afab46891cab3bff5d61f6d7984303e680281b06

    SHA256

    1493aecbe78795358bfdb19e1a281787a9cf6aea4194c8495b27ea2b72d1e28f

    SHA512

    db643d307087d8708e7feac35a08bf6b6c396e37ce965dc2408383993c35afaf4e28d2544ff41ac6094f6c194ead17ad634375b426871911e58f83a600d5cd24

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6390493.exe

    Filesize

    373KB

    MD5

    96371c11f1860483b01843b395de0aab

    SHA1

    01b611fe68d49180b536ccb6eeeea29fb90f739f

    SHA256

    feee54e9fd4c82acd637e240e7cae0caba5f73a43673ebcab6e2433f14b8eba7

    SHA512

    779599766fd5e9a152d5ca0a3d9c788ca543aed6174854694d7f61041db292fd3f22c3b072a7019098e6e6a47e7f45790812a88d736a64fcc192ed43313713a2

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6390493.exe

    Filesize

    373KB

    MD5

    96371c11f1860483b01843b395de0aab

    SHA1

    01b611fe68d49180b536ccb6eeeea29fb90f739f

    SHA256

    feee54e9fd4c82acd637e240e7cae0caba5f73a43673ebcab6e2433f14b8eba7

    SHA512

    779599766fd5e9a152d5ca0a3d9c788ca543aed6174854694d7f61041db292fd3f22c3b072a7019098e6e6a47e7f45790812a88d736a64fcc192ed43313713a2

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s8863227.exe

    Filesize

    173KB

    MD5

    7484c03a9cfacaf6e34e727572b44086

    SHA1

    92de15763ffb915831cedeb2f9b89461e546f7b4

    SHA256

    3fc69db55e7727061fc6e42c73cd3b2dee8c8cd0ce3be6f23b97b1dd800b3024

    SHA512

    e8c8178ed3c065e9adedf1de14d44578ed62ae979ce5887d1aa2acd4ff65c1221ed1764956918d307a615cad41ef8210efd4d609eeffde33a5c1d74484487d55

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s8863227.exe

    Filesize

    173KB

    MD5

    7484c03a9cfacaf6e34e727572b44086

    SHA1

    92de15763ffb915831cedeb2f9b89461e546f7b4

    SHA256

    3fc69db55e7727061fc6e42c73cd3b2dee8c8cd0ce3be6f23b97b1dd800b3024

    SHA512

    e8c8178ed3c065e9adedf1de14d44578ed62ae979ce5887d1aa2acd4ff65c1221ed1764956918d307a615cad41ef8210efd4d609eeffde33a5c1d74484487d55

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8869303.exe

    Filesize

    217KB

    MD5

    e524e064838b89d7d2a05c8e68298f42

    SHA1

    aafc93bf43ec63fd17c658dee1de9f7a83fa6ea4

    SHA256

    ff167473a941db1cbb319307f68a1867c18f6ae691d464712dbcb87b0cfd29d6

    SHA512

    64cb13d84670a8c484ec86084feb8841e9ccc16a62236221f18efa2ef73f9826dfe899ac387e8ebf78b8fc8cdb72125b509ae269ece892b434fb40c44affa7e7

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8869303.exe

    Filesize

    217KB

    MD5

    e524e064838b89d7d2a05c8e68298f42

    SHA1

    aafc93bf43ec63fd17c658dee1de9f7a83fa6ea4

    SHA256

    ff167473a941db1cbb319307f68a1867c18f6ae691d464712dbcb87b0cfd29d6

    SHA512

    64cb13d84670a8c484ec86084feb8841e9ccc16a62236221f18efa2ef73f9826dfe899ac387e8ebf78b8fc8cdb72125b509ae269ece892b434fb40c44affa7e7

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2547496.exe

    Filesize

    15KB

    MD5

    ab106c78c5551458a5b6e3ea90b5f029

    SHA1

    4406024844a08e94c66e824906861b43b445d931

    SHA256

    437f803ccadf845bc3c71ca703e53879f5dd758246b238476655def5f7bef746

    SHA512

    f735c9042cbe52ce862b67a7cf250b52412ebc4abeb76832c3c5f097fcc668dda9d0f11642480367a141f9fe6ec50c5dbf7be673dc958ae8a9374a561255513e

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2547496.exe

    Filesize

    15KB

    MD5

    ab106c78c5551458a5b6e3ea90b5f029

    SHA1

    4406024844a08e94c66e824906861b43b445d931

    SHA256

    437f803ccadf845bc3c71ca703e53879f5dd758246b238476655def5f7bef746

    SHA512

    f735c9042cbe52ce862b67a7cf250b52412ebc4abeb76832c3c5f097fcc668dda9d0f11642480367a141f9fe6ec50c5dbf7be673dc958ae8a9374a561255513e

