Analysis

  • max time kernel
    197s
  • max time network
    206s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    14-10-2023 18:07

General

  • Target

    NEAS.9d8ef5af655dc5cdc92ca4b6f019db80.exe

  • Size

    701KB

  • MD5

    9d8ef5af655dc5cdc92ca4b6f019db80

  • SHA1

    c2d44fa41f85c77939c87bb0fed6d3dbbd7b3c67

  • SHA256

    c947c837debbe5d3285675b550e33f3bdfd0f87aee7d230e1aa514b751956c20

  • SHA512

    a49f9499f3502bd31324e86f79ac2c5c1d13c308161aac4f306824e8d8978143e0f47241eed6a22ebc1f798d411d6110be848c3e8ad37015a58a373b4f0f48a1

  • SSDEEP

    12288:XMr8y90+BwUc0t9kH03s7znim+7bu/cNTE5izJFXpXm9NAWioputjd13RS:Hy3NsHes71+7i/Yiiz78JnpK513RS

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 21 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 9 IoCs
  • Windows security modification 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.9d8ef5af655dc5cdc92ca4b6f019db80.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.9d8ef5af655dc5cdc92ca4b6f019db80.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:312
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina7107.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina7107.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2656
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bu902103.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bu902103.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2660
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cor7125.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cor7125.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2952
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dDP58s46.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dDP58s46.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      PID:2880

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

3
T1112

Impair Defenses

2
T1562

Disable or Modify Tools

2
T1562.001

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dDP58s46.exe
    Filesize

    349KB

    MD5

    cbdf8313faded8b1096f60ea5f25f188

    SHA1

    f3531915b999483b8d3c5328f57db03cb97c0cc9

    SHA256

    f6bc9074464a1ff7149f30a6826065c8639fa190d223f514271f358af1969208

    SHA512

    d9cbe6ad51e15715d6ca0ed067adb085572802a9179a3af782dfca95a0625fa847a9db026b9e99d2b160290a2733acbda702e0f2e8fe9fe527c602b7336dbfdd

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dDP58s46.exe
    Filesize

    349KB

    MD5

    cbdf8313faded8b1096f60ea5f25f188

    SHA1

    f3531915b999483b8d3c5328f57db03cb97c0cc9

    SHA256

    f6bc9074464a1ff7149f30a6826065c8639fa190d223f514271f358af1969208

    SHA512

    d9cbe6ad51e15715d6ca0ed067adb085572802a9179a3af782dfca95a0625fa847a9db026b9e99d2b160290a2733acbda702e0f2e8fe9fe527c602b7336dbfdd

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dDP58s46.exe
    Filesize

    349KB

    MD5

    cbdf8313faded8b1096f60ea5f25f188

    SHA1

    f3531915b999483b8d3c5328f57db03cb97c0cc9

    SHA256

    f6bc9074464a1ff7149f30a6826065c8639fa190d223f514271f358af1969208

    SHA512

    d9cbe6ad51e15715d6ca0ed067adb085572802a9179a3af782dfca95a0625fa847a9db026b9e99d2b160290a2733acbda702e0f2e8fe9fe527c602b7336dbfdd

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina7107.exe
    Filesize

    347KB

    MD5

    86abbd504e918c7c4917059549d52212

    SHA1

    8f7fbe880dcdf89094c4f89fd751f09f14265211

    SHA256

    6b9d8aa3f399999df21d0d7ce1045eb4de03fba4f4dd5c681fdd75331de817c7

    SHA512

    4900326170248fb4a6c340ee452688d25aa6684c406297e13a8d172f70e1bac6f5fbd9c2d2111b374b5b8d0be7e98dc563b3f0a1a48bc151df605c3b6e17753a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina7107.exe
    Filesize

    347KB

    MD5

    86abbd504e918c7c4917059549d52212

    SHA1

    8f7fbe880dcdf89094c4f89fd751f09f14265211

    SHA256

    6b9d8aa3f399999df21d0d7ce1045eb4de03fba4f4dd5c681fdd75331de817c7

    SHA512

    4900326170248fb4a6c340ee452688d25aa6684c406297e13a8d172f70e1bac6f5fbd9c2d2111b374b5b8d0be7e98dc563b3f0a1a48bc151df605c3b6e17753a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bu902103.exe
    Filesize

    11KB

    MD5

    298ef2f35ad3acc67748f59552872720

    SHA1

    541c30f6eece604785df5cc2faa7c55a82598601

    SHA256

    67e53a74b5b03d175617d6985d5a397a34f107b5af7c1e272d75f1a3c974ca40

    SHA512

    2f3c525e5b019690337fe82af5abadf4d00abdfd810955ed9eb6f5f6d82c8b68343ebbeb714a758f01009329a2c9c40eea7d4dbe8716f8140802eb9d7dec789e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bu902103.exe
    Filesize

