Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 22:07
Static task
static1
Behavioral task
behavioral1
Sample
c0486bbb0ec5917f66ca624dba9bd76e15a5d82b396079adc1e538348d5c9777.exe
Resource
win10v2004-20241007-en
General
-
Target
c0486bbb0ec5917f66ca624dba9bd76e15a5d82b396079adc1e538348d5c9777.exe
-
Size
641KB
-
MD5
cd58dcbce12a80efb29cb54938e03ac7
-
SHA1
1ea0a838159f7ede4b0a076578e31b554d760a9a
-
SHA256
c0486bbb0ec5917f66ca624dba9bd76e15a5d82b396079adc1e538348d5c9777
-
SHA512
173304a0d632a799285a08a62d1ad2d7f51677f12378d47b17b9136f7ac78419906c58a514e7166af88966fb3bc613a5dbaa46026b3404dbafac23b7b915ef67
-
SSDEEP
12288:2Mr6y90jdV8MDcYFO2unS1hTLRrOwKQ+lHSFrX0K1MDT4dmE:kyOV8ocJnSLNrupStX7y9E
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
resource yara_rule behavioral1/files/0x000b000000023b84-12.dat healer behavioral1/memory/2680-15-0x0000000000320000-0x000000000032A000-memory.dmp healer behavioral1/memory/3672-22-0x00000000021F0000-0x000000000220A000-memory.dmp healer behavioral1/memory/3672-24-0x0000000002510000-0x0000000002528000-memory.dmp healer behavioral1/memory/3672-52-0x0000000002510000-0x0000000002522000-memory.dmp healer behavioral1/memory/3672-50-0x0000000002510000-0x0000000002522000-memory.dmp healer behavioral1/memory/3672-48-0x0000000002510000-0x0000000002522000-memory.dmp healer behavioral1/memory/3672-47-0x0000000002510000-0x0000000002522000-memory.dmp healer behavioral1/memory/3672-45-0x0000000002510000-0x0000000002522000-memory.dmp healer behavioral1/memory/3672-42-0x0000000002510000-0x0000000002522000-memory.dmp healer behavioral1/memory/3672-40-0x0000000002510000-0x0000000002522000-memory.dmp healer behavioral1/memory/3672-38-0x0000000002510000-0x0000000002522000-memory.dmp healer behavioral1/memory/3672-36-0x0000000002510000-0x0000000002522000-memory.dmp healer behavioral1/memory/3672-34-0x0000000002510000-0x0000000002522000-memory.dmp healer behavioral1/memory/3672-32-0x0000000002510000-0x0000000002522000-memory.dmp healer behavioral1/memory/3672-30-0x0000000002510000-0x0000000002522000-memory.dmp healer behavioral1/memory/3672-28-0x0000000002510000-0x0000000002522000-memory.dmp healer behavioral1/memory/3672-26-0x0000000002510000-0x0000000002522000-memory.dmp healer behavioral1/memory/3672-25-0x0000000002510000-0x0000000002522000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b9466pL.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b9466pL.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b9466pL.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c32Yu34.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c32Yu34.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c32Yu34.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b9466pL.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b9466pL.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c32Yu34.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c32Yu34.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c32Yu34.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b9466pL.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2732-60-0x00000000049D0000-0x0000000004A16000-memory.dmp family_redline behavioral1/memory/2732-61-0x0000000005060000-0x00000000050A4000-memory.dmp family_redline behavioral1/memory/2732-69-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/2732-71-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/2732-96-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/2732-93-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/2732-91-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/2732-89-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/2732-87-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/2732-85-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/2732-83-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/2732-81-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/2732-77-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/2732-75-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/2732-73-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/2732-79-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/2732-67-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/2732-65-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/2732-63-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/2732-62-0x0000000005060000-0x000000000509E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 4248 nice2054.exe 2680 b9466pL.exe 3672 c32Yu34.exe 2732 djlSt17.