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r7368628.exe

    Filesize

    140KB

    MD5

    b969541a1a23e4c84e41bf269152f778

    SHA1

    5ea9e102b63c9000c5d51026af1860fc3ee340ac

    SHA256

    3135357a5fcd03b6fecd37b313cbcfa6fd9921606ba54ebe9bd074d6e14a25ee

    SHA512

    bb217a2164bbfbaf121dd6e49ae1646c4a2a2cde225394faf7668097b4c0c887062d528110db77845d88fe3772338376049704eeda29b7143cadca03e4b2df74

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r7368628.exe

    Filesize

    140KB

    MD5

    b969541a1a23e4c84e41bf269152f778

    SHA1

    5ea9e102b63c9000c5d51026af1860fc3ee340ac

    SHA256

    3135357a5fcd03b6fecd37b313cbcfa6fd9921606ba54ebe9bd074d6e14a25ee

    SHA512

    bb217a2164bbfbaf121dd6e49ae1646c4a2a2cde225394faf7668097b4c0c887062d528110db77845d88fe3772338376049704eeda29b7143cadca03e4b2df74

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z1432191.exe

    Filesize

    824KB

    MD5

    2451d76e26faa8f1b75ca967185530d0

    SHA1

    52c451e5835dd64d6ad0f5b9db7a7cf9d87f73ff

    SHA256

    23ffa30280ab451ec6cb8c129dd45a9c922ccd64a8054fb6ac35075aaaf52249

    SHA512

    c28340796fb59505cef0234fa52df00419579ef61a49f22b37288c2a5c61d64ec894775324dc73361c7e29e6905555414eec7a8087008cf6e915dfc2b557573e

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z1432191.exe

    Filesize

    824KB

    MD5

    2451d76e26faa8f1b75ca967185530d0

    SHA1

    52c451e5835dd64d6ad0f5b9db7a7cf9d87f73ff

    SHA256

    23ffa30280ab451ec6cb8c129dd45a9c922ccd64a8054fb6ac35075aaaf52249

    SHA512

    c28340796fb59505cef0234fa52df00419579ef61a49f22b37288c2a5c61d64ec894775324dc73361c7e29e6905555414eec7a8087008cf6e915dfc2b557573e

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z6946812.exe

    Filesize

    598KB

    MD5

    f5576682d3f025a402f20221664cc8df

    SHA1

    afab46891cab3bff5d61f6d7984303e680281b06

    SHA256

    1493aecbe78795358bfdb19e1a281787a9cf6aea4194c8495b27ea2b72d1e28f

    SHA512

    db643d307087d8708e7feac35a08bf6b6c396e37ce965dc2408383993c35afaf4e28d2544ff41ac6094f6c194ead17ad634375b426871911e58f83a600d5cd24

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z6946812.exe

    Filesize

    598KB

    MD5

    f5576682d3f025a402f20221664cc8df

    SHA1

    afab46891cab3bff5d61f6d7984303e680281b06

    SHA256

    1493aecbe78795358bfdb19e1a281787a9cf6aea4194c8495b27ea2b72d1e28f

    SHA512

    db643d307087d8708e7feac35a08bf6b6c396e37ce965dc2408383993c35afaf4e28d2544ff41ac6094f6c194ead17ad634375b426871911e58f83a600d5cd24

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z6390493.exe

    Filesize

    373KB

    MD5

    96371c11f1860483b01843b395de0aab

    SHA1

    01b611fe68d49180b536ccb6eeeea29fb90f739f

    SHA256

    feee54e9fd4c82acd637e240e7cae0caba5f73a43673ebcab6e2433f14b8eba7

    SHA512

    779599766fd5e9a152d5ca0a3d9c788ca543aed6174854694d7f61041db292fd3f22c3b072a7019098e6e6a47e7f45790812a88d736a64fcc192ed43313713a2

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z6390493.exe

    Filesize

    373KB

    MD5

    96371c11f1860483b01843b395de0aab

    SHA1

    01b611fe68d49180b536ccb6eeeea29fb90f739f

    SHA256

    feee54e9fd4c82acd637e240e7cae0caba5f73a43673ebcab6e2433f14b8eba7

    SHA512

    779599766fd5e9a152d5ca0a3d9c788ca543aed6174854694d7f61041db292fd3f22c3b072a7019098e6e6a47e7f45790812a88d736a64fcc192ed43313713a2

