Analysis

  • max time kernel
    276s
  • max time network
    289s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    28/08/2023, 04:35

General

  • Target

    z2848072.exe

  • Size

    823KB

  • MD5

    c89579e86bf769c30020b945ae869655

  • SHA1

    19217e389889053badeabf86ee1a736cb19ad639

  • SHA256

    80149ad920d25b8d0ada7da35e3d8b08c9b56e64b23e8cb5bf4539c31017800a

  • SHA512

    3c0d01a3b673735906202d92cc74d0dacc3647642a37e3d8d4841b46f59730e25bdeb8ee5fbf42d1ed057c23b106bc73062b7af82d459feec58703001d9a07ac

  • SSDEEP

    24576:gyhs6ofNJ9Zf0FqhhzUzThf1lXJR+4PK4HB037m6F:nniNJL8Fq1UjhJI34HB03t

Malware Config

Extracted

Family

redline

Botnet

jaja

C2

77.91.124.73:19071

Attributes
  • auth_value

    3670179d176ca399ed08e7914610b43c

Signatures

  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 11 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\z2848072.exe
    "C:\Users\Admin\AppData\Local\Temp\z2848072.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3036
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2912421.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2912421.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1928
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6488620.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6488620.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2548
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0256963.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0256963.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2980
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\q1851358.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\q1851358.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2864
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r0291608.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r0291608.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:3032
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\s9187945.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\s9187945.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2740

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2912421.exe

          Filesize

          597KB

          MD5

          e1f43db045463b855af2a6dbc8b78590

          SHA1

          77fccecaef7be5f29c59271692e1a3c26d523fc5

          SHA256

          6ca12fd94eab02dd88f03c13408bf9eb57f576745079a3d17e3730808dc131f9

          SHA512

          30f03a6c4c70d8af9c8c37ed40c707db75605efa3a82ace60c46e5a128379f50b1146e487f741fdd85061349585e4a603df46c0cfd71a329668e465f96ec38a2

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2912421.exe

          Filesize

          597KB

          MD5

          e1f43db045463b855af2a6dbc8b78590

          SHA1

          77fccecaef7be5f29c59271692e1a3c26d523fc5

          SHA256

          6ca12fd94eab02dd88f03c13408bf9eb57f576745079a3d17e3730808dc131f9

          SHA512

          30f03a6c4c70d8af9c8c37ed40c707db75605efa3a82ace60c46e5a128379f50b1146e487f741fdd85061349585e4a603df46c0cfd71a329668e465f96ec38a2

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6488620.exe

          Filesize

          372KB

          MD5

          72166ac91123af2e679e1ddbcbe0280c

          SHA1

          6bc7f1d1b5d37ca9f5b6b51c37f87b2eca2e24f7

          SHA256

          ed5cc0c3008877f9ddca890fb87f631c91fd6db69249c023fddf89e7a30a67e7

          SHA512

          74aaf2f1d6121517ec1363796f8fd31b1ea81575789c3005c535784886e08b7fbc11b15e2ebc4cbda1880032b879a176dea11c95e2a6923d628d60453c32fb45

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6488620.exe

          Filesize

          372KB

          MD5

          72166ac91123af2e679e1ddbcbe0280c

          SHA1

          6bc7f1d1b5d37ca9f5b6b51c37f87b2eca2e24f7

          SHA256

          ed5cc0c3008877f9ddca890fb87f631c91fd6db69249c023fddf89e7a30a67e7

          SHA512

          74aaf2f1d6121517ec1363796f8fd31b1ea81575789c3005c535784886e08b7fbc11b15e2ebc4cbda1880032b879a176dea11c95e2a6923d628d60453c32fb45

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\s9187945.exe

          Filesize

          174KB

          MD5

          0b720dcaf7800886484a5653ab3d3b0b

          SHA1

          71dc69bdf5904ddefdf7cfc4730969ed088ec126

          SHA256

          d33dd57a407234380eb3e83bd61be94840c24cac4aa27b84d9d1ce1e56f5df61

          SHA512

          05e17fe9cb69da689bb3e7cf2b82798fb167ed622c55f86369b08103829cf9134fb91ebfa65d325e680c1caa4bd970c29edee9f629bad0d2cf3ec6ac0b3d83d9

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\s9187945.exe

          Filesize

          174KB

          MD5

          0b720dcaf7800886484a5653ab3d3b0b

          SHA1

          71dc69bdf5904ddefdf7cfc4730969ed088ec126

          SHA256

          d33dd57a407234380eb3e83bd61be94840c24cac4aa27b84d9d1ce1e56f5df61

          SHA512

          05e17fe9cb69da689bb3e7cf2b82798fb167ed622c55f86369b08103829cf9134fb91ebfa65d325e680c1caa4bd970c29edee9f629bad0d2cf3ec6ac0b3d83d9

