Analysis

  • max time kernel
    300s
  • max time network
    303s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    17/09/2023, 22:50

General

  • Target

    8e609295fffb2e5fbc977eb078b929be2afe3bad8dcd1de0fdf993cea8029e98.exe

  • Size

    1.2MB

  • MD5

    0bfc560c0bd0123d1fae264d85e0033f

  • SHA1

    b4e3ceb6dd62eff3f1ef07609706dbad13b6f17c

  • SHA256

    8e609295fffb2e5fbc977eb078b929be2afe3bad8dcd1de0fdf993cea8029e98

  • SHA512

    e7e5db4edfab45ec51cb0078c5589a650fd71c23b3169aa4f2e92ef8d44f280f34467c795c26e750d1bf8fcec2111e237db0a612372e6ec09d1d8bb579d2414b

  • SSDEEP

    24576:wZtw5pR/M8OnFQLDLyHKKTpjKLk9+AVdH07zm0oE7nQUhZ:wZtw5psnF3KKp7H07zZkUhZ

Malware Config

Extracted

Family

redline

Botnet

petin

C2

77.91.124.82:19071

Attributes
  • auth_value

    f6cf7a48c0291d1ef5a3440429827d6d

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 11 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8e609295fffb2e5fbc977eb078b929be2afe3bad8dcd1de0fdf993cea8029e98.exe
    "C:\Users\Admin\AppData\Local\Temp\8e609295fffb2e5fbc977eb078b929be2afe3bad8dcd1de0fdf993cea8029e98.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2468
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2168
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9232265.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9232265.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2716
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2080206.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2080206.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2756
          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3513670.exe
            C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3513670.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2412
            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7334694.exe
              C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7334694.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2688
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2636
            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h7261716.exe
              C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h7261716.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:2976

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9232265.exe

    Filesize

    749KB

    MD5

    1b8d91bd36201a0c5a75698dbc2ce2fb

    SHA1

    18a4d86fa81756517cd92feee157e42e5e2c10b7

    SHA256

    8ce2036371e27987380b54032ac526bb52a03073bfd0f3224f30b8dcd2b16d8f

    SHA512

    98f988f0ed21f4388668102f140313a1296189b284bdec2592afc8e4cb35d8c2f273653c44a9c046f1488edcb9ea8ed09ee67167eb769ad960246519c3634575

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9232265.exe

    Filesize

    749KB

    MD5

    1b8d91bd36201a0c5a75698dbc2ce2fb

    SHA1

    18a4d86fa81756517cd92feee157e42e5e2c10b7

    SHA256

    8ce2036371e27987380b54032ac526bb52a03073bfd0f3224f30b8dcd2b16d8f

    SHA512

    98f988f0ed21f4388668102f140313a1296189b284bdec2592afc8e4cb35d8c2f273653c44a9c046f1488edcb9ea8ed09ee67167eb769ad960246519c3634575

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2080206.exe

    Filesize

    483KB

    MD5

    f6f67e29a3f64149ce9c56079ea3ebd3

    SHA1

    cf08fadb895b915429a14eda1b234f13ec3bb359

    SHA256

    ccacd5d4cf28dbd7e64ee15ba43e36c4f3ef9bf052310db85fb6773b11852f4a

    SHA512

    e2276a9f4f1f601e078bf82109900b6a323b9ef49bb470eb7946d9856ea0a2a0efc4ab3a71f1f49baa91be7661d0ea86bed6c29e20e0b2322e4208cd0c261aa3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2080206.exe

    Filesize

    483KB

    MD5

    f6f67e29a3f64149ce9c56079ea3ebd3

    SHA1

    cf08fadb895b915429a14eda1b234f13ec3bb359

    SHA256

    ccacd5d4cf28dbd7e64ee15ba43e36c4f3ef9bf052310db85fb6773b11852f4a

    SHA512

    e2276a9f4f1f601e078bf82109900b6a323b9ef49bb470eb7946d9856ea0a2a0efc4ab3a71f1f49baa91be7661d0ea86bed6c29e20e0b2322e4208cd0c261aa3

