Analysis

  • max time kernel
    142s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/11/2024, 23:40

General

  • Target

    da39b3e3dfa2ce5647452d8fcfc3d0dd5716c0ff00b323c5c3e4c6ca0e24c377.exe

  • Size

    792KB

  • MD5

    5363388ad930e7f40d7deb7cfc00762a

  • SHA1

    14159b03fcc8f023e05a9d48ec0b4f6afa466eaf

  • SHA256

    da39b3e3dfa2ce5647452d8fcfc3d0dd5716c0ff00b323c5c3e4c6ca0e24c377

  • SHA512

    1d8f9673139402ccdab0ac34a085ed74b28962e2681633b1b71a048890d6c37427491e61a5ec0f1c33d2e963f8d3bb516601b94e6dd27377d1a11a906572705c

  • SSDEEP

    12288:GMrqy90zo7SwHxiSFWSA3hWZGkw+0DhKgjNG54cmm/qPw8ZjzkAR6xNzHgBs:8yHP4SMSUhOzL0FKSkH/owVNxFHge

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Signatures

  • Detects Healer an antivirus disabler dropper 19 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\da39b3e3dfa2ce5647452d8fcfc3d0dd5716c0ff00b323c5c3e4c6ca0e24c377.exe
    "C:\Users\Admin\AppData\Local\Temp\da39b3e3dfa2ce5647452d8fcfc3d0dd5716c0ff00b323c5c3e4c6ca0e24c377.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1044
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice2838.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice2838.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1608
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice1917.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice1917.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3840
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8798Ot.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8798Ot.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4220
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c56gM65.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c56gM65.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2744
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2744 -s 1096
            5⤵
            • Program crash
            PID:3988
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dBxPK64.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dBxPK64.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:3584
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2744 -ip 2744
    1⤵
      PID:4700

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice2838.exe

      Filesize

      647KB

      MD5

      436de9fbd1a6c915a7c02b9f81242b91

      SHA1

      d0a1837039f610d64dd72201e0d19f217b34d237

      SHA256

      a3be6da2fae8cbe466606513827dfe4558d12f6a9c8c127c049f97d5adbdc5b5

      SHA512

      9073054803a394014836bae2cfb228c7353770f9237a4908efcbd42e6a217aa56c05644b09ba419c036de1f2898d5f151a70a6b2e79db4d2e96c6a93396870da

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dBxPK64.exe

      Filesize

      284KB

      MD5

      ab6d6898a6958fee5b77a717afcc660b

      SHA1

      203b4bc9db24e8ca6b1005e9b52720a1392ecc21

      SHA256

      c41fd4a72cfeba96441592a326b77f8296a7d7e0ababd07d6413f3aa90019a9a

      SHA512

      4b7740c90b61729724f85b9175cd1b1566bd802655dbc9a37de770a4c6aed0dbc60b383077e0da93374f6fd9edfb711c74852b430964fe7546a8911a3ce8d953

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice1917.exe

      Filesize

      324KB

      MD5

      1985c94af22774e0436014f7506aeb03

      SHA1

      660fa64d6af05fbc42897861222da65c70e740f0

      SHA256

      ac20a25bd82ec879755b124246b75ede2a11690de66efd2fe414afbf5eef3135

      SHA512

      1b0c2834e7b36392192b657e36e7441b15bd7160dd25292e7d739c9479e1dc03a51616858e74bd63bcba49d53d74a2636eb577af7bb1558ad826df9104a5fa52

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8798Ot.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c56gM65.exe

      Filesize

      226KB

      MD5

      20f3b41f04c51cb3654c8016c06cbc9e

      SHA1

      43757a2cbe66d1a10f1cdc2dc579a4f21e412c5a

      SHA256

      6ed423d20a68e237b44882a020ebd2acf00e78909ca81b6fe1384aa9ac90b854

      SHA512

      b3f558072577bcd0e3cddf8e7edccba3c333b1404b0c5e324bc9933d45beec9b097ab6e4fb99a87ce7c0edce6859ecb526202b3ce20856e79bd4b1c6df78c305

