Analysis

  • max time kernel
    278s
  • max time network
    291s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    28-08-2023 04:37

General

  • Target

    z3355895.exe

  • Size

    823KB

  • MD5

    6b33e28f85c1eb0363dcf90ffcede676

  • SHA1

    273da6f53b2debc200410fac12042534e3c10892

  • SHA256

    b0217a3d624c058f1cacc3dd5eb21f69e8aee7ccf7615d9943abc6184b349955

  • SHA512

    c4f1a62039331e0986ebd6ea464aeb671d5e5774811290960e436025dccc8ab5c1a7ccd28b63a158388d04c5536107d3f272b149759ad38fef6a9a21454dc40d

  • SSDEEP

    12288:XMrMy90tb2Fx7X2mZYIYQHfZpwswR7A4kWPI7m51cnLUIXQ9xo8HGWU2Uxh4lpF0:7yS2F8mqIYw/wswFZZPIisU8Q3mWXt0

Malware Config

Extracted

Family

redline

Botnet

stas

C2

77.91.124.82:19071

Attributes
  • auth_value

    db6d96c4eade05afc28c31d9ad73a73c

Signatures

  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 11 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\z3355895.exe
    "C:\Users\Admin\AppData\Local\Temp\z3355895.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1944
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9005121.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9005121.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1060
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9903491.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9903491.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2128
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0229822.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0229822.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:816
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\q1692333.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\q1692333.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:392
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r5312698.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r5312698.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:2820
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\s9173115.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\s9173115.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:3032

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9005121.exe

    Filesize

    598KB

    MD5

    2a73ee718b6a2fc1f7e7a97be01851e0

    SHA1

    331bba485ae0590cd17654bb55100a6c653fa8bf

    SHA256

    af2bde137f7456de033db4d71f7af25417d02033c12abb8bc274f4f69a656252

    SHA512

    aeff483974248956453471f69a528580019ac888dd64d56864ec161aeb7a61ddaf385a76b5c9ceb2ce5397e2d53a060f6e7a4a6ac6ee1a725b7a0f665a8d695a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9005121.exe

    Filesize

    598KB

    MD5

    2a73ee718b6a2fc1f7e7a97be01851e0

    SHA1

    331bba485ae0590cd17654bb55100a6c653fa8bf

    SHA256

    af2bde137f7456de033db4d71f7af25417d02033c12abb8bc274f4f69a656252

    SHA512

    aeff483974248956453471f69a528580019ac888dd64d56864ec161aeb7a61ddaf385a76b5c9ceb2ce5397e2d53a060f6e7a4a6ac6ee1a725b7a0f665a8d695a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9903491.exe

    Filesize

    372KB

    MD5

    37f31c1bd8a007f9c340cee0a36a1978

    SHA1

    ada78da7ac57ffe73d348ca9c6e18e58e2283174

    SHA256

    9b16b45081d9f6e4eacd6b0eb2907b91389f9be012b453b62393ca47595df553

    SHA512

    c4d2e84d1bc1551ec00812a3e1194d727a29f156a453238a9059ce50b632c44e90e8a1aee746125868ea109fc8acc39c2d3973fb5faf89e9f55b3d99e900c42b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9903491.exe

    Filesize

    372KB

    MD5

    37f31c1bd8a007f9c340cee0a36a1978

    SHA1

    ada78da7ac57ffe73d348ca9c6e18e58e2283174

    SHA256

    9b16b45081d9f6e4eacd6b0eb2907b91389f9be012b453b62393ca47595df553

    SHA512

    c4d2e84d1bc1551ec00812a3e1194d727a29f156a453238a9059ce50b632c44e90e8a1aee746125868ea109fc8acc39c2d3973fb5faf89e9f55b3d99e900c42b

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\s9173115.exe

    Filesize

    174KB

    MD5

    bf1fbc78b555e851ad5e87bd6b6d39f1

    SHA1

    50f9aa3e1e3db16d10f92558e4385a6a8e6aa12b

    SHA256

    2ddf24548fb078acd4a3ab902f84021c52eefaa6f72f06126bda9b642aa4566e

    SHA512

    00f76604d8593da586b7f50fe677a3d94425e2bca12baf9a8c101efdfed6d0351fca7dafcccea06fc79732f95f540c6b939ee2302d666107172e68d81d4d7791

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\s9173115.exe

    Filesize

    174KB

    MD5

    bf1fbc78b555e851ad5e87bd6b6d39f1

    SHA1

    50f9aa3e1e3db16d10f92558e4385a6a8e6aa12b

    SHA256

    2ddf24548fb078acd4a3ab902f84021c52eefaa6f72f06126bda9b642aa4566e

    SHA512

    00f76604d8593da586b7f50fe677a3d94425e2bca12baf9a8c101efdfed6d0351fca7dafcccea06fc79732f95f540c6b939ee2302d666107172e68d81d4d7791

