Analysis

  • max time kernel
    142s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2023, 14:11

General

  • Target

    c2c9c67caa3ab5d23df8c27b54116d490b1ea939ffb6fd2a317fdccdf7f6a57f.exe

  • Size

    1.3MB

  • MD5

    0dc79bf01d9e75c839babcca1e42e0a8

  • SHA1

    7d7b640bae5cf2a14f2f71b443e690656a1756ce

  • SHA256

    c2c9c67caa3ab5d23df8c27b54116d490b1ea939ffb6fd2a317fdccdf7f6a57f

  • SHA512

    bd1d1c9595ae8550f929907b8537df0990d9ce9fa0eefce8a2b6f11f1d5753f43041b8706972d86efecfb426f7644d4d698fdab4a7a9abf99a69acfe933b3698

  • SSDEEP

    24576:mEN25HAF3G/hsFRZ821Qrs2J2y6aHmZXRaezqYx4zo21IyGTSx3v4cw5s:c5HAF3GWTB1R203NRaez34zo21Iy13Ag

Malware Config

Extracted

Family

redline

Botnet

vasha

C2

77.91.124.82:19071

Attributes
  • auth_value

    42fc61786274daca54d589b85a2c1954

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 11 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c2c9c67caa3ab5d23df8c27b54116d490b1ea939ffb6fd2a317fdccdf7f6a57f.exe
    "C:\Users\Admin\AppData\Local\Temp\c2c9c67caa3ab5d23df8c27b54116d490b1ea939ffb6fd2a317fdccdf7f6a57f.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2580
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2708490.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2708490.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2644
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6530725.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6530725.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2496
          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1239521.exe
            C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1239521.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2668
            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4484711.exe
              C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4484711.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2488
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2404
            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h6914137.exe
              C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h6914137.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:1992

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2708490.exe

          Filesize

          777KB

          MD5

          9f06a16e582ca70a87a3bc1fc852e5c2

          SHA1

          7bb84084ff0ca1887f3a54ddc2e9791859bf7ae1

          SHA256

          88ed072db0b6d3eb0b14fd57b37bcadf9bf5ae8c8fa07b09be8ec9887dd688fc

          SHA512

          fdb519a2d11fef2b41cf36b95c58796ccec9b374deb31f05a2b32f0937edc8d36b0a1250e8305c38f3197b2493d36ea80f45880aebeedd9d4d752d01a5486725

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2708490.exe

          Filesize

          777KB

          MD5

          9f06a16e582ca70a87a3bc1fc852e5c2

          SHA1

          7bb84084ff0ca1887f3a54ddc2e9791859bf7ae1

          SHA256

          88ed072db0b6d3eb0b14fd57b37bcadf9bf5ae8c8fa07b09be8ec9887dd688fc

          SHA512

          fdb519a2d11fef2b41cf36b95c58796ccec9b374deb31f05a2b32f0937edc8d36b0a1250e8305c38f3197b2493d36ea80f45880aebeedd9d4d752d01a5486725

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6530725.exe

          Filesize

          506KB

          MD5

          120d6743638ee22e7064acfef7f611ea

          SHA1

          1b06c597acf75118ae939951553bafc3ec815c25

          SHA256

          03311b29cf6f5961cbbd1ea53751be6e9328fd1d97b86a5595a95d27371b92d7

          SHA512

          196a726bbca24d2d924f4fd753931b5d91c5c1b0ba858b7c362c499d75d103e7f17f42905fa05e9e5eb09f7f7c82676d2b15e91adc7aceb93116be6cf9573e41

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6530725.exe

          Filesize

          506KB

          MD5

          120d6743638ee22e7064acfef7f611ea

          SHA1

          1b06c597acf75118ae939951553bafc3ec815c25

          SHA256

          03311b29cf6f5961cbbd1ea53751be6e9328fd1d97b86a5595a95d27371b92d7

          SHA512

          196a726bbca24d2d924f4fd753931b5d91c5c1b0ba858b7c362c499d75d103e7f17f42905fa05e9e5eb09f7f7c82676d2b15e91adc7aceb93116be6cf9573e41

