Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 13:40
Static task
static1
Behavioral task
behavioral1
Sample
fc3de59498636a4cd9b697f2fa078037e4d69e4470c7d97049d30c2c5bf3e85e.exe
Resource
win10v2004-20241007-en
General
-
Target
fc3de59498636a4cd9b697f2fa078037e4d69e4470c7d97049d30c2c5bf3e85e.exe
-
Size
875KB
-
MD5
1c554b64550fd91edf02aa244c3c92bb
-
SHA1
208150956f636668db1c8f92be5f16b48f035466
-
SHA256
fc3de59498636a4cd9b697f2fa078037e4d69e4470c7d97049d30c2c5bf3e85e
-
SHA512
e9b7e702c7ea87b31786d232ff561deba624386a61f91366ae24f7bb3cac84b744bbe26b628286fbe72ef7d1243a8f83cf9b7aa60dbef9c80610fb6fdb52ab69
-
SSDEEP
24576:PyVPjvuwLdrNUdT2hL1utQS1HSDJTeizDoP:aVbvuIxUshL1AHSdT
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
resource yara_rule behavioral1/files/0x000b000000023bad-19.dat healer behavioral1/memory/2012-22-0x0000000000A30000-0x0000000000A3A000-memory.dmp healer behavioral1/memory/3452-29-0x00000000048B0000-0x00000000048CA000-memory.dmp healer behavioral1/memory/3452-31-0x00000000070D0000-0x00000000070E8000-memory.dmp healer behavioral1/memory/3452-33-0x00000000070D0000-0x00000000070E2000-memory.dmp healer behavioral1/memory/3452-35-0x00000000070D0000-0x00000000070E2000-memory.dmp healer behavioral1/memory/3452-59-0x00000000070D0000-0x00000000070E2000-memory.dmp healer behavioral1/memory/3452-58-0x00000000070D0000-0x00000000070E2000-memory.dmp healer behavioral1/memory/3452-55-0x00000000070D0000-0x00000000070E2000-memory.dmp healer behavioral1/memory/3452-53-0x00000000070D0000-0x00000000070E2000-memory.dmp healer behavioral1/memory/3452-51-0x00000000070D0000-0x00000000070E2000-memory.dmp healer behavioral1/memory/3452-49-0x00000000070D0000-0x00000000070E2000-memory.dmp healer behavioral1/memory/3452-48-0x00000000070D0000-0x00000000070E2000-memory.dmp healer behavioral1/memory/3452-46-0x00000000070D0000-0x00000000070E2000-memory.dmp healer behavioral1/memory/3452-43-0x00000000070D0000-0x00000000070E2000-memory.dmp healer behavioral1/memory/3452-41-0x00000000070D0000-0x00000000070E2000-memory.dmp healer behavioral1/memory/3452-39-0x00000000070D0000-0x00000000070E2000-memory.dmp healer behavioral1/memory/3452-37-0x00000000070D0000-0x00000000070E2000-memory.dmp healer behavioral1/memory/3452-32-0x00000000070D0000-0x00000000070E2000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c30Po16.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c30Po16.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c30Po16.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c30Po16.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b3009iF.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b3009iF.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b3009iF.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b3009iF.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c30Po16.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c30Po16.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b3009iF.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b3009iF.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/920-67-0x0000000004AE0000-0x0000000004B26000-memory.dmp family_redline behavioral1/memory/920-68-0x0000000004CD0000-0x0000000004D14000-memory.dmp family_redline behavioral1/memory/920-82-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/920-102-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/920-100-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/920-98-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/920-96-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/920-94-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/920-92-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/920-90-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/920-88-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/920-86-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/920-84-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/920-80-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/920-78-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/920-76-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/920-74-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/920-72-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/920-70-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/920-69-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 5 IoCs
