Analysis

  • max time kernel
    290s
  • max time network
    303s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2023 06:53

General

  • Target

    x7688341.exe

  • Size

    321KB

  • MD5

    6f9fab527e0ccdc98d58ac716181b3c6

  • SHA1

    851541e69cd89d0ebba22b0a2fdd63f40e6d723b

  • SHA256

    93b183e0975c989bfbe8b579ce5d6e41ea957f4568a83e3ed264b4fc94f2f60b

  • SHA512

    eb084cfb876b129a21a40eef6b3aec4ab7ea6bff8f960f8bf205aa1889c5be8ba9b34e301046c94b16e01a0542408be2114229dea1a316ef7f2d5a74ab5acce7

  • SSDEEP

    6144:K1y+bnr+gp0yN90QEDkYflZhNry2xFCC1YamoCKJUU+EAwWoR6d028bC:TMrwy90eYfvrN0CIeJ7+FxvW2AC

Malware Config

Extracted

Family

redline

Botnet

black

C2

77.91.124.82:19071

Attributes
  • auth_value

    c5887216cebc5a219113738140bc3047

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\x7688341.exe
    "C:\Users\Admin\AppData\Local\Temp\x7688341.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2092
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g2204807.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g2204807.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1696
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2008
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\h0745430.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\h0745430.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2080

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g2204807.exe

    Filesize

    236KB

    MD5

    bd7db8b543d1b8d37a380bace855e6f1

    SHA1

    6bb4a5230f3038cfc4414e36175e399df0123568

    SHA256

    85c512fbf6bdc46b301a7fca81c9d0b9c420ba21078befeec31d6061b7c1590b

    SHA512

    bd3d7ddfdefbb677e43fcc87b00f265c9a0cade8aa2f39d40eedb272586e2291c28d085035a3053a214ffb0102c1d6cbd1aa7606fb5c744c6aff3a54f3c6d63f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g2204807.exe

    Filesize

    236KB

    MD5

    bd7db8b543d1b8d37a380bace855e6f1

    SHA1

    6bb4a5230f3038cfc4414e36175e399df0123568

    SHA256

    85c512fbf6bdc46b301a7fca81c9d0b9c420ba21078befeec31d6061b7c1590b

    SHA512

    bd3d7ddfdefbb677e43fcc87b00f265c9a0cade8aa2f39d40eedb272586e2291c28d085035a3053a214ffb0102c1d6cbd1aa7606fb5c744c6aff3a54f3c6d63f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g2204807.exe

    Filesize

    236KB

    MD5

    bd7db8b543d1b8d37a380bace855e6f1

    SHA1

    6bb4a5230f3038cfc4414e36175e399df0123568

    SHA256

    85c512fbf6bdc46b301a7fca81c9d0b9c420ba21078befeec31d6061b7c1590b

    SHA512

    bd3d7ddfdefbb677e43fcc87b00f265c9a0cade8aa2f39d40eedb272586e2291c28d085035a3053a214ffb0102c1d6cbd1aa7606fb5c744c6aff3a54f3c6d63f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\h0745430.exe

    Filesize

    174KB

    MD5

    b0b411456035583fa1873d9e27c80b3f

    SHA1

    b8a0d5d8022911b28ae6caeb0470e1c2f3a8ddc0

    SHA256

    b66a9b7940002fda2d1a3ef446c4732574d7fecf46b05211ec74c4e1b3c6a7db

    SHA512

    e166c14008f836a73bae5be0f49e5f257b73c96878283aad034194d3cfa92783fb9ac478ff86bb6c0fd3f088200c59fdc38b1c6953229737e4f5f555141411ea

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\h0745430.exe

    Filesize

    174KB

    MD5

    b0b411456035583fa1873d9e27c80b3f

    SHA1

    b8a0d5d8022911b28ae6caeb0470e1c2f3a8ddc0

    SHA256

    b66a9b7940002fda2d1a3ef446c4732574d7fecf46b05211ec74c4e1b3c6a7db

    SHA512

    e166c14008f836a73bae5be0f49e5f257b73c96878283aad034194d3cfa92783fb9ac478ff86bb6c0fd3f088200c59fdc38b1c6953229737e4f5f555141411ea

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\g2204807.exe

    Filesize

    236KB

    MD5

    bd7db8b543d1b8d37a380bace855e6f1

    SHA1

    6bb4a5230f3038cfc4414e36175e399df0123568

    SHA256

    85c512fbf6bdc46b301a7fca81c9d0b9c420ba21078befeec31d6061b7c1590b

    SHA512

    bd3d7ddfdefbb677e43fcc87b00f265c9a0cade8aa2f39d40eedb272586e2291c28d085035a3053a214ffb0102c1d6cbd1aa7606fb5c744c6aff3a54f3c6d63f

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\g2204807.exe

    Filesize

    236KB

    MD5

    bd7db8b543d1b8d37a380bace855e6f1

    SHA1

    6bb4a5230f3038cfc4414e36175e399df0123568

    SHA256

    85c512fbf6bdc46b301a7fca81c9d0b9c420ba21078befeec31d6061b7c1590b

    SHA512

    bd3d7ddfdefbb677e43fcc87b00f265c9a0cade8aa2f39d40eedb272586e2291c28d085035a3053a214ffb0102c1d6cbd1aa7606fb5c744c6aff3a54f3c6d63f

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\g2204807.exe

    Filesize

    236KB

    MD5

    bd7db8b543d1b8d37a380bace855e6f1

    SHA1

    6bb4a5230f3038cfc4414e36175e399df0123568

    SHA256

    85c512fbf6bdc46b301a7fca81c9d0b9c420ba21078befeec31d6061b7c1590b

    SHA512

    bd3d7ddfdefbb677e43fcc87b00f265c9a0cade8aa2f39d40eedb272586e2291c28d085035a3053a214ffb0102c1d6cbd1aa7606fb5c744c6aff3a54f3c6d63f

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\h0745430.exe

    Filesize

    174KB

    MD5

    b0b411456035583fa1873d9e27c80b3f

    SHA1

    b8a0d5d8022911b28ae6caeb0470e1c2f3a8ddc0

    SHA256

    b66a9b7940002fda2d1a3ef446c4732574d7fecf46b05211ec74c4e1b3c6a7db

    SHA512

    e166c14008f836a73bae5be0f49e5f257b73c96878283aad034194d3cfa92783fb9ac478ff86bb6c0fd3f088200c59fdc38b1c6953229737e4f5f555141411ea

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\h0745430.exe

    Filesize

    174KB

    MD5

    b0b411456035583fa1873d9e27c80b3f

    SHA1

    b8a0d5d8022911b28ae6caeb0470e1c2f3a8ddc0

    SHA256

    b66a9b7940002fda2d1a3ef446c4732574d7fecf46b05211ec74c4e1b3c6a7db

    SHA512

    e166c14008f836a73bae5be0f49e5f257b73c96878283aad034194d3cfa92783fb9ac478ff86bb6c0fd3f088200c59fdc38b1c6953229737e4f5f555141411ea

  • memory/2008-21-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2008-22-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2008-24-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2008-26-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2008-19-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2008-17-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2008-15-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2008-13-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2080-33-0x0000000000BD0000-0x0000000000C00000-memory.dmp

    Filesize

    192KB

  • memory/2080-34-0x0000000000490000-0x0000000000496000-memory.dmp

    Filesize

    24KB