Analysis

  • max time kernel
    112s
  • max time network
    118s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-11-2024 04:58

General

  • Target

    23547efe8bffd9f0d9b1baab4d9fa4f9c615be1f3b3223f45fa1cbfa6e997335.exe

  • Size

    644KB

  • MD5

    7166dc838dc38ed47eecd53c920ad9e6

  • SHA1

    4435c3ab3743604cb21576ae062f6f8955b09e09

  • SHA256

    23547efe8bffd9f0d9b1baab4d9fa4f9c615be1f3b3223f45fa1cbfa6e997335

  • SHA512

    273b1ab2373bb93442e83013118b0a6ece84b248fb4cff964aabd6488cc0d3689689e8a1bba0472ed444930d5e225fd8fbe4407d69c0aab7779d2c376b07c310

  • SSDEEP

    12288:SMrBy90NNQnu+qHggW6Wl6ESPamUK/ZUpdvlLOgUTMEEO4l:ry1nufTWO6mUK/ZmLOdEO4l

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Signatures

  • Detects Healer an antivirus disabler dropper 19 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 4 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\23547efe8bffd9f0d9b1baab4d9fa4f9c615be1f3b3223f45fa1cbfa6e997335.exe
    "C:\Users\Admin\AppData\Local\Temp\23547efe8bffd9f0d9b1baab4d9fa4f9c615be1f3b3223f45fa1cbfa6e997335.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1384
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice1909.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice1909.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1168
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b2564Sp.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b2564Sp.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:628
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c84Yb20.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c84Yb20.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5104
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5104 -s 1080
          4⤵
          • Program crash
          PID:1012
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dMxPs63.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dMxPs63.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2936
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5104 -ip 5104
    1⤵
      PID:4152

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dMxPs63.exe

      Filesize

      296KB

      MD5

      5d0933bbed890a1fdf4d8a88b5b893a4

      SHA1

      4a356bbb2e79443a166dcb32487de0b5dc4bdf16

      SHA256

      c4d558f0c35836f09ddf522ce0e7d435d1ab0695cfe779fbc2157e2353c63d4c

      SHA512

      7da5d6d7af47765e88a9b6572573ae992772943e988f7d22ef77705b19384b96d76e56cb0a90c7fc45395958955c83c7a2fc786fb76bab3b0d69501b904177c5

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice1909.exe

      Filesize

      322KB

      MD5

      769274192aaf92d0912dc336ba969eec

      SHA1

      eee5f2c3a64270c377ca1d6ad5ba6a4502aafe50

      SHA256

      8bb8034504b3c95357373c660447d32c6e583b4fe64b4061ef07150687140938

      SHA512

      f6d2924eb3a6a6e540649bbb0a0099166d06e899b5feb205760c5a2faf653eb60b35095791be8058c585d04ec1931c827b5459eccaa6d7b2a1bc2b7379dbcbd6

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b2564Sp.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c84Yb20.exe

      Filesize

      239KB

      MD5

      172f0abd0d0f0a38325054107860e303

      SHA1

      be0555b6e5ecf512c8a14cefca5c53d50725304b

      SHA256

      65f45a919b839db7b0f16c26ee43f6ea29798c2afe4e16935f9faf5dff50cb49

      SHA512

      03baec5c6f0f3d55d6c14d1af7f62cb0b8f63e57b877fc62d33781ef06e1ea35b4c794f9d5c5fb3e6cc6879d9b9f40d125e5effc4920a8e7b334864fdfaf639d

