Analysis

  • max time kernel
    147s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    02/09/2023, 10:54

General

  • Target

    JC_350af1e8985855d33719f335dd3d063bce9e2baabc298ec0a2eef8edad09827d.exe

  • Size

    829KB

  • MD5

    8b5b894a9de86538500b7ea126a6b240

  • SHA1

    4fbbd93ff8f56731656e0554d46b490fe9972c0d

  • SHA256

    350af1e8985855d33719f335dd3d063bce9e2baabc298ec0a2eef8edad09827d

  • SHA512

    fdc7ddce94ae731032d778b543ed16165416883462791e301e136220438a185a372b9cee102c3736c1003be492df2af513b01974028bdb816b9fbc86e1bd8e79

  • SSDEEP

    24576:iyEQyHPnhDPXx0RCOhDsj+d6p73o+Sz4b6Hi:JEQgvhDPx0RbhAji6pU

Malware Config

Extracted

Family

redline

Botnet

bobik

C2

77.91.124.82:19071

Attributes
  • auth_value

    d639522ae3c9dda998264d691a19eb33

Signatures

  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 13 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JC_350af1e8985855d33719f335dd3d063bce9e2baabc298ec0a2eef8edad09827d.exe
    "C:\Users\Admin\AppData\Local\Temp\JC_350af1e8985855d33719f335dd3d063bce9e2baabc298ec0a2eef8edad09827d.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3008528.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3008528.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2676
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1915913.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1915913.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2568
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4740263.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4740263.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2576
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9864783.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9864783.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2980
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a4066731.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a4066731.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2700
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b5192239.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b5192239.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:2992
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c3173793.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c3173793.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:2760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3008528.exe

    Filesize

    723KB

    MD5

    e23b7ec88efd81e2cfb9c0c6fc42a72a

    SHA1

    d981468ed571e5cd3808d4921353f5a6f68fe11f

    SHA256

    ea1be3ae60737f95bf35ae1fc77e7573be652c11c138572d515fbbe0af3f6c94

    SHA512

    334cef5232fe1483b418d8d8d9b0c67934c2068674a3b20deb210a9d6b7a4cece907174f96baae3b329c9fffea4228a4a4f9dbb58835919af3758f5482d7d156

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3008528.exe

    Filesize

    723KB

    MD5

    e23b7ec88efd81e2cfb9c0c6fc42a72a

    SHA1

    d981468ed571e5cd3808d4921353f5a6f68fe11f

    SHA256

    ea1be3ae60737f95bf35ae1fc77e7573be652c11c138572d515fbbe0af3f6c94

    SHA512

    334cef5232fe1483b418d8d8d9b0c67934c2068674a3b20deb210a9d6b7a4cece907174f96baae3b329c9fffea4228a4a4f9dbb58835919af3758f5482d7d156

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1915913.exe

    Filesize

    497KB

    MD5

    7309dcce245f70ff28106fbe7dc4dab5

    SHA1

    bc72a83e8399267064f75d480197a3d20cba188b

    SHA256

    179109c2b08396f9811337e5a31ce496899a3c4e51ffdde608b83b3f14723edb

    SHA512

    28565d6e936033db986e112be32c1f0387db6dd54dbd66f9351bba6f60bb30f459e20690961d3219f6d1d74c0af8d5d71cf6e68e1c5b722c71f95266b7bb16be

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1915913.exe

    Filesize

    497KB

    MD5

    7309dcce245f70ff28106fbe7dc4dab5

    SHA1

    bc72a83e8399267064f75d480197a3d20cba188b

    SHA256

    179109c2b08396f9811337e5a31ce496899a3c4e51ffdde608b83b3f14723edb

    SHA512

    28565d6e936033db986e112be32c1f0387db6dd54dbd66f9351bba6f60bb30f459e20690961d3219f6d1d74c0af8d5d71cf6e68e1c5b722c71f95266b7bb16be

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4740263.exe

    Filesize

    372KB

    MD5

    9a270757fb9f1410f75e73b783f5fb6f

    SHA1

    39430e7fc754a5425e124e7c23ba5b0e122beb74

    SHA256

    75eed0df397f07e3845c7a56d0f4aaf9ec6ff20b8631976c850f715e5fdd0873

    SHA512

    4668eca01e154fe151819a2e330586b9feffdc46c13c3eda4ad922b020f8a980d858429760f8efbebcfafe0587114026d5f0aa5439e35eceb5d8221f81f186cc

