Analysis

  • max time kernel
    146s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    01-09-2023 18:28

General

  • Target

    file.exe

  • Size

    829KB

  • MD5

    ba96aeaa69a29e3eddfdb91c1c16b97b

  • SHA1

    b2bab740272039740065fec23f61b836fb6ed226

  • SHA256

    866aa1851340dcd5a75a980d930fa3ad1997c8315077fd393ff1ff8702285b12

  • SHA512

    2327c0bfda2307a66d795b672042f713a95320c248671ea54d91fce11b09b76c3b38014b9f03b95013d9bdf636770a95670d285855a87bbff453ec9daf624e7a

  • SSDEEP

    12288:RMrJy90N9exa0XioHOyJTBYLNMJJ7EiafSN9FOP4XGcPwXFv5juuyJA2oiu4cJB:0yXRHOwTBecEWTw391vRhyJMiu4cP

Malware Config

Extracted

Family

redline

Botnet

domka

C2

77.91.124.82:19071

Attributes
  • auth_value

    74e19436acac85e44d691aebcc617529

Signatures

  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 13 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2236
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6050137.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6050137.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2600
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9633835.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9633835.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2920
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4157596.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4157596.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2320
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8838405.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8838405.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2836
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a3526385.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a3526385.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2572
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b3271686.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b3271686.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:2532
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c5537385.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c5537385.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:2728

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6050137.exe

    Filesize

    724KB

    MD5

    567ad8b8dbadf7880773b9e9e8bc27a0

    SHA1

    024fed5a9daba9d7817459b294d87ca53b387dfb

    SHA256

    745d95ccf5844d02c50dbd626163ac622cd71cd9de4fbbd9d87ebb854ed47074

    SHA512

    4b9a7884e3f0dcb2923365719b75a3d28778e7f312fa02ba1f65d785bb9e0dfb2b9f1618c7bd3bc3be6417a7602d2d77226759b0159c671ca4dba4f1622d436f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6050137.exe

    Filesize

    724KB

    MD5

    567ad8b8dbadf7880773b9e9e8bc27a0

    SHA1

    024fed5a9daba9d7817459b294d87ca53b387dfb

    SHA256

    745d95ccf5844d02c50dbd626163ac622cd71cd9de4fbbd9d87ebb854ed47074

    SHA512

    4b9a7884e3f0dcb2923365719b75a3d28778e7f312fa02ba1f65d785bb9e0dfb2b9f1618c7bd3bc3be6417a7602d2d77226759b0159c671ca4dba4f1622d436f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9633835.exe

    Filesize

    497KB

    MD5

    a45f046e946c9220d3f7b09751ae4e4d

    SHA1

    716b772e6147d7eb5dd5c1a02fbf8c6d84fbadd2

    SHA256

    3b09ed2db88f00e351161da58453c689d6d559d4f27f09ff3b13c1e17f4e3ecf

    SHA512

    5107feaf663f53b9333bd1d10e6cf7b91e91f9a975959b7d4159060e9478d969735267b1255ddb23d9d5672405a486a3c9a85b1965db7181187ebea48040a252

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9633835.exe

    Filesize

    497KB

    MD5

    a45f046e946c9220d3f7b09751ae4e4d

    SHA1

    716b772e6147d7eb5dd5c1a02fbf8c6d84fbadd2

    SHA256

    3b09ed2db88f00e351161da58453c689d6d559d4f27f09ff3b13c1e17f4e3ecf

    SHA512

    5107feaf663f53b9333bd1d10e6cf7b91e91f9a975959b7d4159060e9478d969735267b1255ddb23d9d5672405a486a3c9a85b1965db7181187ebea48040a252

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4157596.exe

    Filesize

    373KB

    MD5

    c06756ab25716c835a3b69decbbbed47

    SHA1

    f4ed51b68f3c26b591a7e5e4694eee74f1bd4534

    SHA256

    bfb21cb60598ed60bbe731051c838635f0c7591ab620bade13dfcd1821fa2ec0

    SHA512

    86858d72cf0ad31eff50874d86fa4250f33376ab868c2bb5b608983591771eee1845df41d27e29df6e520b47155e1132ba50eb95d1a72cc4a63d037c2d8ab569

