Overview
overview
10Static
static
30314c3cf58...62.exe
windows10-2004-x64
10142ed11f80...59.exe
windows10-2004-x64
101f54336cee...4f.exe
windows10-2004-x64
102470f02746...37.exe
windows10-2004-x64
10357dca1dd0...e2.exe
windows7-x64
10357dca1dd0...e2.exe
windows10-2004-x64
10367729c840...03.exe
windows10-2004-x64
103ae8cc733e...e3.exe
windows10-2004-x64
103ff87c5bd0...30.exe
windows10-2004-x64
104157cda315...a6.exe
windows10-2004-x64
105f318080c6...ea.exe
windows10-2004-x64
10620f9ee1b4...8f.exe
windows10-2004-x64
106817354347...3a.exe
windows10-2004-x64
10753cdc12b9...91.exe
windows10-2004-x64
10a4215d26b6...74.exe
windows10-2004-x64
10a4375e040f...82.exe
windows10-2004-x64
10a619ae77d5...2e.exe
windows10-2004-x64
10aaab139650...12.exe
windows10-2004-x64
10aefec08eba...49.exe
windows10-2004-x64
10d12f5fa25c...70.exe
windows10-2004-x64
7e5b42981fd...65.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 05:33
Static task
static1
Behavioral task
behavioral1
Sample
0314c3cf5875f5a348b62f28e53ec17a9180933fb126d66b7184ebbc62e3c362.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
142ed11f8044b70abc93823879852d70e03f8fdb2b557dd5db7da572a6b40d59.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
1f54336ceed1489c1501366db5c3d0173f045faa248587b9e1d9d3669f84114f.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
2470f02746e0ace28b3f21135e43ca5574a20964c1ebe76b4d37e025bc74cf37.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
357dca1dd0b140db9468cb0bea91da2504a032397de5a581bd04f96d59e430e2.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
357dca1dd0b140db9468cb0bea91da2504a032397de5a581bd04f96d59e430e2.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
367729c84050746eb20cd233e6b8d8cfe0625110da6e43f4b4c486aa19d08103.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
3ae8cc733ec108080a1919852f9eed660c71dff454329a044b21af12ce8fa4e3.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
3ff87c5bd0d476dfc954d3706672474698d1e412030e6189e037c2474b97b730.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
4157cda3159c7d2c99d18138d2e023dd1d821d09ae77e78901a80b26492981a6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
5f318080c6c0aef583c575f49bd61e9b4e8b6784f4c52b512e9c07090e4cedea.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
620f9ee1b442855f9904f5108cf7185b16d0acbacad9aaa076f02e0ffd4f588f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
68173543479d737f5e883a0bf3bd569d09813666a895a805fd53a18f3a96df3a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
753cdc12b984ece991f2018329d37985ee627640895e2d9b9a43a13a6dd6fb91.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
a4215d26b6f0c0e1bf7e0f7a14e39744684399db4b301d328c8f7df9ca1c0b74.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
a4375e040f13128a4dc747d845dd82b7204008c71beb526483b369eea30d2582.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
a619ae77d542717361e631ceb6fe3fab295af4ccef45ae4774b92a9355b6bb2e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
aaab139650da2e31907d608a912b0aa66038a21c8d946e300a44ab21b51c2c12.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
aefec08ebaf1c6b975dbf83df5257e52d7efcbaf569ea4b633cec392af828049.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
d12f5fa25c8ef0ae322be4daa1b08acf499c9d1be60c2f8d6f6b5a65c28f0a70.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
e5b42981fd5d352478cd9e79d582bc92295cb43d3d32dfd59e84008eb4216c65.exe
Resource
win10v2004-20240426-en
General
-
Target
2470f02746e0ace28b3f21135e43ca5574a20964c1ebe76b4d37e025bc74cf37.exe
-
Size
702KB
-
MD5
3551b070d8f8c5788e7a26b7eb3e2167
-
SHA1
c4f2f2a5e1534aa6745a4fa10cd33082e796a449
-
SHA256
2470f02746e0ace28b3f21135e43ca5574a20964c1ebe76b4d37e025bc74cf37
-
SHA512
8cf570cae3fe1afcde148277a893bbd95711709792adda13b74132ed4374542999cd4e2a7bca1e35ebf6f4fce1b86a55d8d32d978016d3e70402ba5badc44723
-
SSDEEP
12288:mMr4y90EPnLmwuetmnJuSDno0t3Iu2FKZmtQVpzIZpFCMq48YdavcJynY4y5d:ay9LmwuetmncSDnh3IubZmipzzMq/YOw
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
resource yara_rule behavioral4/files/0x0008000000023428-12.dat healer behavioral4/memory/1492-15-0x00000000008A0000-0x00000000008AA000-memory.dmp healer behavioral4/memory/4168-21-0x0000000007030000-0x000000000704A000-memory.dmp healer behavioral4/memory/4168-23-0x00000000070A0000-0x00000000070B8000-memory.dmp healer behavioral4/memory/4168-51-0x00000000070A0000-0x00000000070B2000-memory.dmp healer behavioral4/memory/4168-49-0x00000000070A0000-0x00000000070B2000-memory.dmp healer behavioral4/memory/4168-47-0x00000000070A0000-0x00000000070B2000-memory.dmp healer behavioral4/memory/4168-45-0x00000000070A0000-0x00000000070B2000-memory.dmp healer behavioral4/memory/4168-43-0x00000000070A0000-0x00000000070B2000-memory.dmp healer behavioral4/memory/4168-42-0x00000000070A0000-0x00000000070B2000-memory.dmp healer behavioral4/memory/4168-39-0x00000000070A0000-0x00000000070B2000-memory.dmp healer behavioral4/memory/4168-38-0x00000000070A0000-0x00000000070B2000-memory.dmp healer behavioral4/memory/4168-35-0x00000000070A0000-0x00000000070B2000-memory.dmp healer behavioral4/memory/4168-33-0x00000000070A0000-0x00000000070B2000-memory.dmp healer behavioral4/memory/4168-31-0x00000000070A0000-0x00000000070B2000-memory.dmp healer behavioral4/memory/4168-29-0x00000000070A0000-0x00000000070B2000-memory.dmp healer behavioral4/memory/4168-27-0x00000000070A0000-0x00000000070B2000-memory.dmp healer behavioral4/memory/4168-25-0x00000000070A0000-0x00000000070B2000-memory.dmp healer behavioral4/memory/4168-24-0x00000000070A0000-0x00000000070B2000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection con2811.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" con2811.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" con2811.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" bus7443.