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4740263.exe

    Filesize

    372KB

    MD5

    9a270757fb9f1410f75e73b783f5fb6f

    SHA1

    39430e7fc754a5425e124e7c23ba5b0e122beb74

    SHA256

    75eed0df397f07e3845c7a56d0f4aaf9ec6ff20b8631976c850f715e5fdd0873

    SHA512

    4668eca01e154fe151819a2e330586b9feffdc46c13c3eda4ad922b020f8a980d858429760f8efbebcfafe0587114026d5f0aa5439e35eceb5d8221f81f186cc

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c3173793.exe

    Filesize

    174KB

    MD5

    6e71d16b1fdbc0b1469e067cbc0c8a63

    SHA1

    e3d32c1e2533763178427c84c77a2fe73f84bae3

    SHA256

    6a1c9ee7db4e276630b20bc5eff33b7298958712da9666898e09a2c226875b3d

    SHA512

    8007779a23a960042717165f31ba5570fa2a50c7bb1a1415f098418c73c4bc79d46e18ccb41f4c6c233b4a811a27ebf7e4d89989c7aed24aa1a0041ea585097d

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c3173793.exe

    Filesize

    174KB

    MD5

    6e71d16b1fdbc0b1469e067cbc0c8a63

    SHA1

    e3d32c1e2533763178427c84c77a2fe73f84bae3

    SHA256

    6a1c9ee7db4e276630b20bc5eff33b7298958712da9666898e09a2c226875b3d

    SHA512

    8007779a23a960042717165f31ba5570fa2a50c7bb1a1415f098418c73c4bc79d46e18ccb41f4c6c233b4a811a27ebf7e4d89989c7aed24aa1a0041ea585097d

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9864783.exe

    Filesize

    217KB

    MD5

    6c2b77a5993bbd09af304349ea973c82

    SHA1

    f1eeb2303363ecc9ce3a8f1800d55d0d9b353d3d

    SHA256

    028892bb53eb539cb82d3a929a23bad768fc20816db15d8b0aabd4fcba6c207d

    SHA512

    ee7f6e3458b967aadea7fdbff538a2205af282287a2759511c9910c8c0a9917f65aab2a6bfa5892e38790c594c165157739d06820081ee2baf7bcd85d1074b5e

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9864783.exe

    Filesize

    217KB

    MD5

    6c2b77a5993bbd09af304349ea973c82

    SHA1

    f1eeb2303363ecc9ce3a8f1800d55d0d9b353d3d

    SHA256

    028892bb53eb539cb82d3a929a23bad768fc20816db15d8b0aabd4fcba6c207d

    SHA512

    ee7f6e3458b967aadea7fdbff538a2205af282287a2759511c9910c8c0a9917f65aab2a6bfa5892e38790c594c165157739d06820081ee2baf7bcd85d1074b5e

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a4066731.exe

    Filesize

    19KB

    MD5

    f174807aa5ab238a4fdc07887961d4fb

    SHA1

    3ba3e71e69b669d536577878d68970f2c7519fee

    SHA256

    8b8b063164926c7bdeb685ef567d00c72589af2c9442e6889a6d33f696919757

    SHA512

    849d8bd56d07980377d3def0ef92d7b073779dd5f0fd7079d5ef11a9acdb6c244c891e8d6d4d7c5e10f41914c203c2973a99d72f7fc22c3fc07794ce1e612bcc

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a4066731.exe

    Filesize

    19KB

    MD5

    f174807aa5ab238a4fdc07887961d4fb

    SHA1

    3ba3e71e69b669d536577878d68970f2c7519fee

    SHA256

    8b8b063164926c7bdeb685ef567d00c72589af2c9442e6889a6d33f696919757

    SHA512

    849d8bd56d07980377d3def0ef92d7b073779dd5f0fd7079d5ef11a9acdb6c244c891e8d6d4d7c5e10f41914c203c2973a99d72f7fc22c3fc07794ce1e612bcc

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b5192239.exe

    Filesize

    140KB

    MD5

    287984a1cc91894b60a2b6de9934ba6d

    SHA1

    9e63658f95bc5c610ccca5f07d3833a4de05c92d

    SHA256

    9813b178d9f3fd4bf6fb2759e24af103e7404dbf745e1258a2ae7a619f6f5551

    SHA512

    740bac8926ba43099c0d7fbd7c9b412f58d39039e9163189a0818acd2a650216c1746bdd5dec89f928964ebadf029529959101ec7dc6bc263e92e756b496d29b

