Analysis

  • max time kernel
    293s
  • max time network
    300s
  • platform
    windows7_x64
  • resource
    win7-20230824-en
  • resource tags

    arch:x64arch:x86image:win7-20230824-enlocale:en-usos:windows7-x64system
  • submitted
    30/08/2023, 04:23

General

  • Target

    z6252258.exe

  • Size

    823KB

  • MD5

    8bd8339d7a7109d1b863a23ff6f14d08

  • SHA1

    028e58ab210eaaa9c4cee72fb1e76606670ce996

  • SHA256

    df8865f3bc0e832d4d9dc5793715eece8c90b335356c8f93305fd968b9d1ea47

  • SHA512

    01f60ce0b205923971ed6727152c2f0b342b40c3d616869c977bfa4473076c17cc63ad7d167e128f69760dad16639d2b89fb9003a5cbcccebeb4641b1bb9069e

  • SSDEEP

    24576:WyXUL+JkX+CgXMDh5whNRUiY10pGtH0Ja:lEAeRgXahChNRUf0Ga

Malware Config

Extracted

Family

redline

Botnet

sruta

C2

77.91.124.82:19071

Attributes
  • auth_value

    c556edcd49703319eca74247de20c236

Signatures

  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 11 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\z6252258.exe
    "C:\Users\Admin\AppData\Local\Temp\z6252258.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:772
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8297145.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8297145.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2428
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3592200.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3592200.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2380
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9025032.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9025032.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2240
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\q0393175.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\q0393175.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2236
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r1386398.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r1386398.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:2776
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\s7372376.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\s7372376.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2684

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8297145.exe

    Filesize

    599KB

    MD5

    2416894682f5e9b74488f703e2d6ba29

    SHA1

    3efc720cadf1f6cb571dfedf6128f1010e1bce64

    SHA256

    0d508e2242211d0fe9eb65671e147c8fd70c0889834f94d68bbbdb8944535338

    SHA512

    ce25d14400f996dba8340263edaa96fe4eec4480b570634e930e490c75920bd5d11f695aca242347dbf28881274baf23860e3cc1e9524ce117753f0791b5fe29

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8297145.exe

    Filesize

    599KB

    MD5

    2416894682f5e9b74488f703e2d6ba29

    SHA1

    3efc720cadf1f6cb571dfedf6128f1010e1bce64

    SHA256

    0d508e2242211d0fe9eb65671e147c8fd70c0889834f94d68bbbdb8944535338

    SHA512

    ce25d14400f996dba8340263edaa96fe4eec4480b570634e930e490c75920bd5d11f695aca242347dbf28881274baf23860e3cc1e9524ce117753f0791b5fe29

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3592200.exe

    Filesize

    373KB

    MD5

    0101cd7e1b8edb9b1d261a0037ba3474

    SHA1

    342b5f1a6f1e26868c50fccf46f71733f0d89eb8

    SHA256

    b1f55ba5f0b6c470094aa90bd07828c6f8eb844e0feb6b393553a5392b54cccb

    SHA512

    7edfcca67a1a3d6c52c569665a540f0f9cb613441ca74f0b5bcded2e5d2ddd97de1453432c7f6293b52b2f55001a81fb7edbdc83fb3e4c6b7fca8cc534e25a96

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3592200.exe

    Filesize

    373KB

    MD5

    0101cd7e1b8edb9b1d261a0037ba3474

    SHA1

    342b5f1a6f1e26868c50fccf46f71733f0d89eb8

    SHA256

    b1f55ba5f0b6c470094aa90bd07828c6f8eb844e0feb6b393553a5392b54cccb

    SHA512

    7edfcca67a1a3d6c52c569665a540f0f9cb613441ca74f0b5bcded2e5d2ddd97de1453432c7f6293b52b2f55001a81fb7edbdc83fb3e4c6b7fca8cc534e25a96

