Analysis

  • max time kernel
    145s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2023, 13:41

General

  • Target

    8bd544af495a2cb1b8fa05598e03080cb9e5ec4d789b9786c5a939aaf8f6e4f1.exe

  • Size

    1.3MB

  • MD5

    15191b422ca8442afe30ca33f4e14a92

  • SHA1

    cd99d2c31e956dd0cfdc9326673e1da692ae45ba

  • SHA256

    8bd544af495a2cb1b8fa05598e03080cb9e5ec4d789b9786c5a939aaf8f6e4f1

  • SHA512

    76b5a8e4c58fc7edcebdaa59d5aaa1aaf4f66e16ddf31b6e9c3c1a071c779ad0d7c474a7bcf9e186c438ce4bb2a24ad2be427608e29b367575648b85ee1df418

  • SSDEEP

    24576:4iGL5iZipp5tB2faukLIFyInKW277WUf+mV+eMj3s:k5iZiprT2iukLLInK/bfN+lj3s

Malware Config

Extracted

Family

redline

Botnet

vasha

C2

77.91.124.82:19071

Attributes
  • auth_value

    42fc61786274daca54d589b85a2c1954

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 11 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8bd544af495a2cb1b8fa05598e03080cb9e5ec4d789b9786c5a939aaf8f6e4f1.exe
    "C:\Users\Admin\AppData\Local\Temp\8bd544af495a2cb1b8fa05598e03080cb9e5ec4d789b9786c5a939aaf8f6e4f1.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2708
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2140
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5110532.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5110532.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2536
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2284241.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2284241.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2788
          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9576681.exe
            C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9576681.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2576
            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5950592.exe
              C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5950592.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2572
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2348
            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h9696137.exe
              C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h9696137.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:520

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5110532.exe

          Filesize

          777KB

          MD5

          22874c5e63c323e6b6ffd63add60a591

          SHA1

          4acaf3d7af232b0556620182a3bb9e94dbc3f4f2

          SHA256

          7e6cec59212a89380c05df582ae2e828532bc2f110f0aa1174dc72e2a0e0f351

          SHA512

          fbc1f09256d9fbd55bb64bd7c54c0b0132342b46372c2393870fb737b53d4e7a7c21759c43cbb6946e45e27616a9d7b4b9b6bf6866c0022e1f33f8aef8d95fd8

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5110532.exe

          Filesize

          777KB

          MD5

          22874c5e63c323e6b6ffd63add60a591

          SHA1

          4acaf3d7af232b0556620182a3bb9e94dbc3f4f2

          SHA256

          7e6cec59212a89380c05df582ae2e828532bc2f110f0aa1174dc72e2a0e0f351

          SHA512

          fbc1f09256d9fbd55bb64bd7c54c0b0132342b46372c2393870fb737b53d4e7a7c21759c43cbb6946e45e27616a9d7b4b9b6bf6866c0022e1f33f8aef8d95fd8

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2284241.exe

          Filesize

          506KB

          MD5

          f60e010be284bcf2757820e06a873cb5

          SHA1

          42c9fdfed5aa9691e4d3d205b59ed54f66c4cb48

          SHA256

          941b313f4a3f7783e5d659582484625f7c57a942cb60c1d4313308db61725192

          SHA512

          a260a4d0c76f29d42d2bd1c2d3d41c8ff60806259d8391815b2c6d2d6fd495e58a03b2d637875f29de82c0000adf5a8d5f4ac86d32fcf8bb4eef999211767964

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2284241.exe

          Filesize

          506KB

          MD5

          f60e010be284bcf2757820e06a873cb5

          SHA1

          42c9fdfed5aa9691e4d3d205b59ed54f66c4cb48

          SHA256

          941b313f4a3f7783e5d659582484625f7c57a942cb60c1d4313308db61725192

          SHA512

          a260a4d0c76f29d42d2bd1c2d3d41c8ff60806259d8391815b2c6d2d6fd495e58a03b2d637875f29de82c0000adf5a8d5f4ac86d32fcf8bb4eef999211767964

