Analysis

  • max time kernel
    142s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 08:51

General

  • Target

    ee8d794e7445209380202361d1806e76c134333456f61d0d9f09634a2f35c1a7.exe

  • Size

    787KB

  • MD5

    6657a70eaebe08956c4195f0d6df0a5e

  • SHA1

    3b2589862df201638f020e08d7aefb9595958edf

  • SHA256

    ee8d794e7445209380202361d1806e76c134333456f61d0d9f09634a2f35c1a7

  • SHA512

    1bcd08aab3b7da40d1b1bb72455b47c868912e5069c25598ed090ae8361a106632c2a14c325da1f9485fc0a50958c41a87f200a524af056fc99bc4803a316553

  • SSDEEP

    12288:gMrwy90vT9VXx0pOi92QR/pLccXriflXb9QObNiBXz1qZurnk1Yz7u+OsEKL:AyeVBg/pLpX2lXbKTF10u7TOs/L

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Signatures

  • Detects Healer an antivirus disabler dropper 19 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ee8d794e7445209380202361d1806e76c134333456f61d0d9f09634a2f35c1a7.exe
    "C:\Users\Admin\AppData\Local\Temp\ee8d794e7445209380202361d1806e76c134333456f61d0d9f09634a2f35c1a7.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1580
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice2661.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice2661.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:396
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice7444.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice7444.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3400
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1537io.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1537io.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4400
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c92MD85.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c92MD85.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4668
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4668 -s 1080
            5⤵
            • Program crash
            PID:228
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dngFC10.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dngFC10.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:5016
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4668 -ip 4668
    1⤵
      PID:4480

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice2661.exe

      Filesize

      642KB

      MD5

      89fb94c9dd27e84c33f43a8522305cba

      SHA1

      e648dec167f182bd06ab6774c9a5f2f55f0fdbdd

      SHA256

      a76a18f4195a943de1e6f45e1b5a945c7b5883e21e2812ead998cb1e0d916829

      SHA512

      5c37a8665d9b87265c9a802562360d02635c0571e748022862d17c53188cf71d3f7da251e5921ba8b82de4392e1e2cbb57bf7f1339b6954a9ff12620f933b362

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dngFC10.exe

      Filesize

      295KB

      MD5

      45abd3f18349bcf745c30ed23c6c1b57

      SHA1

      4590f536a569de872901b213ff1be32c9b0906b4

      SHA256

      6578b6cae9d995a13684772d869c51bc07ff3d18fd644fe1f9d19d870adc46cd

      SHA512

      a3c34ab5a0bb9180aedce9f0dfff91dc74fdaabad4f1f50df57cd416a582033f10e8a145b27d296d30c7e20c00b83733aafc8a0fa957d6ec916fbb04fcc284b3

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice7444.exe

      Filesize

      322KB

      MD5

      be30a229dd8b4f35573aad6c6256fdef

      SHA1

      95f0688290131b0466dda63ea0584c7bd0a1fcaa

      SHA256

      cab4e46167b40b6a0203002f8e9523313831e930186e7262aebb9c7b1fa36809

      SHA512

      9d85e7c9071833ca38806cce83590c7290e27ecaa3e1cef90c5727f9c65a54eaa2feaca5f7431e71acb57bb738d4dbac3b3a21a19f28e83dd61a4fab9fb4e4d6

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1537io.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c92MD85.exe

      Filesize

      237KB

      MD5

      2d0740cec4b32f39f4d3bf505255e7e6

      SHA1

      250e29018499172e47809ff4b1cf187935bbfceb

      SHA256

      5841299acf274ebdb0bcb955c0964fe7a45db349b6e799ff73f59cfed618a6ff

      SHA512

      222f4ff7d9951526263ea2b31f687b704c7103c2ebadc4d4ec2914679c2def38a9412212df8662d42a643b249977f4ec802102c42a62b4ecf0ee216a1185d450