    11KB

    MD5

    298ef2f35ad3acc67748f59552872720

    SHA1

    541c30f6eece604785df5cc2faa7c55a82598601

    SHA256

    67e53a74b5b03d175617d6985d5a397a34f107b5af7c1e272d75f1a3c974ca40

    SHA512

    2f3c525e5b019690337fe82af5abadf4d00abdfd810955ed9eb6f5f6d82c8b68343ebbeb714a758f01009329a2c9c40eea7d4dbe8716f8140802eb9d7dec789e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cor7125.exe
    Filesize

    292KB

    MD5

    2b52ad91022009d48244e018601d13f2

    SHA1

    96ed0d10246c53ddb2036fafd947607e52c494d5

    SHA256

    e48a42feb02c7e5204314ad080f80c397982edd769a7a89c5919f670eb93b823

    SHA512

    4960950af609ce3b0dc0a621538f576d449f2b5c84455be7bf3df6e41ffdb4ec95f54d6b349a0c74bf2e31afb64837a153f465bcf0e24e2e121b79e0a7065d14

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cor7125.exe
    Filesize

    292KB

    MD5

    2b52ad91022009d48244e018601d13f2

    SHA1

    96ed0d10246c53ddb2036fafd947607e52c494d5

    SHA256

    e48a42feb02c7e5204314ad080f80c397982edd769a7a89c5919f670eb93b823

    SHA512

    4960950af609ce3b0dc0a621538f576d449f2b5c84455be7bf3df6e41ffdb4ec95f54d6b349a0c74bf2e31afb64837a153f465bcf0e24e2e121b79e0a7065d14

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cor7125.exe
    Filesize

    292KB

    MD5

    2b52ad91022009d48244e018601d13f2

    SHA1

    96ed0d10246c53ddb2036fafd947607e52c494d5

    SHA256

    e48a42feb02c7e5204314ad080f80c397982edd769a7a89c5919f670eb93b823

    SHA512

    4960950af609ce3b0dc0a621538f576d449f2b5c84455be7bf3df6e41ffdb4ec95f54d6b349a0c74bf2e31afb64837a153f465bcf0e24e2e121b79e0a7065d14

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\dDP58s46.exe
    Filesize

    349KB

    MD5

    cbdf8313faded8b1096f60ea5f25f188

    SHA1

    f3531915b999483b8d3c5328f57db03cb97c0cc9

    SHA256

    f6bc9074464a1ff7149f30a6826065c8639fa190d223f514271f358af1969208

    SHA512

    d9cbe6ad51e15715d6ca0ed067adb085572802a9179a3af782dfca95a0625fa847a9db026b9e99d2b160290a2733acbda702e0f2e8fe9fe527c602b7336dbfdd

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\dDP58s46.exe
    Filesize

    349KB

    MD5

    cbdf8313faded8b1096f60ea5f25f188

    SHA1

    f3531915b999483b8d3c5328f57db03cb97c0cc9

    SHA256

    f6bc9074464a1ff7149f30a6826065c8639fa190d223f514271f358af1969208

    SHA512

    d9cbe6ad51e15715d6ca0ed067adb085572802a9179a3af782dfca95a0625fa847a9db026b9e99d2b160290a2733acbda702e0f2e8fe9fe527c602b7336dbfdd

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\dDP58s46.exe
    Filesize

    349KB

    MD5

    cbdf8313faded8b1096f60ea5f25f188

    SHA1

    f3531915b999483b8d3c5328f57db03cb97c0cc9

    SHA256

    f6bc9074464a1ff7149f30a6826065c8639fa190d223f514271f358af1969208

    SHA512

    d9cbe6ad51e15715d6ca0ed067adb085572802a9179a3af782dfca95a0625fa847a9db026b9e99d2b160290a2733acbda702e0f2e8fe9fe527c602b7336dbfdd

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\kina7107.exe
    Filesize

    347KB

    MD5

    86abbd504e918c7c4917059549d52212

    SHA1

    8f7fbe880dcdf89094c4f89fd751f09f14265211

    SHA256

    6b9d8aa3f399999df21d0d7ce1045eb4de03fba4f4dd5c681fdd75331de817c7

    SHA512

    4900326170248fb4a6c340ee452688d25aa6684c406297e13a8d172f70e1bac6f5fbd9c2d2111b374b5b8d0be7e98dc563b3f0a1a48bc151df605c3b6e17753a