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9576681.exe

          Filesize

          320KB

          MD5

          c1991d93091071c18783cb6a3dc56726

          SHA1

          62a739f4c9aac84d35b814ffa780f5e1c9960a31

          SHA256

          f7e7f334436ed36cd025b2c6111e0690447d16a30cbda94a64846c973475bc64

          SHA512

          00c27dd2869fe9ae244f5ce9ea140a60a5f88dc91ebf853565ea4506f14bc990ff6f0cd7652c2ad5666b3d43345f9ad66ba8e0bd265e9d20ab75e8321b72d471

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9576681.exe

          Filesize

          320KB

          MD5

          c1991d93091071c18783cb6a3dc56726

          SHA1

          62a739f4c9aac84d35b814ffa780f5e1c9960a31

          SHA256

          f7e7f334436ed36cd025b2c6111e0690447d16a30cbda94a64846c973475bc64

          SHA512

          00c27dd2869fe9ae244f5ce9ea140a60a5f88dc91ebf853565ea4506f14bc990ff6f0cd7652c2ad5666b3d43345f9ad66ba8e0bd265e9d20ab75e8321b72d471

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5950592.exe

          Filesize

          236KB

          MD5

          985c577d1e4d7b4e7131782c95468a36

          SHA1

          4c58ea8ee96639001a0f0ceb34c2f30e5e9ed376

          SHA256

          9802e668adc5ee7e905179719fd10807c931d884e17545e2ee84856b5704aec6

          SHA512

          80c3adf2eb7681b9bb05f5b231f4daf09e106e0fd45bdf9ebd90cdccbdd890f43da1671eeec328550022f30e79ab2b11513af92c92317039c66eee9d8113cb66

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5950592.exe

          Filesize

          236KB

          MD5

          985c577d1e4d7b4e7131782c95468a36

          SHA1

          4c58ea8ee96639001a0f0ceb34c2f30e5e9ed376

          SHA256

          9802e668adc5ee7e905179719fd10807c931d884e17545e2ee84856b5704aec6

          SHA512

          80c3adf2eb7681b9bb05f5b231f4daf09e106e0fd45bdf9ebd90cdccbdd890f43da1671eeec328550022f30e79ab2b11513af92c92317039c66eee9d8113cb66

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5950592.exe

          Filesize

          236KB

          MD5

          985c577d1e4d7b4e7131782c95468a36

          SHA1

          4c58ea8ee96639001a0f0ceb34c2f30e5e9ed376

          SHA256

          9802e668adc5ee7e905179719fd10807c931d884e17545e2ee84856b5704aec6

          SHA512

          80c3adf2eb7681b9bb05f5b231f4daf09e106e0fd45bdf9ebd90cdccbdd890f43da1671eeec328550022f30e79ab2b11513af92c92317039c66eee9d8113cb66

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h9696137.exe

          Filesize

          174KB

          MD5

          5b3da0adcc1448d756b9f8c0d7372bec

          SHA1

          9995c09b43e54f3575e19e3a0ec09f3a7076ffdd

          SHA256

          fcc875e5314a22f0f50e349ff3820cb2258c254c45305be3a07238121593ab7f

          SHA512

          285f06b2d561c4e794160217e51035acb896d0bbbd4a5b5126803ba350d9ba9cf67712d697513b3f7af09551203b71037fb4f375c320e80793243d2b2dcc91e3

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h9696137.exe

          Filesize

          174KB

          MD5

          5b3da0adcc1448d756b9f8c0d7372bec

          SHA1

          9995c09b43e54f3575e19e3a0ec09f3a7076ffdd

          SHA256

          fcc875e5314a22f0f50e349ff3820cb2258c254c45305be3a07238121593ab7f

          SHA512

          285f06b2d561c4e794160217e51035acb896d0bbbd4a5b5126803ba350d9ba9cf67712d697513b3f7af09551203b71037fb4f375c320e80793243d2b2dcc91e3

