Analysis

  • max time kernel
    112s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-11-2024 03:30

General

  • Target

    e20017b54b1b0e66603a0370c57d0dd52b616c4149bccf26cd8415cbfbcd487fN.exe

  • Size

    791KB

  • MD5

    735fbb4ec03473f2adfb5396424a5190

  • SHA1

    238f67fce9cab79ee85f66579e6ab4963a10cd50

  • SHA256

    e20017b54b1b0e66603a0370c57d0dd52b616c4149bccf26cd8415cbfbcd487f

  • SHA512

    4efb7dcd362c8d460e4e3d47330359f0909af1b14a8d3509004cfd5732ce9153ebdb0fa9d8806f9ec89dcb8f0425ef82d5b9f940652592c435fdee8b149100ac

  • SSDEEP

    24576:QytdsEHDUBfHQwJSQGI7+kuirGF9RdGkNkW6Y:XtqEjUq1w+kbGF9RrN

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Signatures

  • Detects Healer an antivirus disabler dropper 19 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e20017b54b1b0e66603a0370c57d0dd52b616c4149bccf26cd8415cbfbcd487fN.exe
    "C:\Users\Admin\AppData\Local\Temp\e20017b54b1b0e66603a0370c57d0dd52b616c4149bccf26cd8415cbfbcd487fN.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1136
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice7849.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice7849.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2844
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice5418.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice5418.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1828
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7876ws.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7876ws.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4088
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c58ll15.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c58ll15.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2224
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2224 -s 1016
            5⤵
            • Program crash
            PID:3224
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dmBLg82.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dmBLg82.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:236
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2224 -ip 2224
    1⤵
      PID:2188

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice7849.exe

      Filesize

      646KB

      MD5

      2c7a5c0d1311e535bd4d4c3c9774746c

      SHA1

      a41b4baf923a46c80166825e4557079310b610e3

      SHA256

      3a3f6a6bb59bc915b55180523e86932c48b9ee2fbca4c87d60f50a7fd32baf73

      SHA512

      1581d54b2250f9274064226afa60d7782211f2ad26a6d723a7831fa86b3ca3952f9756bc2ef357e49197a6e05e4225e70a38397ba1f96989e27e7a8597dcfdb8

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dmBLg82.exe

      Filesize

      283KB

      MD5

      9597db5acee85cd9b14830c80a7c74c5

      SHA1

      3a06dfd7a8b157c954707bc9f0febe42b379991b

      SHA256

      41247c227b8d7536e6bbda19287667d61ad3923f24e405e0d121d59188eaeabd

      SHA512

      c47d97215ab38354d6c0d9e58aedc59612bc1b289f7299d8c0ad43bee8b0f9e112b2de89e6e1da3d5141905b593891a2ca999c2d38b0a8fbfd8f2a32840f52a7

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice5418.exe

      Filesize

      323KB

      MD5

      ab10b64811f7dd9887bab4546d2eb49e

      SHA1

      c69fdcc69212ab7c2e510c286c1a829a19d4123c

      SHA256

      051ddec421c34ff5fc8d8529555dd4c9cb7d53fe38588e43cf4c63a36590af1c

      SHA512

      896dd9df9e9fed66d4ec869f66e137d19377c4a6db892ac8c7469f8f5fc6e05fd6ce0ddbe16c32c38d87a29cff155bd977d2a6f8b559656ecdb1d16a257e9834

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7876ws.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c58ll15.exe

      Filesize

      225KB

      MD5

      0e584af557fc09913ece1e2d4f91e818

      SHA1

      2b1713ab49449c222b0bbf40312e3294945258fd

      SHA256

      47fac8e4e755aa87515da4e3d2cad133a8d3b6d42054b9cc9a83b3e4ac08e5be

      SHA512

      feacacb7a999d83c74907ff64b405e6ca194133e8227b297ba542c324c4097c42fd8cdfc666b61401a87c9185011f835b31c12a766713541cf6f36441452da79

