Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 14:12
Static task
static1
Behavioral task
behavioral1
Sample
75689bbbac0baa848e78ed7ef62676af9fbce071c1737e5628b404e321e179e3.exe
Resource
win10v2004-20241007-en
General
-
Target
75689bbbac0baa848e78ed7ef62676af9fbce071c1737e5628b404e321e179e3.exe
-
Size
864KB
-
MD5
a9e3700653facb2968df2d8d97787dff
-
SHA1
23592cc2e4fec13dff8b163a550f1c27a8d22a79
-
SHA256
75689bbbac0baa848e78ed7ef62676af9fbce071c1737e5628b404e321e179e3
-
SHA512
0c14f3a8cde71df192bb76f5512dde766563d64f3ecd3343422fdf7c2b776b4af1a2389aa53da9abdcaec4305c9bd5994903346ac92f104c7af658bb5ba8ad25
-
SSDEEP
24576:iyyAiwvxCM6urBSXpUcOwXNeeU57c6GYfP:JYwvxCMDrBjwXNnp6H
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
resource yara_rule behavioral1/files/0x0009000000023bdf-19.dat healer behavioral1/memory/2252-22-0x0000000000AB0000-0x0000000000ABA000-memory.dmp healer behavioral1/memory/1572-28-0x0000000004820000-0x000000000483A000-memory.dmp healer behavioral1/memory/1572-30-0x0000000004C50000-0x0000000004C68000-memory.dmp healer behavioral1/memory/1572-31-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/1572-38-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/1572-58-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/1572-57-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/1572-54-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/1572-52-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/1572-50-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/1572-48-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/1572-46-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/1572-44-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/1572-42-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/1572-40-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/1572-36-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/1572-34-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/1572-32-0x0000000004C50000-0x0000000004C62000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b1540gX.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c42jm30.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c42jm30.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c42jm30.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c42jm30.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b1540gX.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b1540gX.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b1540gX.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b1540gX.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b1540gX.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c42jm30.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c42jm30.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2920-66-0x0000000004B20000-0x0000000004B66000-memory.dmp family_redline behavioral1/memory/2920-67-0x0000000004E10000-0x0000000004E54000-memory.dmp family_redline behavioral1/memory/2920-71-0x0000000004E10000-0x0000000004E4E000-memory.dmp family_redline behavioral1/memory/2920-79-0x0000000004E10000-0x0000000004E4E000-memory.dmp family_redline behavioral1/memory/2920-101-0x0000000004E10000-0x0000000004E4E000-memory.dmp family_redline behavioral1/memory/2920-100-0x0000000004E10000-0x0000000004E4E000-memory.dmp family_redline behavioral1/memory/2920-97-0x0000000004E10000-0x0000000004E4E000-memory.dmp family_redline behavioral1/memory/2920-95-0x0000000004E10000-0x0000000004E4E000-memory.dmp family_redline behavioral1/memory/2920-91-0x0000000004E10000-0x0000000004E4E000-memory.dmp family_redline behavioral1/memory/2920-89-0x0000000004E10000-0x0000000004E4E000-memory.dmp family_redline behavioral1/memory/2920-85-0x0000000004E10000-0x0000000004E4E000-memory.dmp family_redline behavioral1/memory/2920-83-0x0000000004E10000-0x0000000004E4E000-memory.dmp family_redline behavioral1/memory/2920-81-0x0000000004E10000-0x0000000004E4E000-memory.dmp family_redline behavioral1/memory/2920-77-0x0000000004E10000-0x0000000004E4E000-memory.dmp family_redline behavioral1/memory/2920-75-0x0000000004E10000-0x0000000004E4E000-memory.dmp family_redline behavioral1/memory/2920-73-0x0000000004E10000-0x0000000004E4E000-memory.dmp family_redline behavioral1/memory/2920-93-0x0000000004E10000-0x0000000004E4E000-memory.dmp family_redline behavioral1/memory/2920-87-0x0000000004E10000-0x0000000004E4E000-memory.dmp family_redline behavioral1/memory/2920-69-0x0000000004E10000-0x0000000004E4E000-memory.dmp family_redline behavioral1/memory/2920-68-0x0000000004E10000-0x0000000004E4E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 5 IoCs
