Analysis

  • max time kernel
    290s
  • max time network
    304s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2023 06:53

General

  • Target

    x0996616.exe

  • Size

    757KB

  • MD5

    5ce0626813026706a786b6d10370b362

  • SHA1

    2827998b7a70b2c6bee245b692d468a43d3f73d9

  • SHA256

    0c029ea417bd0bcbf096c68fcb87e95638ac3b29437df5399ab1f00d26addcb4

  • SHA512

    0da43afba595709b076e903075df4b5388dc9f5237dbb2a20af88af0a49ff2272535919b2263006d61c3b6a5802de7bf34bb019ac5b2c63631c324f91874b2a5

  • SSDEEP

    12288:gMroy90khXhCxf7G+p9Ra4rS03q9UjJImxbPFxvi4gq/kcEPd3j6nyPRqTtIv2mv:4yZh4xDG+pNLESJLPF1i4H+PZGnypqp

Malware Config

Extracted

Family

redline

Botnet

black

C2

77.91.124.82:19071

Attributes
  • auth_value

    c5887216cebc5a219113738140bc3047

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 9 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\x0996616.exe
    "C:\Users\Admin\AppData\Local\Temp\x0996616.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2272
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1368633.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1368633.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1740
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7688341.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7688341.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2268
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g2204807.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g2204807.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:1644
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            5⤵
              PID:2788
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              5⤵
                PID:2804
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                5⤵
                  PID:2760
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  5⤵
                  • Modifies Windows Defender Real-time Protection settings
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2648
              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h0745430.exe
                C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h0745430.exe
                4⤵
                • Executes dropped EXE
                • Loads dropped DLL
                PID:2744

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1368633.exe

          Filesize

          487KB

          MD5

          66fc7c0264275bd0d212270b875c36e7

          SHA1

          9b46dc1c23a4347f203aad5d138c5948918c7b22

          SHA256

          67984aa804e237aeb7bd79a1441ad49a6e5fc935bf44f324e23b97da314a7331

          SHA512

          ee46610b5fb07a4e16d152e9631def521192ef09c14d420091c57865a503f7707bff1aa591e410f61aae9d86dd6b9b02612511b80ffc3ddabbeee7ef6a6d64cf

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1368633.exe

          Filesize

          487KB

          MD5

          66fc7c0264275bd0d212270b875c36e7

          SHA1

          9b46dc1c23a4347f203aad5d138c5948918c7b22

          SHA256

          67984aa804e237aeb7bd79a1441ad49a6e5fc935bf44f324e23b97da314a7331

          SHA512

          ee46610b5fb07a4e16d152e9631def521192ef09c14d420091c57865a503f7707bff1aa591e410f61aae9d86dd6b9b02612511b80ffc3ddabbeee7ef6a6d64cf

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7688341.exe

          Filesize

          321KB

          MD5

          6f9fab527e0ccdc98d58ac716181b3c6

          SHA1

          851541e69cd89d0ebba22b0a2fdd63f40e6d723b

          SHA256

          93b183e0975c989bfbe8b579ce5d6e41ea957f4568a83e3ed264b4fc94f2f60b

          SHA512

          eb084cfb876b129a21a40eef6b3aec4ab7ea6bff8f960f8bf205aa1889c5be8ba9b34e301046c94b16e01a0542408be2114229dea1a316ef7f2d5a74ab5acce7

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7688341.exe

          Filesize

          321KB

          MD5

          6f9fab527e0ccdc98d58ac716181b3c6

          SHA1

          851541e69cd89d0ebba22b0a2fdd63f40e6d723b

          SHA256

          93b183e0975c989bfbe8b579ce5d6e41ea957f4568a83e3ed264b4fc94f2f60b

          SHA512

          eb084cfb876b129a21a40eef6b3aec4ab7ea6bff8f960f8bf205aa1889c5be8ba9b34e301046c94b16e01a0542408be2114229dea1a316ef7f2d5a74ab5acce7

