Analysis

  • max time kernel
    151s
  • max time network
    173s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2023 20:23

General

  • Target

    f703b6708b86c41fb7a7f0593361a581d0c46c015de7774b4100245dbfc7ffde.exe

  • Size

    749KB

  • MD5

    c2ace77e865cfd50b8c4998b5cb5a675

  • SHA1

    c090b378c5df00c532c9a2802cc2f764a69dc7dc

  • SHA256

    f703b6708b86c41fb7a7f0593361a581d0c46c015de7774b4100245dbfc7ffde

  • SHA512

    7fb476eae7f059dcf89ec7eabf981e9a4b5ae1d737a0a3343453c26a23e9f18d1488382f5b83bfe67125fe576b435262f9dcf45ecd1c99a11c1a3bc2ccd42a1b

  • SSDEEP

    12288:vMrby90OzVkNyxTKtVLlKIifJQtfe6Evagq46xE9mxXWuiT05SZilY5006g9p:syDkNyhqd6Q1e6WagxUxXX+00ilYylup

Malware Config

Extracted

Family

redline

Botnet

gruha

C2

77.91.124.55:19071

Attributes
  • auth_value

    2f4cf2e668a540e64775b27535cc6892

Signatures

  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 14 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f703b6708b86c41fb7a7f0593361a581d0c46c015de7774b4100245dbfc7ffde.exe
    "C:\Users\Admin\AppData\Local\Temp\f703b6708b86c41fb7a7f0593361a581d0c46c015de7774b4100245dbfc7ffde.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3967036.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3967036.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1352
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2675087.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2675087.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3068
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5446204.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5446204.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2728
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\q2222420.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\q2222420.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2784
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s8504502.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s8504502.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2516
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:2976
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2516 -s 36
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:1864

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3967036.exe

      Filesize

      648KB

      MD5

      1556d6b6fe97175c643a1efe18243194

      SHA1

      4f229acbdc803f6c1fc17bf1838495821fef6565

      SHA256

      8c027e871baef26d729eb683296d081ba025362fb410bfaf4290d7839422d9be

      SHA512

      cd79d551f46e9992446747108d8750da93341287590cfb2c59c0b6d4d094d6795c25673516714f3d117265126e4ee9eae7c9442949a06cd81f327c745febf065

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3967036.exe

      Filesize

      648KB

      MD5

      1556d6b6fe97175c643a1efe18243194

      SHA1

      4f229acbdc803f6c1fc17bf1838495821fef6565

      SHA256

      8c027e871baef26d729eb683296d081ba025362fb410bfaf4290d7839422d9be

      SHA512

      cd79d551f46e9992446747108d8750da93341287590cfb2c59c0b6d4d094d6795c25673516714f3d117265126e4ee9eae7c9442949a06cd81f327c745febf065

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2675087.exe

      Filesize

      465KB

      MD5

      712df0a25ec212d05c8ff048caf21369

      SHA1

      6dfad1fb1e5a94e83100013544c27012a8badebf

      SHA256

      68e8c9b7495f20b099d86d22cc265a4f04d8ef55dee1b0b389219ace26d64dc6

      SHA512

      b741c5e334d3dc8e66750082f7950b7684c44be6ea306061e770f3289f38fcc73de616bf208dfe3aa897bd116668277fa25af5798a83f99ead2e1a800c96073c

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2675087.exe

      Filesize

      465KB

      MD5

      712df0a25ec212d05c8ff048caf21369

      SHA1

      6dfad1fb1e5a94e83100013544c27012a8badebf

      SHA256

      68e8c9b7495f20b099d86d22cc265a4f04d8ef55dee1b0b389219ace26d64dc6

      SHA512

      b741c5e334d3dc8e66750082f7950b7684c44be6ea306061e770f3289f38fcc73de616bf208dfe3aa897bd116668277fa25af5798a83f99ead2e1a800c96073c

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5446204.exe

      Filesize

      283KB

      MD5

      6362dfc17229132b48802ffcd49f21be

      SHA1

      c785e3ed02cae435586e5239f9d15508a6b8e98d

      SHA256

      cfb90e137790e6f838c54d42f42401f989b60104b469c8e15246fc45970f10a6

      SHA512

      95c14b81015358c8fce8f71146a3149d6724b6c46012086928dbc1efc4512cccbf38bd11e2f76699d3294088e04e4f727fc89e402b9421f57b0f7b1e12b373ab

