Analysis

  • max time kernel
    146s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    01-09-2023 19:56

General

  • Target

    JC_f3eb694f585ae8a677463076e455b5a34826b088e8bc849e70fe70d9eebf4da3.exe

  • Size

    829KB

  • MD5

    3d8f7a2d8cc160f611070083fe80ad48

  • SHA1

    9f90315a136107750102b4791c09ff408d32598a

  • SHA256

    f3eb694f585ae8a677463076e455b5a34826b088e8bc849e70fe70d9eebf4da3

  • SHA512

    cf9b68014da8836b419ef1d0ff173507af025f02df4a4ebcc2a9bd5e2cd6f34d88ac68db9afd4893607cc59e584e3930e72812b5a89c663b226acd6b15b1905c

  • SSDEEP

    12288:nMr4y901GqukWlRlCgfbrUY3PPehLwp+37yeqEWC1:HywGqu5PzN61GeqPU

Malware Config

Extracted

Family

redline

Botnet

jang

C2

77.91.124.82:19071

Attributes
  • auth_value

    662102010afcbe9e22b13116b1c1a088

Signatures

  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 13 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JC_f3eb694f585ae8a677463076e455b5a34826b088e8bc849e70fe70d9eebf4da3.exe
    "C:\Users\Admin\AppData\Local\Temp\JC_f3eb694f585ae8a677463076e455b5a34826b088e8bc849e70fe70d9eebf4da3.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2236
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4719010.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4719010.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2596
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1947033.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1947033.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2212
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7307623.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7307623.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2700
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1518836.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1518836.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2656
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a3701235.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a3701235.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2716
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b0737206.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b0737206.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:2644
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c1812145.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c1812145.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:2508

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4719010.exe

    Filesize

    723KB

    MD5

    42e4bf6d5d8e67e8482dac0b12d1897b

    SHA1

    59f90382789b091d72db6fecc82fc8bfcac8b359

    SHA256

    ee7b265586548684506b593bff33eaff7cbd8c22bb2c6a895ab9d402e1c3a29b

    SHA512

    0ca6ed4080dca9f065ae636888e3c4b591cc3969453c2bfedca7df03754b30753facaf7dfdec2db029c00a2cc27f3772f735ee00454643971af3a492109aea8a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4719010.exe

    Filesize

    723KB

    MD5

    42e4bf6d5d8e67e8482dac0b12d1897b

    SHA1

    59f90382789b091d72db6fecc82fc8bfcac8b359

    SHA256

    ee7b265586548684506b593bff33eaff7cbd8c22bb2c6a895ab9d402e1c3a29b

    SHA512

    0ca6ed4080dca9f065ae636888e3c4b591cc3969453c2bfedca7df03754b30753facaf7dfdec2db029c00a2cc27f3772f735ee00454643971af3a492109aea8a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1947033.exe

    Filesize

    497KB

    MD5

    1a022d9bf7d9ff5df93f717cf2123f05

    SHA1

    b546fb78b9ae041735ca1583cbd17c895e9ef3cf

    SHA256

    923a77a848faeead351b26498258acb0c34f1a7f1e317b15d67c73f3842f893f

    SHA512

    ad102d44e3ae79bc207b05c7ceed42b8c8a36546f82e4b3be041483f8e75b0e7f982e8b1eb3f41216138bc2ce6847f8772936d63f2994e39624db24a795819dd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1947033.exe

    Filesize

    497KB

    MD5

    1a022d9bf7d9ff5df93f717cf2123f05

    SHA1

    b546fb78b9ae041735ca1583cbd17c895e9ef3cf

    SHA256

    923a77a848faeead351b26498258acb0c34f1a7f1e317b15d67c73f3842f893f

    SHA512

    ad102d44e3ae79bc207b05c7ceed42b8c8a36546f82e4b3be041483f8e75b0e7f982e8b1eb3f41216138bc2ce6847f8772936d63f2994e39624db24a795819dd

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7307623.exe

    Filesize

    373KB

    MD5

    dab06bf67ce52e87e5ac79ca08d55882

    SHA1

    c6b69b6477e31607006aeeb383730cabbc63a42c

    SHA256

    b3e5d7d3a2b51b4f3d8d8b7301bfd2016927fdc370e29707d438d18d5b48ca3f

    SHA512

    e6d10cc0c22be8daf169564d3b33d67d759e5d7367ee2d58f5280e9d2eed82cc04c0f1127bd5fe0c0fb58d4dd80d511c37b6d0e73e28ed25d3e1faa3a7e5d135

