Analysis

  • max time kernel
    146s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    02-09-2023 11:54

General

  • Target

    JC_98b48f108a619408d7ff503c192a9ca234126e3ef7167a6dcaf26b98c0aa23da.exe

  • Size

    830KB

  • MD5

    22f2f2f118e5c873067ec856db7c81a9

  • SHA1

    0490839a2fa124ef76c6ae6360150f42dd08e109

  • SHA256

    98b48f108a619408d7ff503c192a9ca234126e3ef7167a6dcaf26b98c0aa23da

  • SHA512

    470af34f73181631169bca75b837703ac88f71fe924d5cc6b14d3e3cce128b21c259bbe8a97a84fd9da1e2b8c13b3c6928c46c8d068bdec4398143f7bb3cdc33

  • SSDEEP

    12288:rMrjy90m7Eid8L6yDGDVDInzwzp+qb9dldDBXRgluSdrx7SnXPnyXJSF4el5xsw:Iyt7hMieziXqHT7SnXPyZExl5Gw

Malware Config

Extracted

Family

redline

Botnet

bobik

C2

77.91.124.82:19071

Attributes
  • auth_value

    d639522ae3c9dda998264d691a19eb33

Signatures

  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 13 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JC_98b48f108a619408d7ff503c192a9ca234126e3ef7167a6dcaf26b98c0aa23da.exe
    "C:\Users\Admin\AppData\Local\Temp\JC_98b48f108a619408d7ff503c192a9ca234126e3ef7167a6dcaf26b98c0aa23da.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2104
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9661419.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9661419.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2016
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6569015.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6569015.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2784
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0720801.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0720801.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2848
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2853061.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2853061.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2388
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a7977848.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a7977848.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2724
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b8957875.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b8957875.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:2528
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c9432669.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c9432669.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:1952

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9661419.exe

    Filesize

    724KB

    MD5

    efdc76a221daaa19b8c729b68ec621ae

    SHA1

    634458f1f2544308556e9654925a9b40abc6f453

    SHA256

    d6a0eb4a28f0436cf3061e2eef5223f91f28954bb17321f81033ef4ef2704cda

    SHA512

    dda74be90fe7dcc9a9e2214ec7feffb0b33824203070dc22dfc4ad03d2d4a095acf8b7cbe60d09b7968ebc5e8e93617b1b25c907d45e1ea6b87bebe800da4228

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9661419.exe

    Filesize

    724KB

    MD5

    efdc76a221daaa19b8c729b68ec621ae

    SHA1

    634458f1f2544308556e9654925a9b40abc6f453

    SHA256

    d6a0eb4a28f0436cf3061e2eef5223f91f28954bb17321f81033ef4ef2704cda

    SHA512

    dda74be90fe7dcc9a9e2214ec7feffb0b33824203070dc22dfc4ad03d2d4a095acf8b7cbe60d09b7968ebc5e8e93617b1b25c907d45e1ea6b87bebe800da4228

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6569015.exe

    Filesize

    498KB

    MD5

    e7357705a9e202267a9e1a7cd1d55090

    SHA1

    84ccd2834cd06acf3264a0ada331308cbfde1a59

    SHA256

    59e91b13d24f42251dd33b9a9ff809dbd3b796b6493fcee0d6dec54c2c7d30a7

    SHA512

    58448718e52085616df4bb9a87102743d56406b75e5e4051eb63d0cff3b361ca9031f27380becaf0f6230dd5b231f9fa38feb2c5ec7e52bd3658cdab36ffc8f1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6569015.exe

    Filesize

    498KB

    MD5

    e7357705a9e202267a9e1a7cd1d55090

    SHA1

    84ccd2834cd06acf3264a0ada331308cbfde1a59

    SHA256

    59e91b13d24f42251dd33b9a9ff809dbd3b796b6493fcee0d6dec54c2c7d30a7

    SHA512

    58448718e52085616df4bb9a87102743d56406b75e5e4051eb63d0cff3b361ca9031f27380becaf0f6230dd5b231f9fa38feb2c5ec7e52bd3658cdab36ffc8f1

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0720801.exe

    Filesize

    373KB

    MD5

    75ec89549864e518dc747a28aa40de7c

    SHA1

    9eb287ba4d8f1ea2aa3988087a6db130bb1527e8

    SHA256

    5f81a6eb359d10becaa50f55276ce4b67c030801096500f3268a693fe0a6cbf2

    SHA512

    dd7875399adfaa76e98d56eb6d54b2d4385bd808a01beb57be1d902b1b7efdfc4c31a6ef65637c5c7f24a5a0a87fd7ce55efedad79e3161f036509abe04b2f80

