Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    28/08/2023, 00:17

General

  • Target

    16a494de7f5e76ed8980bb54ec1e656c.exe

  • Size

    929KB

  • MD5

    16a494de7f5e76ed8980bb54ec1e656c

  • SHA1

    23b9c27a366770a1ec39c511ba5d38fd94970343

  • SHA256

    2a95218aa13cf312724cc534ecbc1cf025b0e43f0ab36c8ee421ec1c66e89387

  • SHA512

    3c8520a8d1f6d43a7f0fb90feb5dcad3c7b0e0edc7f5630c3484262198f7c3657735a90cbda63c9bd8ea3400ef8a9819a010c17f3f86c5533fcee21d50fc9bf8

  • SSDEEP

    24576:MyxsfWKmpi2t7m1FjZQ+1T0E4yvoAclJZFxTlDK9:7JK5tbjGw0EfvTUJZFve

Malware Config

Extracted

Family

redline

Botnet

nrava

C2

77.91.124.82:19071

Attributes
  • auth_value

    43fe50e9ee6afb85588e03ac9676e2f7

Signatures

  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 13 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\16a494de7f5e76ed8980bb54ec1e656c.exe
    "C:\Users\Admin\AppData\Local\Temp\16a494de7f5e76ed8980bb54ec1e656c.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2192
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6877854.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6877854.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2220
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6781914.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6781914.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2664
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7039270.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7039270.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2784
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7770330.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7770330.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2824
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6009359.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6009359.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2848
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r1936623.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r1936623.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:2700
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s9645183.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s9645183.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:2696

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6877854.exe

          Filesize

          823KB

          MD5

          e9d0102d456aeb0887c2f9962c772b3f

          SHA1

          525d3b40a79e6ce51c52f80a9adeb01063465e23

          SHA256

          933ed44e940cd0db4d2e26d030e02678dfabbd2a09bb2595d13e6289a9ca729f

          SHA512

          7f68c0a4b63651ea5ce9bd676768d76bbdb1523464ce203159cc1ad2bb4721ce8b822f02a1614314084b1cf83f21672fbe1361a0c6f02534b67cfc15f9e2dba4

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6877854.exe

          Filesize

          823KB

          MD5

          e9d0102d456aeb0887c2f9962c772b3f

          SHA1

          525d3b40a79e6ce51c52f80a9adeb01063465e23

          SHA256

          933ed44e940cd0db4d2e26d030e02678dfabbd2a09bb2595d13e6289a9ca729f

          SHA512

          7f68c0a4b63651ea5ce9bd676768d76bbdb1523464ce203159cc1ad2bb4721ce8b822f02a1614314084b1cf83f21672fbe1361a0c6f02534b67cfc15f9e2dba4

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6781914.exe

          Filesize

          597KB

          MD5

          f7962886e02583494465f3c2cfbfd652

          SHA1

          cff3b28bd7469b418b74780d2cd9fbde4ed18647

          SHA256

          e917e33e86f29a0a035e5ff91ec851a9eb6381e6ef58a545429ddf215c521dd8

          SHA512

          cb9c25e8d50e53987ca28907621388b5734d5251805e84c331de7cf7df67dff914c2ecaa430f0ca13bd10c347e2dd9398944fa8f8652d7c18f3fd139f5902cb6

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6781914.exe

          Filesize

          597KB

          MD5

          f7962886e02583494465f3c2cfbfd652

          SHA1

          cff3b28bd7469b418b74780d2cd9fbde4ed18647

          SHA256

          e917e33e86f29a0a035e5ff91ec851a9eb6381e6ef58a545429ddf215c521dd8

          SHA512

          cb9c25e8d50e53987ca28907621388b5734d5251805e84c331de7cf7df67dff914c2ecaa430f0ca13bd10c347e2dd9398944fa8f8652d7c18f3fd139f5902cb6

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7039270.exe

          Filesize

          372KB

          MD5

          373b388e5dc18992578485fc6a520d00

          SHA1

          91ef1b54d9a381d2df0bf4bffe89cc1791e64374

          SHA256

          c0415d2404e07d8072848ffe59b18e4f384673db1d3a36eae083e18871739a1a

          SHA512

          6769751180bd06f310f4aa31ba3f5654690df02313d107fb8a2a9624408f6596fc1e46ceec6f3705dcc360834241912bfe6bbbbe031ed85eb5e7a157376a10dd

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7039270.exe

          Filesize

          372KB

          MD5

          373b388e5dc18992578485fc6a520d00

          SHA1

          91ef1b54d9a381d2df0bf4bffe89cc1791e64374

          SHA256

          c0415d2404e07d8072848ffe59b18e4f384673db1d3a36eae083e18871739a1a

          SHA512

          6769751180bd06f310f4aa31ba3f5654690df02313d107fb8a2a9624408f6596fc1e46ceec6f3705dcc360834241912bfe6bbbbe031ed85eb5e7a157376a10dd

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s9645183.exe

          Filesize

          174KB

          MD5

          1f8b74ba7ada6ecde0f120c7cfb4819e

          SHA1

          97d7018cf02183796adbcb26a8f170c232f96d11

          SHA256

          58958798a306565aae0af82f90e69d853f1fc3164cfa88587d1ac91e839ae3ac

          SHA512

          c4dbd0296baaf3b01f8837b2a7f4b4b4e832b7b2b74aa92dde15013a0f489eb316fb096b5ed8042abeb37042f7f164b221d69586ec847d4ee72ed17af673a7d9

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s9645183.exe

          Filesize

          174KB

          MD5

          1f8b74ba7ada6ecde0f120c7cfb4819e

          SHA1

          97d7018cf02183796adbcb26a8f170c232f96d11

          SHA256

          58958798a306565aae0af82f90e69d853f1fc3164cfa88587d1ac91e839ae3ac

          SHA512

          c4dbd0296baaf3b01f8837b2a7f4b4b4e832b7b2b74aa92dde15013a0f489eb316fb096b5ed8042abeb37042f7f164b221d69586ec847d4ee72ed17af673a7d9

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7770330.exe

          Filesize

          217KB

          MD5

          e2101d60f07fcf4c106624451c194f09

          SHA1

          55e68f2f9d781a569442bf16b4e1861b1094ed6d

          SHA256

          f35bc4fb361cce1ca387cd582808ddd08066e07559d547e692d3455ecea9cd2f

          SHA512

          5bc8c31a8cf50900771fe780ee7af453e187431cd36221e49ebeaa2def8cfe65391da6f6008cbf1d39f122549832ef750ebb31cc2a24970c167fedab592c22c7

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7770330.exe

          Filesize

          217KB

          MD5

          e2101d60f07fcf4c106624451c194f09

          SHA1

          55e68f2f9d781a569442bf16b4e1861b1094ed6d

          SHA256

          f35bc4fb361cce1ca387cd582808ddd08066e07559d547e692d3455ecea9cd2f

          SHA512

          5bc8c31a8cf50900771fe780ee7af453e187431cd36221e49ebeaa2def8cfe65391da6f6008cbf1d39f122549832ef750ebb31cc2a24970c167fedab592c22c7

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6009359.exe

          Filesize

          15KB

          MD5

          303200af878955b69fc0bdea5a1e4af6

          SHA1

          3f8ca78f382d4276d05d18b1dfdbf7fa2995e9fb

          SHA256

          90936ad92515d85730eebe43f3c5e6a1233d6db463913e4958b83f14c3f08a6a

          SHA512

          0e4b7343daee54fc9bed215f5b19efb013231c5885449b56624a138f691e7e82300b58e512c1d8179dd62e9bcea77ca11b17d57e55ace5fff9c622a16492fcca

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6009359.exe

          Filesize

          15KB

          MD5

          303200af878955b69fc0bdea5a1e4af6

          SHA1

          3f8ca78f382d4276d05d18b1dfdbf7fa2995e9fb

          SHA256

          90936ad92515d85730eebe43f3c5e6a1233d6db463913e4958b83f14c3f08a6a

          SHA512

          0e4b7343daee54fc9bed215f5b19efb013231c5885449b56624a138f691e7e82300b58e512c1d8179dd62e9bcea77ca11b17d57e55ace5fff9c622a16492fcca

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r1936623.exe

          Filesize

          140KB

          MD5

          1b5dcc5265164c4b014a5e863f4e5c9a

          SHA1

          374de0e1e4ca874535f7d68c278d65e58977a8f7

          SHA256

          986cc256f29c17155a2a260ca3d75d71194c79ee8ed7096ad1aebdb6e77d1ac9

          SHA512

          084661a379c82b35a70cf369b8865e563861edec32b4f3d08b64a67d71c81e9c6b8aacaf7ea3ed57b0df194a9b7e96b87f8077f521721a71e9e83e32a74e853e

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r1936623.exe

          Filesize

          140KB

          MD5

          1b5dcc5265164c4b014a5e863f4e5c9a

          SHA1

          374de0e1e4ca874535f7d68c278d65e58977a8f7

          SHA256

          986cc256f29c17155a2a260ca3d75d71194c79ee8ed7096ad1aebdb6e77d1ac9

          SHA512

          084661a379c82b35a70cf369b8865e563861edec32b4f3d08b64a67d71c81e9c6b8aacaf7ea3ed57b0df194a9b7e96b87f8077f521721a71e9e83e32a74e853e

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z6877854.exe

          Filesize

          823KB

          MD5

          e9d0102d456aeb0887c2f9962c772b3f

          SHA1

          525d3b40a79e6ce51c52f80a9adeb01063465e23

          SHA256

          933ed44e940cd0db4d2e26d030e02678dfabbd2a09bb2595d13e6289a9ca729f

          SHA512

          7f68c0a4b63651ea5ce9bd676768d76bbdb1523464ce203159cc1ad2bb4721ce8b822f02a1614314084b1cf83f21672fbe1361a0c6f02534b67cfc15f9e2dba4

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z6877854.exe

          Filesize

          823KB

          MD5

          e9d0102d456aeb0887c2f9962c772b3f

          SHA1

          525d3b40a79e6ce51c52f80a9adeb01063465e23

          SHA256

          933ed44e940cd0db4d2e26d030e02678dfabbd2a09bb2595d13e6289a9ca729f

          SHA512

          7f68c0a4b63651ea5ce9bd676768d76bbdb1523464ce203159cc1ad2bb4721ce8b822f02a1614314084b1cf83f21672fbe1361a0c6f02534b67cfc15f9e2dba4

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z6781914.exe

          Filesize

          597KB

          MD5

          f7962886e02583494465f3c2cfbfd652

          SHA1

          cff3b28bd7469b418b74780d2cd9fbde4ed18647

          SHA256

          e917e33e86f29a0a035e5ff91ec851a9eb6381e6ef58a545429ddf215c521dd8

          SHA512

          cb9c25e8d50e53987ca28907621388b5734d5251805e84c331de7cf7df67dff914c2ecaa430f0ca13bd10c347e2dd9398944fa8f8652d7c18f3fd139f5902cb6

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z6781914.exe

          Filesize

          597KB

          MD5

          f7962886e02583494465f3c2cfbfd652

          SHA1

          cff3b28bd7469b418b74780d2cd9fbde4ed18647

          SHA256

          e917e33e86f29a0a035e5ff91ec851a9eb6381e6ef58a545429ddf215c521dd8

          SHA512

          cb9c25e8d50e53987ca28907621388b5734d5251805e84c331de7cf7df67dff914c2ecaa430f0ca13bd10c347e2dd9398944fa8f8652d7c18f3fd139f5902cb6

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z7039270.exe

          Filesize

          372KB

          MD5

          373b388e5dc18992578485fc6a520d00

          SHA1

          91ef1b54d9a381d2df0bf4bffe89cc1791e64374

          SHA256

          c0415d2404e07d8072848ffe59b18e4f384673db1d3a36eae083e18871739a1a

          SHA512

          6769751180bd06f310f4aa31ba3f5654690df02313d107fb8a2a9624408f6596fc1e46ceec6f3705dcc360834241912bfe6bbbbe031ed85eb5e7a157376a10dd

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z7039270.exe

          Filesize

          372KB

          MD5

          373b388e5dc18992578485fc6a520d00

          SHA1

          91ef1b54d9a381d2df0bf4bffe89cc1791e64374

          SHA256

          c0415d2404e07d8072848ffe59b18e4f384673db1d3a36eae083e18871739a1a

          SHA512

          6769751180bd06f310f4aa31ba3f5654690df02313d107fb8a2a9624408f6596fc1e46ceec6f3705dcc360834241912bfe6bbbbe031ed85eb5e7a157376a10dd

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\s9645183.exe

          Filesize

          174KB

          MD5

          1f8b74ba7ada6ecde0f120c7cfb4819e

          SHA1

          97d7018cf02183796adbcb26a8f170c232f96d11

          SHA256

          58958798a306565aae0af82f90e69d853f1fc3164cfa88587d1ac91e839ae3ac

          SHA512

          c4dbd0296baaf3b01f8837b2a7f4b4b4e832b7b2b74aa92dde15013a0f489eb316fb096b5ed8042abeb37042f7f164b221d69586ec847d4ee72ed17af673a7d9

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\s9645183.exe

          Filesize

          174KB

          MD5

          1f8b74ba7ada6ecde0f120c7cfb4819e

          SHA1

          97d7018cf02183796adbcb26a8f170c232f96d11

          SHA256

          58958798a306565aae0af82f90e69d853f1fc3164cfa88587d1ac91e839ae3ac

          SHA512

          c4dbd0296baaf3b01f8837b2a7f4b4b4e832b7b2b74aa92dde15013a0f489eb316fb096b5ed8042abeb37042f7f164b221d69586ec847d4ee72ed17af673a7d9

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z7770330.exe

          Filesize

          217KB

          MD5

          e2101d60f07fcf4c106624451c194f09

          SHA1

          55e68f2f9d781a569442bf16b4e1861b1094ed6d

          SHA256

          f35bc4fb361cce1ca387cd582808ddd08066e07559d547e692d3455ecea9cd2f

          SHA512

          5bc8c31a8cf50900771fe780ee7af453e187431cd36221e49ebeaa2def8cfe65391da6f6008cbf1d39f122549832ef750ebb31cc2a24970c167fedab592c22c7

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z7770330.exe

          Filesize

          217KB

          MD5

          e2101d60f07fcf4c106624451c194f09

          SHA1

          55e68f2f9d781a569442bf16b4e1861b1094ed6d

          SHA256

          f35bc4fb361cce1ca387cd582808ddd08066e07559d547e692d3455ecea9cd2f

          SHA512

          5bc8c31a8cf50900771fe780ee7af453e187431cd36221e49ebeaa2def8cfe65391da6f6008cbf1d39f122549832ef750ebb31cc2a24970c167fedab592c22c7

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6009359.exe

          Filesize

          15KB

          MD5

          303200af878955b69fc0bdea5a1e4af6

          SHA1

          3f8ca78f382d4276d05d18b1dfdbf7fa2995e9fb

          SHA256

          90936ad92515d85730eebe43f3c5e6a1233d6db463913e4958b83f14c3f08a6a

          SHA512

          0e4b7343daee54fc9bed215f5b19efb013231c5885449b56624a138f691e7e82300b58e512c1d8179dd62e9bcea77ca11b17d57e55ace5fff9c622a16492fcca

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r1936623.exe

          Filesize

          140KB

          MD5

          1b5dcc5265164c4b014a5e863f4e5c9a

          SHA1

          374de0e1e4ca874535f7d68c278d65e58977a8f7

          SHA256

          986cc256f29c17155a2a260ca3d75d71194c79ee8ed7096ad1aebdb6e77d1ac9

          SHA512

          084661a379c82b35a70cf369b8865e563861edec32b4f3d08b64a67d71c81e9c6b8aacaf7ea3ed57b0df194a9b7e96b87f8077f521721a71e9e83e32a74e853e

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r1936623.exe

          Filesize

          140KB

          MD5

          1b5dcc5265164c4b014a5e863f4e5c9a

          SHA1

          374de0e1e4ca874535f7d68c278d65e58977a8f7

          SHA256

          986cc256f29c17155a2a260ca3d75d71194c79ee8ed7096ad1aebdb6e77d1ac9

          SHA512

          084661a379c82b35a70cf369b8865e563861edec32b4f3d08b64a67d71c81e9c6b8aacaf7ea3ed57b0df194a9b7e96b87f8077f521721a71e9e83e32a74e853e

        • memory/2696-64-0x0000000000360000-0x0000000000390000-memory.dmp

          Filesize

          192KB

        • memory/2696-65-0x00000000004E0000-0x00000000004E6000-memory.dmp

          Filesize

          24KB

        • memory/2848-51-0x000007FEF54B0000-0x000007FEF5E9C000-memory.dmp

          Filesize

          9.9MB

        • memory/2848-50-0x000007FEF54B0000-0x000007FEF5E9C000-memory.dmp

          Filesize

          9.9MB

        • memory/2848-49-0x000007FEF54B0000-0x000007FEF5E9C000-memory.dmp

          Filesize

          9.9MB

        • memory/2848-48-0x0000000000F30000-0x0000000000F3A000-memory.dmp

          Filesize

          40KB