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7307623.exe

    Filesize

    373KB

    MD5

    dab06bf67ce52e87e5ac79ca08d55882

    SHA1

    c6b69b6477e31607006aeeb383730cabbc63a42c

    SHA256

    b3e5d7d3a2b51b4f3d8d8b7301bfd2016927fdc370e29707d438d18d5b48ca3f

    SHA512

    e6d10cc0c22be8daf169564d3b33d67d759e5d7367ee2d58f5280e9d2eed82cc04c0f1127bd5fe0c0fb58d4dd80d511c37b6d0e73e28ed25d3e1faa3a7e5d135

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c1812145.exe

    Filesize

    174KB

    MD5

    936869d9a96eea96642ed6915809e4ce

    SHA1

    05aa268a72ffa170122ad6d514c5d08d024b72b7

    SHA256

    5a6fadabe00d46c04b425a9f4f6cddc46c3ae5f838a6f0f39697e50a31828360

    SHA512

    7daf0e124b53bdc5005e59787367361939fb22ce0703dc177d8fa8a747e36ae110ffbe35f5dd1046a55fa2dff9646663755c19c7755032d52de219f8a054324a

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c1812145.exe

    Filesize

    174KB

    MD5

    936869d9a96eea96642ed6915809e4ce

    SHA1

    05aa268a72ffa170122ad6d514c5d08d024b72b7

    SHA256

    5a6fadabe00d46c04b425a9f4f6cddc46c3ae5f838a6f0f39697e50a31828360

    SHA512

    7daf0e124b53bdc5005e59787367361939fb22ce0703dc177d8fa8a747e36ae110ffbe35f5dd1046a55fa2dff9646663755c19c7755032d52de219f8a054324a

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1518836.exe

    Filesize

    217KB

    MD5

    a41641ae5758765881efbf67b128606a

    SHA1

    8fef0fa313fa2ffae91bfc3719305c9726b5037a

    SHA256

    ce1791f3d04595a74d7b330390552699747430430a33c33274ad2c8464f8627c

    SHA512

    2d90824c9692852a63d15a490cee5725830f199a4da3b894952b3ffa8f1566de42afedd5c427752c582a2fbd9b041d4cebfe321826b7bcb15196f20e5b720fc3

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1518836.exe

    Filesize

    217KB

    MD5

    a41641ae5758765881efbf67b128606a

    SHA1

    8fef0fa313fa2ffae91bfc3719305c9726b5037a

    SHA256

    ce1791f3d04595a74d7b330390552699747430430a33c33274ad2c8464f8627c

    SHA512

    2d90824c9692852a63d15a490cee5725830f199a4da3b894952b3ffa8f1566de42afedd5c427752c582a2fbd9b041d4cebfe321826b7bcb15196f20e5b720fc3

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a3701235.exe

    Filesize

    19KB

    MD5

    750381e78038ca9ee743e3a0db623a49

    SHA1

    9d0a70eaf0101f932c4b5c06ae95ea29714639d2

    SHA256

    b9aaa983068a4ecf60c02556578d982149e5d87080ecc1c5d8cd64f99d7c22a0

    SHA512

    57efa387f6287c9adc89643e81a20aa1707c39512ed0f86fa1e372ea8611d18f531839d1ee683c5069bfd31124f85164abd24650524672c91eaa41af87ecc7f1

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a3701235.exe

    Filesize

    19KB

    MD5

    750381e78038ca9ee743e3a0db623a49

    SHA1

    9d0a70eaf0101f932c4b5c06ae95ea29714639d2

    SHA256

    b9aaa983068a4ecf60c02556578d982149e5d87080ecc1c5d8cd64f99d7c22a0

    SHA512

    57efa387f6287c9adc89643e81a20aa1707c39512ed0f86fa1e372ea8611d18f531839d1ee683c5069bfd31124f85164abd24650524672c91eaa41af87ecc7f1

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b0737206.exe

    Filesize

    141KB

    MD5

    d89cfd9e89e84625529a90e1733d5e15

    SHA1

    db9243f57e09c273ffc995aacd53686c56d02c13

    SHA256

    4f4fa4689d550495a63e610203e74f9bb9bc405d78b424740819b58d140d9eb8

    SHA512

    be6177471c275284daa7e3df911be76e91ac297a40b93c683370e7225c49a1259ec2cd64f92c7c728ac5abc0d32aa87a65d1725e446b2a2fca82d873b1c4782e

