Analysis

  • max time kernel
    143s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-11-2024 13:40

General

  • Target

    fc3de59498636a4cd9b697f2fa078037e4d69e4470c7d97049d30c2c5bf3e85e.exe

  • Size

    875KB

  • MD5

    1c554b64550fd91edf02aa244c3c92bb

  • SHA1

    208150956f636668db1c8f92be5f16b48f035466

  • SHA256

    fc3de59498636a4cd9b697f2fa078037e4d69e4470c7d97049d30c2c5bf3e85e

  • SHA512

    e9b7e702c7ea87b31786d232ff561deba624386a61f91366ae24f7bb3cac84b744bbe26b628286fbe72ef7d1243a8f83cf9b7aa60dbef9c80610fb6fdb52ab69

  • SSDEEP

    24576:PyVPjvuwLdrNUdT2hL1utQS1HSDJTeizDoP:aVbvuIxUshL1AHSdT

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Signatures

  • Detects Healer an antivirus disabler dropper 19 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fc3de59498636a4cd9b697f2fa078037e4d69e4470c7d97049d30c2c5bf3e85e.exe
    "C:\Users\Admin\AppData\Local\Temp\fc3de59498636a4cd9b697f2fa078037e4d69e4470c7d97049d30c2c5bf3e85e.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4508
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice9085.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice9085.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3736
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice3354.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice3354.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3636
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3009iF.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3009iF.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2012
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c30Po16.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c30Po16.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3452
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3452 -s 1080
            5⤵
            • Program crash
            PID:2344
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dOCmp49.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dOCmp49.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:920
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3452 -ip 3452
    1⤵
      PID:3280
    • C:\Windows\system32\sc.exe
      C:\Windows\system32\sc.exe start wuauserv
      1⤵
      • Launches sc.exe
      PID:2984

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice9085.exe

      Filesize

      731KB

      MD5

      cac18e6ffcb0aff970d1721f2e763619

      SHA1

      5488e590ea27f95f0381e6bead24196bedf4f6c1

      SHA256

      bd738e4eadce9615cea81ae4aa2a2fd2821cfbd8f0da72f37fc9e59df4934128

      SHA512

      a823156e30a803922c73d299845548a74e65c341cbe9f04c20e583b524340c7cae13da03b9dee4e2fffe234e34677f1f1d2bc7bea571c31e115e4a63a550682f

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dOCmp49.exe

      Filesize

      409KB

      MD5

      6c818ec8d3828554770537a6a2d0fe7d

      SHA1

      90cab6f36316d51363a3d80fc33d1699a404433f

      SHA256

      9cce3bf35f9a52533003b1c0519559e0806ec540ada13aea6c414c65a33bb588

      SHA512

      c0eb2a0ed73075eff446c6e05dcca814b63fc3dfd1769d646a40cfd1daf48e2c1ebc61f08c6f4bc07b8c2aa369cda4424b26adcf709f9a6263a4d622641649b5

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice3354.exe

      Filesize

      366KB

      MD5

      752536930b8c7e3092815baa5d889a5b

      SHA1

      9156a270f543c9c9e30ca83258b511d9b6239758

      SHA256

      ae243556ab9d490c0f9978d48df703740ab0a5ffc3f99d923acda206faa2566e

      SHA512

      0b3f32996686956ba327b134d17f25dbe2ae71dfcb6c0144cd974e4ce054aaa622cb7a093f3fe06bca633578d9b7be41996c9646f9873c79cb17c8bb4f984814

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3009iF.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c30Po16.exe

      Filesize

      351KB

      MD5

      40603ee9a465eb9d5eb53ae76f163963

      SHA1

      0ca5026a09120f0648a4619f7af3729c05e36a33

      SHA256

      c0edf7ca5a8482805d6f2fcd4e9cb4e165c1ea390e1fbf3c46aca419a221d098

      SHA512

      386d8a94cc263cc76dc24c3ffd5a04f05b346a8f8d1ecc14a2dad54025e017612c06624c22d1667f16a66831d5d24d233c010746cdbc9dcdcc21931b39249d30

