Analysis

  • max time kernel
    147s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    30/08/2023, 09:19

General

  • Target

    img0581.exe

  • Size

    829KB

  • MD5

    206f84e9cc0df7ae39147aa076ae9f8f

  • SHA1

    d65c255ee546b296e6173051aa9cd4e31fa283c4

  • SHA256

    23bf98ab984c24e91f36d2c71278441a6ea7d7b847abc11e2b00580125a3ddf7

  • SHA512

    427aa9e620475b72a16c8619a7d62b5a2458aaed8db6acb3fc213856aef26e9a791461dc0ab146ba0ec159060277103add06ce31b3598bfe339dc3caa0609950

  • SSDEEP

    12288:BMrYy90N+XBSmXTxD8ILWo2rQ8AibRRMti94cMEkZMzNGHyf5A3UvHn6HGj:5yhAmXx8Ho2PRaiJM/ZMw8/HnR

Malware Config

Extracted

Family

redline

Botnet

sruta

C2

77.91.124.82:19071

Attributes
  • auth_value

    c556edcd49703319eca74247de20c236

Signatures

  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 13 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\img0581.exe
    "C:\Users\Admin\AppData\Local\Temp\img0581.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1636
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3500610.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3500610.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1308
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0415012.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0415012.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2888
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4519024.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4519024.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:624
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4023060.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4023060.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:3020
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a7607508.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a7607508.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2984
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b9551583.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b9551583.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:2156
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c8132038.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c8132038.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:2360

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3500610.exe

    Filesize

    723KB

    MD5

    5fb814cc815dc7ebfcbd6be7a7e8654d

    SHA1

    d795f4bc7bd942b37ec4c2d2d389eb3e538f66b6

    SHA256

    f2b95c9a0c92ee5c906b198392fe7581ac67615b021e497cedd0cb2be5867279

    SHA512

    46a3a6b6c17eb76f22cd0ddaafeb972a9a414b73748c29e65edd72589830fb77d0a208fa55a6f5f39b2070071c93345c06e3c8139f2a34b104174d3a54a9f871

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3500610.exe

    Filesize

    723KB

    MD5

    5fb814cc815dc7ebfcbd6be7a7e8654d

    SHA1

    d795f4bc7bd942b37ec4c2d2d389eb3e538f66b6

    SHA256

    f2b95c9a0c92ee5c906b198392fe7581ac67615b021e497cedd0cb2be5867279

    SHA512

    46a3a6b6c17eb76f22cd0ddaafeb972a9a414b73748c29e65edd72589830fb77d0a208fa55a6f5f39b2070071c93345c06e3c8139f2a34b104174d3a54a9f871

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0415012.exe

    Filesize

    497KB

    MD5

    c91195e20339013a76675bcc5e357c5a

    SHA1

    59526aca2d8dedfaf1e5b49ec90159b7890800bd

    SHA256

    c97dee4258f424560f6656d150c8f0f3721d0d7e82df3007a2351e73c619b2d4

    SHA512

    9437b1fadedea0783ae5242b4510b61e4b28031086085a0488719f303a7062006adf03053cf65a46eedabed3674835380715d94b5f83363569345e7178109673

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0415012.exe

    Filesize

    497KB

    MD5

    c91195e20339013a76675bcc5e357c5a

    SHA1

    59526aca2d8dedfaf1e5b49ec90159b7890800bd

    SHA256

    c97dee4258f424560f6656d150c8f0f3721d0d7e82df3007a2351e73c619b2d4

    SHA512

    9437b1fadedea0783ae5242b4510b61e4b28031086085a0488719f303a7062006adf03053cf65a46eedabed3674835380715d94b5f83363569345e7178109673

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4519024.exe

    Filesize

    372KB

    MD5

    1cf17d08ea699c76e0743cbe171a5d44

    SHA1

    bbc2ce42af1730c44cd5faf7d9e1ea2efa8bbe2e

    SHA256

    e3e2ed892014edd1acd8cf7182cab4a654131515e7e200fc94e54f0287694c42

    SHA512

    3aeea78e1ac254c329e0b042ae8c002a7789bdf72ca56e5f5f241b3e492436e1d3157d36fe75cd2dfcbca4202e8f063016b621b07e3b52c34b6e454430231c51