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\s8863227.exe

    Filesize

    173KB

    MD5

    7484c03a9cfacaf6e34e727572b44086

    SHA1

    92de15763ffb915831cedeb2f9b89461e546f7b4

    SHA256

    3fc69db55e7727061fc6e42c73cd3b2dee8c8cd0ce3be6f23b97b1dd800b3024

    SHA512

    e8c8178ed3c065e9adedf1de14d44578ed62ae979ce5887d1aa2acd4ff65c1221ed1764956918d307a615cad41ef8210efd4d609eeffde33a5c1d74484487d55

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\s8863227.exe

    Filesize

    173KB

    MD5

    7484c03a9cfacaf6e34e727572b44086

    SHA1

    92de15763ffb915831cedeb2f9b89461e546f7b4

    SHA256

    3fc69db55e7727061fc6e42c73cd3b2dee8c8cd0ce3be6f23b97b1dd800b3024

    SHA512

    e8c8178ed3c065e9adedf1de14d44578ed62ae979ce5887d1aa2acd4ff65c1221ed1764956918d307a615cad41ef8210efd4d609eeffde33a5c1d74484487d55

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z8869303.exe

    Filesize

    217KB

    MD5

    e524e064838b89d7d2a05c8e68298f42

    SHA1

    aafc93bf43ec63fd17c658dee1de9f7a83fa6ea4

    SHA256

    ff167473a941db1cbb319307f68a1867c18f6ae691d464712dbcb87b0cfd29d6

    SHA512

    64cb13d84670a8c484ec86084feb8841e9ccc16a62236221f18efa2ef73f9826dfe899ac387e8ebf78b8fc8cdb72125b509ae269ece892b434fb40c44affa7e7

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z8869303.exe

    Filesize

    217KB

    MD5

    e524e064838b89d7d2a05c8e68298f42

    SHA1

    aafc93bf43ec63fd17c658dee1de9f7a83fa6ea4

    SHA256

    ff167473a941db1cbb319307f68a1867c18f6ae691d464712dbcb87b0cfd29d6

    SHA512

    64cb13d84670a8c484ec86084feb8841e9ccc16a62236221f18efa2ef73f9826dfe899ac387e8ebf78b8fc8cdb72125b509ae269ece892b434fb40c44affa7e7

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2547496.exe

    Filesize

    15KB

    MD5

    ab106c78c5551458a5b6e3ea90b5f029

    SHA1

    4406024844a08e94c66e824906861b43b445d931

    SHA256

    437f803ccadf845bc3c71ca703e53879f5dd758246b238476655def5f7bef746

    SHA512

    f735c9042cbe52ce862b67a7cf250b52412ebc4abeb76832c3c5f097fcc668dda9d0f11642480367a141f9fe6ec50c5dbf7be673dc958ae8a9374a561255513e

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r7368628.exe

    Filesize

    140KB

    MD5

    b969541a1a23e4c84e41bf269152f778

    SHA1

    5ea9e102b63c9000c5d51026af1860fc3ee340ac

    SHA256

    3135357a5fcd03b6fecd37b313cbcfa6fd9921606ba54ebe9bd074d6e14a25ee

    SHA512

    bb217a2164bbfbaf121dd6e49ae1646c4a2a2cde225394faf7668097b4c0c887062d528110db77845d88fe3772338376049704eeda29b7143cadca03e4b2df74

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r7368628.exe

    Filesize

    140KB

    MD5

    b969541a1a23e4c84e41bf269152f778

    SHA1

    5ea9e102b63c9000c5d51026af1860fc3ee340ac

    SHA256

    3135357a5fcd03b6fecd37b313cbcfa6fd9921606ba54ebe9bd074d6e14a25ee

    SHA512

    bb217a2164bbfbaf121dd6e49ae1646c4a2a2cde225394faf7668097b4c0c887062d528110db77845d88fe3772338376049704eeda29b7143cadca03e4b2df74

  • memory/1364-48-0x0000000000F80000-0x0000000000F8A000-memory.dmp

    Filesize

    40KB

  • memory/1364-51-0x000007FEF5A80000-0x000007FEF646C000-memory.dmp

    Filesize

    9.9MB

  • memory/1364-50-0x000007FEF5A80000-0x000007FEF646C000-memory.dmp

    Filesize

    9.9MB

  • memory/1364-49-0x000007FEF5A80000-0x000007FEF646C000-memory.dmp

    Filesize

    9.9MB

  • memory/2652-64-0x0000000000380000-0x00000000003B0000-memory.dmp

    Filesize

    192KB

  • memory/2652-65-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB