Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-11-2024 13:45

General

  • Target

    fc3de59498636a4cd9b697f2fa078037e4d69e4470c7d97049d30c2c5bf3e85e.exe

  • Size

    875KB

  • MD5

    1c554b64550fd91edf02aa244c3c92bb

  • SHA1

    208150956f636668db1c8f92be5f16b48f035466

  • SHA256

    fc3de59498636a4cd9b697f2fa078037e4d69e4470c7d97049d30c2c5bf3e85e

  • SHA512

    e9b7e702c7ea87b31786d232ff561deba624386a61f91366ae24f7bb3cac84b744bbe26b628286fbe72ef7d1243a8f83cf9b7aa60dbef9c80610fb6fdb52ab69

  • SSDEEP

    24576:PyVPjvuwLdrNUdT2hL1utQS1HSDJTeizDoP:aVbvuIxUshL1AHSdT

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Signatures

  • Detects Healer an antivirus disabler dropper 19 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fc3de59498636a4cd9b697f2fa078037e4d69e4470c7d97049d30c2c5bf3e85e.exe
    "C:\Users\Admin\AppData\Local\Temp\fc3de59498636a4cd9b697f2fa078037e4d69e4470c7d97049d30c2c5bf3e85e.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3680
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice9085.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice9085.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5072
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice3354.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice3354.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3928
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3009iF.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3009iF.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:856
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c30Po16.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c30Po16.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:772
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 772 -s 1036
            5⤵
            • Program crash
            PID:1432
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dOCmp49.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dOCmp49.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4420
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 772 -ip 772
    1⤵
      PID:1292

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice9085.exe

      Filesize

      731KB

      MD5

      cac18e6ffcb0aff970d1721f2e763619

      SHA1

      5488e590ea27f95f0381e6bead24196bedf4f6c1

      SHA256

      bd738e4eadce9615cea81ae4aa2a2fd2821cfbd8f0da72f37fc9e59df4934128

      SHA512

      a823156e30a803922c73d299845548a74e65c341cbe9f04c20e583b524340c7cae13da03b9dee4e2fffe234e34677f1f1d2bc7bea571c31e115e4a63a550682f

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dOCmp49.exe

      Filesize

      409KB

      MD5

      6c818ec8d3828554770537a6a2d0fe7d

      SHA1

      90cab6f36316d51363a3d80fc33d1699a404433f

      SHA256

      9cce3bf35f9a52533003b1c0519559e0806ec540ada13aea6c414c65a33bb588

      SHA512

      c0eb2a0ed73075eff446c6e05dcca814b63fc3dfd1769d646a40cfd1daf48e2c1ebc61f08c6f4bc07b8c2aa369cda4424b26adcf709f9a6263a4d622641649b5

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice3354.exe

      Filesize

      366KB

      MD5

      752536930b8c7e3092815baa5d889a5b

      SHA1

      9156a270f543c9c9e30ca83258b511d9b6239758

      SHA256

      ae243556ab9d490c0f9978d48df703740ab0a5ffc3f99d923acda206faa2566e

      SHA512

      0b3f32996686956ba327b134d17f25dbe2ae71dfcb6c0144cd974e4ce054aaa622cb7a093f3fe06bca633578d9b7be41996c9646f9873c79cb17c8bb4f984814

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3009iF.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c30Po16.exe

      Filesize

      351KB

      MD5

      40603ee9a465eb9d5eb53ae76f163963

      SHA1

      0ca5026a09120f0648a4619f7af3729c05e36a33

      SHA256

      c0edf7ca5a8482805d6f2fcd4e9cb4e165c1ea390e1fbf3c46aca419a221d098

      SHA512

      386d8a94cc263cc76dc24c3ffd5a04f05b346a8f8d1ecc14a2dad54025e017612c06624c22d1667f16a66831d5d24d233c010746cdbc9dcdcc21931b39249d30