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0229822.exe

    Filesize

    217KB

    MD5

    d3fb0d6ac1c25081e49f59f67bbbe749

    SHA1

    f24a1ad77a695800c99c41c36fac9743e314b84c

    SHA256

    15955632f175d9251d3eb24e66230e0fae1598ab014dd9a911b0856192be10d4

    SHA512

    25b3a95597e83b556e8c9a23505b20c53f5b57bcd0bb2d04b82cff851b1cacf7baa1ae80fefe2cd540f2ca727e95cfe153971514b6487127c2107453d9702a9a

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0229822.exe

    Filesize

    217KB

    MD5

    d3fb0d6ac1c25081e49f59f67bbbe749

    SHA1

    f24a1ad77a695800c99c41c36fac9743e314b84c

    SHA256

    15955632f175d9251d3eb24e66230e0fae1598ab014dd9a911b0856192be10d4

    SHA512

    25b3a95597e83b556e8c9a23505b20c53f5b57bcd0bb2d04b82cff851b1cacf7baa1ae80fefe2cd540f2ca727e95cfe153971514b6487127c2107453d9702a9a

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\q1692333.exe

    Filesize

    15KB

    MD5

    932b2ddaf63311f7c4b619c6bf0fe403

    SHA1

    1ee3a38dbb776a5e95855cafd66977cc3b073261

    SHA256

    8d09ac6e4dde88074dbba05bc7495381422abf17902f79e8072b3655ca5672b3

    SHA512

    4939aef8bfbbfc07e262ff4280e65f3d25e55a3572b8184091b58514fd49f67b719069944f2b26bf459dcfacbbe9cac9bf1ce8a842477c28565c40ad398bc654

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\q1692333.exe

    Filesize

    15KB

    MD5

    932b2ddaf63311f7c4b619c6bf0fe403

    SHA1

    1ee3a38dbb776a5e95855cafd66977cc3b073261

    SHA256

    8d09ac6e4dde88074dbba05bc7495381422abf17902f79e8072b3655ca5672b3

    SHA512

    4939aef8bfbbfc07e262ff4280e65f3d25e55a3572b8184091b58514fd49f67b719069944f2b26bf459dcfacbbe9cac9bf1ce8a842477c28565c40ad398bc654

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r5312698.exe

    Filesize

    140KB

    MD5

    9bb9dd7aef5faa22ea475689e40d2b95

    SHA1

    19fa7b88ea00b3506e853b49ebf0c2f394322758

    SHA256

    55775f9024c361cabbb70d870522a5f9d1dd36c8def7a944dd5cfa240f936ed5

    SHA512

    5639b707d4d0e3d8230f321c378c49cd5ed4d573d2e6b22e649ee3f33d59ff30ef1cb1c3b5b93033467062bcd733bc0a042035bc40421cf60c265c2bd5e12999

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r5312698.exe

    Filesize

    140KB

    MD5

    9bb9dd7aef5faa22ea475689e40d2b95

    SHA1

    19fa7b88ea00b3506e853b49ebf0c2f394322758

    SHA256

    55775f9024c361cabbb70d870522a5f9d1dd36c8def7a944dd5cfa240f936ed5

    SHA512

    5639b707d4d0e3d8230f321c378c49cd5ed4d573d2e6b22e649ee3f33d59ff30ef1cb1c3b5b93033467062bcd733bc0a042035bc40421cf60c265c2bd5e12999

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z9005121.exe

    Filesize

    598KB

    MD5

    2a73ee718b6a2fc1f7e7a97be01851e0

    SHA1

    331bba485ae0590cd17654bb55100a6c653fa8bf

    SHA256

    af2bde137f7456de033db4d71f7af25417d02033c12abb8bc274f4f69a656252

    SHA512

    aeff483974248956453471f69a528580019ac888dd64d56864ec161aeb7a61ddaf385a76b5c9ceb2ce5397e2d53a060f6e7a4a6ac6ee1a725b7a0f665a8d695a

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z9005121.exe

    Filesize

    598KB

    MD5

    2a73ee718b6a2fc1f7e7a97be01851e0

    SHA1

    331bba485ae0590cd17654bb55100a6c653fa8bf

    SHA256

    af2bde137f7456de033db4d71f7af25417d02033c12abb8bc274f4f69a656252

    SHA512

    aeff483974248956453471f69a528580019ac888dd64d56864ec161aeb7a61ddaf385a76b5c9ceb2ce5397e2d53a060f6e7a4a6ac6ee1a725b7a0f665a8d695a

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z9903491.exe

    Filesize

    372KB

    MD5

    37f31c1bd8a007f9c340cee0a36a1978

    SHA1

    ada78da7ac57ffe73d348ca9c6e18e58e2283174

    SHA256

    9b16b45081d9f6e4eacd6b0eb2907b91389f9be012b453b62393ca47595df553

    SHA512

    c4d2e84d1bc1551ec00812a3e1194d727a29f156a453238a9059ce50b632c44e90e8a1aee746125868ea109fc8acc39c2d3973fb5faf89e9f55b3d99e900c42b