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g2204807.exe

          Filesize

          236KB

          MD5

          bd7db8b543d1b8d37a380bace855e6f1

          SHA1

          6bb4a5230f3038cfc4414e36175e399df0123568

          SHA256

          85c512fbf6bdc46b301a7fca81c9d0b9c420ba21078befeec31d6061b7c1590b

          SHA512

          bd3d7ddfdefbb677e43fcc87b00f265c9a0cade8aa2f39d40eedb272586e2291c28d085035a3053a214ffb0102c1d6cbd1aa7606fb5c744c6aff3a54f3c6d63f

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g2204807.exe

          Filesize

          236KB

          MD5

          bd7db8b543d1b8d37a380bace855e6f1

          SHA1

          6bb4a5230f3038cfc4414e36175e399df0123568

          SHA256

          85c512fbf6bdc46b301a7fca81c9d0b9c420ba21078befeec31d6061b7c1590b

          SHA512

          bd3d7ddfdefbb677e43fcc87b00f265c9a0cade8aa2f39d40eedb272586e2291c28d085035a3053a214ffb0102c1d6cbd1aa7606fb5c744c6aff3a54f3c6d63f

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g2204807.exe

          Filesize

          236KB

          MD5

          bd7db8b543d1b8d37a380bace855e6f1

          SHA1

          6bb4a5230f3038cfc4414e36175e399df0123568

          SHA256

          85c512fbf6bdc46b301a7fca81c9d0b9c420ba21078befeec31d6061b7c1590b

          SHA512

          bd3d7ddfdefbb677e43fcc87b00f265c9a0cade8aa2f39d40eedb272586e2291c28d085035a3053a214ffb0102c1d6cbd1aa7606fb5c744c6aff3a54f3c6d63f

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h0745430.exe

          Filesize

          174KB

          MD5

          b0b411456035583fa1873d9e27c80b3f

          SHA1

          b8a0d5d8022911b28ae6caeb0470e1c2f3a8ddc0

          SHA256

          b66a9b7940002fda2d1a3ef446c4732574d7fecf46b05211ec74c4e1b3c6a7db

          SHA512

          e166c14008f836a73bae5be0f49e5f257b73c96878283aad034194d3cfa92783fb9ac478ff86bb6c0fd3f088200c59fdc38b1c6953229737e4f5f555141411ea

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h0745430.exe

          Filesize

          174KB

          MD5

          b0b411456035583fa1873d9e27c80b3f

          SHA1

          b8a0d5d8022911b28ae6caeb0470e1c2f3a8ddc0

          SHA256

          b66a9b7940002fda2d1a3ef446c4732574d7fecf46b05211ec74c4e1b3c6a7db

          SHA512

          e166c14008f836a73bae5be0f49e5f257b73c96878283aad034194d3cfa92783fb9ac478ff86bb6c0fd3f088200c59fdc38b1c6953229737e4f5f555141411ea

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x1368633.exe

          Filesize

          487KB

          MD5

          66fc7c0264275bd0d212270b875c36e7

          SHA1

          9b46dc1c23a4347f203aad5d138c5948918c7b22

          SHA256

          67984aa804e237aeb7bd79a1441ad49a6e5fc935bf44f324e23b97da314a7331

          SHA512

          ee46610b5fb07a4e16d152e9631def521192ef09c14d420091c57865a503f7707bff1aa591e410f61aae9d86dd6b9b02612511b80ffc3ddabbeee7ef6a6d64cf

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x1368633.exe

          Filesize

          487KB

          MD5

          66fc7c0264275bd0d212270b875c36e7

          SHA1

          9b46dc1c23a4347f203aad5d138c5948918c7b22

          SHA256

          67984aa804e237aeb7bd79a1441ad49a6e5fc935bf44f324e23b97da314a7331

          SHA512

          ee46610b5fb07a4e16d152e9631def521192ef09c14d420091c57865a503f7707bff1aa591e410f61aae9d86dd6b9b02612511b80ffc3ddabbeee7ef6a6d64cf

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x7688341.exe

          Filesize

          321KB

          MD5

          6f9fab527e0ccdc98d58ac716181b3c6

          SHA1

          851541e69cd89d0ebba22b0a2fdd63f40e6d723b

          SHA256

          93b183e0975c989bfbe8b579ce5d6e41ea957f4568a83e3ed264b4fc94f2f60b

          SHA512

          eb084cfb876b129a21a40eef6b3aec4ab7ea6bff8f960f8bf205aa1889c5be8ba9b34e301046c94b16e01a0542408be2114229dea1a316ef7f2d5a74ab5acce7