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5446204.exe

      Filesize

      283KB

      MD5

      6362dfc17229132b48802ffcd49f21be

      SHA1

      c785e3ed02cae435586e5239f9d15508a6b8e98d

      SHA256

      cfb90e137790e6f838c54d42f42401f989b60104b469c8e15246fc45970f10a6

      SHA512

      95c14b81015358c8fce8f71146a3149d6724b6c46012086928dbc1efc4512cccbf38bd11e2f76699d3294088e04e4f727fc89e402b9421f57b0f7b1e12b373ab

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\q2222420.exe

      Filesize

      11KB

      MD5

      573c54c5cb5b85116a69adcc9c600c29

      SHA1

      4aaf20f1a0caa4ec9317e6d01eb53b762bade06c

      SHA256

      6c27ae27403cdfeeb1065341b8c59818aaf484cd4af621236eebb9ab781b0e21

      SHA512

      835cf7678a6b6536810f2eedc9b62e2d3cfb6f21fbc218025c8017804f096ef7aa9475908c23596589e8a65b45cf3012862ced439b36f6ec0ccfbe7197eb52fc

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\q2222420.exe

      Filesize

      11KB

      MD5

      573c54c5cb5b85116a69adcc9c600c29

      SHA1

      4aaf20f1a0caa4ec9317e6d01eb53b762bade06c

      SHA256

      6c27ae27403cdfeeb1065341b8c59818aaf484cd4af621236eebb9ab781b0e21

      SHA512

      835cf7678a6b6536810f2eedc9b62e2d3cfb6f21fbc218025c8017804f096ef7aa9475908c23596589e8a65b45cf3012862ced439b36f6ec0ccfbe7197eb52fc

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s8504502.exe

      Filesize

      310KB

      MD5

      1b299b318f01939bf1f4bdba54a9bd7d

      SHA1

      95745a57d25560d46edde9a50ddf958ec1aa2494

      SHA256

      12f6f69d6575f9511c85c8c5e9f595ebac1e1c36dd80cc5c5b52e97352bb1c3c

      SHA512

      99df7af2ce0f5775c1c7d0ac904f947ae3cfc2c2f568139a458f7f7a1e87e2c9797e95fdb5f24a8582ede4b64dd7514a3d839e934c31f13d84b877d5c36ba5df

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s8504502.exe

      Filesize

      310KB

      MD5

      1b299b318f01939bf1f4bdba54a9bd7d

      SHA1

      95745a57d25560d46edde9a50ddf958ec1aa2494

      SHA256

      12f6f69d6575f9511c85c8c5e9f595ebac1e1c36dd80cc5c5b52e97352bb1c3c

      SHA512

      99df7af2ce0f5775c1c7d0ac904f947ae3cfc2c2f568139a458f7f7a1e87e2c9797e95fdb5f24a8582ede4b64dd7514a3d839e934c31f13d84b877d5c36ba5df

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s8504502.exe

      Filesize

      310KB

      MD5

      1b299b318f01939bf1f4bdba54a9bd7d

      SHA1

      95745a57d25560d46edde9a50ddf958ec1aa2494

      SHA256

      12f6f69d6575f9511c85c8c5e9f595ebac1e1c36dd80cc5c5b52e97352bb1c3c

      SHA512

      99df7af2ce0f5775c1c7d0ac904f947ae3cfc2c2f568139a458f7f7a1e87e2c9797e95fdb5f24a8582ede4b64dd7514a3d839e934c31f13d84b877d5c36ba5df

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z3967036.exe

      Filesize

      648KB

      MD5

      1556d6b6fe97175c643a1efe18243194

      SHA1

      4f229acbdc803f6c1fc17bf1838495821fef6565

      SHA256

      8c027e871baef26d729eb683296d081ba025362fb410bfaf4290d7839422d9be

      SHA512

      cd79d551f46e9992446747108d8750da93341287590cfb2c59c0b6d4d094d6795c25673516714f3d117265126e4ee9eae7c9442949a06cd81f327c745febf065