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0720801.exe

    Filesize

    373KB

    MD5

    75ec89549864e518dc747a28aa40de7c

    SHA1

    9eb287ba4d8f1ea2aa3988087a6db130bb1527e8

    SHA256

    5f81a6eb359d10becaa50f55276ce4b67c030801096500f3268a693fe0a6cbf2

    SHA512

    dd7875399adfaa76e98d56eb6d54b2d4385bd808a01beb57be1d902b1b7efdfc4c31a6ef65637c5c7f24a5a0a87fd7ce55efedad79e3161f036509abe04b2f80

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c9432669.exe

    Filesize

    174KB

    MD5

    55314cbe90ebe687f350f58cfe26fd89

    SHA1

    6c8d3e3dff8b4371908c4b48b132dd22990ecfec

    SHA256

    6d92ff4784dcf5cf55c1cddcf066facd081eb96c0c8377aef80f8e80ef5e8761

    SHA512

    92a0c8cde0ec488b61f67f42a132c99a316f27d48f7d17c87edf236881cd1fe0c383c1c2ab957fd9f2569057993f7881230257829bb22c80ce81abc9592723d6

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c9432669.exe

    Filesize

    174KB

    MD5

    55314cbe90ebe687f350f58cfe26fd89

    SHA1

    6c8d3e3dff8b4371908c4b48b132dd22990ecfec

    SHA256

    6d92ff4784dcf5cf55c1cddcf066facd081eb96c0c8377aef80f8e80ef5e8761

    SHA512

    92a0c8cde0ec488b61f67f42a132c99a316f27d48f7d17c87edf236881cd1fe0c383c1c2ab957fd9f2569057993f7881230257829bb22c80ce81abc9592723d6

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2853061.exe

    Filesize

    217KB

    MD5

    6b0e85af2bfa0e6ca54fc26148f867cb

    SHA1

    b001403b7f0e27b82e1d52aa330ed9334f32dc04

    SHA256

    ce9c6b058169e122f10d94183693c9194e129ab90ee1505309d2cf90b1e87ac7

    SHA512

    9e5f856b37e1a69e49d8f8a9398c3500227ca249ef7d4f44b7e76c34586e5a2f356f29bc19f1e3f771eba9ae87654531ca28eb94bc2b6421831f00ce1a3cf30c

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2853061.exe

    Filesize

    217KB

    MD5

    6b0e85af2bfa0e6ca54fc26148f867cb

    SHA1

    b001403b7f0e27b82e1d52aa330ed9334f32dc04

    SHA256

    ce9c6b058169e122f10d94183693c9194e129ab90ee1505309d2cf90b1e87ac7

    SHA512

    9e5f856b37e1a69e49d8f8a9398c3500227ca249ef7d4f44b7e76c34586e5a2f356f29bc19f1e3f771eba9ae87654531ca28eb94bc2b6421831f00ce1a3cf30c

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a7977848.exe

    Filesize

    20KB

    MD5

    bcc317d03d272637469bdd81ae219926

    SHA1

    a0244604fed38156ca17cfc0c4152c1ee8a508a3

    SHA256

    07be6d7ffa44c02bb38175cc7928004cb46c4c039eb8ad794f266ef953aad87c

    SHA512

    f76e48a117ba1052eee3659ad5a95ba9919b897f35de38dd7d127c1d524d49a8cee384d13108e9eb82d70a18a2d06cb28db7b90edfe2f64d4e17b381919da38b

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a7977848.exe

    Filesize

    20KB

    MD5

    bcc317d03d272637469bdd81ae219926

    SHA1

    a0244604fed38156ca17cfc0c4152c1ee8a508a3

    SHA256

    07be6d7ffa44c02bb38175cc7928004cb46c4c039eb8ad794f266ef953aad87c

    SHA512

    f76e48a117ba1052eee3659ad5a95ba9919b897f35de38dd7d127c1d524d49a8cee384d13108e9eb82d70a18a2d06cb28db7b90edfe2f64d4e17b381919da38b

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b8957875.exe

    Filesize

    140KB

    MD5

    6cec28ec05aad7285295e27fb462273c

    SHA1

    5d60f3e25e145c766c37f218df635fbb352fdd83

    SHA256

    dde3853d18f908deadb707a4208f149cfba6e09ad12e403a65a1d1df0dfb9f47

    SHA512

    c8a703e991d75edd83545dad5cdc0a5da5f13c146dc9c61ffccfe92f7b140a256edfab9858668a06fcf1dbc60f9b1d42f557442d6d135d4ab8218edef884128f

