Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 13:45
Static task
static1
Behavioral task
behavioral1
Sample
70396a539c70e4e02b8a28a1e054e559e6f5a2dba81eb888eb46ddca2a4c70e5.exe
Resource
win10v2004-20241007-en
General
-
Target
70396a539c70e4e02b8a28a1e054e559e6f5a2dba81eb888eb46ddca2a4c70e5.exe
-
Size
788KB
-
MD5
31f99726925bd5d92264b67fd39ed7ed
-
SHA1
b71499baa902447f1cc7091f3b0f55e0961f5219
-
SHA256
70396a539c70e4e02b8a28a1e054e559e6f5a2dba81eb888eb46ddca2a4c70e5
-
SHA512
bb5ec28076d4166f43413c3251f3357a5fa3fa7424ed86aeba52f32c14c3e504fb55f3739dd68b3dcc1f5252e9f61a7303012f7ec3dfe77fa86ce8bd3470dbd0
-
SSDEEP
24576:qyH8+/6bX67ANznJTTVLiFNe+8T4A/Gau:xv/f7AN9TpL8Nw/
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
resource yara_rule behavioral1/files/0x0009000000023bb0-19.dat healer behavioral1/memory/3024-22-0x0000000000F10000-0x0000000000F1A000-memory.dmp healer behavioral1/memory/3640-29-0x0000000002430000-0x000000000244A000-memory.dmp healer behavioral1/memory/3640-31-0x0000000002720000-0x0000000002738000-memory.dmp healer behavioral1/memory/3640-59-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/3640-57-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/3640-55-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/3640-53-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/3640-51-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/3640-49-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/3640-47-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/3640-45-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/3640-43-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/3640-41-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/3640-39-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/3640-37-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/3640-35-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/3640-33-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/3640-32-0x0000000002720000-0x0000000002732000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c59BC02.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c59BC02.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c59BC02.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c59BC02.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b0482OT.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b0482OT.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b0482OT.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c59BC02.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c59BC02.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b0482OT.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b0482OT.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b0482OT.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4776-67-0x00000000025A0000-0x00000000025E6000-memory.dmp family_redline behavioral1/memory/4776-68-0x0000000005090000-0x00000000050D4000-memory.dmp family_redline behavioral1/memory/4776-72-0x0000000005090000-0x00000000050CE000-memory.dmp family_redline behavioral1/memory/4776-80-0x0000000005090000-0x00000000050CE000-memory.dmp family_redline behavioral1/memory/4776-102-0x0000000005090000-0x00000000050CE000-memory.dmp family_redline behavioral1/memory/4776-100-0x0000000005090000-0x00000000050CE000-memory.dmp family_redline behavioral1/memory/4776-98-0x0000000005090000-0x00000000050CE000-memory.dmp family_redline behavioral1/memory/4776-94-0x0000000005090000-0x00000000050CE000-memory.dmp family_redline behavioral1/memory/4776-92-0x0000000005090000-0x00000000050CE000-memory.dmp family_redline behavioral1/memory/4776-90-0x0000000005090000-0x00000000050CE000-memory.dmp family_redline behavioral1/memory/4776-88-0x0000000005090000-0x00000000050CE000-memory.dmp family_redline behavioral1/memory/4776-86-0x0000000005090000-0x00000000050CE000-memory.dmp family_redline behavioral1/memory/4776-84-0x0000000005090000-0x00000000050CE000-memory.dmp family_redline behavioral1/memory/4776-82-0x0000000005090000-0x00000000050CE000-memory.dmp family_redline behavioral1/memory/4776-78-0x0000000005090000-0x00000000050CE000-memory.dmp family_redline behavioral1/memory/4776-76-0x0000000005090000-0x00000000050CE000-memory.dmp family_redline behavioral1/memory/4776-74-0x0000000005090000-0x00000000050CE000-memory.dmp family_redline behavioral1/memory/4776-96-0x0000000005090000-0x00000000050CE000-memory.dmp family_redline behavioral1/memory/4776-70-0x0000000005090000-0x00000000050CE000-memory.dmp family_redline behavioral1/memory/4776-69-0x0000000005090000-0x00000000050CE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 5 IoCs