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3513670.exe

    Filesize

    317KB

    MD5

    7e6dd5961cd8a7383f43dc0152aa28fe

    SHA1

    86a903ef4cda016d31cac3cc6c334cbd519ec5e9

    SHA256

    011e4237bc6852a9dbdcc167e385d02ff0f68f6a476ffdf54ea79e73ea141855

    SHA512

    41e4f1984fbb4a92a1d567dc03db50d4799a96397f6781f8b5e2321a4e8a2ffd1490f845a1e20aa2202d459b79b34ffe109f64161cc0080a038e797cc98fb243

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3513670.exe

    Filesize

    317KB

    MD5

    7e6dd5961cd8a7383f43dc0152aa28fe

    SHA1

    86a903ef4cda016d31cac3cc6c334cbd519ec5e9

    SHA256

    011e4237bc6852a9dbdcc167e385d02ff0f68f6a476ffdf54ea79e73ea141855

    SHA512

    41e4f1984fbb4a92a1d567dc03db50d4799a96397f6781f8b5e2321a4e8a2ffd1490f845a1e20aa2202d459b79b34ffe109f64161cc0080a038e797cc98fb243

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7334694.exe

    Filesize

    230KB

    MD5

    18d9c020171f2840ca85fca3f12023c1

    SHA1

    d5219c75e08f770fbce21fc17d86cc29d59a38e5

    SHA256

    ec45baa1de3db2df59282921dd14e3e62be927c29ce66e65b682d360ea6e0fcf

    SHA512

    52c570af426b1bf3ffab4664e165dceb4550fd48adbcca888eec78984895a68627da70ddf560ddaa12e3cf751d498093cbaa931d2895620817028f70666d3ea3

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7334694.exe

    Filesize

    230KB

    MD5

    18d9c020171f2840ca85fca3f12023c1

    SHA1

    d5219c75e08f770fbce21fc17d86cc29d59a38e5

    SHA256

    ec45baa1de3db2df59282921dd14e3e62be927c29ce66e65b682d360ea6e0fcf

    SHA512

    52c570af426b1bf3ffab4664e165dceb4550fd48adbcca888eec78984895a68627da70ddf560ddaa12e3cf751d498093cbaa931d2895620817028f70666d3ea3

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7334694.exe

    Filesize

    230KB

    MD5

    18d9c020171f2840ca85fca3f12023c1

    SHA1

    d5219c75e08f770fbce21fc17d86cc29d59a38e5

    SHA256

    ec45baa1de3db2df59282921dd14e3e62be927c29ce66e65b682d360ea6e0fcf

    SHA512

    52c570af426b1bf3ffab4664e165dceb4550fd48adbcca888eec78984895a68627da70ddf560ddaa12e3cf751d498093cbaa931d2895620817028f70666d3ea3

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h7261716.exe

    Filesize

    174KB

    MD5

    38fc21073d61ced3e2fe1ed7ca53f84b

    SHA1

    04f9e718ea8b60d19f892848bc89c94f864c0aff

    SHA256

    8f2c90a9ca77dbd908b99e6bb38079596ecb1e5b058a2f0f7120d2dbebfbe421

    SHA512

    cfb016fc74623790b2f474006604e59a9b215685b514adf7736d9fc6416ce40a28b9a1505819b15d079c45c08638ff6a302f22609ad33b90608adc681bb5a163

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h7261716.exe

    Filesize

    174KB

    MD5

    38fc21073d61ced3e2fe1ed7ca53f84b

    SHA1

    04f9e718ea8b60d19f892848bc89c94f864c0aff

    SHA256

    8f2c90a9ca77dbd908b99e6bb38079596ecb1e5b058a2f0f7120d2dbebfbe421

    SHA512

    cfb016fc74623790b2f474006604e59a9b215685b514adf7736d9fc6416ce40a28b9a1505819b15d079c45c08638ff6a302f22609ad33b90608adc681bb5a163