    • memory/2744-60-0x0000000000400000-0x00000000004B8000-memory.dmp

      Filesize

      736KB

    • memory/2744-51-0x00000000024E0000-0x00000000024F2000-memory.dmp

      Filesize

      72KB

    • memory/2744-29-0x0000000002140000-0x000000000215A000-memory.dmp

      Filesize

      104KB

    • memory/2744-30-0x0000000004D90000-0x0000000005334000-memory.dmp

      Filesize

      5.6MB

    • memory/2744-31-0x00000000024E0000-0x00000000024F8000-memory.dmp

      Filesize

      96KB

    • memory/2744-43-0x00000000024E0000-0x00000000024F2000-memory.dmp

      Filesize

      72KB

    • memory/2744-59-0x00000000024E0000-0x00000000024F2000-memory.dmp

      Filesize

      72KB

    • memory/2744-58-0x00000000024E0000-0x00000000024F2000-memory.dmp

      Filesize

      72KB

    • memory/2744-55-0x00000000024E0000-0x00000000024F2000-memory.dmp

      Filesize

      72KB

    • memory/2744-53-0x00000000024E0000-0x00000000024F2000-memory.dmp

      Filesize

      72KB

    • memory/2744-62-0x0000000000400000-0x00000000004B8000-memory.dmp

      Filesize

      736KB

    • memory/2744-49-0x00000000024E0000-0x00000000024F2000-memory.dmp

      Filesize

      72KB

    • memory/2744-47-0x00000000024E0000-0x00000000024F2000-memory.dmp

      Filesize

      72KB

    • memory/2744-46-0x00000000024E0000-0x00000000024F2000-memory.dmp

      Filesize

      72KB

    • memory/2744-42-0x00000000024E0000-0x00000000024F2000-memory.dmp

      Filesize

      72KB

    • memory/2744-39-0x00000000024E0000-0x00000000024F2000-memory.dmp

      Filesize

      72KB

    • memory/2744-38-0x00000000024E0000-0x00000000024F2000-memory.dmp

      Filesize

      72KB

    • memory/2744-35-0x00000000024E0000-0x00000000024F2000-memory.dmp

      Filesize

      72KB

    • memory/2744-33-0x00000000024E0000-0x00000000024F2000-memory.dmp

      Filesize

      72KB

    • memory/2744-32-0x00000000024E0000-0x00000000024F2000-memory.dmp

      Filesize

      72KB

    • memory/3584-78-0x00000000050A0000-0x00000000050DE000-memory.dmp

      Filesize

      248KB

    • memory/3584-975-0x0000000005100000-0x0000000005718000-memory.dmp

      Filesize

      6.1MB

    • memory/3584-979-0x0000000005A50000-0x0000000005A9C000-memory.dmp

      Filesize

      304KB

    • memory/3584-978-0x0000000005900000-0x000000000593C000-memory.dmp

      Filesize

      240KB

    • memory/3584-85-0x00000000050A0000-0x00000000050DE000-memory.dmp

      Filesize

      248KB

    • memory/3584-72-0x00000000050A0000-0x00000000050DE000-memory.dmp

      Filesize

      248KB

    • memory/3584-102-0x00000000050A0000-0x00000000050DE000-memory.dmp

      Filesize

      248KB

    • memory/3584-101-0x00000000050A0000-0x00000000050DE000-memory.dmp

      Filesize

      248KB

    • memory/3584-98-0x00000000050A0000-0x00000000050DE000-memory.dmp

      Filesize

      248KB

    • memory/3584-97-0x00000000050A0000-0x00000000050DE000-memory.dmp

      Filesize

      248KB

    • memory/3584-94-0x00000000050A0000-0x00000000050DE000-memory.dmp

      Filesize

      248KB

    • memory/3584-92-0x00000000050A0000-0x00000000050DE000-memory.dmp

      Filesize

      248KB

    • memory/3584-67-0x0000000002410000-0x0000000002456000-memory.dmp

      Filesize

      280KB

    • memory/3584-90-0x00000000050A0000-0x00000000050DE000-memory.dmp

      Filesize

      248KB

    • memory/3584-68-0x00000000050A0000-0x00000000050E4000-memory.dmp

      Filesize

      272KB

    • memory/3584-89-0x00000000050A0000-0x00000000050DE000-memory.dmp

      Filesize

      248KB

    • memory/3584-82-0x00000000050A0000-0x00000000050DE000-memory.dmp

      Filesize

      248KB

    • memory/3584-81-0x00000000050A0000-0x00000000050DE000-memory.dmp

      Filesize

      248KB

    • memory/3584-86-0x00000000050A0000-0x00000000050DE000-memory.dmp

      Filesize

      248KB

    • memory/3584-76-0x00000000050A0000-0x00000000050DE000-memory.dmp

      Filesize

      248KB

    • memory/3584-74-0x00000000050A0000-0x00000000050DE000-memory.dmp

      Filesize

      248KB

    • memory/3584-70-0x00000000050A0000-0x00000000050DE000-memory.dmp

      Filesize

      248KB

    • memory/3584-69-0x00000000050A0000-0x00000000050DE000-memory.dmp

      Filesize

      248KB

    • memory/3584-977-0x00000000058E0000-0x00000000058F2000-memory.dmp

      Filesize

      72KB

    • memory/3584-976-0x00000000057A0000-0x00000000058AA000-memory.dmp

      Filesize

      1.0MB

    • memory/4220-22-0x0000000000410000-0x000000000041A000-memory.dmp

      Filesize

      40KB

    • memory/4220-21-0x00007FFF14CB3000-0x00007FFF14CB5000-memory.dmp

      Filesize

      8KB

    • memory/4220-23-0x00007FFF14CB3000-0x00007FFF14CB5000-memory.dmp

      Filesize

      8KB