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4519024.exe

    Filesize

    372KB

    MD5

    1cf17d08ea699c76e0743cbe171a5d44

    SHA1

    bbc2ce42af1730c44cd5faf7d9e1ea2efa8bbe2e

    SHA256

    e3e2ed892014edd1acd8cf7182cab4a654131515e7e200fc94e54f0287694c42

    SHA512

    3aeea78e1ac254c329e0b042ae8c002a7789bdf72ca56e5f5f241b3e492436e1d3157d36fe75cd2dfcbca4202e8f063016b621b07e3b52c34b6e454430231c51

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c8132038.exe

    Filesize

    175KB

    MD5

    d7664f7eb74bb9ff363eae163eaa0177

    SHA1

    f86d7988864df15eba6651c70429ce2913c5891c

    SHA256

    d3e1bdec1ed827675cd2814412e2bcd0d15b9c09ce42983c03dd26c16552d88b

    SHA512

    22bef8bf07f1656589b36be98576f919002fc799a7e97150f5b161440e2ffb9c6cb96709a926858efb5390ab7b5e2f9ef28738536660e259ac210b10abe1b7ba

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c8132038.exe

    Filesize

    175KB

    MD5

    d7664f7eb74bb9ff363eae163eaa0177

    SHA1

    f86d7988864df15eba6651c70429ce2913c5891c

    SHA256

    d3e1bdec1ed827675cd2814412e2bcd0d15b9c09ce42983c03dd26c16552d88b

    SHA512

    22bef8bf07f1656589b36be98576f919002fc799a7e97150f5b161440e2ffb9c6cb96709a926858efb5390ab7b5e2f9ef28738536660e259ac210b10abe1b7ba

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4023060.exe

    Filesize

    217KB

    MD5

    eac702600fb8262f0bb6498fbe8ab39e

    SHA1

    61f1a1fc86abf627c0a7f7696b2dbefb079b8d9b

    SHA256

    dbf0d52910b66f3a580e4b2fd6ae025aaea7fef95cfb69774972b2ae48894441

    SHA512

    e84f826cccab70a41120d858be6488d6f5aa931d54c1d17eb8d210c44daf48b34180fcbc809b120c343e5f45189b20591e7fc878b88edc2a3e411157e5cd5202

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4023060.exe

    Filesize

    217KB

    MD5

    eac702600fb8262f0bb6498fbe8ab39e

    SHA1

    61f1a1fc86abf627c0a7f7696b2dbefb079b8d9b

    SHA256

    dbf0d52910b66f3a580e4b2fd6ae025aaea7fef95cfb69774972b2ae48894441

    SHA512

    e84f826cccab70a41120d858be6488d6f5aa931d54c1d17eb8d210c44daf48b34180fcbc809b120c343e5f45189b20591e7fc878b88edc2a3e411157e5cd5202

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a7607508.exe

    Filesize

    17KB

    MD5

    e74cda8dc05280260517bb66229b7b69

    SHA1

    363c0dd7adfa26b1027235987019b52b9b7024b2

    SHA256

    a1e7f708b602e24a71575a40e55c34f4b9bb0dab95f2756250fa0adbe7324249

    SHA512

    c476dde2b224399d1c8bcbb47a9a223f9e83f6089e321e099c052cea26340f5ad1568be28b358fea964c1ab13f831aaefe476e4cbb2a170f4da1714cd99e3a65

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a7607508.exe

    Filesize

    17KB

    MD5

    e74cda8dc05280260517bb66229b7b69

    SHA1

    363c0dd7adfa26b1027235987019b52b9b7024b2

    SHA256

    a1e7f708b602e24a71575a40e55c34f4b9bb0dab95f2756250fa0adbe7324249

    SHA512

    c476dde2b224399d1c8bcbb47a9a223f9e83f6089e321e099c052cea26340f5ad1568be28b358fea964c1ab13f831aaefe476e4cbb2a170f4da1714cd99e3a65

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b9551583.exe

    Filesize

    140KB

    MD5

    ba600a947e004a27970da12ea854bd43

    SHA1

    445acae3c3264a9b27ef109510f74ac4bf0436e8

    SHA256

    82c7bd490b6a84253da2d0a425358608f358a753194887a336cc12af9229bef6

    SHA512

    8259a8e55eab2252a5b397e328f23a52c3d33b2f49c4d038389c635671df5784fafd9e025a7862b1695adec8608a2bdc7c2cc4dd2aca0cdf03c74914d87948a4