    • memory/920-74-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

      Filesize

      248KB

    • memory/920-78-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

      Filesize

      248KB

    • memory/920-979-0x00000000072C0000-0x000000000730C000-memory.dmp

      Filesize

      304KB

    • memory/920-978-0x0000000007270000-0x00000000072AC000-memory.dmp

      Filesize

      240KB

    • memory/920-977-0x0000000007250000-0x0000000007262000-memory.dmp

      Filesize

      72KB

    • memory/920-976-0x0000000007F00000-0x000000000800A000-memory.dmp

      Filesize

      1.0MB

    • memory/920-975-0x00000000078E0000-0x0000000007EF8000-memory.dmp

      Filesize

      6.1MB

    • memory/920-69-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

      Filesize

      248KB

    • memory/920-100-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

      Filesize

      248KB

    • memory/920-70-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

      Filesize

      248KB

    • memory/920-72-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

      Filesize

      248KB

    • memory/920-98-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

      Filesize

      248KB

    • memory/920-76-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

      Filesize

      248KB

    • memory/920-102-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

      Filesize

      248KB

    • memory/920-80-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

      Filesize

      248KB

    • memory/920-84-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

      Filesize

      248KB

    • memory/920-86-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

      Filesize

      248KB

    • memory/920-88-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

      Filesize

      248KB

    • memory/920-90-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

      Filesize

      248KB

    • memory/920-92-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

      Filesize

      248KB

    • memory/920-94-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

      Filesize

      248KB

    • memory/920-82-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

      Filesize

      248KB

    • memory/920-96-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

      Filesize

      248KB

    • memory/920-67-0x0000000004AE0000-0x0000000004B26000-memory.dmp

      Filesize

      280KB

    • memory/920-68-0x0000000004CD0000-0x0000000004D14000-memory.dmp

      Filesize

      272KB

    • memory/2012-21-0x00007FFAAFA73000-0x00007FFAAFA75000-memory.dmp

      Filesize

      8KB

    • memory/2012-23-0x00007FFAAFA73000-0x00007FFAAFA75000-memory.dmp

      Filesize

      8KB

    • memory/2012-22-0x0000000000A30000-0x0000000000A3A000-memory.dmp

      Filesize

      40KB

    • memory/3452-58-0x00000000070D0000-0x00000000070E2000-memory.dmp

      Filesize

      72KB

    • memory/3452-62-0x0000000000400000-0x0000000002B1C000-memory.dmp

      Filesize

      39.1MB

    • memory/3452-60-0x0000000000400000-0x0000000002B1C000-memory.dmp

      Filesize

      39.1MB

    • memory/3452-32-0x00000000070D0000-0x00000000070E2000-memory.dmp

      Filesize

      72KB

    • memory/3452-37-0x00000000070D0000-0x00000000070E2000-memory.dmp

      Filesize

      72KB

    • memory/3452-39-0x00000000070D0000-0x00000000070E2000-memory.dmp

      Filesize

      72KB

    • memory/3452-41-0x00000000070D0000-0x00000000070E2000-memory.dmp

      Filesize

      72KB

    • memory/3452-43-0x00000000070D0000-0x00000000070E2000-memory.dmp

      Filesize

      72KB

    • memory/3452-46-0x00000000070D0000-0x00000000070E2000-memory.dmp

      Filesize

      72KB

    • memory/3452-48-0x00000000070D0000-0x00000000070E2000-memory.dmp

      Filesize

      72KB

    • memory/3452-49-0x00000000070D0000-0x00000000070E2000-memory.dmp

      Filesize

      72KB

    • memory/3452-51-0x00000000070D0000-0x00000000070E2000-memory.dmp

      Filesize

      72KB

    • memory/3452-53-0x00000000070D0000-0x00000000070E2000-memory.dmp

      Filesize

      72KB

    • memory/3452-55-0x00000000070D0000-0x00000000070E2000-memory.dmp

      Filesize

      72KB

    • memory/3452-59-0x00000000070D0000-0x00000000070E2000-memory.dmp

      Filesize

      72KB

    • memory/3452-35-0x00000000070D0000-0x00000000070E2000-memory.dmp

      Filesize

      72KB

    • memory/3452-33-0x00000000070D0000-0x00000000070E2000-memory.dmp

      Filesize

      72KB

    • memory/3452-31-0x00000000070D0000-0x00000000070E8000-memory.dmp

      Filesize

      96KB

    • memory/3452-30-0x0000000007170000-0x0000000007714000-memory.dmp

      Filesize

      5.6MB

    • memory/3452-29-0x00000000048B0000-0x00000000048CA000-memory.dmp

      Filesize

      104KB