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1239521.exe

          Filesize

          321KB

          MD5

          2676e2c1bcd3717a1b867c00db688ae1

          SHA1

          5aa6a634d31997d721530acc2f7e68f2cdefcbaa

          SHA256

          3bd96ca71968f80bc97e330c1b80a7d36248ab5fde1ee1fd8691ef4b02678b29

          SHA512

          c4e38ee4d0160b7b6c6b4d2a5bceb38cda51cbcc36143fda25f8a6062f6fa7038bf659b6953d1c7e40c030e4c9372f04479388f11bffcea2fc1415f695f093cb

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1239521.exe

          Filesize

          321KB

          MD5

          2676e2c1bcd3717a1b867c00db688ae1

          SHA1

          5aa6a634d31997d721530acc2f7e68f2cdefcbaa

          SHA256

          3bd96ca71968f80bc97e330c1b80a7d36248ab5fde1ee1fd8691ef4b02678b29

          SHA512

          c4e38ee4d0160b7b6c6b4d2a5bceb38cda51cbcc36143fda25f8a6062f6fa7038bf659b6953d1c7e40c030e4c9372f04479388f11bffcea2fc1415f695f093cb

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4484711.exe

          Filesize

          236KB

          MD5

          20a84957f86cd737db745a0a5f6d74e6

          SHA1

          102e3c2550501a9304411685d52ff13c45a2e24e

          SHA256

          fcd02044243b61e6eaf97c1b53a59556b46d09c962eb93d607eadf5225f36705

          SHA512

          dc114c581c4d0a5b4425ad48fded69a3002501b4d40fe983cfd66069a398dc6047cc8c1c60c0b7035ae3f3077bb8c99c3282eab804d866028e5bcfd85f48c95d

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4484711.exe

          Filesize

          236KB

          MD5

          20a84957f86cd737db745a0a5f6d74e6

          SHA1

          102e3c2550501a9304411685d52ff13c45a2e24e

          SHA256

          fcd02044243b61e6eaf97c1b53a59556b46d09c962eb93d607eadf5225f36705

          SHA512

          dc114c581c4d0a5b4425ad48fded69a3002501b4d40fe983cfd66069a398dc6047cc8c1c60c0b7035ae3f3077bb8c99c3282eab804d866028e5bcfd85f48c95d

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4484711.exe

          Filesize

          236KB

          MD5

          20a84957f86cd737db745a0a5f6d74e6

          SHA1

          102e3c2550501a9304411685d52ff13c45a2e24e

          SHA256

          fcd02044243b61e6eaf97c1b53a59556b46d09c962eb93d607eadf5225f36705

          SHA512

          dc114c581c4d0a5b4425ad48fded69a3002501b4d40fe983cfd66069a398dc6047cc8c1c60c0b7035ae3f3077bb8c99c3282eab804d866028e5bcfd85f48c95d

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h6914137.exe

          Filesize

          174KB

          MD5

          d824707d7fc1b9e3693982b03b50b079

          SHA1

          867575ee99f92c6467a538e784ea09abfeeb9906

          SHA256

          57c6203bb787b0df2b18bf6a5340480f933c72c17fea79011ddf7b55abf39745

          SHA512

          15b4dd55837c9ccf11a9537234d75c6285845627ebc41bb89c7491662832b2a1cb613b38badab30b44d3bbadd89e34e05a61225c47172434bee6bc32202a7cd2

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h6914137.exe

          Filesize

          174KB

          MD5

          d824707d7fc1b9e3693982b03b50b079

          SHA1

          867575ee99f92c6467a538e784ea09abfeeb9906

          SHA256

          57c6203bb787b0df2b18bf6a5340480f933c72c17fea79011ddf7b55abf39745

          SHA512

          15b4dd55837c9ccf11a9537234d75c6285845627ebc41bb89c7491662832b2a1cb613b38badab30b44d3bbadd89e34e05a61225c47172434bee6bc32202a7cd2