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x5110532.exe

          Filesize

          777KB

          MD5

          22874c5e63c323e6b6ffd63add60a591

          SHA1

          4acaf3d7af232b0556620182a3bb9e94dbc3f4f2

          SHA256

          7e6cec59212a89380c05df582ae2e828532bc2f110f0aa1174dc72e2a0e0f351

          SHA512

          fbc1f09256d9fbd55bb64bd7c54c0b0132342b46372c2393870fb737b53d4e7a7c21759c43cbb6946e45e27616a9d7b4b9b6bf6866c0022e1f33f8aef8d95fd8

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x5110532.exe

          Filesize

          777KB

          MD5

          22874c5e63c323e6b6ffd63add60a591

          SHA1

          4acaf3d7af232b0556620182a3bb9e94dbc3f4f2

          SHA256

          7e6cec59212a89380c05df582ae2e828532bc2f110f0aa1174dc72e2a0e0f351

          SHA512

          fbc1f09256d9fbd55bb64bd7c54c0b0132342b46372c2393870fb737b53d4e7a7c21759c43cbb6946e45e27616a9d7b4b9b6bf6866c0022e1f33f8aef8d95fd8

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x2284241.exe

          Filesize

          506KB

          MD5

          f60e010be284bcf2757820e06a873cb5

          SHA1

          42c9fdfed5aa9691e4d3d205b59ed54f66c4cb48

          SHA256

          941b313f4a3f7783e5d659582484625f7c57a942cb60c1d4313308db61725192

          SHA512

          a260a4d0c76f29d42d2bd1c2d3d41c8ff60806259d8391815b2c6d2d6fd495e58a03b2d637875f29de82c0000adf5a8d5f4ac86d32fcf8bb4eef999211767964

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x2284241.exe

          Filesize

          506KB

          MD5

          f60e010be284bcf2757820e06a873cb5

          SHA1

          42c9fdfed5aa9691e4d3d205b59ed54f66c4cb48

          SHA256

          941b313f4a3f7783e5d659582484625f7c57a942cb60c1d4313308db61725192

          SHA512

          a260a4d0c76f29d42d2bd1c2d3d41c8ff60806259d8391815b2c6d2d6fd495e58a03b2d637875f29de82c0000adf5a8d5f4ac86d32fcf8bb4eef999211767964

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x9576681.exe

          Filesize

          320KB

          MD5

          c1991d93091071c18783cb6a3dc56726

          SHA1

          62a739f4c9aac84d35b814ffa780f5e1c9960a31

          SHA256

          f7e7f334436ed36cd025b2c6111e0690447d16a30cbda94a64846c973475bc64

          SHA512

          00c27dd2869fe9ae244f5ce9ea140a60a5f88dc91ebf853565ea4506f14bc990ff6f0cd7652c2ad5666b3d43345f9ad66ba8e0bd265e9d20ab75e8321b72d471

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x9576681.exe

          Filesize

          320KB

          MD5

          c1991d93091071c18783cb6a3dc56726

          SHA1

          62a739f4c9aac84d35b814ffa780f5e1c9960a31

          SHA256

          f7e7f334436ed36cd025b2c6111e0690447d16a30cbda94a64846c973475bc64

          SHA512

          00c27dd2869fe9ae244f5ce9ea140a60a5f88dc91ebf853565ea4506f14bc990ff6f0cd7652c2ad5666b3d43345f9ad66ba8e0bd265e9d20ab75e8321b72d471

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g5950592.exe

          Filesize

          236KB

          MD5

          985c577d1e4d7b4e7131782c95468a36

          SHA1

          4c58ea8ee96639001a0f0ceb34c2f30e5e9ed376

          SHA256

          9802e668adc5ee7e905179719fd10807c931d884e17545e2ee84856b5704aec6

          SHA512

          80c3adf2eb7681b9bb05f5b231f4daf09e106e0fd45bdf9ebd90cdccbdd890f43da1671eeec328550022f30e79ab2b11513af92c92317039c66eee9d8113cb66