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b9551583.exe

    Filesize

    140KB

    MD5

    ba600a947e004a27970da12ea854bd43

    SHA1

    445acae3c3264a9b27ef109510f74ac4bf0436e8

    SHA256

    82c7bd490b6a84253da2d0a425358608f358a753194887a336cc12af9229bef6

    SHA512

    8259a8e55eab2252a5b397e328f23a52c3d33b2f49c4d038389c635671df5784fafd9e025a7862b1695adec8608a2bdc7c2cc4dd2aca0cdf03c74914d87948a4

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v3500610.exe

    Filesize

    723KB

    MD5

    5fb814cc815dc7ebfcbd6be7a7e8654d

    SHA1

    d795f4bc7bd942b37ec4c2d2d389eb3e538f66b6

    SHA256

    f2b95c9a0c92ee5c906b198392fe7581ac67615b021e497cedd0cb2be5867279

    SHA512

    46a3a6b6c17eb76f22cd0ddaafeb972a9a414b73748c29e65edd72589830fb77d0a208fa55a6f5f39b2070071c93345c06e3c8139f2a34b104174d3a54a9f871

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v3500610.exe

    Filesize

    723KB

    MD5

    5fb814cc815dc7ebfcbd6be7a7e8654d

    SHA1

    d795f4bc7bd942b37ec4c2d2d389eb3e538f66b6

    SHA256

    f2b95c9a0c92ee5c906b198392fe7581ac67615b021e497cedd0cb2be5867279

    SHA512

    46a3a6b6c17eb76f22cd0ddaafeb972a9a414b73748c29e65edd72589830fb77d0a208fa55a6f5f39b2070071c93345c06e3c8139f2a34b104174d3a54a9f871

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v0415012.exe

    Filesize

    497KB

    MD5

    c91195e20339013a76675bcc5e357c5a

    SHA1

    59526aca2d8dedfaf1e5b49ec90159b7890800bd

    SHA256

    c97dee4258f424560f6656d150c8f0f3721d0d7e82df3007a2351e73c619b2d4

    SHA512

    9437b1fadedea0783ae5242b4510b61e4b28031086085a0488719f303a7062006adf03053cf65a46eedabed3674835380715d94b5f83363569345e7178109673

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v0415012.exe

    Filesize

    497KB

    MD5

    c91195e20339013a76675bcc5e357c5a

    SHA1

    59526aca2d8dedfaf1e5b49ec90159b7890800bd

    SHA256

    c97dee4258f424560f6656d150c8f0f3721d0d7e82df3007a2351e73c619b2d4

    SHA512

    9437b1fadedea0783ae5242b4510b61e4b28031086085a0488719f303a7062006adf03053cf65a46eedabed3674835380715d94b5f83363569345e7178109673

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v4519024.exe

    Filesize

    372KB

    MD5

    1cf17d08ea699c76e0743cbe171a5d44

    SHA1

    bbc2ce42af1730c44cd5faf7d9e1ea2efa8bbe2e

    SHA256

    e3e2ed892014edd1acd8cf7182cab4a654131515e7e200fc94e54f0287694c42

    SHA512

    3aeea78e1ac254c329e0b042ae8c002a7789bdf72ca56e5f5f241b3e492436e1d3157d36fe75cd2dfcbca4202e8f063016b621b07e3b52c34b6e454430231c51

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v4519024.exe

    Filesize

    372KB

    MD5

    1cf17d08ea699c76e0743cbe171a5d44

    SHA1

    bbc2ce42af1730c44cd5faf7d9e1ea2efa8bbe2e

    SHA256

    e3e2ed892014edd1acd8cf7182cab4a654131515e7e200fc94e54f0287694c42

    SHA512

    3aeea78e1ac254c329e0b042ae8c002a7789bdf72ca56e5f5f241b3e492436e1d3157d36fe75cd2dfcbca4202e8f063016b621b07e3b52c34b6e454430231c51

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\c8132038.exe

    Filesize

    175KB

    MD5

    d7664f7eb74bb9ff363eae163eaa0177

    SHA1

    f86d7988864df15eba6651c70429ce2913c5891c

    SHA256

    d3e1bdec1ed827675cd2814412e2bcd0d15b9c09ce42983c03dd26c16552d88b

    SHA512

    22bef8bf07f1656589b36be98576f919002fc799a7e97150f5b161440e2ffb9c6cb96709a926858efb5390ab7b5e2f9ef28738536660e259ac210b10abe1b7ba