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\s7372376.exe

    Filesize

    174KB

    MD5

    349241a38bafd0ac4e859471e974fe4d

    SHA1

    adc8da0bd03a53947f95f585ea7fabf8831a3de5

    SHA256

    3331ead871b2176dcf7a3736fe8194c2b0d604c245b2eabfcc9648c87720d163

    SHA512

    7a68e72dec506c53e3b84dd884ec9f3133e06ecfdbbc2b2fdbbdbc6f1e349dd7331ede2425fd899450ea638205f75f781e8663358d0db9438ea1cf8333f89b04

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\s7372376.exe

    Filesize

    174KB

    MD5

    349241a38bafd0ac4e859471e974fe4d

    SHA1

    adc8da0bd03a53947f95f585ea7fabf8831a3de5

    SHA256

    3331ead871b2176dcf7a3736fe8194c2b0d604c245b2eabfcc9648c87720d163

    SHA512

    7a68e72dec506c53e3b84dd884ec9f3133e06ecfdbbc2b2fdbbdbc6f1e349dd7331ede2425fd899450ea638205f75f781e8663358d0db9438ea1cf8333f89b04

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9025032.exe

    Filesize

    217KB

    MD5

    0bf01d0a7f9b30070cec5ef4336b92dd

    SHA1

    2c720832934496005f87273c140f6882c49a8286

    SHA256

    b650dcab7fd82bd47a58e73eb229b14b7a96b32473b07b6cf1aed2d8f646c213

    SHA512

    dcd1cca9d5a9d769fd87065ccb0536c4f574f3c1753a203d6f920c1c8b0ac1d90d0690c6906fa56f17f9ee29a2c203230d5ea9ecfbf3d7b0fd49c91c83d300a4

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9025032.exe

    Filesize

    217KB

    MD5

    0bf01d0a7f9b30070cec5ef4336b92dd

    SHA1

    2c720832934496005f87273c140f6882c49a8286

    SHA256

    b650dcab7fd82bd47a58e73eb229b14b7a96b32473b07b6cf1aed2d8f646c213

    SHA512

    dcd1cca9d5a9d769fd87065ccb0536c4f574f3c1753a203d6f920c1c8b0ac1d90d0690c6906fa56f17f9ee29a2c203230d5ea9ecfbf3d7b0fd49c91c83d300a4

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\q0393175.exe

    Filesize

    17KB

    MD5

    25f22091beb8ae2f318226bb6005ca3c

    SHA1

    cc03ae7a06a3ff5d8cd63c25764b28ec6aa3c0f2

    SHA256

    7c34fb203761d24ba673c666a98aca34782a3bf73566fc5c313dfb631d49a62c

    SHA512

    0244f2fa9798bf1a636f00289d7bd1290e9906b7375374fdd0834042494c88b2e4d16b8565f8026588e4bf8b5b98b1be8b0ea0583e517df70cd4fe6cf0740e57

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\q0393175.exe

    Filesize

    17KB

    MD5

    25f22091beb8ae2f318226bb6005ca3c

    SHA1

    cc03ae7a06a3ff5d8cd63c25764b28ec6aa3c0f2

    SHA256

    7c34fb203761d24ba673c666a98aca34782a3bf73566fc5c313dfb631d49a62c

    SHA512

    0244f2fa9798bf1a636f00289d7bd1290e9906b7375374fdd0834042494c88b2e4d16b8565f8026588e4bf8b5b98b1be8b0ea0583e517df70cd4fe6cf0740e57

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r1386398.exe

    Filesize

    141KB

    MD5

    a1f50e9eb29422e2a074f540775c78e5

    SHA1

    ef2c12ddf2b33b781274744bbe4990c133eb2b9b

    SHA256

    94eaf8b3b3335b191ca5f53157cfe665eca75c84f2a8b4e6361f5adf0b3fed4f

    SHA512

    18955ddf8fac8630d798b59918dcac45b33f6808841469357613c0bd6d4c2e1f4dd52123532c65bd495ba65b91cd0fff98004c67e6801804c0840c189a591e07