pid Process 3736 tice9085.exe 3636 tice3354.exe 2012 b3009iF.exe 3452 c30Po16.exe 920 dOCmp49.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b3009iF.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c30Po16.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c30Po16.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fc3de59498636a4cd9b697f2fa078037e4d69e4470c7d97049d30c2c5bf3e85e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice9085.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice3354.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2984 sc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2344 3452 WerFault.exe 94 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc3de59498636a4cd9b697f2fa078037e4d69e4470c7d97049d30c2c5bf3e85e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice9085.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice3354.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c30Po16.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dOCmp49.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2012 b3009iF.exe 2012 b3009iF.exe 3452 c30Po16.exe 3452 c30Po16.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2012 b3009iF.exe Token: SeDebugPrivilege 3452 c30Po16.exe Token: SeDebugPrivilege 920 dOCmp49.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4508 wrote to memory of 3736 4508 fc3de59498636a4cd9b697f2fa078037e4d69e4470c7d97049d30c2c5bf3e85e.exe 84 PID 4508 wrote to memory of 3736 4508 fc3de59498636a4cd9b697f2fa078037e4d69e4470c7d97049d30c2c5bf3e85e.exe 84 PID 4508 wrote to memory of 3736 4508 fc3de59498636a4cd9b697f2fa078037e4d69e4470c7d97049d30c2c5bf3e85e.exe 84 PID 3736 wrote to memory of 3636 3736 tice9085.exe 85 PID 3736 wrote to memory of 3636 3736 tice9085.exe 85 PID 3736 wrote to memory of 3636 3736 tice9085.exe 85 PID 3636 wrote to memory of 2012 3636 tice3354.exe 86 PID 3636 wrote to memory of 2012 3636 tice3354.exe 86 PID 3636 wrote to memory of 3452 3636 tice3354.exe 94 PID 3636 wrote to memory of 3452 3636 tice3354.exe 94 PID 3636 wrote to memory of 3452 3636 tice3354.exe 94 PID 3736 wrote to memory of 920 3736 tice9085.exe 99 PID 3736 wrote to memory of 920 3736 tice9085.exe 99 PID 3736 wrote to memory of 920 3736 tice9085.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc3de59498636a4cd9b697f2fa078037e4d69e4470c7d97049d30c2c5bf3e85e.exe"C:\Users\Admin\AppData\Local\Temp\fc3de59498636a4cd9b697f2fa078037e4d69e4470c7d97049d30c2c5bf3e85e.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice9085.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice9085.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice3354.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice3354.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3009iF.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3009iF.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2012
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c30Po16.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c30Po16.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3452 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3452 -s 10805⤵
- Program crash
PID:2344
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dOCmp49.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dOCmp49.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:920
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3452 -ip 34521⤵PID:3280
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2984
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
731KB
MD5cac18e6ffcb0aff970d1721f2e763619
SHA15488e590ea27f95f0381e6bead24196bedf4f6c1
SHA256bd738e4eadce9615cea81ae4aa2a2fd2821cfbd8f0da72f37fc9e59df4934128
SHA512a823156e30a803922c73d299845548a74e65c341cbe9f04c20e583b524340c7cae13da03b9dee4e2fffe234e34677f1f1d2bc7bea571c31e115e4a63a550682f
-
Filesize
409KB
MD56c818ec8d3828554770537a6a2d0fe7d
SHA190cab6f36316d51363a3d80fc33d1699a404433f
SHA2569cce3bf35f9a52533003b1c0519559e0806ec540ada13aea6c414c65a33bb588
SHA512c0eb2a0ed73075eff446c6e05dcca814b63fc3dfd1769d646a40cfd1daf48e2c1ebc61f08c6f4bc07b8c2aa369cda4424b26adcf709f9a6263a4d622641649b5
-
Filesize
366KB
MD5752536930b8c7e3092815baa5d889a5b
SHA19156a270f543c9c9e30ca83258b511d9b6239758
SHA256ae243556ab9d490c0f9978d48df703740ab0a5ffc3f99d923acda206faa2566e
SHA5120b3f32996686956ba327b134d17f25dbe2ae71dfcb6c0144cd974e4ce054aaa622cb7a093f3fe06bca633578d9b7be41996c9646f9873c79cb17c8bb4f984814
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
351KB
MD540603ee9a465eb9d5eb53ae76f163963
SHA10ca5026a09120f0648a4619f7af3729c05e36a33
SHA256c0edf7ca5a8482805d6f2fcd4e9cb4e165c1ea390e1fbf3c46aca419a221d098
SHA512386d8a94cc263cc76dc24c3ffd5a04f05b346a8f8d1ecc14a2dad54025e017612c06624c22d1667f16a66831d5d24d233c010746cdbc9dcdcc21931b39249d30