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b8957875.exe

    Filesize

    140KB

    MD5

    6cec28ec05aad7285295e27fb462273c

    SHA1

    5d60f3e25e145c766c37f218df635fbb352fdd83

    SHA256

    dde3853d18f908deadb707a4208f149cfba6e09ad12e403a65a1d1df0dfb9f47

    SHA512

    c8a703e991d75edd83545dad5cdc0a5da5f13c146dc9c61ffccfe92f7b140a256edfab9858668a06fcf1dbc60f9b1d42f557442d6d135d4ab8218edef884128f

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v9661419.exe

    Filesize

    724KB

    MD5

    efdc76a221daaa19b8c729b68ec621ae

    SHA1

    634458f1f2544308556e9654925a9b40abc6f453

    SHA256

    d6a0eb4a28f0436cf3061e2eef5223f91f28954bb17321f81033ef4ef2704cda

    SHA512

    dda74be90fe7dcc9a9e2214ec7feffb0b33824203070dc22dfc4ad03d2d4a095acf8b7cbe60d09b7968ebc5e8e93617b1b25c907d45e1ea6b87bebe800da4228

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v9661419.exe

    Filesize

    724KB

    MD5

    efdc76a221daaa19b8c729b68ec621ae

    SHA1

    634458f1f2544308556e9654925a9b40abc6f453

    SHA256

    d6a0eb4a28f0436cf3061e2eef5223f91f28954bb17321f81033ef4ef2704cda

    SHA512

    dda74be90fe7dcc9a9e2214ec7feffb0b33824203070dc22dfc4ad03d2d4a095acf8b7cbe60d09b7968ebc5e8e93617b1b25c907d45e1ea6b87bebe800da4228

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v6569015.exe

    Filesize

    498KB

    MD5

    e7357705a9e202267a9e1a7cd1d55090

    SHA1

    84ccd2834cd06acf3264a0ada331308cbfde1a59

    SHA256

    59e91b13d24f42251dd33b9a9ff809dbd3b796b6493fcee0d6dec54c2c7d30a7

    SHA512

    58448718e52085616df4bb9a87102743d56406b75e5e4051eb63d0cff3b361ca9031f27380becaf0f6230dd5b231f9fa38feb2c5ec7e52bd3658cdab36ffc8f1

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v6569015.exe

    Filesize

    498KB

    MD5

    e7357705a9e202267a9e1a7cd1d55090

    SHA1

    84ccd2834cd06acf3264a0ada331308cbfde1a59

    SHA256

    59e91b13d24f42251dd33b9a9ff809dbd3b796b6493fcee0d6dec54c2c7d30a7

    SHA512

    58448718e52085616df4bb9a87102743d56406b75e5e4051eb63d0cff3b361ca9031f27380becaf0f6230dd5b231f9fa38feb2c5ec7e52bd3658cdab36ffc8f1

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v0720801.exe

    Filesize

    373KB

    MD5

    75ec89549864e518dc747a28aa40de7c

    SHA1

    9eb287ba4d8f1ea2aa3988087a6db130bb1527e8

    SHA256

    5f81a6eb359d10becaa50f55276ce4b67c030801096500f3268a693fe0a6cbf2

    SHA512

    dd7875399adfaa76e98d56eb6d54b2d4385bd808a01beb57be1d902b1b7efdfc4c31a6ef65637c5c7f24a5a0a87fd7ce55efedad79e3161f036509abe04b2f80

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v0720801.exe

    Filesize

    373KB

    MD5

    75ec89549864e518dc747a28aa40de7c

    SHA1

    9eb287ba4d8f1ea2aa3988087a6db130bb1527e8

    SHA256

    5f81a6eb359d10becaa50f55276ce4b67c030801096500f3268a693fe0a6cbf2

    SHA512

    dd7875399adfaa76e98d56eb6d54b2d4385bd808a01beb57be1d902b1b7efdfc4c31a6ef65637c5c7f24a5a0a87fd7ce55efedad79e3161f036509abe04b2f80