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g5950592.exe

          Filesize

          236KB

          MD5

          985c577d1e4d7b4e7131782c95468a36

          SHA1

          4c58ea8ee96639001a0f0ceb34c2f30e5e9ed376

          SHA256

          9802e668adc5ee7e905179719fd10807c931d884e17545e2ee84856b5704aec6

          SHA512

          80c3adf2eb7681b9bb05f5b231f4daf09e106e0fd45bdf9ebd90cdccbdd890f43da1671eeec328550022f30e79ab2b11513af92c92317039c66eee9d8113cb66

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g5950592.exe

          Filesize

          236KB

          MD5

          985c577d1e4d7b4e7131782c95468a36

          SHA1

          4c58ea8ee96639001a0f0ceb34c2f30e5e9ed376

          SHA256

          9802e668adc5ee7e905179719fd10807c931d884e17545e2ee84856b5704aec6

          SHA512

          80c3adf2eb7681b9bb05f5b231f4daf09e106e0fd45bdf9ebd90cdccbdd890f43da1671eeec328550022f30e79ab2b11513af92c92317039c66eee9d8113cb66

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\h9696137.exe

          Filesize

          174KB

          MD5

          5b3da0adcc1448d756b9f8c0d7372bec

          SHA1

          9995c09b43e54f3575e19e3a0ec09f3a7076ffdd

          SHA256

          fcc875e5314a22f0f50e349ff3820cb2258c254c45305be3a07238121593ab7f

          SHA512

          285f06b2d561c4e794160217e51035acb896d0bbbd4a5b5126803ba350d9ba9cf67712d697513b3f7af09551203b71037fb4f375c320e80793243d2b2dcc91e3

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\h9696137.exe

          Filesize

          174KB

          MD5

          5b3da0adcc1448d756b9f8c0d7372bec

          SHA1

          9995c09b43e54f3575e19e3a0ec09f3a7076ffdd

          SHA256

          fcc875e5314a22f0f50e349ff3820cb2258c254c45305be3a07238121593ab7f

          SHA512

          285f06b2d561c4e794160217e51035acb896d0bbbd4a5b5126803ba350d9ba9cf67712d697513b3f7af09551203b71037fb4f375c320e80793243d2b2dcc91e3

        • memory/520-77-0x0000000000B90000-0x0000000000BC0000-memory.dmp

          Filesize

          192KB

        • memory/520-78-0x00000000003A0000-0x00000000003A6000-memory.dmp

          Filesize

          24KB

        • memory/2140-10-0x0000000000400000-0x0000000000513000-memory.dmp

          Filesize

          1.1MB

        • memory/2140-0-0x0000000000400000-0x0000000000513000-memory.dmp

          Filesize

          1.1MB

        • memory/2140-8-0x0000000000400000-0x0000000000513000-memory.dmp

          Filesize

          1.1MB

        • memory/2140-6-0x0000000000400000-0x0000000000513000-memory.dmp

          Filesize

          1.1MB

        • memory/2140-12-0x0000000000400000-0x0000000000513000-memory.dmp

          Filesize

          1.1MB

        • memory/2140-17-0x0000000000400000-0x0000000000513000-memory.dmp

          Filesize

          1.1MB

        • memory/2140-79-0x0000000000400000-0x0000000000513000-memory.dmp

          Filesize

          1.1MB

        • memory/2140-11-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

          Filesize

          4KB

        • memory/2140-14-0x0000000000400000-0x0000000000513000-memory.dmp

          Filesize

          1.1MB

        • memory/2140-2-0x0000000000400000-0x0000000000513000-memory.dmp

          Filesize

          1.1MB

        • memory/2140-16-0x0000000000400000-0x0000000000513000-memory.dmp

          Filesize

          1.1MB

        • memory/2140-4-0x0000000000400000-0x0000000000513000-memory.dmp

          Filesize

          1.1MB

        • memory/2348-61-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2348-70-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2348-68-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2348-66-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2348-65-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

          Filesize

          4KB

        • memory/2348-64-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2348-63-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2348-62-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB