Analysis

  • max time kernel
    290s
  • max time network
    301s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    18/09/2023, 01:34

General

  • Target

    x7736762.exe

  • Size

    317KB

  • MD5

    d047dcb0e25ffbaf6b4e60868fd4f674

  • SHA1

    eab1c19d076503ec694647708ead3d0bd0838c3f

  • SHA256

    5a7fcd45e3c459f6c3a54087acf304e8640fa23a89d63d693d983d796b2b8b92

  • SHA512

    ebf67f18b109f6f0318b182a4a9cfeabfaa256f798f6914fcf47637a52beb14c48cadb765cd442c65329075da3ab84ca80cf9d6371b01eb7221964a3dba6d9b8

  • SSDEEP

    6144:K1y+bnr+4p0yN90QEtLKoJkjRbddNHGt4qw5b8W+iKH4DTjX/UD:jMrcy90nK3Rbbd24poW+B43jsD

Malware Config

Extracted

Family

redline

Botnet

petin

C2

77.91.124.82:19071

Attributes
  • auth_value

    f6cf7a48c0291d1ef5a3440429827d6d

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\x7736762.exe
    "C:\Users\Admin\AppData\Local\Temp\x7736762.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2960
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g6971722.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g6971722.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3068
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1636
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\h1671165.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\h1671165.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:1988

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g6971722.exe

    Filesize

    230KB

    MD5

    28f4c66f8f133b7afc12129a703db4c7

    SHA1

    9523893869405d19b7d2113dc1ef511edb58412e

    SHA256

    5f66740c73bcf731b9aeef814bb3939901b94cb73e9de332ed84c9b4485fe2c4

    SHA512

    9180087ee699a64a9b726b2d72fc2237b3077db059c6248a2fe18b972da826e5f94702f8c3f206e46a617e87cbe28a6fb3e485a36354931b5b7c4952a96b42d1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g6971722.exe

    Filesize

    230KB

    MD5

    28f4c66f8f133b7afc12129a703db4c7

    SHA1

    9523893869405d19b7d2113dc1ef511edb58412e

    SHA256

    5f66740c73bcf731b9aeef814bb3939901b94cb73e9de332ed84c9b4485fe2c4

    SHA512

    9180087ee699a64a9b726b2d72fc2237b3077db059c6248a2fe18b972da826e5f94702f8c3f206e46a617e87cbe28a6fb3e485a36354931b5b7c4952a96b42d1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g6971722.exe

    Filesize

    230KB

    MD5

    28f4c66f8f133b7afc12129a703db4c7

    SHA1

    9523893869405d19b7d2113dc1ef511edb58412e

    SHA256

    5f66740c73bcf731b9aeef814bb3939901b94cb73e9de332ed84c9b4485fe2c4

    SHA512

    9180087ee699a64a9b726b2d72fc2237b3077db059c6248a2fe18b972da826e5f94702f8c3f206e46a617e87cbe28a6fb3e485a36354931b5b7c4952a96b42d1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\h1671165.exe

    Filesize

    174KB

    MD5

    fd94fde19fe8c56ea4e6fb60ee7a62f9

    SHA1

    82c5535dd2a2dae3e9bdc673bd9f78ae67d56db1

    SHA256

    ff922becf1b60549f74ec0b827933003c142b10a18d4c1a04804568ac7016f50

    SHA512

    9c2beacd8a99fcce19184bbd86cc71e4fcdd0a0cb1cfd616f1961d167f8a7c9f9e0775880ffe83f0afd699fef43023c284068e400974f495f2b029dbb7f66df5

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\h1671165.exe

    Filesize

    174KB

    MD5

    fd94fde19fe8c56ea4e6fb60ee7a62f9

    SHA1

    82c5535dd2a2dae3e9bdc673bd9f78ae67d56db1

    SHA256

    ff922becf1b60549f74ec0b827933003c142b10a18d4c1a04804568ac7016f50

    SHA512

    9c2beacd8a99fcce19184bbd86cc71e4fcdd0a0cb1cfd616f1961d167f8a7c9f9e0775880ffe83f0afd699fef43023c284068e400974f495f2b029dbb7f66df5

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\g6971722.exe

    Filesize

    230KB

    MD5

    28f4c66f8f133b7afc12129a703db4c7

    SHA1

    9523893869405d19b7d2113dc1ef511edb58412e

    SHA256

    5f66740c73bcf731b9aeef814bb3939901b94cb73e9de332ed84c9b4485fe2c4

    SHA512

    9180087ee699a64a9b726b2d72fc2237b3077db059c6248a2fe18b972da826e5f94702f8c3f206e46a617e87cbe28a6fb3e485a36354931b5b7c4952a96b42d1

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\g6971722.exe

    Filesize

    230KB

    MD5

    28f4c66f8f133b7afc12129a703db4c7

    SHA1

    9523893869405d19b7d2113dc1ef511edb58412e

    SHA256

    5f66740c73bcf731b9aeef814bb3939901b94cb73e9de332ed84c9b4485fe2c4

    SHA512

    9180087ee699a64a9b726b2d72fc2237b3077db059c6248a2fe18b972da826e5f94702f8c3f206e46a617e87cbe28a6fb3e485a36354931b5b7c4952a96b42d1

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\g6971722.exe

    Filesize

    230KB

    MD5

    28f4c66f8f133b7afc12129a703db4c7

    SHA1

    9523893869405d19b7d2113dc1ef511edb58412e

    SHA256

    5f66740c73bcf731b9aeef814bb3939901b94cb73e9de332ed84c9b4485fe2c4

    SHA512

    9180087ee699a64a9b726b2d72fc2237b3077db059c6248a2fe18b972da826e5f94702f8c3f206e46a617e87cbe28a6fb3e485a36354931b5b7c4952a96b42d1

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\h1671165.exe

    Filesize

    174KB

    MD5

    fd94fde19fe8c56ea4e6fb60ee7a62f9

    SHA1

    82c5535dd2a2dae3e9bdc673bd9f78ae67d56db1

    SHA256

    ff922becf1b60549f74ec0b827933003c142b10a18d4c1a04804568ac7016f50

    SHA512

    9c2beacd8a99fcce19184bbd86cc71e4fcdd0a0cb1cfd616f1961d167f8a7c9f9e0775880ffe83f0afd699fef43023c284068e400974f495f2b029dbb7f66df5

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\h1671165.exe

    Filesize

    174KB

    MD5

    fd94fde19fe8c56ea4e6fb60ee7a62f9

    SHA1

    82c5535dd2a2dae3e9bdc673bd9f78ae67d56db1

    SHA256

    ff922becf1b60549f74ec0b827933003c142b10a18d4c1a04804568ac7016f50

    SHA512

    9c2beacd8a99fcce19184bbd86cc71e4fcdd0a0cb1cfd616f1961d167f8a7c9f9e0775880ffe83f0afd699fef43023c284068e400974f495f2b029dbb7f66df5

  • memory/1636-17-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1636-22-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1636-24-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1636-26-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1636-21-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/1636-19-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1636-15-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1636-13-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1988-33-0x0000000001270000-0x00000000012A0000-memory.dmp

    Filesize

    192KB

  • memory/1988-34-0x0000000000220000-0x0000000000226000-memory.dmp

    Filesize

    24KB