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b0737206.exe

    Filesize

    141KB

    MD5

    d89cfd9e89e84625529a90e1733d5e15

    SHA1

    db9243f57e09c273ffc995aacd53686c56d02c13

    SHA256

    4f4fa4689d550495a63e610203e74f9bb9bc405d78b424740819b58d140d9eb8

    SHA512

    be6177471c275284daa7e3df911be76e91ac297a40b93c683370e7225c49a1259ec2cd64f92c7c728ac5abc0d32aa87a65d1725e446b2a2fca82d873b1c4782e

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v4719010.exe

    Filesize

    723KB

    MD5

    42e4bf6d5d8e67e8482dac0b12d1897b

    SHA1

    59f90382789b091d72db6fecc82fc8bfcac8b359

    SHA256

    ee7b265586548684506b593bff33eaff7cbd8c22bb2c6a895ab9d402e1c3a29b

    SHA512

    0ca6ed4080dca9f065ae636888e3c4b591cc3969453c2bfedca7df03754b30753facaf7dfdec2db029c00a2cc27f3772f735ee00454643971af3a492109aea8a

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v4719010.exe

    Filesize

    723KB

    MD5

    42e4bf6d5d8e67e8482dac0b12d1897b

    SHA1

    59f90382789b091d72db6fecc82fc8bfcac8b359

    SHA256

    ee7b265586548684506b593bff33eaff7cbd8c22bb2c6a895ab9d402e1c3a29b

    SHA512

    0ca6ed4080dca9f065ae636888e3c4b591cc3969453c2bfedca7df03754b30753facaf7dfdec2db029c00a2cc27f3772f735ee00454643971af3a492109aea8a

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v1947033.exe

    Filesize

    497KB

    MD5

    1a022d9bf7d9ff5df93f717cf2123f05

    SHA1

    b546fb78b9ae041735ca1583cbd17c895e9ef3cf

    SHA256

    923a77a848faeead351b26498258acb0c34f1a7f1e317b15d67c73f3842f893f

    SHA512

    ad102d44e3ae79bc207b05c7ceed42b8c8a36546f82e4b3be041483f8e75b0e7f982e8b1eb3f41216138bc2ce6847f8772936d63f2994e39624db24a795819dd

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v1947033.exe

    Filesize

    497KB

    MD5

    1a022d9bf7d9ff5df93f717cf2123f05

    SHA1

    b546fb78b9ae041735ca1583cbd17c895e9ef3cf

    SHA256

    923a77a848faeead351b26498258acb0c34f1a7f1e317b15d67c73f3842f893f

    SHA512

    ad102d44e3ae79bc207b05c7ceed42b8c8a36546f82e4b3be041483f8e75b0e7f982e8b1eb3f41216138bc2ce6847f8772936d63f2994e39624db24a795819dd

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v7307623.exe

    Filesize

    373KB

    MD5

    dab06bf67ce52e87e5ac79ca08d55882

    SHA1

    c6b69b6477e31607006aeeb383730cabbc63a42c

    SHA256

    b3e5d7d3a2b51b4f3d8d8b7301bfd2016927fdc370e29707d438d18d5b48ca3f

    SHA512

    e6d10cc0c22be8daf169564d3b33d67d759e5d7367ee2d58f5280e9d2eed82cc04c0f1127bd5fe0c0fb58d4dd80d511c37b6d0e73e28ed25d3e1faa3a7e5d135

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v7307623.exe

    Filesize

    373KB

    MD5

    dab06bf67ce52e87e5ac79ca08d55882

    SHA1

    c6b69b6477e31607006aeeb383730cabbc63a42c

    SHA256

    b3e5d7d3a2b51b4f3d8d8b7301bfd2016927fdc370e29707d438d18d5b48ca3f

    SHA512

    e6d10cc0c22be8daf169564d3b33d67d759e5d7367ee2d58f5280e9d2eed82cc04c0f1127bd5fe0c0fb58d4dd80d511c37b6d0e73e28ed25d3e1faa3a7e5d135