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4157596.exe

    Filesize

    373KB

    MD5

    c06756ab25716c835a3b69decbbbed47

    SHA1

    f4ed51b68f3c26b591a7e5e4694eee74f1bd4534

    SHA256

    bfb21cb60598ed60bbe731051c838635f0c7591ab620bade13dfcd1821fa2ec0

    SHA512

    86858d72cf0ad31eff50874d86fa4250f33376ab868c2bb5b608983591771eee1845df41d27e29df6e520b47155e1132ba50eb95d1a72cc4a63d037c2d8ab569

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c5537385.exe

    Filesize

    174KB

    MD5

    bab4d1b32812f02d8644aa73b9e343ae

    SHA1

    e96a038085b496cf761f089b01146427f3fc40fa

    SHA256

    44d586342f14b242295634d02d68751706e77117e25289103e8b5a149f66e629

    SHA512

    aafda423ef7e8f8984325d11ba3492ef364ce16a317d6c61bd0938da0785d283b0fdc3c5d34d05c78c1ed75ad0e04fe1b18cc83f29cc7d3cc6e4440aa822f94c

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c5537385.exe

    Filesize

    174KB

    MD5

    bab4d1b32812f02d8644aa73b9e343ae

    SHA1

    e96a038085b496cf761f089b01146427f3fc40fa

    SHA256

    44d586342f14b242295634d02d68751706e77117e25289103e8b5a149f66e629

    SHA512

    aafda423ef7e8f8984325d11ba3492ef364ce16a317d6c61bd0938da0785d283b0fdc3c5d34d05c78c1ed75ad0e04fe1b18cc83f29cc7d3cc6e4440aa822f94c

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8838405.exe

    Filesize

    217KB

    MD5

    a3a848a56a06995b2f9f3b8670d58ddb

    SHA1

    eafd36e4a72c92bad845a0d401ca9c539b5f6aa0

    SHA256

    64f605b0d25a70e060be993a881722e6b8e621f1ff5e72351c995cd550d40336

    SHA512

    64c77678d232dd7ce3dc651dbfb216e8b041d8f0a4295d0fa31f5305386b7e40a88cd6ae61fa04e538684a89a1a317899c57faa2e33b212520c780857ee38a6f

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8838405.exe

    Filesize

    217KB

    MD5

    a3a848a56a06995b2f9f3b8670d58ddb

    SHA1

    eafd36e4a72c92bad845a0d401ca9c539b5f6aa0

    SHA256

    64f605b0d25a70e060be993a881722e6b8e621f1ff5e72351c995cd550d40336

    SHA512

    64c77678d232dd7ce3dc651dbfb216e8b041d8f0a4295d0fa31f5305386b7e40a88cd6ae61fa04e538684a89a1a317899c57faa2e33b212520c780857ee38a6f

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a3526385.exe

    Filesize

    19KB

    MD5

    2ecbd70c6e5de68be9652d754917e391

    SHA1

    6ed968348c416762f4961692c18662563f629b7c

    SHA256

    1af5104ec39dacfd5534bd7546878800c6506ad0085f601878c50ae1af2ae84f

    SHA512

    9177ebabff634194504efb76bc59da5f319092122aab4ca59bc71d9956f172f0e4670c54d4bcce2ba4f16460137e8f5db4bf73fd9d8692fb926d4f9f652c316c

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a3526385.exe

    Filesize

    19KB

    MD5

    2ecbd70c6e5de68be9652d754917e391

    SHA1

    6ed968348c416762f4961692c18662563f629b7c

    SHA256

    1af5104ec39dacfd5534bd7546878800c6506ad0085f601878c50ae1af2ae84f

    SHA512

    9177ebabff634194504efb76bc59da5f319092122aab4ca59bc71d9956f172f0e4670c54d4bcce2ba4f16460137e8f5db4bf73fd9d8692fb926d4f9f652c316c

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b3271686.exe

    Filesize

    140KB

    MD5

    004208224cf8cc8e3549bc71e69486a4

    SHA1

    2ed9d035e837d5a80aa2610b42013b9cfacf4a10

    SHA256

    0a216017895309f4f9f79b515cb82b94f78e95e5ed5e8a37dc6a67f6f67aeeee

    SHA512

    199f73d39d9a11b11af35bd584f29a7405b1840e6f5f088ab2fbcf2bee5cbe5cb932c7300faf012d130b1fda2b985b32354b1f2ec60f692cfa8cf2871bb264b8