    • memory/772-28-0x0000000004910000-0x000000000492A000-memory.dmp

      Filesize

      104KB

    • memory/772-29-0x00000000072D0000-0x0000000007874000-memory.dmp

      Filesize

      5.6MB

    • memory/772-30-0x0000000004AD0000-0x0000000004AE8000-memory.dmp

      Filesize

      96KB

    • memory/772-58-0x0000000004AD0000-0x0000000004AE2000-memory.dmp

      Filesize

      72KB

    • memory/772-57-0x0000000004AD0000-0x0000000004AE2000-memory.dmp

      Filesize

      72KB

    • memory/772-54-0x0000000004AD0000-0x0000000004AE2000-memory.dmp

      Filesize

      72KB

    • memory/772-52-0x0000000004AD0000-0x0000000004AE2000-memory.dmp

      Filesize

      72KB

    • memory/772-50-0x0000000004AD0000-0x0000000004AE2000-memory.dmp

      Filesize

      72KB

    • memory/772-48-0x0000000004AD0000-0x0000000004AE2000-memory.dmp

      Filesize

      72KB

    • memory/772-46-0x0000000004AD0000-0x0000000004AE2000-memory.dmp

      Filesize

      72KB

    • memory/772-44-0x0000000004AD0000-0x0000000004AE2000-memory.dmp

      Filesize

      72KB

    • memory/772-42-0x0000000004AD0000-0x0000000004AE2000-memory.dmp

      Filesize

      72KB

    • memory/772-40-0x0000000004AD0000-0x0000000004AE2000-memory.dmp

      Filesize

      72KB

    • memory/772-38-0x0000000004AD0000-0x0000000004AE2000-memory.dmp

      Filesize

      72KB

    • memory/772-36-0x0000000004AD0000-0x0000000004AE2000-memory.dmp

      Filesize

      72KB

    • memory/772-34-0x0000000004AD0000-0x0000000004AE2000-memory.dmp

      Filesize

      72KB

    • memory/772-32-0x0000000004AD0000-0x0000000004AE2000-memory.dmp

      Filesize

      72KB

    • memory/772-31-0x0000000004AD0000-0x0000000004AE2000-memory.dmp

      Filesize

      72KB

    • memory/772-59-0x0000000000400000-0x0000000002B1C000-memory.dmp

      Filesize

      39.1MB

    • memory/772-61-0x0000000000400000-0x0000000002B1C000-memory.dmp

      Filesize

      39.1MB

    • memory/856-21-0x00007FFE0B410000-0x00007FFE0B432000-memory.dmp

      Filesize

      136KB

    • memory/856-22-0x0000000000A40000-0x0000000000A4A000-memory.dmp

      Filesize

      40KB

    • memory/4420-66-0x0000000004C40000-0x0000000004C86000-memory.dmp

      Filesize

      280KB

    • memory/4420-67-0x0000000007140000-0x0000000007184000-memory.dmp

      Filesize

      272KB

    • memory/4420-68-0x0000000007140000-0x000000000717E000-memory.dmp

      Filesize

      248KB

    • memory/4420-73-0x0000000007140000-0x000000000717E000-memory.dmp

      Filesize

      248KB

    • memory/4420-79-0x0000000007140000-0x000000000717E000-memory.dmp

      Filesize

      248KB

    • memory/4420-101-0x0000000007140000-0x000000000717E000-memory.dmp

      Filesize

      248KB

    • memory/4420-99-0x0000000007140000-0x000000000717E000-memory.dmp

      Filesize

      248KB

    • memory/4420-97-0x0000000007140000-0x000000000717E000-memory.dmp

      Filesize

      248KB

    • memory/4420-95-0x0000000007140000-0x000000000717E000-memory.dmp

      Filesize

      248KB

    • memory/4420-93-0x0000000007140000-0x000000000717E000-memory.dmp

      Filesize

      248KB

    • memory/4420-92-0x0000000007140000-0x000000000717E000-memory.dmp

      Filesize

      248KB

    • memory/4420-89-0x0000000007140000-0x000000000717E000-memory.dmp

      Filesize

      248KB

    • memory/4420-87-0x0000000007140000-0x000000000717E000-memory.dmp

      Filesize

      248KB

    • memory/4420-85-0x0000000007140000-0x000000000717E000-memory.dmp

      Filesize

      248KB

    • memory/4420-83-0x0000000007140000-0x000000000717E000-memory.dmp

      Filesize

      248KB

    • memory/4420-81-0x0000000007140000-0x000000000717E000-memory.dmp

      Filesize

      248KB

    • memory/4420-77-0x0000000007140000-0x000000000717E000-memory.dmp

      Filesize

      248KB

    • memory/4420-75-0x0000000007140000-0x000000000717E000-memory.dmp

      Filesize

      248KB

    • memory/4420-71-0x0000000007140000-0x000000000717E000-memory.dmp

      Filesize

      248KB

    • memory/4420-69-0x0000000007140000-0x000000000717E000-memory.dmp

      Filesize

      248KB

    • memory/4420-974-0x0000000007830000-0x0000000007E48000-memory.dmp

      Filesize

      6.1MB

    • memory/4420-975-0x0000000007E50000-0x0000000007F5A000-memory.dmp

      Filesize

      1.0MB

    • memory/4420-976-0x0000000007250000-0x0000000007262000-memory.dmp

      Filesize

      72KB

    • memory/4420-977-0x0000000007F60000-0x0000000007F9C000-memory.dmp

      Filesize

      240KB

    • memory/4420-978-0x00000000080B0000-0x00000000080FC000-memory.dmp

      Filesize

      304KB