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x2708490.exe

          Filesize

          777KB

          MD5

          9f06a16e582ca70a87a3bc1fc852e5c2

          SHA1

          7bb84084ff0ca1887f3a54ddc2e9791859bf7ae1

          SHA256

          88ed072db0b6d3eb0b14fd57b37bcadf9bf5ae8c8fa07b09be8ec9887dd688fc

          SHA512

          fdb519a2d11fef2b41cf36b95c58796ccec9b374deb31f05a2b32f0937edc8d36b0a1250e8305c38f3197b2493d36ea80f45880aebeedd9d4d752d01a5486725

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x2708490.exe

          Filesize

          777KB

          MD5

          9f06a16e582ca70a87a3bc1fc852e5c2

          SHA1

          7bb84084ff0ca1887f3a54ddc2e9791859bf7ae1

          SHA256

          88ed072db0b6d3eb0b14fd57b37bcadf9bf5ae8c8fa07b09be8ec9887dd688fc

          SHA512

          fdb519a2d11fef2b41cf36b95c58796ccec9b374deb31f05a2b32f0937edc8d36b0a1250e8305c38f3197b2493d36ea80f45880aebeedd9d4d752d01a5486725

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x6530725.exe

          Filesize

          506KB

          MD5

          120d6743638ee22e7064acfef7f611ea

          SHA1

          1b06c597acf75118ae939951553bafc3ec815c25

          SHA256

          03311b29cf6f5961cbbd1ea53751be6e9328fd1d97b86a5595a95d27371b92d7

          SHA512

          196a726bbca24d2d924f4fd753931b5d91c5c1b0ba858b7c362c499d75d103e7f17f42905fa05e9e5eb09f7f7c82676d2b15e91adc7aceb93116be6cf9573e41

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x6530725.exe

          Filesize

          506KB

          MD5

          120d6743638ee22e7064acfef7f611ea

          SHA1

          1b06c597acf75118ae939951553bafc3ec815c25

          SHA256

          03311b29cf6f5961cbbd1ea53751be6e9328fd1d97b86a5595a95d27371b92d7

          SHA512

          196a726bbca24d2d924f4fd753931b5d91c5c1b0ba858b7c362c499d75d103e7f17f42905fa05e9e5eb09f7f7c82676d2b15e91adc7aceb93116be6cf9573e41

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x1239521.exe

          Filesize

          321KB

          MD5

          2676e2c1bcd3717a1b867c00db688ae1

          SHA1

          5aa6a634d31997d721530acc2f7e68f2cdefcbaa

          SHA256

          3bd96ca71968f80bc97e330c1b80a7d36248ab5fde1ee1fd8691ef4b02678b29

          SHA512

          c4e38ee4d0160b7b6c6b4d2a5bceb38cda51cbcc36143fda25f8a6062f6fa7038bf659b6953d1c7e40c030e4c9372f04479388f11bffcea2fc1415f695f093cb

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x1239521.exe

          Filesize

          321KB

          MD5

          2676e2c1bcd3717a1b867c00db688ae1

          SHA1

          5aa6a634d31997d721530acc2f7e68f2cdefcbaa

          SHA256

          3bd96ca71968f80bc97e330c1b80a7d36248ab5fde1ee1fd8691ef4b02678b29

          SHA512

          c4e38ee4d0160b7b6c6b4d2a5bceb38cda51cbcc36143fda25f8a6062f6fa7038bf659b6953d1c7e40c030e4c9372f04479388f11bffcea2fc1415f695f093cb

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g4484711.exe

          Filesize

          236KB

          MD5

          20a84957f86cd737db745a0a5f6d74e6

          SHA1

          102e3c2550501a9304411685d52ff13c45a2e24e

          SHA256

          fcd02044243b61e6eaf97c1b53a59556b46d09c962eb93d607eadf5225f36705

          SHA512

          dc114c581c4d0a5b4425ad48fded69a3002501b4d40fe983cfd66069a398dc6047cc8c1c60c0b7035ae3f3077bb8c99c3282eab804d866028e5bcfd85f48c95d