    • memory/236-74-0x0000000004AC0000-0x0000000004AFE000-memory.dmp

      Filesize

      248KB

    • memory/236-82-0x0000000004AC0000-0x0000000004AFE000-memory.dmp

      Filesize

      248KB

    • memory/236-976-0x00000000057E0000-0x00000000058EA000-memory.dmp

      Filesize

      1.0MB

    • memory/236-975-0x00000000051C0000-0x00000000057D8000-memory.dmp

      Filesize

      6.1MB

    • memory/236-69-0x0000000004AC0000-0x0000000004AFE000-memory.dmp

      Filesize

      248KB

    • memory/236-94-0x0000000004AC0000-0x0000000004AFE000-memory.dmp

      Filesize

      248KB

    • memory/236-70-0x0000000004AC0000-0x0000000004AFE000-memory.dmp

      Filesize

      248KB

    • memory/236-72-0x0000000004AC0000-0x0000000004AFE000-memory.dmp

      Filesize

      248KB

    • memory/236-978-0x0000000005910000-0x000000000594C000-memory.dmp

      Filesize

      240KB

    • memory/236-90-0x0000000004AC0000-0x0000000004AFE000-memory.dmp

      Filesize

      248KB

    • memory/236-76-0x0000000004AC0000-0x0000000004AFE000-memory.dmp

      Filesize

      248KB

    • memory/236-78-0x0000000004AC0000-0x0000000004AFE000-memory.dmp

      Filesize

      248KB

    • memory/236-80-0x0000000004AC0000-0x0000000004AFE000-memory.dmp

      Filesize

      248KB

    • memory/236-977-0x00000000058F0000-0x0000000005902000-memory.dmp

      Filesize

      72KB

    • memory/236-84-0x0000000004AC0000-0x0000000004AFE000-memory.dmp

      Filesize

      248KB

    • memory/236-86-0x0000000004AC0000-0x0000000004AFE000-memory.dmp

      Filesize

      248KB

    • memory/236-88-0x0000000004AC0000-0x0000000004AFE000-memory.dmp

      Filesize

      248KB

    • memory/236-92-0x0000000004AC0000-0x0000000004AFE000-memory.dmp

      Filesize

      248KB

    • memory/236-96-0x0000000004AC0000-0x0000000004AFE000-memory.dmp

      Filesize

      248KB

    • memory/236-98-0x0000000004AC0000-0x0000000004AFE000-memory.dmp

      Filesize

      248KB

    • memory/236-100-0x0000000004AC0000-0x0000000004AFE000-memory.dmp

      Filesize

      248KB

    • memory/236-102-0x0000000004AC0000-0x0000000004AFE000-memory.dmp

      Filesize

      248KB

    • memory/236-979-0x0000000005A50000-0x0000000005A9C000-memory.dmp

      Filesize

      304KB

    • memory/236-67-0x00000000024F0000-0x0000000002536000-memory.dmp

      Filesize

      280KB

    • memory/236-68-0x0000000004AC0000-0x0000000004B04000-memory.dmp

      Filesize

      272KB

    • memory/2224-55-0x0000000004A60000-0x0000000004A72000-memory.dmp

      Filesize

      72KB

    • memory/2224-62-0x0000000000400000-0x00000000004B8000-memory.dmp

      Filesize

      736KB

    • memory/2224-60-0x0000000000400000-0x00000000004B8000-memory.dmp

      Filesize

      736KB

    • memory/2224-39-0x0000000004A60000-0x0000000004A72000-memory.dmp

      Filesize

      72KB

    • memory/2224-33-0x0000000004A60000-0x0000000004A72000-memory.dmp

      Filesize

      72KB

    • memory/2224-37-0x0000000004A60000-0x0000000004A72000-memory.dmp

      Filesize

      72KB

    • memory/2224-41-0x0000000004A60000-0x0000000004A72000-memory.dmp

      Filesize

      72KB

    • memory/2224-59-0x0000000004A60000-0x0000000004A72000-memory.dmp

      Filesize

      72KB

    • memory/2224-43-0x0000000004A60000-0x0000000004A72000-memory.dmp

      Filesize

      72KB

    • memory/2224-45-0x0000000004A60000-0x0000000004A72000-memory.dmp

      Filesize

      72KB

    • memory/2224-47-0x0000000004A60000-0x0000000004A72000-memory.dmp

      Filesize

      72KB

    • memory/2224-49-0x0000000004A60000-0x0000000004A72000-memory.dmp

      Filesize

      72KB

    • memory/2224-52-0x0000000004A60000-0x0000000004A72000-memory.dmp

      Filesize

      72KB

    • memory/2224-53-0x0000000004A60000-0x0000000004A72000-memory.dmp

      Filesize

      72KB

    • memory/2224-57-0x0000000004A60000-0x0000000004A72000-memory.dmp

      Filesize

      72KB

    • memory/2224-35-0x0000000004A60000-0x0000000004A72000-memory.dmp

      Filesize

      72KB

    • memory/2224-32-0x0000000004A60000-0x0000000004A72000-memory.dmp

      Filesize

      72KB

    • memory/2224-31-0x0000000004A60000-0x0000000004A78000-memory.dmp

      Filesize

      96KB

    • memory/2224-30-0x0000000004B30000-0x00000000050D4000-memory.dmp

      Filesize

      5.6MB

    • memory/2224-29-0x0000000002170000-0x000000000218A000-memory.dmp

      Filesize

      104KB

    • memory/4088-23-0x00007FFCFB0E3000-0x00007FFCFB0E5000-memory.dmp

      Filesize

      8KB

    • memory/4088-22-0x0000000000800000-0x000000000080A000-memory.dmp

      Filesize

      40KB

    • memory/4088-21-0x00007FFCFB0E3000-0x00007FFCFB0E5000-memory.dmp

      Filesize

      8KB