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x9232265.exe

    Filesize

    749KB

    MD5

    1b8d91bd36201a0c5a75698dbc2ce2fb

    SHA1

    18a4d86fa81756517cd92feee157e42e5e2c10b7

    SHA256

    8ce2036371e27987380b54032ac526bb52a03073bfd0f3224f30b8dcd2b16d8f

    SHA512

    98f988f0ed21f4388668102f140313a1296189b284bdec2592afc8e4cb35d8c2f273653c44a9c046f1488edcb9ea8ed09ee67167eb769ad960246519c3634575

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x9232265.exe

    Filesize

    749KB

    MD5

    1b8d91bd36201a0c5a75698dbc2ce2fb

    SHA1

    18a4d86fa81756517cd92feee157e42e5e2c10b7

    SHA256

    8ce2036371e27987380b54032ac526bb52a03073bfd0f3224f30b8dcd2b16d8f

    SHA512

    98f988f0ed21f4388668102f140313a1296189b284bdec2592afc8e4cb35d8c2f273653c44a9c046f1488edcb9ea8ed09ee67167eb769ad960246519c3634575

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x2080206.exe

    Filesize

    483KB

    MD5

    f6f67e29a3f64149ce9c56079ea3ebd3

    SHA1

    cf08fadb895b915429a14eda1b234f13ec3bb359

    SHA256

    ccacd5d4cf28dbd7e64ee15ba43e36c4f3ef9bf052310db85fb6773b11852f4a

    SHA512

    e2276a9f4f1f601e078bf82109900b6a323b9ef49bb470eb7946d9856ea0a2a0efc4ab3a71f1f49baa91be7661d0ea86bed6c29e20e0b2322e4208cd0c261aa3

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x2080206.exe

    Filesize

    483KB

    MD5

    f6f67e29a3f64149ce9c56079ea3ebd3

    SHA1

    cf08fadb895b915429a14eda1b234f13ec3bb359

    SHA256

    ccacd5d4cf28dbd7e64ee15ba43e36c4f3ef9bf052310db85fb6773b11852f4a

    SHA512

    e2276a9f4f1f601e078bf82109900b6a323b9ef49bb470eb7946d9856ea0a2a0efc4ab3a71f1f49baa91be7661d0ea86bed6c29e20e0b2322e4208cd0c261aa3

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x3513670.exe

    Filesize

    317KB

    MD5

    7e6dd5961cd8a7383f43dc0152aa28fe

    SHA1

    86a903ef4cda016d31cac3cc6c334cbd519ec5e9

    SHA256

    011e4237bc6852a9dbdcc167e385d02ff0f68f6a476ffdf54ea79e73ea141855

    SHA512

    41e4f1984fbb4a92a1d567dc03db50d4799a96397f6781f8b5e2321a4e8a2ffd1490f845a1e20aa2202d459b79b34ffe109f64161cc0080a038e797cc98fb243

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x3513670.exe

    Filesize

    317KB

    MD5

    7e6dd5961cd8a7383f43dc0152aa28fe

    SHA1

    86a903ef4cda016d31cac3cc6c334cbd519ec5e9

    SHA256

    011e4237bc6852a9dbdcc167e385d02ff0f68f6a476ffdf54ea79e73ea141855

    SHA512

    41e4f1984fbb4a92a1d567dc03db50d4799a96397f6781f8b5e2321a4e8a2ffd1490f845a1e20aa2202d459b79b34ffe109f64161cc0080a038e797cc98fb243

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g7334694.exe

    Filesize

    230KB

    MD5

    18d9c020171f2840ca85fca3f12023c1

    SHA1

    d5219c75e08f770fbce21fc17d86cc29d59a38e5

    SHA256

    ec45baa1de3db2df59282921dd14e3e62be927c29ce66e65b682d360ea6e0fcf

    SHA512

    52c570af426b1bf3ffab4664e165dceb4550fd48adbcca888eec78984895a68627da70ddf560ddaa12e3cf751d498093cbaa931d2895620817028f70666d3ea3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g7334694.exe