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\kina7107.exe
    Filesize

    347KB

    MD5

    86abbd504e918c7c4917059549d52212

    SHA1

    8f7fbe880dcdf89094c4f89fd751f09f14265211

    SHA256

    6b9d8aa3f399999df21d0d7ce1045eb4de03fba4f4dd5c681fdd75331de817c7

    SHA512

    4900326170248fb4a6c340ee452688d25aa6684c406297e13a8d172f70e1bac6f5fbd9c2d2111b374b5b8d0be7e98dc563b3f0a1a48bc151df605c3b6e17753a

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\bu902103.exe
    Filesize

    11KB

    MD5

    298ef2f35ad3acc67748f59552872720

    SHA1

    541c30f6eece604785df5cc2faa7c55a82598601

    SHA256

    67e53a74b5b03d175617d6985d5a397a34f107b5af7c1e272d75f1a3c974ca40

    SHA512

    2f3c525e5b019690337fe82af5abadf4d00abdfd810955ed9eb6f5f6d82c8b68343ebbeb714a758f01009329a2c9c40eea7d4dbe8716f8140802eb9d7dec789e

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\cor7125.exe
    Filesize

    292KB

    MD5

    2b52ad91022009d48244e018601d13f2

    SHA1

    96ed0d10246c53ddb2036fafd947607e52c494d5

    SHA256

    e48a42feb02c7e5204314ad080f80c397982edd769a7a89c5919f670eb93b823

    SHA512

    4960950af609ce3b0dc0a621538f576d449f2b5c84455be7bf3df6e41ffdb4ec95f54d6b349a0c74bf2e31afb64837a153f465bcf0e24e2e121b79e0a7065d14

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\cor7125.exe
    Filesize

    292KB

    MD5

    2b52ad91022009d48244e018601d13f2

    SHA1

    96ed0d10246c53ddb2036fafd947607e52c494d5

    SHA256

    e48a42feb02c7e5204314ad080f80c397982edd769a7a89c5919f670eb93b823

    SHA512

    4960950af609ce3b0dc0a621538f576d449f2b5c84455be7bf3df6e41ffdb4ec95f54d6b349a0c74bf2e31afb64837a153f465bcf0e24e2e121b79e0a7065d14

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\cor7125.exe
    Filesize

    292KB

    MD5

    2b52ad91022009d48244e018601d13f2

    SHA1

    96ed0d10246c53ddb2036fafd947607e52c494d5

    SHA256

    e48a42feb02c7e5204314ad080f80c397982edd769a7a89c5919f670eb93b823

    SHA512

    4960950af609ce3b0dc0a621538f576d449f2b5c84455be7bf3df6e41ffdb4ec95f54d6b349a0c74bf2e31afb64837a153f465bcf0e24e2e121b79e0a7065d14