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" bus7443.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" bus7443.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" bus7443.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" con2811.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" con2811.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" con2811.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection bus7443.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" bus7443.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral4/memory/2284-58-0x0000000004A60000-0x0000000004AA6000-memory.dmp family_redline behavioral4/memory/2284-59-0x0000000004C00000-0x0000000004C44000-memory.dmp family_redline behavioral4/memory/2284-93-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral4/memory/2284-91-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral4/memory/2284-89-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral4/memory/2284-87-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral4/memory/2284-85-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral4/memory/2284-83-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral4/memory/2284-81-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral4/memory/2284-79-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral4/memory/2284-77-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral4/memory/2284-75-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral4/memory/2284-74-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral4/memory/2284-69-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral4/memory/2284-65-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral4/memory/2284-63-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral4/memory/2284-61-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral4/memory/2284-60-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral4/memory/2284-71-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral4/memory/2284-67-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4676 kino9261.exe 1492 bus7443.exe 4168 con2811.exe 2284 dWa97s47.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" bus7443.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features con2811.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" con2811.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2470f02746e0ace28b3f21135e43ca5574a20964c1ebe76b4d37e025bc74cf37.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" kino9261.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2296 4168 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1492 bus7443.exe 1492 bus7443.exe 4168 con2811.exe 4168 con2811.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1492 bus7443.exe Token: SeDebugPrivilege 4168 con2811.exe Token: SeDebugPrivilege 2284 dWa97s47.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2672 wrote to memory of 4676 2672 2470f02746e0ace28b3f21135e43ca5574a20964c1ebe76b4d37e025bc74cf37.exe 83 PID 2672 wrote to memory of 4676 2672 2470f02746e0ace28b3f21135e43ca5574a20964c1ebe76b4d37e025bc74cf37.exe 83 PID 2672 wrote to memory of 4676 2672 2470f02746e0ace28b3f21135e43ca5574a20964c1ebe76b4d37e025bc74cf37.exe 83 PID 4676 wrote to memory of 1492 4676 kino9261.exe 84 PID 4676 wrote to memory of 1492 4676 kino9261.exe 84 PID 4676 wrote to memory of 4168 4676 kino9261.exe 92 PID 4676 wrote to memory of 4168 4676 kino9261.exe 92 PID 4676 wrote to memory of 4168 4676 kino9261.exe 92 PID 2672 wrote to memory of 2284 2672 2470f02746e0ace28b3f21135e43ca5574a20964c1ebe76b4d37e025bc74cf37.exe 96 PID 2672 wrote to memory of 2284 2672 2470f02746e0ace28b3f21135e43ca5574a20964c1ebe76b4d37e025bc74cf37.exe 96 PID 2672 wrote to memory of 2284 2672 2470f02746e0ace28b3f21135e43ca5574a20964c1ebe76b4d37e025bc74cf37.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\2470f02746e0ace28b3f21135e43ca5574a20964c1ebe76b4d37e025bc74cf37.exe"C:\Users\Admin\AppData\Local\Temp\2470f02746e0ace28b3f21135e43ca5574a20964c1ebe76b4d37e025bc74cf37.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino9261.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino9261.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bus7443.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bus7443.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1492
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\con2811.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\con2811.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4168 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4168 -s 10804⤵
- Program crash
PID:2296
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dWa97s47.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dWa97s47.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2284
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4168 -ip 41681⤵PID:1964
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
395KB
MD5e25387fb916a34d4affe07ade28d8455
SHA1b5bb0ac2c95612be258c13f03718e33ac07f508a
SHA256db9c125de03bc9f7a939cbed3d5b4c78a8b3cf58a1fb95c588a9b6644abcae80
SHA5124fe8bedbb69141284d61a765023422d1a570f15a66144f03f5e3977839dd14dafaa7c9e05845acb56c385742ad46d1cf79792dc01fec40c88b201d9d5c2bd789
-
Filesize
348KB
MD51efa83425eabab9a22fbe7729b0152ae
SHA1819eb1db62529387bc29f5e06f665cea513cfe28
SHA2560e22f456ec421185445bcea21c2f9c9be7b980dc99a98a33f65396b7c1b2bf90
SHA5123bcc1baa1e85fe455be3511040e0588999f99d49d830327b56b5309a4c19aaf71631fb8457fb8eb9f55a4d91460273482b9d7936bcdef64e8493e1e2b0b0f5d8
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
338KB
MD55cd6b1f2c41d7a661c6df2e1b21f36c4
SHA14e491407a4fa3cb2141ac1e53add2d2e6eaa87c7
SHA25692fdfed7ca6e16c859119ff3f2cc57f05e1f2ce56593f9e77af55edbdfb2559e
SHA512490ed23ef3b20e77e6fe3fc7963c1299770b4ebc0f9b9fba543faac27cbbe3ad64ec21687871b4ba0858ca07234193227f6c166703716633eedb7295c0e5ea6b