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g4484711.exe

          Filesize

          236KB

          MD5

          20a84957f86cd737db745a0a5f6d74e6

          SHA1

          102e3c2550501a9304411685d52ff13c45a2e24e

          SHA256

          fcd02044243b61e6eaf97c1b53a59556b46d09c962eb93d607eadf5225f36705

          SHA512

          dc114c581c4d0a5b4425ad48fded69a3002501b4d40fe983cfd66069a398dc6047cc8c1c60c0b7035ae3f3077bb8c99c3282eab804d866028e5bcfd85f48c95d

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g4484711.exe

          Filesize

          236KB

          MD5

          20a84957f86cd737db745a0a5f6d74e6

          SHA1

          102e3c2550501a9304411685d52ff13c45a2e24e

          SHA256

          fcd02044243b61e6eaf97c1b53a59556b46d09c962eb93d607eadf5225f36705

          SHA512

          dc114c581c4d0a5b4425ad48fded69a3002501b4d40fe983cfd66069a398dc6047cc8c1c60c0b7035ae3f3077bb8c99c3282eab804d866028e5bcfd85f48c95d

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\h6914137.exe

          Filesize

          174KB

          MD5

          d824707d7fc1b9e3693982b03b50b079

          SHA1

          867575ee99f92c6467a538e784ea09abfeeb9906

          SHA256

          57c6203bb787b0df2b18bf6a5340480f933c72c17fea79011ddf7b55abf39745

          SHA512

          15b4dd55837c9ccf11a9537234d75c6285845627ebc41bb89c7491662832b2a1cb613b38badab30b44d3bbadd89e34e05a61225c47172434bee6bc32202a7cd2

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\h6914137.exe

          Filesize

          174KB

          MD5

          d824707d7fc1b9e3693982b03b50b079

          SHA1

          867575ee99f92c6467a538e784ea09abfeeb9906

          SHA256

          57c6203bb787b0df2b18bf6a5340480f933c72c17fea79011ddf7b55abf39745

          SHA512

          15b4dd55837c9ccf11a9537234d75c6285845627ebc41bb89c7491662832b2a1cb613b38badab30b44d3bbadd89e34e05a61225c47172434bee6bc32202a7cd2

        • memory/1992-78-0x00000000001D0000-0x00000000001D6000-memory.dmp

          Filesize

          24KB

        • memory/1992-77-0x0000000000BD0000-0x0000000000C00000-memory.dmp

          Filesize

          192KB

        • memory/2404-65-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

          Filesize

          4KB

        • memory/2404-63-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2404-70-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2404-68-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2404-61-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2404-62-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2404-66-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2404-64-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2580-17-0x0000000000400000-0x0000000000513000-memory.dmp

          Filesize

          1.1MB

        • memory/2580-10-0x0000000000400000-0x0000000000513000-memory.dmp

          Filesize

          1.1MB

        • memory/2580-6-0x0000000000400000-0x0000000000513000-memory.dmp

          Filesize

          1.1MB

        • memory/2580-0-0x0000000000400000-0x0000000000513000-memory.dmp

          Filesize

          1.1MB

        • memory/2580-8-0x0000000000400000-0x0000000000513000-memory.dmp

          Filesize

          1.1MB

        • memory/2580-11-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

          Filesize

          4KB

        • memory/2580-4-0x0000000000400000-0x0000000000513000-memory.dmp

          Filesize

          1.1MB

        • memory/2580-12-0x0000000000400000-0x0000000000513000-memory.dmp

          Filesize

          1.1MB

        • memory/2580-2-0x0000000000400000-0x0000000000513000-memory.dmp

          Filesize

          1.1MB

        • memory/2580-14-0x0000000000400000-0x0000000000513000-memory.dmp

          Filesize

          1.1MB

        • memory/2580-16-0x0000000000400000-0x0000000000513000-memory.dmp

          Filesize

          1.1MB

        • memory/2580-79-0x0000000000400000-0x0000000000513000-memory.dmp

          Filesize

          1.1MB