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0256963.exe

          Filesize

          217KB

          MD5

          536fdd473974df3d4a0ca6e8d07ca08b

          SHA1

          e59eb3a0b56ae4042576414d057de40ea8f67d94

          SHA256

          70ef9254eb80d5f844d46f023b76bc186c8ec7e74fde33a67c059079b844adb5

          SHA512

          1ef2514f8135e45ee7e8380dc1b29d028b62d104cd5582a42f30f1ae8cb78989883d1a7e2762187b52893512cf03b78a4f7a73581ba228384f038caeec082bcc

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0256963.exe

          Filesize

          217KB

          MD5

          536fdd473974df3d4a0ca6e8d07ca08b

          SHA1

          e59eb3a0b56ae4042576414d057de40ea8f67d94

          SHA256

          70ef9254eb80d5f844d46f023b76bc186c8ec7e74fde33a67c059079b844adb5

          SHA512

          1ef2514f8135e45ee7e8380dc1b29d028b62d104cd5582a42f30f1ae8cb78989883d1a7e2762187b52893512cf03b78a4f7a73581ba228384f038caeec082bcc

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\q1851358.exe

          Filesize

          14KB

          MD5

          2b33dc9f94f0ff1f1a2b4ec50ceddbf5

          SHA1

          2c154597c5696c4a493271eaeb6dcf714b256a79

          SHA256

          32aa2648cc29a5aa6abce6fc9203434ac5b772b7f7f2a1a725a82dc2b0d79aa2

          SHA512

          9e60fe795628173828490c721f52b3ff186e69383958f5671a6b9985c6ebcfc623d959d46403c5a98455257cb6140e28ceca2f99af331ca20809b54e08292189

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\q1851358.exe

          Filesize

          14KB

          MD5

          2b33dc9f94f0ff1f1a2b4ec50ceddbf5

          SHA1

          2c154597c5696c4a493271eaeb6dcf714b256a79

          SHA256

          32aa2648cc29a5aa6abce6fc9203434ac5b772b7f7f2a1a725a82dc2b0d79aa2

          SHA512

          9e60fe795628173828490c721f52b3ff186e69383958f5671a6b9985c6ebcfc623d959d46403c5a98455257cb6140e28ceca2f99af331ca20809b54e08292189

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r0291608.exe

          Filesize

          140KB

          MD5

          93bdbd71164f3aba04fae02d98e7048a

          SHA1

          c7ac3a250814491caa55108ec68f571008dd8a73

          SHA256

          1c9a430e89c03746ae76d53659f8875aa13afaf7bccb15ddd0050443677f655d

          SHA512

          53434dbeba3c0ea161a151ed25ea8a6dc4a92fd3692235d8e993e912f09f5e2aaff8a276ab9daf9c15cecceece592614d401caa1ee99b3bdc23d61b32d266be4

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r0291608.exe

          Filesize

          140KB

          MD5

          93bdbd71164f3aba04fae02d98e7048a

          SHA1

          c7ac3a250814491caa55108ec68f571008dd8a73

          SHA256

          1c9a430e89c03746ae76d53659f8875aa13afaf7bccb15ddd0050443677f655d

          SHA512

          53434dbeba3c0ea161a151ed25ea8a6dc4a92fd3692235d8e993e912f09f5e2aaff8a276ab9daf9c15cecceece592614d401caa1ee99b3bdc23d61b32d266be4

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z2912421.exe

          Filesize

          597KB

          MD5

          e1f43db045463b855af2a6dbc8b78590

          SHA1

          77fccecaef7be5f29c59271692e1a3c26d523fc5

          SHA256

          6ca12fd94eab02dd88f03c13408bf9eb57f576745079a3d17e3730808dc131f9

          SHA512

          30f03a6c4c70d8af9c8c37ed40c707db75605efa3a82ace60c46e5a128379f50b1146e487f741fdd85061349585e4a603df46c0cfd71a329668e465f96ec38a2

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z2912421.exe

          Filesize

          597KB

          MD5

          e1f43db045463b855af2a6dbc8b78590

          SHA1

          77fccecaef7be5f29c59271692e1a3c26d523fc5

          SHA256

          6ca12fd94eab02dd88f03c13408bf9eb57f576745079a3d17e3730808dc131f9

          SHA512

          30f03a6c4c70d8af9c8c37ed40c707db75605efa3a82ace60c46e5a128379f50b1146e487f741fdd85061349585e4a603df46c0cfd71a329668e465f96ec38a2

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z6488620.exe

          Filesize

          372KB

          MD5

          72166ac91123af2e679e1ddbcbe0280c

          SHA1

          6bc7f1d1b5d37ca9f5b6b51c37f87b2eca2e24f7

          SHA256

          ed5cc0c3008877f9ddca890fb87f631c91fd6db69249c023fddf89e7a30a67e7

          SHA512

          74aaf2f1d6121517ec1363796f8fd31b1ea81575789c3005c535784886e08b7fbc11b15e2ebc4cbda1880032b879a176dea11c95e2a6923d628d60453c32fb45