pid Process 1592 tice4717.exe 2484 tice7195.exe 2252 b1540gX.exe 1572 c42jm30.exe 2920 dwFuN11.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b1540gX.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c42jm30.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c42jm30.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 75689bbbac0baa848e78ed7ef62676af9fbce071c1737e5628b404e321e179e3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice4717.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice7195.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1300 1572 WerFault.exe 94 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c42jm30.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwFuN11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 75689bbbac0baa848e78ed7ef62676af9fbce071c1737e5628b404e321e179e3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice4717.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice7195.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2252 b1540gX.exe 2252 b1540gX.exe 1572 c42jm30.exe 1572 c42jm30.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2252 b1540gX.exe Token: SeDebugPrivilege 1572 c42jm30.exe Token: SeDebugPrivilege 2920 dwFuN11.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1332 wrote to memory of 1592 1332 75689bbbac0baa848e78ed7ef62676af9fbce071c1737e5628b404e321e179e3.exe 84 PID 1332 wrote to memory of 1592 1332 75689bbbac0baa848e78ed7ef62676af9fbce071c1737e5628b404e321e179e3.exe 84 PID 1332 wrote to memory of 1592 1332 75689bbbac0baa848e78ed7ef62676af9fbce071c1737e5628b404e321e179e3.exe 84 PID 1592 wrote to memory of 2484 1592 tice4717.exe 85 PID 1592 wrote to memory of 2484 1592 tice4717.exe 85 PID 1592 wrote to memory of 2484 1592 tice4717.exe 85 PID 2484 wrote to memory of 2252 2484 tice7195.exe 86 PID 2484 wrote to memory of 2252 2484 tice7195.exe 86 PID 2484 wrote to memory of 1572 2484 tice7195.exe 94 PID 2484 wrote to memory of 1572 2484 tice7195.exe 94 PID 2484 wrote to memory of 1572 2484 tice7195.exe 94 PID 1592 wrote to memory of 2920 1592 tice4717.exe 98 PID 1592 wrote to memory of 2920 1592 tice4717.exe 98 PID 1592 wrote to memory of 2920 1592 tice4717.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\75689bbbac0baa848e78ed7ef62676af9fbce071c1737e5628b404e321e179e3.exe"C:\Users\Admin\AppData\Local\Temp\75689bbbac0baa848e78ed7ef62676af9fbce071c1737e5628b404e321e179e3.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice4717.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice4717.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice7195.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice7195.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1540gX.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1540gX.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2252
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c42jm30.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c42jm30.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1572 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1572 -s 10125⤵
- Program crash
PID:1300
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dwFuN11.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dwFuN11.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2920
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1572 -ip 15721⤵PID:4916
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
719KB
MD54826f36f6bfc6bd4bcd1b6162de99280
SHA162fc3938d849180a9df09aaaed0a9120197dcf3b
SHA25684c0be2c3adc070fc5b9e012252b68fcb9532a5bb107f1343dabacc50f1dfb05
SHA5128865bd717bb6db96a3204de5a36e703fb8566f579dc186edb1abbe6290a2c2df68a9440e922eb7c30975db30c03e494d9e4f110e9dd253fb6c2795651d94a3d3
-
Filesize
399KB
MD53cab31be670b6383965bfce545a5021f
SHA1c31ab9a7005da86a33010795a236d980fa2635ba
SHA256cac4249a985c1b8192f360c2a9220d59c0e5af51c675b24269f791726dca2742
SHA51287aecb18e7b304ec5b32566a4f550fd1c27e10d894d1fdb47feb3c525a275c2e4cd79adb115cf30c9b3b0bac63096915ac574beaa5f68fdecccd4ef3dec6369a
-
Filesize
360KB
MD549f9d4774cd4daea02087f9b31f9dcd5
SHA1cda22847205f423b15a0347c31c9c59936efd161
SHA2568dff733f75bfc4057549cfd6aa2f2fb7ab6ba188852cf08445c634d9bf6f972f
SHA512d459e5de0afbfecedd01018740a8ff1300bb0943fcb43d83477b0e07687bc4fcc2e0aed680d6a9b6f5c4daea9c14c1f0062bc2e78cc5a96a8889e9f6c0da1249
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
342KB
MD526d3d0ecf98712fcc119f02468427d6f
SHA1c90a61fd6217b127f3161d7588fd1892aa85b158
SHA25602f30fc41aa678931b46b153ea0161154a480a22153dfb9bed76df2e1de8817b
SHA51210b9fa30e7848243a877db6747e6befb1a19add90fa1215a069e37e444b3a67f763824685ba3ac96106e371d3695cc5961d4a963d9181d861baae77e96994bfa