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z9903491.exe

    Filesize

    372KB

    MD5

    37f31c1bd8a007f9c340cee0a36a1978

    SHA1

    ada78da7ac57ffe73d348ca9c6e18e58e2283174

    SHA256

    9b16b45081d9f6e4eacd6b0eb2907b91389f9be012b453b62393ca47595df553

    SHA512

    c4d2e84d1bc1551ec00812a3e1194d727a29f156a453238a9059ce50b632c44e90e8a1aee746125868ea109fc8acc39c2d3973fb5faf89e9f55b3d99e900c42b

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\s9173115.exe

    Filesize

    174KB

    MD5

    bf1fbc78b555e851ad5e87bd6b6d39f1

    SHA1

    50f9aa3e1e3db16d10f92558e4385a6a8e6aa12b

    SHA256

    2ddf24548fb078acd4a3ab902f84021c52eefaa6f72f06126bda9b642aa4566e

    SHA512

    00f76604d8593da586b7f50fe677a3d94425e2bca12baf9a8c101efdfed6d0351fca7dafcccea06fc79732f95f540c6b939ee2302d666107172e68d81d4d7791

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\s9173115.exe

    Filesize

    174KB

    MD5

    bf1fbc78b555e851ad5e87bd6b6d39f1

    SHA1

    50f9aa3e1e3db16d10f92558e4385a6a8e6aa12b

    SHA256

    2ddf24548fb078acd4a3ab902f84021c52eefaa6f72f06126bda9b642aa4566e

    SHA512

    00f76604d8593da586b7f50fe677a3d94425e2bca12baf9a8c101efdfed6d0351fca7dafcccea06fc79732f95f540c6b939ee2302d666107172e68d81d4d7791

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z0229822.exe

    Filesize

    217KB

    MD5

    d3fb0d6ac1c25081e49f59f67bbbe749

    SHA1

    f24a1ad77a695800c99c41c36fac9743e314b84c

    SHA256

    15955632f175d9251d3eb24e66230e0fae1598ab014dd9a911b0856192be10d4

    SHA512

    25b3a95597e83b556e8c9a23505b20c53f5b57bcd0bb2d04b82cff851b1cacf7baa1ae80fefe2cd540f2ca727e95cfe153971514b6487127c2107453d9702a9a

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z0229822.exe

    Filesize

    217KB

    MD5

    d3fb0d6ac1c25081e49f59f67bbbe749

    SHA1

    f24a1ad77a695800c99c41c36fac9743e314b84c

    SHA256

    15955632f175d9251d3eb24e66230e0fae1598ab014dd9a911b0856192be10d4

    SHA512

    25b3a95597e83b556e8c9a23505b20c53f5b57bcd0bb2d04b82cff851b1cacf7baa1ae80fefe2cd540f2ca727e95cfe153971514b6487127c2107453d9702a9a

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\q1692333.exe

    Filesize

    15KB

    MD5

    932b2ddaf63311f7c4b619c6bf0fe403

    SHA1

    1ee3a38dbb776a5e95855cafd66977cc3b073261

    SHA256

    8d09ac6e4dde88074dbba05bc7495381422abf17902f79e8072b3655ca5672b3

    SHA512

    4939aef8bfbbfc07e262ff4280e65f3d25e55a3572b8184091b58514fd49f67b719069944f2b26bf459dcfacbbe9cac9bf1ce8a842477c28565c40ad398bc654

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\r5312698.exe

    Filesize

    140KB

    MD5

    9bb9dd7aef5faa22ea475689e40d2b95

    SHA1

    19fa7b88ea00b3506e853b49ebf0c2f394322758

    SHA256

    55775f9024c361cabbb70d870522a5f9d1dd36c8def7a944dd5cfa240f936ed5

    SHA512

    5639b707d4d0e3d8230f321c378c49cd5ed4d573d2e6b22e649ee3f33d59ff30ef1cb1c3b5b93033467062bcd733bc0a042035bc40421cf60c265c2bd5e12999

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\r5312698.exe

    Filesize

    140KB

    MD5

    9bb9dd7aef5faa22ea475689e40d2b95

    SHA1

    19fa7b88ea00b3506e853b49ebf0c2f394322758

    SHA256

    55775f9024c361cabbb70d870522a5f9d1dd36c8def7a944dd5cfa240f936ed5

    SHA512

    5639b707d4d0e3d8230f321c378c49cd5ed4d573d2e6b22e649ee3f33d59ff30ef1cb1c3b5b93033467062bcd733bc0a042035bc40421cf60c265c2bd5e12999

  • memory/392-41-0x000007FEF5900000-0x000007FEF62EC000-memory.dmp

    Filesize

    9.9MB

  • memory/392-40-0x000007FEF5900000-0x000007FEF62EC000-memory.dmp

    Filesize

    9.9MB

  • memory/392-39-0x000007FEF5900000-0x000007FEF62EC000-memory.dmp

    Filesize

    9.9MB

  • memory/392-38-0x0000000000D40000-0x0000000000D4A000-memory.dmp

    Filesize

    40KB

  • memory/3032-54-0x0000000000A30000-0x0000000000A60000-memory.dmp

    Filesize

    192KB

  • memory/3032-55-0x00000000003D0000-0x00000000003D6000-memory.dmp

    Filesize

    24KB