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b3271686.exe

    Filesize

    140KB

    MD5

    004208224cf8cc8e3549bc71e69486a4

    SHA1

    2ed9d035e837d5a80aa2610b42013b9cfacf4a10

    SHA256

    0a216017895309f4f9f79b515cb82b94f78e95e5ed5e8a37dc6a67f6f67aeeee

    SHA512

    199f73d39d9a11b11af35bd584f29a7405b1840e6f5f088ab2fbcf2bee5cbe5cb932c7300faf012d130b1fda2b985b32354b1f2ec60f692cfa8cf2871bb264b8

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v6050137.exe

    Filesize

    724KB

    MD5

    567ad8b8dbadf7880773b9e9e8bc27a0

    SHA1

    024fed5a9daba9d7817459b294d87ca53b387dfb

    SHA256

    745d95ccf5844d02c50dbd626163ac622cd71cd9de4fbbd9d87ebb854ed47074

    SHA512

    4b9a7884e3f0dcb2923365719b75a3d28778e7f312fa02ba1f65d785bb9e0dfb2b9f1618c7bd3bc3be6417a7602d2d77226759b0159c671ca4dba4f1622d436f

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v6050137.exe

    Filesize

    724KB

    MD5

    567ad8b8dbadf7880773b9e9e8bc27a0

    SHA1

    024fed5a9daba9d7817459b294d87ca53b387dfb

    SHA256

    745d95ccf5844d02c50dbd626163ac622cd71cd9de4fbbd9d87ebb854ed47074

    SHA512

    4b9a7884e3f0dcb2923365719b75a3d28778e7f312fa02ba1f65d785bb9e0dfb2b9f1618c7bd3bc3be6417a7602d2d77226759b0159c671ca4dba4f1622d436f

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v9633835.exe

    Filesize

    497KB

    MD5

    a45f046e946c9220d3f7b09751ae4e4d

    SHA1

    716b772e6147d7eb5dd5c1a02fbf8c6d84fbadd2

    SHA256

    3b09ed2db88f00e351161da58453c689d6d559d4f27f09ff3b13c1e17f4e3ecf

    SHA512

    5107feaf663f53b9333bd1d10e6cf7b91e91f9a975959b7d4159060e9478d969735267b1255ddb23d9d5672405a486a3c9a85b1965db7181187ebea48040a252

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v9633835.exe

    Filesize

    497KB

    MD5

    a45f046e946c9220d3f7b09751ae4e4d

    SHA1

    716b772e6147d7eb5dd5c1a02fbf8c6d84fbadd2

    SHA256

    3b09ed2db88f00e351161da58453c689d6d559d4f27f09ff3b13c1e17f4e3ecf

    SHA512

    5107feaf663f53b9333bd1d10e6cf7b91e91f9a975959b7d4159060e9478d969735267b1255ddb23d9d5672405a486a3c9a85b1965db7181187ebea48040a252

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v4157596.exe

    Filesize

    373KB

    MD5

    c06756ab25716c835a3b69decbbbed47

    SHA1

    f4ed51b68f3c26b591a7e5e4694eee74f1bd4534

    SHA256

    bfb21cb60598ed60bbe731051c838635f0c7591ab620bade13dfcd1821fa2ec0

    SHA512

    86858d72cf0ad31eff50874d86fa4250f33376ab868c2bb5b608983591771eee1845df41d27e29df6e520b47155e1132ba50eb95d1a72cc4a63d037c2d8ab569

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v4157596.exe

    Filesize

    373KB

    MD5

    c06756ab25716c835a3b69decbbbed47

    SHA1

    f4ed51b68f3c26b591a7e5e4694eee74f1bd4534

    SHA256

    bfb21cb60598ed60bbe731051c838635f0c7591ab620bade13dfcd1821fa2ec0

    SHA512

    86858d72cf0ad31eff50874d86fa4250f33376ab868c2bb5b608983591771eee1845df41d27e29df6e520b47155e1132ba50eb95d1a72cc4a63d037c2d8ab569

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\c5537385.exe

    Filesize

    174KB

    MD5

    bab4d1b32812f02d8644aa73b9e343ae

    SHA1

    e96a038085b496cf761f089b01146427f3fc40fa

    SHA256

    44d586342f14b242295634d02d68751706e77117e25289103e8b5a149f66e629

    SHA512

    aafda423ef7e8f8984325d11ba3492ef364ce16a317d6c61bd0938da0785d283b0fdc3c5d34d05c78c1ed75ad0e04fe1b18cc83f29cc7d3cc6e4440aa822f94c