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x7688341.exe

          Filesize

          321KB

          MD5

          6f9fab527e0ccdc98d58ac716181b3c6

          SHA1

          851541e69cd89d0ebba22b0a2fdd63f40e6d723b

          SHA256

          93b183e0975c989bfbe8b579ce5d6e41ea957f4568a83e3ed264b4fc94f2f60b

          SHA512

          eb084cfb876b129a21a40eef6b3aec4ab7ea6bff8f960f8bf205aa1889c5be8ba9b34e301046c94b16e01a0542408be2114229dea1a316ef7f2d5a74ab5acce7

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\g2204807.exe

          Filesize

          236KB

          MD5

          bd7db8b543d1b8d37a380bace855e6f1

          SHA1

          6bb4a5230f3038cfc4414e36175e399df0123568

          SHA256

          85c512fbf6bdc46b301a7fca81c9d0b9c420ba21078befeec31d6061b7c1590b

          SHA512

          bd3d7ddfdefbb677e43fcc87b00f265c9a0cade8aa2f39d40eedb272586e2291c28d085035a3053a214ffb0102c1d6cbd1aa7606fb5c744c6aff3a54f3c6d63f

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\g2204807.exe

          Filesize

          236KB

          MD5

          bd7db8b543d1b8d37a380bace855e6f1

          SHA1

          6bb4a5230f3038cfc4414e36175e399df0123568

          SHA256

          85c512fbf6bdc46b301a7fca81c9d0b9c420ba21078befeec31d6061b7c1590b

          SHA512

          bd3d7ddfdefbb677e43fcc87b00f265c9a0cade8aa2f39d40eedb272586e2291c28d085035a3053a214ffb0102c1d6cbd1aa7606fb5c744c6aff3a54f3c6d63f

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\g2204807.exe

          Filesize

          236KB

          MD5

          bd7db8b543d1b8d37a380bace855e6f1

          SHA1

          6bb4a5230f3038cfc4414e36175e399df0123568

          SHA256

          85c512fbf6bdc46b301a7fca81c9d0b9c420ba21078befeec31d6061b7c1590b

          SHA512

          bd3d7ddfdefbb677e43fcc87b00f265c9a0cade8aa2f39d40eedb272586e2291c28d085035a3053a214ffb0102c1d6cbd1aa7606fb5c744c6aff3a54f3c6d63f

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\h0745430.exe

          Filesize

          174KB

          MD5

          b0b411456035583fa1873d9e27c80b3f

          SHA1

          b8a0d5d8022911b28ae6caeb0470e1c2f3a8ddc0

          SHA256

          b66a9b7940002fda2d1a3ef446c4732574d7fecf46b05211ec74c4e1b3c6a7db

          SHA512

          e166c14008f836a73bae5be0f49e5f257b73c96878283aad034194d3cfa92783fb9ac478ff86bb6c0fd3f088200c59fdc38b1c6953229737e4f5f555141411ea

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\h0745430.exe

          Filesize

          174KB

          MD5

          b0b411456035583fa1873d9e27c80b3f

          SHA1

          b8a0d5d8022911b28ae6caeb0470e1c2f3a8ddc0

          SHA256

          b66a9b7940002fda2d1a3ef446c4732574d7fecf46b05211ec74c4e1b3c6a7db

          SHA512

          e166c14008f836a73bae5be0f49e5f257b73c96878283aad034194d3cfa92783fb9ac478ff86bb6c0fd3f088200c59fdc38b1c6953229737e4f5f555141411ea

        • memory/2648-34-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2648-38-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2648-40-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2648-42-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2648-35-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2648-36-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2648-37-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

          Filesize

          4KB

        • memory/2648-33-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2744-49-0x0000000000EB0000-0x0000000000EE0000-memory.dmp

          Filesize

          192KB

        • memory/2744-50-0x0000000000200000-0x0000000000206000-memory.dmp

          Filesize

          24KB