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\c9432669.exe

    Filesize

    174KB

    MD5

    55314cbe90ebe687f350f58cfe26fd89

    SHA1

    6c8d3e3dff8b4371908c4b48b132dd22990ecfec

    SHA256

    6d92ff4784dcf5cf55c1cddcf066facd081eb96c0c8377aef80f8e80ef5e8761

    SHA512

    92a0c8cde0ec488b61f67f42a132c99a316f27d48f7d17c87edf236881cd1fe0c383c1c2ab957fd9f2569057993f7881230257829bb22c80ce81abc9592723d6

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\c9432669.exe

    Filesize

    174KB

    MD5

    55314cbe90ebe687f350f58cfe26fd89

    SHA1

    6c8d3e3dff8b4371908c4b48b132dd22990ecfec

    SHA256

    6d92ff4784dcf5cf55c1cddcf066facd081eb96c0c8377aef80f8e80ef5e8761

    SHA512

    92a0c8cde0ec488b61f67f42a132c99a316f27d48f7d17c87edf236881cd1fe0c383c1c2ab957fd9f2569057993f7881230257829bb22c80ce81abc9592723d6

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v2853061.exe

    Filesize

    217KB

    MD5

    6b0e85af2bfa0e6ca54fc26148f867cb

    SHA1

    b001403b7f0e27b82e1d52aa330ed9334f32dc04

    SHA256

    ce9c6b058169e122f10d94183693c9194e129ab90ee1505309d2cf90b1e87ac7

    SHA512

    9e5f856b37e1a69e49d8f8a9398c3500227ca249ef7d4f44b7e76c34586e5a2f356f29bc19f1e3f771eba9ae87654531ca28eb94bc2b6421831f00ce1a3cf30c

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v2853061.exe

    Filesize

    217KB

    MD5

    6b0e85af2bfa0e6ca54fc26148f867cb

    SHA1

    b001403b7f0e27b82e1d52aa330ed9334f32dc04

    SHA256

    ce9c6b058169e122f10d94183693c9194e129ab90ee1505309d2cf90b1e87ac7

    SHA512

    9e5f856b37e1a69e49d8f8a9398c3500227ca249ef7d4f44b7e76c34586e5a2f356f29bc19f1e3f771eba9ae87654531ca28eb94bc2b6421831f00ce1a3cf30c

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a7977848.exe

    Filesize

    20KB

    MD5

    bcc317d03d272637469bdd81ae219926

    SHA1

    a0244604fed38156ca17cfc0c4152c1ee8a508a3

    SHA256

    07be6d7ffa44c02bb38175cc7928004cb46c4c039eb8ad794f266ef953aad87c

    SHA512

    f76e48a117ba1052eee3659ad5a95ba9919b897f35de38dd7d127c1d524d49a8cee384d13108e9eb82d70a18a2d06cb28db7b90edfe2f64d4e17b381919da38b

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b8957875.exe

    Filesize

    140KB

    MD5

    6cec28ec05aad7285295e27fb462273c

    SHA1

    5d60f3e25e145c766c37f218df635fbb352fdd83

    SHA256

    dde3853d18f908deadb707a4208f149cfba6e09ad12e403a65a1d1df0dfb9f47

    SHA512

    c8a703e991d75edd83545dad5cdc0a5da5f13c146dc9c61ffccfe92f7b140a256edfab9858668a06fcf1dbc60f9b1d42f557442d6d135d4ab8218edef884128f

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b8957875.exe

    Filesize

    140KB

    MD5

    6cec28ec05aad7285295e27fb462273c

    SHA1

    5d60f3e25e145c766c37f218df635fbb352fdd83

    SHA256

    dde3853d18f908deadb707a4208f149cfba6e09ad12e403a65a1d1df0dfb9f47

    SHA512

    c8a703e991d75edd83545dad5cdc0a5da5f13c146dc9c61ffccfe92f7b140a256edfab9858668a06fcf1dbc60f9b1d42f557442d6d135d4ab8218edef884128f

  • memory/1952-64-0x0000000000350000-0x0000000000380000-memory.dmp

    Filesize

    192KB

  • memory/1952-65-0x0000000000300000-0x0000000000306000-memory.dmp

    Filesize

    24KB

  • memory/2724-48-0x0000000001020000-0x000000000102A000-memory.dmp

    Filesize

    40KB

  • memory/2724-51-0x000007FEF5E70000-0x000007FEF685C000-memory.dmp

    Filesize

    9.9MB

  • memory/2724-50-0x000007FEF5E70000-0x000007FEF685C000-memory.dmp

    Filesize

    9.9MB

  • memory/2724-49-0x000007FEF5E70000-0x000007FEF685C000-memory.dmp

    Filesize

    9.9MB