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\c5537385.exe

    Filesize

    174KB

    MD5

    bab4d1b32812f02d8644aa73b9e343ae

    SHA1

    e96a038085b496cf761f089b01146427f3fc40fa

    SHA256

    44d586342f14b242295634d02d68751706e77117e25289103e8b5a149f66e629

    SHA512

    aafda423ef7e8f8984325d11ba3492ef364ce16a317d6c61bd0938da0785d283b0fdc3c5d34d05c78c1ed75ad0e04fe1b18cc83f29cc7d3cc6e4440aa822f94c

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v8838405.exe

    Filesize

    217KB

    MD5

    a3a848a56a06995b2f9f3b8670d58ddb

    SHA1

    eafd36e4a72c92bad845a0d401ca9c539b5f6aa0

    SHA256

    64f605b0d25a70e060be993a881722e6b8e621f1ff5e72351c995cd550d40336

    SHA512

    64c77678d232dd7ce3dc651dbfb216e8b041d8f0a4295d0fa31f5305386b7e40a88cd6ae61fa04e538684a89a1a317899c57faa2e33b212520c780857ee38a6f

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v8838405.exe

    Filesize

    217KB

    MD5

    a3a848a56a06995b2f9f3b8670d58ddb

    SHA1

    eafd36e4a72c92bad845a0d401ca9c539b5f6aa0

    SHA256

    64f605b0d25a70e060be993a881722e6b8e621f1ff5e72351c995cd550d40336

    SHA512

    64c77678d232dd7ce3dc651dbfb216e8b041d8f0a4295d0fa31f5305386b7e40a88cd6ae61fa04e538684a89a1a317899c57faa2e33b212520c780857ee38a6f

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a3526385.exe

    Filesize

    19KB

    MD5

    2ecbd70c6e5de68be9652d754917e391

    SHA1

    6ed968348c416762f4961692c18662563f629b7c

    SHA256

    1af5104ec39dacfd5534bd7546878800c6506ad0085f601878c50ae1af2ae84f

    SHA512

    9177ebabff634194504efb76bc59da5f319092122aab4ca59bc71d9956f172f0e4670c54d4bcce2ba4f16460137e8f5db4bf73fd9d8692fb926d4f9f652c316c

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b3271686.exe

    Filesize

    140KB

    MD5

    004208224cf8cc8e3549bc71e69486a4

    SHA1

    2ed9d035e837d5a80aa2610b42013b9cfacf4a10

    SHA256

    0a216017895309f4f9f79b515cb82b94f78e95e5ed5e8a37dc6a67f6f67aeeee

    SHA512

    199f73d39d9a11b11af35bd584f29a7405b1840e6f5f088ab2fbcf2bee5cbe5cb932c7300faf012d130b1fda2b985b32354b1f2ec60f692cfa8cf2871bb264b8

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b3271686.exe

    Filesize

    140KB

    MD5

    004208224cf8cc8e3549bc71e69486a4

    SHA1

    2ed9d035e837d5a80aa2610b42013b9cfacf4a10

    SHA256

    0a216017895309f4f9f79b515cb82b94f78e95e5ed5e8a37dc6a67f6f67aeeee

    SHA512

    199f73d39d9a11b11af35bd584f29a7405b1840e6f5f088ab2fbcf2bee5cbe5cb932c7300faf012d130b1fda2b985b32354b1f2ec60f692cfa8cf2871bb264b8

  • memory/2572-50-0x000007FEF5990000-0x000007FEF637C000-memory.dmp

    Filesize

    9.9MB

  • memory/2572-51-0x000007FEF5990000-0x000007FEF637C000-memory.dmp

    Filesize

    9.9MB

  • memory/2572-49-0x000007FEF5990000-0x000007FEF637C000-memory.dmp

    Filesize

    9.9MB

  • memory/2572-48-0x0000000000EF0000-0x0000000000EFA000-memory.dmp

    Filesize

    40KB

  • memory/2728-64-0x0000000000AD0000-0x0000000000B00000-memory.dmp

    Filesize

    192KB

  • memory/2728-65-0x0000000000300000-0x0000000000306000-memory.dmp

    Filesize

    24KB