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\c1812145.exe

    Filesize

    174KB

    MD5

    936869d9a96eea96642ed6915809e4ce

    SHA1

    05aa268a72ffa170122ad6d514c5d08d024b72b7

    SHA256

    5a6fadabe00d46c04b425a9f4f6cddc46c3ae5f838a6f0f39697e50a31828360

    SHA512

    7daf0e124b53bdc5005e59787367361939fb22ce0703dc177d8fa8a747e36ae110ffbe35f5dd1046a55fa2dff9646663755c19c7755032d52de219f8a054324a

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\c1812145.exe

    Filesize

    174KB

    MD5

    936869d9a96eea96642ed6915809e4ce

    SHA1

    05aa268a72ffa170122ad6d514c5d08d024b72b7

    SHA256

    5a6fadabe00d46c04b425a9f4f6cddc46c3ae5f838a6f0f39697e50a31828360

    SHA512

    7daf0e124b53bdc5005e59787367361939fb22ce0703dc177d8fa8a747e36ae110ffbe35f5dd1046a55fa2dff9646663755c19c7755032d52de219f8a054324a

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v1518836.exe

    Filesize

    217KB

    MD5

    a41641ae5758765881efbf67b128606a

    SHA1

    8fef0fa313fa2ffae91bfc3719305c9726b5037a

    SHA256

    ce1791f3d04595a74d7b330390552699747430430a33c33274ad2c8464f8627c

    SHA512

    2d90824c9692852a63d15a490cee5725830f199a4da3b894952b3ffa8f1566de42afedd5c427752c582a2fbd9b041d4cebfe321826b7bcb15196f20e5b720fc3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v1518836.exe

    Filesize

    217KB

    MD5

    a41641ae5758765881efbf67b128606a

    SHA1

    8fef0fa313fa2ffae91bfc3719305c9726b5037a

    SHA256

    ce1791f3d04595a74d7b330390552699747430430a33c33274ad2c8464f8627c

    SHA512

    2d90824c9692852a63d15a490cee5725830f199a4da3b894952b3ffa8f1566de42afedd5c427752c582a2fbd9b041d4cebfe321826b7bcb15196f20e5b720fc3

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a3701235.exe

    Filesize

    19KB

    MD5

    750381e78038ca9ee743e3a0db623a49

    SHA1

    9d0a70eaf0101f932c4b5c06ae95ea29714639d2

    SHA256

    b9aaa983068a4ecf60c02556578d982149e5d87080ecc1c5d8cd64f99d7c22a0

    SHA512

    57efa387f6287c9adc89643e81a20aa1707c39512ed0f86fa1e372ea8611d18f531839d1ee683c5069bfd31124f85164abd24650524672c91eaa41af87ecc7f1

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b0737206.exe

    Filesize

    141KB

    MD5

    d89cfd9e89e84625529a90e1733d5e15

    SHA1

    db9243f57e09c273ffc995aacd53686c56d02c13

    SHA256

    4f4fa4689d550495a63e610203e74f9bb9bc405d78b424740819b58d140d9eb8

    SHA512

    be6177471c275284daa7e3df911be76e91ac297a40b93c683370e7225c49a1259ec2cd64f92c7c728ac5abc0d32aa87a65d1725e446b2a2fca82d873b1c4782e

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b0737206.exe

    Filesize

    141KB

    MD5

    d89cfd9e89e84625529a90e1733d5e15

    SHA1

    db9243f57e09c273ffc995aacd53686c56d02c13

    SHA256

    4f4fa4689d550495a63e610203e74f9bb9bc405d78b424740819b58d140d9eb8

    SHA512

    be6177471c275284daa7e3df911be76e91ac297a40b93c683370e7225c49a1259ec2cd64f92c7c728ac5abc0d32aa87a65d1725e446b2a2fca82d873b1c4782e

  • memory/2508-63-0x00000000010F0000-0x0000000001120000-memory.dmp

    Filesize

    192KB

  • memory/2508-64-0x00000000003B0000-0x00000000003B6000-memory.dmp

    Filesize

    24KB

  • memory/2716-54-0x000007FEF5680000-0x000007FEF606C000-memory.dmp

    Filesize

    9.9MB

  • memory/2716-48-0x0000000000080000-0x000000000008A000-memory.dmp

    Filesize

    40KB

  • memory/2716-49-0x000007FEF5680000-0x000007FEF606C000-memory.dmp

    Filesize

    9.9MB