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z3967036.exe

      Filesize

      648KB

      MD5

      1556d6b6fe97175c643a1efe18243194

      SHA1

      4f229acbdc803f6c1fc17bf1838495821fef6565

      SHA256

      8c027e871baef26d729eb683296d081ba025362fb410bfaf4290d7839422d9be

      SHA512

      cd79d551f46e9992446747108d8750da93341287590cfb2c59c0b6d4d094d6795c25673516714f3d117265126e4ee9eae7c9442949a06cd81f327c745febf065

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z2675087.exe

      Filesize

      465KB

      MD5

      712df0a25ec212d05c8ff048caf21369

      SHA1

      6dfad1fb1e5a94e83100013544c27012a8badebf

      SHA256

      68e8c9b7495f20b099d86d22cc265a4f04d8ef55dee1b0b389219ace26d64dc6

      SHA512

      b741c5e334d3dc8e66750082f7950b7684c44be6ea306061e770f3289f38fcc73de616bf208dfe3aa897bd116668277fa25af5798a83f99ead2e1a800c96073c

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z2675087.exe

      Filesize

      465KB

      MD5

      712df0a25ec212d05c8ff048caf21369

      SHA1

      6dfad1fb1e5a94e83100013544c27012a8badebf

      SHA256

      68e8c9b7495f20b099d86d22cc265a4f04d8ef55dee1b0b389219ace26d64dc6

      SHA512

      b741c5e334d3dc8e66750082f7950b7684c44be6ea306061e770f3289f38fcc73de616bf208dfe3aa897bd116668277fa25af5798a83f99ead2e1a800c96073c

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z5446204.exe

      Filesize

      283KB

      MD5

      6362dfc17229132b48802ffcd49f21be

      SHA1

      c785e3ed02cae435586e5239f9d15508a6b8e98d

      SHA256

      cfb90e137790e6f838c54d42f42401f989b60104b469c8e15246fc45970f10a6

      SHA512

      95c14b81015358c8fce8f71146a3149d6724b6c46012086928dbc1efc4512cccbf38bd11e2f76699d3294088e04e4f727fc89e402b9421f57b0f7b1e12b373ab

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z5446204.exe

      Filesize

      283KB

      MD5

      6362dfc17229132b48802ffcd49f21be

      SHA1

      c785e3ed02cae435586e5239f9d15508a6b8e98d

      SHA256

      cfb90e137790e6f838c54d42f42401f989b60104b469c8e15246fc45970f10a6

      SHA512

      95c14b81015358c8fce8f71146a3149d6724b6c46012086928dbc1efc4512cccbf38bd11e2f76699d3294088e04e4f727fc89e402b9421f57b0f7b1e12b373ab

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\q2222420.exe

      Filesize

      11KB

      MD5

      573c54c5cb5b85116a69adcc9c600c29

      SHA1

      4aaf20f1a0caa4ec9317e6d01eb53b762bade06c

      SHA256

      6c27ae27403cdfeeb1065341b8c59818aaf484cd4af621236eebb9ab781b0e21

      SHA512

      835cf7678a6b6536810f2eedc9b62e2d3cfb6f21fbc218025c8017804f096ef7aa9475908c23596589e8a65b45cf3012862ced439b36f6ec0ccfbe7197eb52fc

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\s8504502.exe

      Filesize

      310KB

      MD5

      1b299b318f01939bf1f4bdba54a9bd7d

      SHA1

      95745a57d25560d46edde9a50ddf958ec1aa2494

      SHA256

      12f6f69d6575f9511c85c8c5e9f595ebac1e1c36dd80cc5c5b52e97352bb1c3c

      SHA512

      99df7af2ce0f5775c1c7d0ac904f947ae3cfc2c2f568139a458f7f7a1e87e2c9797e95fdb5f24a8582ede4b64dd7514a3d839e934c31f13d84b877d5c36ba5df