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b9466pL.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c32Yu34.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c32Yu34.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c0486bbb0ec5917f66ca624dba9bd76e15a5d82b396079adc1e538348d5c9777.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nice2054.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4236 sc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2304 3672 WerFault.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c0486bbb0ec5917f66ca624dba9bd76e15a5d82b396079adc1e538348d5c9777.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nice2054.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c32Yu34.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djlSt17.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2680 b9466pL.exe 2680 b9466pL.exe 3672 c32Yu34.exe 3672 c32Yu34.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2680 b9466pL.exe Token: SeDebugPrivilege 3672 c32Yu34.exe Token: SeDebugPrivilege 2732 djlSt17.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1360 wrote to memory of 4248 1360 c0486bbb0ec5917f66ca624dba9bd76e15a5d82b396079adc1e538348d5c9777.exe 84 PID 1360 wrote to memory of 4248 1360 c0486bbb0ec5917f66ca624dba9bd76e15a5d82b396079adc1e538348d5c9777.exe 84 PID 1360 wrote to memory of 4248 1360 c0486bbb0ec5917f66ca624dba9bd76e15a5d82b396079adc1e538348d5c9777.exe 84 PID 4248 wrote to memory of 2680 4248 nice2054.exe 85 PID 4248 wrote to memory of 2680 4248 nice2054.exe 85 PID 4248 wrote to memory of 3672 4248 nice2054.exe 93 PID 4248 wrote to memory of 3672 4248 nice2054.exe 93 PID 4248 wrote to memory of 3672 4248 nice2054.exe 93 PID 1360 wrote to memory of 2732 1360 c0486bbb0ec5917f66ca624dba9bd76e15a5d82b396079adc1e538348d5c9777.exe 97 PID 1360 wrote to memory of 2732 1360 c0486bbb0ec5917f66ca624dba9bd76e15a5d82b396079adc1e538348d5c9777.exe 97 PID 1360 wrote to memory of 2732 1360 c0486bbb0ec5917f66ca624dba9bd76e15a5d82b396079adc1e538348d5c9777.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0486bbb0ec5917f66ca624dba9bd76e15a5d82b396079adc1e538348d5c9777.exe"C:\Users\Admin\AppData\Local\Temp\c0486bbb0ec5917f66ca624dba9bd76e15a5d82b396079adc1e538348d5c9777.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nice2054.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nice2054.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b9466pL.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b9466pL.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2680
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c32Yu34.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c32Yu34.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3672 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3672 -s 10884⤵
- Program crash
PID:2304
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\djlSt17.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\djlSt17.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3672 -ip 36721⤵PID:2396
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4236
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
297KB
MD5e8648f11054fa226a4152b9ac5af3db6
SHA111f9b7db0330d1f5a43986e8d431959b0c4c66c7
SHA25675cb188eadb01e8e580cad7a830cc3fd621c1b7538bfc223e8ab4c8b943717ce
SHA512fa09b31ff28ab5e863b910aa92a3ab6b785a33c7bff74f11e7f69b709a0ae03cf0ff9a8bf0d0c38eca92fd9804a3f90d2267cbb0db396884d87b8dd247db2dc7
-
Filesize
321KB
MD5db63633adc2c6c7cd260f3a2bc51a3be
SHA11b1ae9e1bc10103bfa4a2f9e46fb606c0318afc1
SHA256c5cb6e02fe0ba92691435c5499c952358e73dd731de3f3fc626ff6f44dd7e0c9
SHA5126963d00fe3715516d1aefff4ad1d831b6430996e23ca14edfade0b9ffd6f568eca3ce1cea69b45215474966ba71917d9e3da250d54c33ed515c34e4b26950475
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
239KB
MD5e4346376b6f8fc8702c08d5a4b2be736
SHA1d1ba9179e3c55cc062f4dd0b27ed140b16e63c80
SHA256567b1d493c973e67250188a3fa9c6722ce5f78048d82558567a99a1f54c00939
SHA512a51847a5541b952cedea246dfd96e94bde7acc9c07b3a91a9bff3015b8a134a4ca546fb6593f3556a141397d9e373dadb0cc3d26fa265dc5386fe5a8c4726594