pid Process 5052 tice0460.exe 4384 tice4860.exe 3024 b0482OT.exe 3640 c59BC02.exe 4776 dllxA27.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b0482OT.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c59BC02.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c59BC02.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 70396a539c70e4e02b8a28a1e054e559e6f5a2dba81eb888eb46ddca2a4c70e5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice0460.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice4860.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5528 sc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2024 3640 WerFault.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice0460.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice4860.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c59BC02.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dllxA27.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 70396a539c70e4e02b8a28a1e054e559e6f5a2dba81eb888eb46ddca2a4c70e5.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3024 b0482OT.exe 3024 b0482OT.exe 3640 c59BC02.exe 3640 c59BC02.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3024 b0482OT.exe Token: SeDebugPrivilege 3640 c59BC02.exe Token: SeDebugPrivilege 4776 dllxA27.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3204 wrote to memory of 5052 3204 70396a539c70e4e02b8a28a1e054e559e6f5a2dba81eb888eb46ddca2a4c70e5.exe 84 PID 3204 wrote to memory of 5052 3204 70396a539c70e4e02b8a28a1e054e559e6f5a2dba81eb888eb46ddca2a4c70e5.exe 84 PID 3204 wrote to memory of 5052 3204 70396a539c70e4e02b8a28a1e054e559e6f5a2dba81eb888eb46ddca2a4c70e5.exe 84 PID 5052 wrote to memory of 4384 5052 tice0460.exe 85 PID 5052 wrote to memory of 4384 5052 tice0460.exe 85 PID 5052 wrote to memory of 4384 5052 tice0460.exe 85 PID 4384 wrote to memory of 3024 4384 tice4860.exe 86 PID 4384 wrote to memory of 3024 4384 tice4860.exe 86 PID 4384 wrote to memory of 3640 4384 tice4860.exe 95 PID 4384 wrote to memory of 3640 4384 tice4860.exe 95 PID 4384 wrote to memory of 3640 4384 tice4860.exe 95 PID 5052 wrote to memory of 4776 5052 tice0460.exe 100 PID 5052 wrote to memory of 4776 5052 tice0460.exe 100 PID 5052 wrote to memory of 4776 5052 tice0460.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\70396a539c70e4e02b8a28a1e054e559e6f5a2dba81eb888eb46ddca2a4c70e5.exe"C:\Users\Admin\AppData\Local\Temp\70396a539c70e4e02b8a28a1e054e559e6f5a2dba81eb888eb46ddca2a4c70e5.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice0460.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice0460.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice4860.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice4860.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b0482OT.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b0482OT.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3024
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c59BC02.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c59BC02.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3640 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3640 -s 10925⤵
- Program crash
PID:2024
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dllxA27.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dllxA27.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4776
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3640 -ip 36401⤵PID:3948
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:5528
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
643KB
MD58b74ec39e6a2b04eb3eeb07157facf0e
SHA18738478148bdbd0fc357dab86fc31e37c1c339ba
SHA256aae2964fa48ac5bef69efa9d0431295bbc70351e4c612fbd2b6cf210cd749aab
SHA512f47f29726ab37d81816c340d28d66f8c1891d836ea63266115594a6f8d8da2c3349513dd035fc1eb5ec8c9ff2a8162732a70f1842424fa40980ff86c91513471
-
Filesize
295KB
MD5595d5271d42158eba302b780810ee091
SHA1db080d9569e164118b0f353fb20481a835e4e426
SHA25641d4b54176ec5fc7decc3316581f61bb98b7a44a602f73d5f449a6a3cf4843e4
SHA512f5b8537c2a263b76ffe0b3bb72d01164f5919cb4c6a65f9abcef2da736011265d9838a7c5c0b40f03f6a1463cec6f15717c28fac5b19b675a2faa65abaff6a70
-
Filesize
322KB
MD53b5ebff31785be32474cd3f9fe09b5e4
SHA15deeea1e665590630a8bea6f7a0f502fbd6f3d36
SHA2565cd184d613901b8116c1b74b3cec3c7fbabedf0060b63104f7726e08eaf6dbe0
SHA512b678ff20a6eae58a4adc0449bcb7fb5c9182459670de7e376217d608e1ddf3fdbc2e4e18972587b685f8f76547c12932aa449a01ba77cdaff0f7ea4ca532a25b
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
237KB
MD5bdee60cb3bf94541988bed06cc3afb6d
SHA16f5582e79bdc146f0a419c33e16a610e4d01c352
SHA256f100081365e0b420261702a45f13a6e3f7382b68405facecda8db4b421985a68
SHA5126042fafc7077b66f5f6f1da83f46d691783a576d63658ef3aa0e441425a8a285660d4322342509f17316fbdb682726fd9abc97e465757ee59714e285763d8792