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r1386398.exe

    Filesize

    141KB

    MD5

    a1f50e9eb29422e2a074f540775c78e5

    SHA1

    ef2c12ddf2b33b781274744bbe4990c133eb2b9b

    SHA256

    94eaf8b3b3335b191ca5f53157cfe665eca75c84f2a8b4e6361f5adf0b3fed4f

    SHA512

    18955ddf8fac8630d798b59918dcac45b33f6808841469357613c0bd6d4c2e1f4dd52123532c65bd495ba65b91cd0fff98004c67e6801804c0840c189a591e07

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z8297145.exe

    Filesize

    599KB

    MD5

    2416894682f5e9b74488f703e2d6ba29

    SHA1

    3efc720cadf1f6cb571dfedf6128f1010e1bce64

    SHA256

    0d508e2242211d0fe9eb65671e147c8fd70c0889834f94d68bbbdb8944535338

    SHA512

    ce25d14400f996dba8340263edaa96fe4eec4480b570634e930e490c75920bd5d11f695aca242347dbf28881274baf23860e3cc1e9524ce117753f0791b5fe29

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z8297145.exe

    Filesize

    599KB

    MD5

    2416894682f5e9b74488f703e2d6ba29

    SHA1

    3efc720cadf1f6cb571dfedf6128f1010e1bce64

    SHA256

    0d508e2242211d0fe9eb65671e147c8fd70c0889834f94d68bbbdb8944535338

    SHA512

    ce25d14400f996dba8340263edaa96fe4eec4480b570634e930e490c75920bd5d11f695aca242347dbf28881274baf23860e3cc1e9524ce117753f0791b5fe29

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z3592200.exe

    Filesize

    373KB

    MD5

    0101cd7e1b8edb9b1d261a0037ba3474

    SHA1

    342b5f1a6f1e26868c50fccf46f71733f0d89eb8

    SHA256

    b1f55ba5f0b6c470094aa90bd07828c6f8eb844e0feb6b393553a5392b54cccb

    SHA512

    7edfcca67a1a3d6c52c569665a540f0f9cb613441ca74f0b5bcded2e5d2ddd97de1453432c7f6293b52b2f55001a81fb7edbdc83fb3e4c6b7fca8cc534e25a96

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z3592200.exe

    Filesize

    373KB

    MD5

    0101cd7e1b8edb9b1d261a0037ba3474

    SHA1

    342b5f1a6f1e26868c50fccf46f71733f0d89eb8

    SHA256

    b1f55ba5f0b6c470094aa90bd07828c6f8eb844e0feb6b393553a5392b54cccb

    SHA512

    7edfcca67a1a3d6c52c569665a540f0f9cb613441ca74f0b5bcded2e5d2ddd97de1453432c7f6293b52b2f55001a81fb7edbdc83fb3e4c6b7fca8cc534e25a96

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\s7372376.exe

    Filesize

    174KB

    MD5

    349241a38bafd0ac4e859471e974fe4d

    SHA1

    adc8da0bd03a53947f95f585ea7fabf8831a3de5

    SHA256

    3331ead871b2176dcf7a3736fe8194c2b0d604c245b2eabfcc9648c87720d163

    SHA512

    7a68e72dec506c53e3b84dd884ec9f3133e06ecfdbbc2b2fdbbdbc6f1e349dd7331ede2425fd899450ea638205f75f781e8663358d0db9438ea1cf8333f89b04

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\s7372376.exe

    Filesize

    174KB

    MD5

    349241a38bafd0ac4e859471e974fe4d

    SHA1

    adc8da0bd03a53947f95f585ea7fabf8831a3de5

    SHA256

    3331ead871b2176dcf7a3736fe8194c2b0d604c245b2eabfcc9648c87720d163

    SHA512

    7a68e72dec506c53e3b84dd884ec9f3133e06ecfdbbc2b2fdbbdbc6f1e349dd7331ede2425fd899450ea638205f75f781e8663358d0db9438ea1cf8333f89b04