    Filesize

    230KB

    MD5

    18d9c020171f2840ca85fca3f12023c1

    SHA1

    d5219c75e08f770fbce21fc17d86cc29d59a38e5

    SHA256

    ec45baa1de3db2df59282921dd14e3e62be927c29ce66e65b682d360ea6e0fcf

    SHA512

    52c570af426b1bf3ffab4664e165dceb4550fd48adbcca888eec78984895a68627da70ddf560ddaa12e3cf751d498093cbaa931d2895620817028f70666d3ea3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g7334694.exe

    Filesize

    230KB

    MD5

    18d9c020171f2840ca85fca3f12023c1

    SHA1

    d5219c75e08f770fbce21fc17d86cc29d59a38e5

    SHA256

    ec45baa1de3db2df59282921dd14e3e62be927c29ce66e65b682d360ea6e0fcf

    SHA512

    52c570af426b1bf3ffab4664e165dceb4550fd48adbcca888eec78984895a68627da70ddf560ddaa12e3cf751d498093cbaa931d2895620817028f70666d3ea3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\h7261716.exe

    Filesize

    174KB

    MD5

    38fc21073d61ced3e2fe1ed7ca53f84b

    SHA1

    04f9e718ea8b60d19f892848bc89c94f864c0aff

    SHA256

    8f2c90a9ca77dbd908b99e6bb38079596ecb1e5b058a2f0f7120d2dbebfbe421

    SHA512

    cfb016fc74623790b2f474006604e59a9b215685b514adf7736d9fc6416ce40a28b9a1505819b15d079c45c08638ff6a302f22609ad33b90608adc681bb5a163

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\h7261716.exe

    Filesize

    174KB

    MD5

    38fc21073d61ced3e2fe1ed7ca53f84b

    SHA1

    04f9e718ea8b60d19f892848bc89c94f864c0aff

    SHA256

    8f2c90a9ca77dbd908b99e6bb38079596ecb1e5b058a2f0f7120d2dbebfbe421

    SHA512

    cfb016fc74623790b2f474006604e59a9b215685b514adf7736d9fc6416ce40a28b9a1505819b15d079c45c08638ff6a302f22609ad33b90608adc681bb5a163

  • memory/2168-0-0x0000000000400000-0x0000000000506000-memory.dmp

    Filesize

    1.0MB

  • memory/2168-11-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2168-10-0x0000000000400000-0x0000000000506000-memory.dmp

    Filesize

    1.0MB

  • memory/2168-2-0x0000000000400000-0x0000000000506000-memory.dmp

    Filesize

    1.0MB

  • memory/2168-8-0x0000000000400000-0x0000000000506000-memory.dmp

    Filesize

    1.0MB

  • memory/2168-12-0x0000000000400000-0x0000000000506000-memory.dmp

    Filesize

    1.0MB

  • memory/2168-78-0x0000000000400000-0x0000000000506000-memory.dmp

    Filesize

    1.0MB

  • memory/2168-16-0x0000000000400000-0x0000000000506000-memory.dmp

    Filesize

    1.0MB

  • memory/2168-4-0x0000000000400000-0x0000000000506000-memory.dmp

    Filesize

    1.0MB

  • memory/2168-14-0x0000000000400000-0x0000000000506000-memory.dmp

    Filesize

    1.0MB

  • memory/2168-6-0x0000000000400000-0x0000000000506000-memory.dmp

    Filesize

    1.0MB

  • memory/2636-65-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2636-67-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2636-69-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2636-60-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2636-61-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2636-62-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2636-63-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2636-64-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2976-76-0x0000000001270000-0x00000000012A0000-memory.dmp

    Filesize

    192KB

  • memory/2976-77-0x0000000000340000-0x0000000000346000-memory.dmp

    Filesize

    24KB