Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 23:35
Static task
static1
Behavioral task
behavioral1
Sample
ffb4e4e1867206096ef841e367cc044a2a3e48240e29d8ffe7def65eae6b6135.exe
Resource
win10v2004-20241007-en
General
-
Target
ffb4e4e1867206096ef841e367cc044a2a3e48240e29d8ffe7def65eae6b6135.exe
-
Size
792KB
-
MD5
6d06e7d8f8b563cfe30956717d781ae6
-
SHA1
596dadd6850c8b866ae684033e115be0bdda0234
-
SHA256
ffb4e4e1867206096ef841e367cc044a2a3e48240e29d8ffe7def65eae6b6135
-
SHA512
fe77841c8daf0770940287210d724c1e8db5bd970ba92e7309324307eb74bea3b5d0446d9456bb3ac3823b2bad5c9d557561dde040a6c8edca4142192b6da579
-
SSDEEP
24576:cyf/EV0qK6/3BD9P2kH3grSj+IZmkqTvUGN2:LfsWq53RpZXg0mE
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
resource yara_rule behavioral1/files/0x0008000000023c8e-20.dat healer behavioral1/memory/3092-22-0x0000000000DB0000-0x0000000000DBA000-memory.dmp healer behavioral1/memory/2332-29-0x0000000004AC0000-0x0000000004ADA000-memory.dmp healer behavioral1/memory/2332-31-0x0000000004B90000-0x0000000004BA8000-memory.dmp healer behavioral1/memory/2332-32-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/2332-59-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/2332-57-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/2332-55-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/2332-54-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/2332-51-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/2332-50-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/2332-47-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/2332-45-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/2332-43-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/2332-41-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/2332-39-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/2332-37-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/2332-35-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/2332-33-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b8513tT.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b8513tT.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b8513tT.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b8513tT.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c99ig17.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c99ig17.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b8513tT.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b8513tT.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c99ig17.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c99ig17.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c99ig17.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c99ig17.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2928-67-0x00000000024B0000-0x00000000024F6000-memory.dmp family_redline behavioral1/memory/2928-68-0x0000000004AE0000-0x0000000004B24000-memory.dmp family_redline behavioral1/memory/2928-74-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2928-86-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2928-103-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2928-100-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2928-98-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2928-96-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2928-92-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2928-90-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2928-88-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2928-84-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2928-82-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2928-80-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2928-78-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2928-76-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2928-94-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2928-72-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2928-70-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2928-69-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 5 IoCs
pid Process 3004 tice2051.exe 3416 tice1010.exe 3092 b8513tT.exe 2332 c99ig17.exe 2928 dTXyl31.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c99ig17.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c99ig17.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b8513tT.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ffb4e4e1867206096ef841e367cc044a2a3e48240e29d8ffe7def65eae6b6135.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice2051.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice1010.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3248 2332 WerFault.exe 100 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dTXyl31.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffb4e4e1867206096ef841e367cc044a2a3e48240e29d8ffe7def65eae6b6135.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice2051.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice1010.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c99ig17.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3092 b8513tT.exe 3092 b8513tT.exe 2332 c99ig17.exe 2332 c99ig17.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3092 b8513tT.exe Token: SeDebugPrivilege 2332 c99ig17.exe Token: SeDebugPrivilege 2928 dTXyl31.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2804 wrote to memory of 3004 2804 ffb4e4e1867206096ef841e367cc044a2a3e48240e29d8ffe7def65eae6b6135.exe 85 PID 2804 wrote to memory of 3004 2804 ffb4e4e1867206096ef841e367cc044a2a3e48240e29d8ffe7def65eae6b6135.exe 85 PID 2804 wrote to memory of 3004 2804 ffb4e4e1867206096ef841e367cc044a2a3e48240e29d8ffe7def65eae6b6135.exe 85 PID 3004 wrote to memory of 3416 3004 tice2051.exe 87 PID 3004 wrote to memory of 3416 3004 tice2051.exe 87 PID 3004 wrote to memory of 3416 3004 tice2051.exe 87 PID 3416 wrote to memory of 3092 3416 tice1010.exe 88 PID 3416 wrote to memory of 3092 3416 tice1010.exe 88 PID 3416 wrote to memory of 2332 3416 tice1010.exe 100 PID 3416 wrote to memory of 2332 3416 tice1010.exe 100 PID 3416 wrote to memory of 2332 3416 tice1010.exe 100 PID 3004 wrote to memory of 2928 3004 tice2051.exe 111 PID 3004 wrote to memory of 2928 3004 tice2051.exe 111 PID 3004 wrote to memory of 2928 3004 tice2051.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\ffb4e4e1867206096ef841e367cc044a2a3e48240e29d8ffe7def65eae6b6135.exe"C:\Users\Admin\AppData\Local\Temp\ffb4e4e1867206096ef841e367cc044a2a3e48240e29d8ffe7def65eae6b6135.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice2051.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice2051.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice1010.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice1010.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8513tT.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8513tT.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3092
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c99ig17.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c99ig17.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2332 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2332 -s 10765⤵
- Program crash
PID:3248
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dTXyl31.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dTXyl31.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2928
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2332 -ip 23321⤵PID:1544
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
647KB
MD5c594c54bc5c5c498bd8968ca1672d4bf
SHA157c0af772956b2ecba9509fdd9b7bef0d02b26d5
SHA256f5fa3128ff4ca07a41592d3445be149bd238dab52f053e4a753b8fd78ceab6fa
SHA5129cbe11d8909d9a4c50e87b87df3a0f6004e2406af14d2bc4f6eff6c80c056210770cd3f37d63f613add61d9d2a9e977a1c30dbea7f544337840248c4399bbfa1
-
Filesize
283KB
MD561d43bd5b9db888f98125ead955776bb
SHA17f60a19e65cb98f77ada82e84464d20f737ef1f7
SHA2566ab8a1870b09da469ea768f91aceb6cf1ce28caea6ba946a3273d05ea5fd0414
SHA51227334d89c394619d2d8232118e165f75c2cfda43a8d75532a4d032d73813078bf7d415b63f95f12ff510102eec0531df62c34e091ae01a748a7a4a0cdf33cb06
-
Filesize
324KB
MD5395eeacf0ae124c03bf410d82dc6084c
SHA14cfd0096ad597c52f394c7967eaa98c0163bbaaf
SHA2567c959fa9c9ff8ef3527c0f8813e639b0f1ecb7fe9d1e64a22ed2a97990411b28
SHA51267c92dad7a95eccef0515380873c4cf7d9480452f3d03fc57d2b71b2f51a3898f8ae3ca07b43b76a93704668211e208a061f0820506a7ed08cdf19d86ecede03
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
225KB
MD5cf8904e16ab2731c2eae59a4027d527c
SHA12c040498cc56e4c89e3cec4e26a2009ac3db09bc
SHA256208099ca0b3a9b95e5bd36468248e22cafb60de715b5cb80449f8228b77eb3d7
SHA5120119ebda1335efdaa9496cf00fb95358852fdc939b831acb19ad009a4c7a11cf2f67236e758f0f9ce43fe5a95137ce19a449775300e2901f470abc5b2b8a041e