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\c8132038.exe

    Filesize

    175KB

    MD5

    d7664f7eb74bb9ff363eae163eaa0177

    SHA1

    f86d7988864df15eba6651c70429ce2913c5891c

    SHA256

    d3e1bdec1ed827675cd2814412e2bcd0d15b9c09ce42983c03dd26c16552d88b

    SHA512

    22bef8bf07f1656589b36be98576f919002fc799a7e97150f5b161440e2ffb9c6cb96709a926858efb5390ab7b5e2f9ef28738536660e259ac210b10abe1b7ba

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v4023060.exe

    Filesize

    217KB

    MD5

    eac702600fb8262f0bb6498fbe8ab39e

    SHA1

    61f1a1fc86abf627c0a7f7696b2dbefb079b8d9b

    SHA256

    dbf0d52910b66f3a580e4b2fd6ae025aaea7fef95cfb69774972b2ae48894441

    SHA512

    e84f826cccab70a41120d858be6488d6f5aa931d54c1d17eb8d210c44daf48b34180fcbc809b120c343e5f45189b20591e7fc878b88edc2a3e411157e5cd5202

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v4023060.exe

    Filesize

    217KB

    MD5

    eac702600fb8262f0bb6498fbe8ab39e

    SHA1

    61f1a1fc86abf627c0a7f7696b2dbefb079b8d9b

    SHA256

    dbf0d52910b66f3a580e4b2fd6ae025aaea7fef95cfb69774972b2ae48894441

    SHA512

    e84f826cccab70a41120d858be6488d6f5aa931d54c1d17eb8d210c44daf48b34180fcbc809b120c343e5f45189b20591e7fc878b88edc2a3e411157e5cd5202

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a7607508.exe

    Filesize

    17KB

    MD5

    e74cda8dc05280260517bb66229b7b69

    SHA1

    363c0dd7adfa26b1027235987019b52b9b7024b2

    SHA256

    a1e7f708b602e24a71575a40e55c34f4b9bb0dab95f2756250fa0adbe7324249

    SHA512

    c476dde2b224399d1c8bcbb47a9a223f9e83f6089e321e099c052cea26340f5ad1568be28b358fea964c1ab13f831aaefe476e4cbb2a170f4da1714cd99e3a65

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b9551583.exe

    Filesize

    140KB

    MD5

    ba600a947e004a27970da12ea854bd43

    SHA1

    445acae3c3264a9b27ef109510f74ac4bf0436e8

    SHA256

    82c7bd490b6a84253da2d0a425358608f358a753194887a336cc12af9229bef6

    SHA512

    8259a8e55eab2252a5b397e328f23a52c3d33b2f49c4d038389c635671df5784fafd9e025a7862b1695adec8608a2bdc7c2cc4dd2aca0cdf03c74914d87948a4

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b9551583.exe

    Filesize

    140KB

    MD5

    ba600a947e004a27970da12ea854bd43

    SHA1

    445acae3c3264a9b27ef109510f74ac4bf0436e8

    SHA256

    82c7bd490b6a84253da2d0a425358608f358a753194887a336cc12af9229bef6

    SHA512

    8259a8e55eab2252a5b397e328f23a52c3d33b2f49c4d038389c635671df5784fafd9e025a7862b1695adec8608a2bdc7c2cc4dd2aca0cdf03c74914d87948a4

  • memory/2360-64-0x0000000000E90000-0x0000000000EC0000-memory.dmp

    Filesize

    192KB

  • memory/2360-65-0x0000000000250000-0x0000000000256000-memory.dmp

    Filesize

    24KB

  • memory/2984-48-0x0000000000360000-0x000000000036A000-memory.dmp

    Filesize

    40KB

  • memory/2984-51-0x000007FEF5F20000-0x000007FEF690C000-memory.dmp

    Filesize

    9.9MB

  • memory/2984-50-0x000007FEF5F20000-0x000007FEF690C000-memory.dmp

    Filesize

    9.9MB

  • memory/2984-49-0x000007FEF5F20000-0x000007FEF690C000-memory.dmp

    Filesize

    9.9MB