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\s8504502.exe

      Filesize

      310KB

      MD5

      1b299b318f01939bf1f4bdba54a9bd7d

      SHA1

      95745a57d25560d46edde9a50ddf958ec1aa2494

      SHA256

      12f6f69d6575f9511c85c8c5e9f595ebac1e1c36dd80cc5c5b52e97352bb1c3c

      SHA512

      99df7af2ce0f5775c1c7d0ac904f947ae3cfc2c2f568139a458f7f7a1e87e2c9797e95fdb5f24a8582ede4b64dd7514a3d839e934c31f13d84b877d5c36ba5df

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\s8504502.exe

      Filesize

      310KB

      MD5

      1b299b318f01939bf1f4bdba54a9bd7d

      SHA1

      95745a57d25560d46edde9a50ddf958ec1aa2494

      SHA256

      12f6f69d6575f9511c85c8c5e9f595ebac1e1c36dd80cc5c5b52e97352bb1c3c

      SHA512

      99df7af2ce0f5775c1c7d0ac904f947ae3cfc2c2f568139a458f7f7a1e87e2c9797e95fdb5f24a8582ede4b64dd7514a3d839e934c31f13d84b877d5c36ba5df

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\s8504502.exe

      Filesize

      310KB

      MD5

      1b299b318f01939bf1f4bdba54a9bd7d

      SHA1

      95745a57d25560d46edde9a50ddf958ec1aa2494

      SHA256

      12f6f69d6575f9511c85c8c5e9f595ebac1e1c36dd80cc5c5b52e97352bb1c3c

      SHA512

      99df7af2ce0f5775c1c7d0ac904f947ae3cfc2c2f568139a458f7f7a1e87e2c9797e95fdb5f24a8582ede4b64dd7514a3d839e934c31f13d84b877d5c36ba5df

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\s8504502.exe

      Filesize

      310KB

      MD5

      1b299b318f01939bf1f4bdba54a9bd7d

      SHA1

      95745a57d25560d46edde9a50ddf958ec1aa2494

      SHA256

      12f6f69d6575f9511c85c8c5e9f595ebac1e1c36dd80cc5c5b52e97352bb1c3c

      SHA512

      99df7af2ce0f5775c1c7d0ac904f947ae3cfc2c2f568139a458f7f7a1e87e2c9797e95fdb5f24a8582ede4b64dd7514a3d839e934c31f13d84b877d5c36ba5df

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\s8504502.exe

      Filesize

      310KB

      MD5

      1b299b318f01939bf1f4bdba54a9bd7d

      SHA1

      95745a57d25560d46edde9a50ddf958ec1aa2494

      SHA256

      12f6f69d6575f9511c85c8c5e9f595ebac1e1c36dd80cc5c5b52e97352bb1c3c

      SHA512

      99df7af2ce0f5775c1c7d0ac904f947ae3cfc2c2f568139a458f7f7a1e87e2c9797e95fdb5f24a8582ede4b64dd7514a3d839e934c31f13d84b877d5c36ba5df

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\s8504502.exe

      Filesize

      310KB

      MD5

      1b299b318f01939bf1f4bdba54a9bd7d

      SHA1

      95745a57d25560d46edde9a50ddf958ec1aa2494

      SHA256

      12f6f69d6575f9511c85c8c5e9f595ebac1e1c36dd80cc5c5b52e97352bb1c3c

      SHA512

      99df7af2ce0f5775c1c7d0ac904f947ae3cfc2c2f568139a458f7f7a1e87e2c9797e95fdb5f24a8582ede4b64dd7514a3d839e934c31f13d84b877d5c36ba5df

    • memory/2784-41-0x000007FEF5B80000-0x000007FEF656C000-memory.dmp

      Filesize

      9.9MB

    • memory/2784-40-0x000007FEF5B80000-0x000007FEF656C000-memory.dmp

      Filesize

      9.9MB

    • memory/2784-39-0x000007FEF5B80000-0x000007FEF656C000-memory.dmp

      Filesize

      9.9MB

    • memory/2784-38-0x00000000011D0000-0x00000000011DA000-memory.dmp

      Filesize

      40KB

    • memory/2976-52-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2976-53-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2976-55-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2976-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

      Filesize

      4KB

    • memory/2976-58-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2976-60-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2976-62-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2976-51-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2976-67-0x0000000000250000-0x0000000000256000-memory.dmp

      Filesize

      24KB