  • memory/2660-21-0x000007FEF5690000-0x000007FEF607C000-memory.dmp
    Filesize

    9.9MB

  • memory/2660-20-0x000007FEF5690000-0x000007FEF607C000-memory.dmp
    Filesize

    9.9MB

  • memory/2660-19-0x000007FEF5690000-0x000007FEF607C000-memory.dmp
    Filesize

    9.9MB

  • memory/2660-18-0x0000000000FB0000-0x0000000000FBA000-memory.dmp
    Filesize

    40KB

  • memory/2880-112-0x00000000021E0000-0x000000000221F000-memory.dmp
    Filesize

    252KB

  • memory/2880-88-0x00000000021E0000-0x000000000221F000-memory.dmp
    Filesize

    252KB

  • memory/2880-110-0x00000000021E0000-0x000000000221F000-memory.dmp
    Filesize

    252KB

  • memory/2880-108-0x00000000021E0000-0x000000000221F000-memory.dmp
    Filesize

    252KB

  • memory/2880-106-0x00000000021E0000-0x000000000221F000-memory.dmp
    Filesize

    252KB

  • memory/2880-102-0x00000000021E0000-0x000000000221F000-memory.dmp
    Filesize

    252KB

  • memory/2880-104-0x00000000021E0000-0x000000000221F000-memory.dmp
    Filesize

    252KB

  • memory/2880-100-0x00000000021E0000-0x000000000221F000-memory.dmp
    Filesize

    252KB

  • memory/2880-98-0x00000000021E0000-0x000000000221F000-memory.dmp
    Filesize

    252KB

  • memory/2880-96-0x00000000021E0000-0x000000000221F000-memory.dmp
    Filesize

    252KB

  • memory/2880-94-0x00000000021E0000-0x000000000221F000-memory.dmp
    Filesize

    252KB

  • memory/2880-92-0x00000000021E0000-0x000000000221F000-memory.dmp
    Filesize

    252KB

  • memory/2880-90-0x00000000021E0000-0x000000000221F000-memory.dmp
    Filesize

    252KB

  • memory/2880-114-0x00000000021E0000-0x000000000221F000-memory.dmp
    Filesize

    252KB

  • memory/2880-87-0x00000000021E0000-0x000000000221F000-memory.dmp
    Filesize

    252KB

  • memory/2880-83-0x0000000002110000-0x0000000002156000-memory.dmp
    Filesize

    280KB

  • memory/2880-85-0x00000000021E0000-0x0000000002224000-memory.dmp
    Filesize

    272KB

  • memory/2880-86-0x0000000000830000-0x000000000087B000-memory.dmp
    Filesize

    300KB

  • memory/2880-84-0x0000000000400000-0x00000000004C7000-memory.dmp
    Filesize

    796KB

  • memory/2880-82-0x0000000000260000-0x0000000000360000-memory.dmp
    Filesize

    1024KB

  • memory/2880-116-0x00000000021E0000-0x000000000221F000-memory.dmp
    Filesize

    252KB

  • memory/2880-118-0x00000000021E0000-0x000000000221F000-memory.dmp
    Filesize

    252KB

  • memory/2880-993-0x0000000000260000-0x0000000000360000-memory.dmp
    Filesize

    1024KB

  • memory/2880-995-0x00000000049C0000-0x0000000004A00000-memory.dmp
    Filesize

    256KB

  • memory/2880-997-0x00000000049C0000-0x0000000004A00000-memory.dmp
    Filesize

    256KB

  • memory/2952-33-0x0000000000270000-0x000000000029D000-memory.dmp
    Filesize

    180KB

  • memory/2952-71-0x00000000008E0000-0x00000000009E0000-memory.dmp
    Filesize

    1024KB

  • memory/2952-70-0x0000000000400000-0x00000000004B9000-memory.dmp
    Filesize

    740KB

  • memory/2952-66-0x0000000002330000-0x0000000002342000-memory.dmp
    Filesize

    72KB

  • memory/2952-68-0x0000000002330000-0x0000000002342000-memory.dmp
    Filesize

    72KB

  • memory/2952-62-0x0000000002330000-0x0000000002342000-memory.dmp
    Filesize

    72KB

  • memory/2952-64-0x0000000002330000-0x0000000002342000-memory.dmp
    Filesize

    72KB

  • memory/2952-58-0x0000000002330000-0x0000000002342000-memory.dmp
    Filesize

    72KB

  • memory/2952-60-0x0000000002330000-0x0000000002342000-memory.dmp
    Filesize

    72KB

  • memory/2952-54-0x0000000002330000-0x0000000002342000-memory.dmp
    Filesize

    72KB

  • memory/2952-56-0x0000000002330000-0x0000000002342000-memory.dmp
    Filesize

    72KB

  • memory/2952-52-0x0000000002330000-0x0000000002342000-memory.dmp
    Filesize

    72KB

  • memory/2952-48-0x0000000002330000-0x0000000002342000-memory.dmp
    Filesize

    72KB

  • memory/2952-50-0x0000000002330000-0x0000000002342000-memory.dmp
    Filesize

    72KB

  • memory/2952-46-0x0000000002330000-0x0000000002342000-memory.dmp
    Filesize

    72KB

  • memory/2952-44-0x0000000002330000-0x0000000002342000-memory.dmp
    Filesize

    72KB

  • memory/2952-42-0x0000000002330000-0x0000000002342000-memory.dmp
    Filesize

    72KB

  • memory/2952-41-0x0000000002330000-0x0000000002342000-memory.dmp
    Filesize

    72KB

  • memory/2952-40-0x0000000002330000-0x0000000002348000-memory.dmp
    Filesize

    96KB

  • memory/2952-39-0x0000000002310000-0x000000000232A000-memory.dmp
    Filesize

    104KB

  • memory/2952-37-0x0000000000400000-0x00000000004B9000-memory.dmp
    Filesize

    740KB

  • memory/2952-38-0x0000000000270000-0x000000000029D000-memory.dmp
    Filesize

    180KB

  • memory/2952-36-0x00000000008E0000-0x00000000009E0000-memory.dmp
    Filesize

    1024KB

  • memory/2952-35-0x0000000000400000-0x00000000004B9000-memory.dmp
    Filesize

    740KB

  • memory/2952-34-0x0000000000400000-0x00000000004B9000-memory.dmp
    Filesize

    740KB

  • memory/2952-32-0x00000000008E0000-0x00000000009E0000-memory.dmp
    Filesize

    1024KB