    • memory/628-15-0x0000000000910000-0x000000000091A000-memory.dmp

      Filesize

      40KB

    • memory/628-14-0x00007FFB24F23000-0x00007FFB24F25000-memory.dmp

      Filesize

      8KB

    • memory/2936-86-0x0000000004AE0000-0x0000000004B1E000-memory.dmp

      Filesize

      248KB

    • memory/2936-74-0x0000000004AE0000-0x0000000004B1E000-memory.dmp

      Filesize

      248KB

    • memory/2936-968-0x00000000057F0000-0x00000000058FA000-memory.dmp

      Filesize

      1.0MB

    • memory/2936-967-0x00000000051D0000-0x00000000057E8000-memory.dmp

      Filesize

      6.1MB

    • memory/2936-61-0x0000000004AE0000-0x0000000004B1E000-memory.dmp

      Filesize

      248KB

    • memory/2936-62-0x0000000004AE0000-0x0000000004B1E000-memory.dmp

      Filesize

      248KB

    • memory/2936-970-0x0000000005900000-0x000000000593C000-memory.dmp

      Filesize

      240KB

    • memory/2936-64-0x0000000004AE0000-0x0000000004B1E000-memory.dmp

      Filesize

      248KB

    • memory/2936-92-0x0000000004AE0000-0x0000000004B1E000-memory.dmp

      Filesize

      248KB

    • memory/2936-66-0x0000000004AE0000-0x0000000004B1E000-memory.dmp

      Filesize

      248KB

    • memory/2936-68-0x0000000004AE0000-0x0000000004B1E000-memory.dmp

      Filesize

      248KB

    • memory/2936-70-0x0000000004AE0000-0x0000000004B1E000-memory.dmp

      Filesize

      248KB

    • memory/2936-72-0x0000000004AE0000-0x0000000004B1E000-memory.dmp

      Filesize

      248KB

    • memory/2936-969-0x0000000004BF0000-0x0000000004C02000-memory.dmp

      Filesize

      72KB

    • memory/2936-76-0x0000000004AE0000-0x0000000004B1E000-memory.dmp

      Filesize

      248KB

    • memory/2936-82-0x0000000004AE0000-0x0000000004B1E000-memory.dmp

      Filesize

      248KB

    • memory/2936-84-0x0000000004AE0000-0x0000000004B1E000-memory.dmp

      Filesize

      248KB

    • memory/2936-88-0x0000000004AE0000-0x0000000004B1E000-memory.dmp

      Filesize

      248KB

    • memory/2936-90-0x0000000004AE0000-0x0000000004B1E000-memory.dmp

      Filesize

      248KB

    • memory/2936-971-0x0000000005A50000-0x0000000005A9C000-memory.dmp

      Filesize

      304KB

    • memory/2936-59-0x00000000025C0000-0x0000000002606000-memory.dmp

      Filesize

      280KB

    • memory/2936-60-0x0000000004AE0000-0x0000000004B24000-memory.dmp

      Filesize

      272KB

    • memory/2936-78-0x0000000004AE0000-0x0000000004B1E000-memory.dmp

      Filesize

      248KB

    • memory/2936-80-0x0000000004AE0000-0x0000000004B1E000-memory.dmp

      Filesize

      248KB

    • memory/2936-94-0x0000000004AE0000-0x0000000004B1E000-memory.dmp

      Filesize

      248KB

    • memory/5104-49-0x0000000002500000-0x0000000002512000-memory.dmp

      Filesize

      72KB

    • memory/5104-54-0x0000000000400000-0x00000000004BC000-memory.dmp

      Filesize

      752KB

    • memory/5104-52-0x0000000000400000-0x00000000004BC000-memory.dmp

      Filesize

      752KB

    • memory/5104-25-0x0000000002500000-0x0000000002512000-memory.dmp

      Filesize

      72KB

    • memory/5104-29-0x0000000002500000-0x0000000002512000-memory.dmp

      Filesize

      72KB

    • memory/5104-33-0x0000000002500000-0x0000000002512000-memory.dmp

      Filesize

      72KB

    • memory/5104-35-0x0000000002500000-0x0000000002512000-memory.dmp

      Filesize

      72KB

    • memory/5104-37-0x0000000002500000-0x0000000002512000-memory.dmp

      Filesize

      72KB

    • memory/5104-27-0x0000000002500000-0x0000000002512000-memory.dmp

      Filesize

      72KB

    • memory/5104-39-0x0000000002500000-0x0000000002512000-memory.dmp

      Filesize

      72KB

    • memory/5104-41-0x0000000002500000-0x0000000002512000-memory.dmp

      Filesize

      72KB

    • memory/5104-43-0x0000000002500000-0x0000000002512000-memory.dmp

      Filesize

      72KB

    • memory/5104-46-0x0000000002500000-0x0000000002512000-memory.dmp

      Filesize

      72KB

    • memory/5104-51-0x0000000002500000-0x0000000002512000-memory.dmp

      Filesize

      72KB

    • memory/5104-48-0x0000000002500000-0x0000000002512000-memory.dmp

      Filesize

      72KB

    • memory/5104-31-0x0000000002500000-0x0000000002512000-memory.dmp

      Filesize

      72KB

    • memory/5104-24-0x0000000002500000-0x0000000002512000-memory.dmp

      Filesize

      72KB

    • memory/5104-23-0x0000000002500000-0x0000000002518000-memory.dmp

      Filesize

      96KB

    • memory/5104-22-0x0000000004C70000-0x0000000005214000-memory.dmp

      Filesize

      5.6MB

    • memory/5104-21-0x0000000002060000-0x000000000207A000-memory.dmp

      Filesize

      104KB