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z9025032.exe

    Filesize

    217KB

    MD5

    0bf01d0a7f9b30070cec5ef4336b92dd

    SHA1

    2c720832934496005f87273c140f6882c49a8286

    SHA256

    b650dcab7fd82bd47a58e73eb229b14b7a96b32473b07b6cf1aed2d8f646c213

    SHA512

    dcd1cca9d5a9d769fd87065ccb0536c4f574f3c1753a203d6f920c1c8b0ac1d90d0690c6906fa56f17f9ee29a2c203230d5ea9ecfbf3d7b0fd49c91c83d300a4

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z9025032.exe

    Filesize

    217KB

    MD5

    0bf01d0a7f9b30070cec5ef4336b92dd

    SHA1

    2c720832934496005f87273c140f6882c49a8286

    SHA256

    b650dcab7fd82bd47a58e73eb229b14b7a96b32473b07b6cf1aed2d8f646c213

    SHA512

    dcd1cca9d5a9d769fd87065ccb0536c4f574f3c1753a203d6f920c1c8b0ac1d90d0690c6906fa56f17f9ee29a2c203230d5ea9ecfbf3d7b0fd49c91c83d300a4

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\q0393175.exe

    Filesize

    17KB

    MD5

    25f22091beb8ae2f318226bb6005ca3c

    SHA1

    cc03ae7a06a3ff5d8cd63c25764b28ec6aa3c0f2

    SHA256

    7c34fb203761d24ba673c666a98aca34782a3bf73566fc5c313dfb631d49a62c

    SHA512

    0244f2fa9798bf1a636f00289d7bd1290e9906b7375374fdd0834042494c88b2e4d16b8565f8026588e4bf8b5b98b1be8b0ea0583e517df70cd4fe6cf0740e57

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\r1386398.exe

    Filesize

    141KB

    MD5

    a1f50e9eb29422e2a074f540775c78e5

    SHA1

    ef2c12ddf2b33b781274744bbe4990c133eb2b9b

    SHA256

    94eaf8b3b3335b191ca5f53157cfe665eca75c84f2a8b4e6361f5adf0b3fed4f

    SHA512

    18955ddf8fac8630d798b59918dcac45b33f6808841469357613c0bd6d4c2e1f4dd52123532c65bd495ba65b91cd0fff98004c67e6801804c0840c189a591e07

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\r1386398.exe

    Filesize

    141KB

    MD5

    a1f50e9eb29422e2a074f540775c78e5

    SHA1

    ef2c12ddf2b33b781274744bbe4990c133eb2b9b

    SHA256

    94eaf8b3b3335b191ca5f53157cfe665eca75c84f2a8b4e6361f5adf0b3fed4f

    SHA512

    18955ddf8fac8630d798b59918dcac45b33f6808841469357613c0bd6d4c2e1f4dd52123532c65bd495ba65b91cd0fff98004c67e6801804c0840c189a591e07

  • memory/2236-41-0x000007FEF61C0000-0x000007FEF6BAC000-memory.dmp

    Filesize

    9.9MB

  • memory/2236-40-0x000007FEF61C0000-0x000007FEF6BAC000-memory.dmp

    Filesize

    9.9MB

  • memory/2236-39-0x000007FEF61C0000-0x000007FEF6BAC000-memory.dmp

    Filesize

    9.9MB

  • memory/2236-38-0x00000000003B0000-0x00000000003BA000-memory.dmp

    Filesize

    40KB

  • memory/2684-54-0x00000000000D0000-0x0000000000100000-memory.dmp

    Filesize

    192KB

  • memory/2684-55-0x0000000000450000-0x0000000000456000-memory.dmp

    Filesize

    24KB