    • memory/4400-21-0x00007FFD4EE03000-0x00007FFD4EE05000-memory.dmp

      Filesize

      8KB

    • memory/4400-22-0x0000000000D20000-0x0000000000D2A000-memory.dmp

      Filesize

      40KB

    • memory/4400-23-0x00007FFD4EE03000-0x00007FFD4EE05000-memory.dmp

      Filesize

      8KB

    • memory/4668-60-0x0000000000400000-0x00000000004BA000-memory.dmp

      Filesize

      744KB

    • memory/4668-31-0x0000000002440000-0x0000000002458000-memory.dmp

      Filesize

      96KB

    • memory/4668-59-0x0000000002440000-0x0000000002452000-memory.dmp

      Filesize

      72KB

    • memory/4668-57-0x0000000002440000-0x0000000002452000-memory.dmp

      Filesize

      72KB

    • memory/4668-55-0x0000000002440000-0x0000000002452000-memory.dmp

      Filesize

      72KB

    • memory/4668-54-0x0000000002440000-0x0000000002452000-memory.dmp

      Filesize

      72KB

    • memory/4668-52-0x0000000002440000-0x0000000002452000-memory.dmp

      Filesize

      72KB

    • memory/4668-49-0x0000000002440000-0x0000000002452000-memory.dmp

      Filesize

      72KB

    • memory/4668-47-0x0000000002440000-0x0000000002452000-memory.dmp

      Filesize

      72KB

    • memory/4668-45-0x0000000002440000-0x0000000002452000-memory.dmp

      Filesize

      72KB

    • memory/4668-43-0x0000000002440000-0x0000000002452000-memory.dmp

      Filesize

      72KB

    • memory/4668-41-0x0000000002440000-0x0000000002452000-memory.dmp

      Filesize

      72KB

    • memory/4668-39-0x0000000002440000-0x0000000002452000-memory.dmp

      Filesize

      72KB

    • memory/4668-37-0x0000000002440000-0x0000000002452000-memory.dmp

      Filesize

      72KB

    • memory/4668-35-0x0000000002440000-0x0000000002452000-memory.dmp

      Filesize

      72KB

    • memory/4668-33-0x0000000002440000-0x0000000002452000-memory.dmp

      Filesize

      72KB

    • memory/4668-32-0x0000000002440000-0x0000000002452000-memory.dmp

      Filesize

      72KB

    • memory/4668-30-0x0000000004BC0000-0x0000000005164000-memory.dmp

      Filesize

      5.6MB

    • memory/4668-62-0x0000000000400000-0x00000000004BA000-memory.dmp

      Filesize

      744KB

    • memory/4668-29-0x0000000002160000-0x000000000217A000-memory.dmp

      Filesize

      104KB

    • memory/5016-84-0x00000000050A0000-0x00000000050DE000-memory.dmp

      Filesize

      248KB

    • memory/5016-81-0x00000000050A0000-0x00000000050DE000-memory.dmp

      Filesize

      248KB

    • memory/5016-78-0x00000000050A0000-0x00000000050DE000-memory.dmp

      Filesize

      248KB

    • memory/5016-67-0x0000000004A10000-0x0000000004A56000-memory.dmp

      Filesize

      280KB

    • memory/5016-102-0x00000000050A0000-0x00000000050DE000-memory.dmp

      Filesize

      248KB

    • memory/5016-100-0x00000000050A0000-0x00000000050DE000-memory.dmp

      Filesize

      248KB

    • memory/5016-98-0x00000000050A0000-0x00000000050DE000-memory.dmp

      Filesize

      248KB

    • memory/5016-96-0x00000000050A0000-0x00000000050DE000-memory.dmp

      Filesize

      248KB

    • memory/5016-94-0x00000000050A0000-0x00000000050DE000-memory.dmp

      Filesize

      248KB

    • memory/5016-92-0x00000000050A0000-0x00000000050DE000-memory.dmp

      Filesize

      248KB

    • memory/5016-90-0x00000000050A0000-0x00000000050DE000-memory.dmp

      Filesize

      248KB

    • memory/5016-86-0x00000000050A0000-0x00000000050DE000-memory.dmp

      Filesize

      248KB

    • memory/5016-82-0x00000000050A0000-0x00000000050DE000-memory.dmp

      Filesize

      248KB

    • memory/5016-68-0x00000000050A0000-0x00000000050E4000-memory.dmp

      Filesize

      272KB

    • memory/5016-76-0x00000000050A0000-0x00000000050DE000-memory.dmp

      Filesize

      248KB

    • memory/5016-74-0x00000000050A0000-0x00000000050DE000-memory.dmp

      Filesize

      248KB

    • memory/5016-88-0x00000000050A0000-0x00000000050DE000-memory.dmp

      Filesize

      248KB

    • memory/5016-72-0x00000000050A0000-0x00000000050DE000-memory.dmp

      Filesize

      248KB

    • memory/5016-70-0x00000000050A0000-0x00000000050DE000-memory.dmp

      Filesize

      248KB

    • memory/5016-69-0x00000000050A0000-0x00000000050DE000-memory.dmp

      Filesize

      248KB

    • memory/5016-975-0x0000000005100000-0x0000000005718000-memory.dmp

      Filesize

      6.1MB

    • memory/5016-976-0x00000000057A0000-0x00000000058AA000-memory.dmp

      Filesize

      1.0MB

    • memory/5016-977-0x00000000058E0000-0x00000000058F2000-memory.dmp

      Filesize

      72KB

    • memory/5016-978-0x0000000005900000-0x000000000593C000-memory.dmp

      Filesize

      240KB

    • memory/5016-979-0x0000000005A50000-0x0000000005A9C000-memory.dmp

      Filesize

      304KB