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b5192239.exe

    Filesize

    140KB

    MD5

    287984a1cc91894b60a2b6de9934ba6d

    SHA1

    9e63658f95bc5c610ccca5f07d3833a4de05c92d

    SHA256

    9813b178d9f3fd4bf6fb2759e24af103e7404dbf745e1258a2ae7a619f6f5551

    SHA512

    740bac8926ba43099c0d7fbd7c9b412f58d39039e9163189a0818acd2a650216c1746bdd5dec89f928964ebadf029529959101ec7dc6bc263e92e756b496d29b

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v3008528.exe

    Filesize

    723KB

    MD5

    e23b7ec88efd81e2cfb9c0c6fc42a72a

    SHA1

    d981468ed571e5cd3808d4921353f5a6f68fe11f

    SHA256

    ea1be3ae60737f95bf35ae1fc77e7573be652c11c138572d515fbbe0af3f6c94

    SHA512

    334cef5232fe1483b418d8d8d9b0c67934c2068674a3b20deb210a9d6b7a4cece907174f96baae3b329c9fffea4228a4a4f9dbb58835919af3758f5482d7d156

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v3008528.exe

    Filesize

    723KB

    MD5

    e23b7ec88efd81e2cfb9c0c6fc42a72a

    SHA1

    d981468ed571e5cd3808d4921353f5a6f68fe11f

    SHA256

    ea1be3ae60737f95bf35ae1fc77e7573be652c11c138572d515fbbe0af3f6c94

    SHA512

    334cef5232fe1483b418d8d8d9b0c67934c2068674a3b20deb210a9d6b7a4cece907174f96baae3b329c9fffea4228a4a4f9dbb58835919af3758f5482d7d156

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v1915913.exe

    Filesize

    497KB

    MD5

    7309dcce245f70ff28106fbe7dc4dab5

    SHA1

    bc72a83e8399267064f75d480197a3d20cba188b

    SHA256

    179109c2b08396f9811337e5a31ce496899a3c4e51ffdde608b83b3f14723edb

    SHA512

    28565d6e936033db986e112be32c1f0387db6dd54dbd66f9351bba6f60bb30f459e20690961d3219f6d1d74c0af8d5d71cf6e68e1c5b722c71f95266b7bb16be

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v1915913.exe

    Filesize

    497KB

    MD5

    7309dcce245f70ff28106fbe7dc4dab5

    SHA1

    bc72a83e8399267064f75d480197a3d20cba188b

    SHA256

    179109c2b08396f9811337e5a31ce496899a3c4e51ffdde608b83b3f14723edb

    SHA512

    28565d6e936033db986e112be32c1f0387db6dd54dbd66f9351bba6f60bb30f459e20690961d3219f6d1d74c0af8d5d71cf6e68e1c5b722c71f95266b7bb16be

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v4740263.exe

    Filesize

    372KB

    MD5

    9a270757fb9f1410f75e73b783f5fb6f

    SHA1

    39430e7fc754a5425e124e7c23ba5b0e122beb74

    SHA256

    75eed0df397f07e3845c7a56d0f4aaf9ec6ff20b8631976c850f715e5fdd0873

    SHA512

    4668eca01e154fe151819a2e330586b9feffdc46c13c3eda4ad922b020f8a980d858429760f8efbebcfafe0587114026d5f0aa5439e35eceb5d8221f81f186cc

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v4740263.exe

    Filesize

    372KB

    MD5

    9a270757fb9f1410f75e73b783f5fb6f

    SHA1

    39430e7fc754a5425e124e7c23ba5b0e122beb74

    SHA256

    75eed0df397f07e3845c7a56d0f4aaf9ec6ff20b8631976c850f715e5fdd0873

    SHA512

    4668eca01e154fe151819a2e330586b9feffdc46c13c3eda4ad922b020f8a980d858429760f8efbebcfafe0587114026d5f0aa5439e35eceb5d8221f81f186cc

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\c3173793.exe

    Filesize

    174KB

    MD5

    6e71d16b1fdbc0b1469e067cbc0c8a63

    SHA1

    e3d32c1e2533763178427c84c77a2fe73f84bae3

    SHA256

    6a1c9ee7db4e276630b20bc5eff33b7298958712da9666898e09a2c226875b3d

    SHA512

    8007779a23a960042717165f31ba5570fa2a50c7bb1a1415f098418c73c4bc79d46e18ccb41f4c6c233b4a811a27ebf7e4d89989c7aed24aa1a0041ea585097d

