Analysis

  • max time kernel
    147s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230831-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-09-2023 19:18

General

  • Target

    JC_7b393839706fc44d8effc36ed3c9538240443d9fb9d64507b5c63b28b01a16d5.exe

  • Size

    930KB

  • MD5

    b1c91dfe5e7acfd456da745113fbb936

  • SHA1

    9351c757766ab66f64a4816d4ba9d05cb0914ecb

  • SHA256

    7b393839706fc44d8effc36ed3c9538240443d9fb9d64507b5c63b28b01a16d5

  • SHA512

    9fdd409466860ee070b0929cad4009faf9387bff16df104b9fcc0d7636bf5340ddb38a066529b7033272b1094ce4d53d224e7cbf791595bd88276e383382c3b6

  • SSDEEP

    24576:tysQamVA9ssr+advJF+BD8uZjkjSOGVLX:IsQjA9DrdObW2

Malware Config

Extracted

Family

redline

Botnet

jang

C2

77.91.124.82:19071

Attributes
  • auth_value

    662102010afcbe9e22b13116b1c1a088

Signatures

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JC_7b393839706fc44d8effc36ed3c9538240443d9fb9d64507b5c63b28b01a16d5.exe
    "C:\Users\Admin\AppData\Local\Temp\JC_7b393839706fc44d8effc36ed3c9538240443d9fb9d64507b5c63b28b01a16d5.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2816
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2172217.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2172217.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4244
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7448172.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7448172.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2880
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5238597.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5238597.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1156
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8231296.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8231296.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:4964
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8246959.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8246959.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:5116
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0263729.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0263729.exe
              6⤵
              • Executes dropped EXE
              PID:2576
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s0386718.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s0386718.exe
            5⤵
            • Executes dropped EXE
            PID:4504

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2172217.exe

    Filesize

    824KB

    MD5

    578c7a5afb5a984a0fb766372a00581f

    SHA1

    bcfb4b4a8a7c79ab1c94c45adb08265e20c93296

    SHA256

    ac004e5cda7900398b6c47019e3d64c28efdfbba61f59fe4df6c3edc0d8abd21

    SHA512

    9214d6afdb1caba6ef3b18d9c560fc60014a8cd1e36715db943fef9acd45b3fa9d9170e25642e77ac64e7e7261f9e0a03abb01c218940bee58666a8825745dc1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2172217.exe

    Filesize

    824KB

    MD5

    578c7a5afb5a984a0fb766372a00581f

    SHA1

    bcfb4b4a8a7c79ab1c94c45adb08265e20c93296

    SHA256

    ac004e5cda7900398b6c47019e3d64c28efdfbba61f59fe4df6c3edc0d8abd21

    SHA512

    9214d6afdb1caba6ef3b18d9c560fc60014a8cd1e36715db943fef9acd45b3fa9d9170e25642e77ac64e7e7261f9e0a03abb01c218940bee58666a8825745dc1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7448172.exe

    Filesize

    599KB

    MD5

    5144b39f3106b55ca2cb459767186f91

    SHA1

    d855ab3bafc03bfb846e4638d22ad8248fae1bf4

    SHA256

    7e72a669ca31c7bdb820aa040bcbdf865e2ad7ed0eeed0de484f1c53b4597887

    SHA512

    b48f7a6edda9d1a164b99ccac61588e726f91164a22c29fa3ddd4a3af6beef144a106f3adff1c61638abaae0008ef57bf490226bce41cf7db8f716ae0059d026

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7448172.exe

    Filesize

    599KB

    MD5

    5144b39f3106b55ca2cb459767186f91

    SHA1

    d855ab3bafc03bfb846e4638d22ad8248fae1bf4

    SHA256

    7e72a669ca31c7bdb820aa040bcbdf865e2ad7ed0eeed0de484f1c53b4597887

    SHA512

    b48f7a6edda9d1a164b99ccac61588e726f91164a22c29fa3ddd4a3af6beef144a106f3adff1c61638abaae0008ef57bf490226bce41cf7db8f716ae0059d026

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5238597.exe

    Filesize

    373KB

    MD5

    203794fd3f2564eadaae4d11a3c60b87

    SHA1

    513f53b2f6f72e468299b3a1b79d117d1ffb2edf

    SHA256

    b22e416755b475a2fb66185eafd8c9f8a85a9bf342c7f8877520ec2f0589995e

    SHA512

    d0d27c529a2d86bd81632ac857e17f95c3ac0ab9539442a079e83e1838a0b33090461d48d195e00faea9664edc110ece860605943fc8941ac80491bfc40a58ef

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5238597.exe

    Filesize

    373KB

    MD5

    203794fd3f2564eadaae4d11a3c60b87

    SHA1

    513f53b2f6f72e468299b3a1b79d117d1ffb2edf

    SHA256

    b22e416755b475a2fb66185eafd8c9f8a85a9bf342c7f8877520ec2f0589995e

    SHA512

    d0d27c529a2d86bd81632ac857e17f95c3ac0ab9539442a079e83e1838a0b33090461d48d195e00faea9664edc110ece860605943fc8941ac80491bfc40a58ef

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s0386718.exe

    Filesize

    174KB

    MD5

    f3b031ad44f3fbb9925b1fafcf5c5537

    SHA1

    2a443398b2811f6d68a3c7ac59cf05d8a870a324

    SHA256

    1d57b27c993a6a073ff451dbed1f9cbc071aeb6c8f9f50c83c93148ca10a3c6f

    SHA512

    001a34fb323a272c2f46db4413992e2e322f8e8cd73821c4c9efa7072fb359e8254ed65d90a8372a89539b5777fb3c8eacb38255bc22905c3b962b07af6a38b9