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z6488620.exe

          Filesize

          372KB

          MD5

          72166ac91123af2e679e1ddbcbe0280c

          SHA1

          6bc7f1d1b5d37ca9f5b6b51c37f87b2eca2e24f7

          SHA256

          ed5cc0c3008877f9ddca890fb87f631c91fd6db69249c023fddf89e7a30a67e7

          SHA512

          74aaf2f1d6121517ec1363796f8fd31b1ea81575789c3005c535784886e08b7fbc11b15e2ebc4cbda1880032b879a176dea11c95e2a6923d628d60453c32fb45

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\s9187945.exe

          Filesize

          174KB

          MD5

          0b720dcaf7800886484a5653ab3d3b0b

          SHA1

          71dc69bdf5904ddefdf7cfc4730969ed088ec126

          SHA256

          d33dd57a407234380eb3e83bd61be94840c24cac4aa27b84d9d1ce1e56f5df61

          SHA512

          05e17fe9cb69da689bb3e7cf2b82798fb167ed622c55f86369b08103829cf9134fb91ebfa65d325e680c1caa4bd970c29edee9f629bad0d2cf3ec6ac0b3d83d9

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\s9187945.exe

          Filesize

          174KB

          MD5

          0b720dcaf7800886484a5653ab3d3b0b

          SHA1

          71dc69bdf5904ddefdf7cfc4730969ed088ec126

          SHA256

          d33dd57a407234380eb3e83bd61be94840c24cac4aa27b84d9d1ce1e56f5df61

          SHA512

          05e17fe9cb69da689bb3e7cf2b82798fb167ed622c55f86369b08103829cf9134fb91ebfa65d325e680c1caa4bd970c29edee9f629bad0d2cf3ec6ac0b3d83d9

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z0256963.exe

          Filesize

          217KB

          MD5

          536fdd473974df3d4a0ca6e8d07ca08b

          SHA1

          e59eb3a0b56ae4042576414d057de40ea8f67d94

          SHA256

          70ef9254eb80d5f844d46f023b76bc186c8ec7e74fde33a67c059079b844adb5

          SHA512

          1ef2514f8135e45ee7e8380dc1b29d028b62d104cd5582a42f30f1ae8cb78989883d1a7e2762187b52893512cf03b78a4f7a73581ba228384f038caeec082bcc

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z0256963.exe

          Filesize

          217KB

          MD5

          536fdd473974df3d4a0ca6e8d07ca08b

          SHA1

          e59eb3a0b56ae4042576414d057de40ea8f67d94

          SHA256

          70ef9254eb80d5f844d46f023b76bc186c8ec7e74fde33a67c059079b844adb5

          SHA512

          1ef2514f8135e45ee7e8380dc1b29d028b62d104cd5582a42f30f1ae8cb78989883d1a7e2762187b52893512cf03b78a4f7a73581ba228384f038caeec082bcc

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\q1851358.exe

          Filesize

          14KB

          MD5

          2b33dc9f94f0ff1f1a2b4ec50ceddbf5

          SHA1

          2c154597c5696c4a493271eaeb6dcf714b256a79

          SHA256

          32aa2648cc29a5aa6abce6fc9203434ac5b772b7f7f2a1a725a82dc2b0d79aa2

          SHA512

          9e60fe795628173828490c721f52b3ff186e69383958f5671a6b9985c6ebcfc623d959d46403c5a98455257cb6140e28ceca2f99af331ca20809b54e08292189

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\r0291608.exe

          Filesize

          140KB

          MD5

          93bdbd71164f3aba04fae02d98e7048a

          SHA1

          c7ac3a250814491caa55108ec68f571008dd8a73

          SHA256

          1c9a430e89c03746ae76d53659f8875aa13afaf7bccb15ddd0050443677f655d

          SHA512

          53434dbeba3c0ea161a151ed25ea8a6dc4a92fd3692235d8e993e912f09f5e2aaff8a276ab9daf9c15cecceece592614d401caa1ee99b3bdc23d61b32d266be4

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\r0291608.exe

          Filesize

          140KB

          MD5

          93bdbd71164f3aba04fae02d98e7048a

          SHA1

          c7ac3a250814491caa55108ec68f571008dd8a73

          SHA256

          1c9a430e89c03746ae76d53659f8875aa13afaf7bccb15ddd0050443677f655d

          SHA512

          53434dbeba3c0ea161a151ed25ea8a6dc4a92fd3692235d8e993e912f09f5e2aaff8a276ab9daf9c15cecceece592614d401caa1ee99b3bdc23d61b32d266be4

        • memory/2740-54-0x0000000000FB0000-0x0000000000FE0000-memory.dmp

          Filesize

          192KB

        • memory/2740-55-0x00000000004F0000-0x00000000004F6000-memory.dmp

          Filesize

          24KB

        • memory/2864-41-0x000007FEF5990000-0x000007FEF637C000-memory.dmp

          Filesize

          9.9MB

        • memory/2864-40-0x000007FEF5990000-0x000007FEF637C000-memory.dmp

          Filesize

          9.9MB

        • memory/2864-39-0x000007FEF5990000-0x000007FEF637C000-memory.dmp

          Filesize

          9.9MB

        • memory/2864-38-0x0000000000A70000-0x0000000000A7A000-memory.dmp

          Filesize

          40KB