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\c3173793.exe

    Filesize

    174KB

    MD5

    6e71d16b1fdbc0b1469e067cbc0c8a63

    SHA1

    e3d32c1e2533763178427c84c77a2fe73f84bae3

    SHA256

    6a1c9ee7db4e276630b20bc5eff33b7298958712da9666898e09a2c226875b3d

    SHA512

    8007779a23a960042717165f31ba5570fa2a50c7bb1a1415f098418c73c4bc79d46e18ccb41f4c6c233b4a811a27ebf7e4d89989c7aed24aa1a0041ea585097d

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v9864783.exe

    Filesize

    217KB

    MD5

    6c2b77a5993bbd09af304349ea973c82

    SHA1

    f1eeb2303363ecc9ce3a8f1800d55d0d9b353d3d

    SHA256

    028892bb53eb539cb82d3a929a23bad768fc20816db15d8b0aabd4fcba6c207d

    SHA512

    ee7f6e3458b967aadea7fdbff538a2205af282287a2759511c9910c8c0a9917f65aab2a6bfa5892e38790c594c165157739d06820081ee2baf7bcd85d1074b5e

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v9864783.exe

    Filesize

    217KB

    MD5

    6c2b77a5993bbd09af304349ea973c82

    SHA1

    f1eeb2303363ecc9ce3a8f1800d55d0d9b353d3d

    SHA256

    028892bb53eb539cb82d3a929a23bad768fc20816db15d8b0aabd4fcba6c207d

    SHA512

    ee7f6e3458b967aadea7fdbff538a2205af282287a2759511c9910c8c0a9917f65aab2a6bfa5892e38790c594c165157739d06820081ee2baf7bcd85d1074b5e

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a4066731.exe

    Filesize

    19KB

    MD5

    f174807aa5ab238a4fdc07887961d4fb

    SHA1

    3ba3e71e69b669d536577878d68970f2c7519fee

    SHA256

    8b8b063164926c7bdeb685ef567d00c72589af2c9442e6889a6d33f696919757

    SHA512

    849d8bd56d07980377d3def0ef92d7b073779dd5f0fd7079d5ef11a9acdb6c244c891e8d6d4d7c5e10f41914c203c2973a99d72f7fc22c3fc07794ce1e612bcc

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b5192239.exe

    Filesize

    140KB

    MD5

    287984a1cc91894b60a2b6de9934ba6d

    SHA1

    9e63658f95bc5c610ccca5f07d3833a4de05c92d

    SHA256

    9813b178d9f3fd4bf6fb2759e24af103e7404dbf745e1258a2ae7a619f6f5551

    SHA512

    740bac8926ba43099c0d7fbd7c9b412f58d39039e9163189a0818acd2a650216c1746bdd5dec89f928964ebadf029529959101ec7dc6bc263e92e756b496d29b

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b5192239.exe

    Filesize

    140KB

    MD5

    287984a1cc91894b60a2b6de9934ba6d

    SHA1

    9e63658f95bc5c610ccca5f07d3833a4de05c92d

    SHA256

    9813b178d9f3fd4bf6fb2759e24af103e7404dbf745e1258a2ae7a619f6f5551

    SHA512

    740bac8926ba43099c0d7fbd7c9b412f58d39039e9163189a0818acd2a650216c1746bdd5dec89f928964ebadf029529959101ec7dc6bc263e92e756b496d29b

  • memory/2700-48-0x0000000000B40000-0x0000000000B4A000-memory.dmp

    Filesize

    40KB

  • memory/2700-51-0x000007FEF5990000-0x000007FEF637C000-memory.dmp

    Filesize

    9.9MB

  • memory/2700-50-0x000007FEF5990000-0x000007FEF637C000-memory.dmp

    Filesize

    9.9MB

  • memory/2700-49-0x000007FEF5990000-0x000007FEF637C000-memory.dmp

    Filesize

    9.9MB

  • memory/2760-64-0x0000000001280000-0x00000000012B0000-memory.dmp

    Filesize

    192KB

  • memory/2760-65-0x0000000000460000-0x0000000000466000-memory.dmp

    Filesize

    24KB