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s0386718.exe

    Filesize

    174KB

    MD5

    f3b031ad44f3fbb9925b1fafcf5c5537

    SHA1

    2a443398b2811f6d68a3c7ac59cf05d8a870a324

    SHA256

    1d57b27c993a6a073ff451dbed1f9cbc071aeb6c8f9f50c83c93148ca10a3c6f

    SHA512

    001a34fb323a272c2f46db4413992e2e322f8e8cd73821c4c9efa7072fb359e8254ed65d90a8372a89539b5777fb3c8eacb38255bc22905c3b962b07af6a38b9

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8231296.exe

    Filesize

    217KB

    MD5

    f4344315fed15b13ab58d0b168e31dfe

    SHA1

    a423118f4c1a3689820598ed823883a40ec711b2

    SHA256

    666f974bbdb5fdfe33c61a682fdb96a457c4ce2e3a5107a3698f905d3e63edd0

    SHA512

    346048c2cf02403b9aa6ff01b092e327d95999c979fa7c4162d01f7461782f04475eee5bf0a33f5da03fdf8ea0a5c04545dfe55e07d35f8512ad462b2f18b570

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8231296.exe

    Filesize

    217KB

    MD5

    f4344315fed15b13ab58d0b168e31dfe

    SHA1

    a423118f4c1a3689820598ed823883a40ec711b2

    SHA256

    666f974bbdb5fdfe33c61a682fdb96a457c4ce2e3a5107a3698f905d3e63edd0

    SHA512

    346048c2cf02403b9aa6ff01b092e327d95999c979fa7c4162d01f7461782f04475eee5bf0a33f5da03fdf8ea0a5c04545dfe55e07d35f8512ad462b2f18b570

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8246959.exe

    Filesize

    19KB

    MD5

    c86cbd17b43bfc1f0ec4000c1a380960

    SHA1

    e8e94e60498c1ced0427e8bda5b656e926382d2c

    SHA256

    f905db785fbc3de8238b2d025313d4b6296686e2e179574a9911e88aa16ff1c6

    SHA512

    5fa95b15f2665b328dcedcde1bd1d11be1dc2c17bd80cf167a518e9b9d9a01b518a802c4e60f6c1455c3966dbb787b834a801da4b59f0fd621f7c30d98412482

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8246959.exe

    Filesize

    19KB

    MD5

    c86cbd17b43bfc1f0ec4000c1a380960

    SHA1

    e8e94e60498c1ced0427e8bda5b656e926382d2c

    SHA256

    f905db785fbc3de8238b2d025313d4b6296686e2e179574a9911e88aa16ff1c6

    SHA512

    5fa95b15f2665b328dcedcde1bd1d11be1dc2c17bd80cf167a518e9b9d9a01b518a802c4e60f6c1455c3966dbb787b834a801da4b59f0fd621f7c30d98412482

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0263729.exe

    Filesize

    140KB

    MD5

    9fc7177788d75945184823177231f664

    SHA1

    18d434c13d222d00d2af9e2929159d35ef25bbce

    SHA256

    4510fd13049a4ca7951ed0fa2c5b18a706854c7d0b03dcf10aba4a85974a5d1a

    SHA512

    148c6607ee32f9c73672faf04047c1190ec56d8e5a051ba223177436316ef0e9e8759c4bebdfeb05e46c9cfe7b34149950352a62b5547a6b4ac5deb12c311851

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0263729.exe

    Filesize

    140KB

    MD5

    9fc7177788d75945184823177231f664

    SHA1

    18d434c13d222d00d2af9e2929159d35ef25bbce

    SHA256

    4510fd13049a4ca7951ed0fa2c5b18a706854c7d0b03dcf10aba4a85974a5d1a

    SHA512

    148c6607ee32f9c73672faf04047c1190ec56d8e5a051ba223177436316ef0e9e8759c4bebdfeb05e46c9cfe7b34149950352a62b5547a6b4ac5deb12c311851

  • memory/4504-46-0x0000000074B40000-0x00000000752F0000-memory.dmp

    Filesize

    7.7MB

  • memory/4504-45-0x0000000000820000-0x0000000000850000-memory.dmp

    Filesize

    192KB

  • memory/4504-47-0x000000000AB70000-0x000000000B188000-memory.dmp

    Filesize

    6.1MB

  • memory/4504-48-0x000000000A690000-0x000000000A79A000-memory.dmp

    Filesize

    1.0MB

  • memory/4504-49-0x00000000050C0000-0x00000000050D0000-memory.dmp

    Filesize

    64KB

  • memory/4504-50-0x000000000A5D0000-0x000000000A5E2000-memory.dmp

    Filesize

    72KB

  • memory/4504-51-0x000000000A630000-0x000000000A66C000-memory.dmp

    Filesize

    240KB

  • memory/4504-52-0x0000000074B40000-0x00000000752F0000-memory.dmp

    Filesize

    7.7MB

  • memory/4504-53-0x00000000050C0000-0x00000000050D0000-memory.dmp

    Filesize

    64KB

  • memory/5116-38-0x00007FFF815F0000-0x00007FFF820B1000-memory.dmp

    Filesize

    10.8MB

  • memory/5116-36-0x00007FFF815F0000-0x00007FFF820B1000-memory.dmp

    Filesize

    10.8MB

  • memory/5116-35-0x0000000000F50000-0x0000000000F5A000-memory.dmp

    Filesize

    40KB