Analysis
-
max time kernel
141s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 00:41
Static task
static1
Behavioral task
behavioral1
Sample
b4f47b37f2a291ebf179018f59a6bea960a525dbd08293fcc42f139e67a5bc40.exe
Resource
win10v2004-20241007-en
General
-
Target
b4f47b37f2a291ebf179018f59a6bea960a525dbd08293fcc42f139e67a5bc40.exe
-
Size
876KB
-
MD5
ad580e44d3d13177d843cb2d0dea3e2b
-
SHA1
ff33ddf7651553df1f604136bc446900a5edf6b0
-
SHA256
b4f47b37f2a291ebf179018f59a6bea960a525dbd08293fcc42f139e67a5bc40
-
SHA512
e7e37e6846915d4c5f77b409e41453c23f7b46e25178db0277a196a6143a4672e1b434d73f4d9fc03574f8696085c3147114ace84a13f30edbe38aa4daccf517
-
SSDEEP
24576:8ykABV26X/rQhlNQ87dlhnHxq2SaxKYi:rkABc6X0HNRZRq2SMr
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
resource yara_rule behavioral1/files/0x000b000000023b7a-19.dat healer behavioral1/memory/1472-22-0x00000000001F0000-0x00000000001FA000-memory.dmp healer behavioral1/memory/3192-29-0x0000000004A20000-0x0000000004A3A000-memory.dmp healer behavioral1/memory/3192-31-0x0000000004D70000-0x0000000004D88000-memory.dmp healer behavioral1/memory/3192-45-0x0000000004D70000-0x0000000004D82000-memory.dmp healer behavioral1/memory/3192-59-0x0000000004D70000-0x0000000004D82000-memory.dmp healer behavioral1/memory/3192-57-0x0000000004D70000-0x0000000004D82000-memory.dmp healer behavioral1/memory/3192-55-0x0000000004D70000-0x0000000004D82000-memory.dmp healer behavioral1/memory/3192-53-0x0000000004D70000-0x0000000004D82000-memory.dmp healer behavioral1/memory/3192-51-0x0000000004D70000-0x0000000004D82000-memory.dmp healer behavioral1/memory/3192-49-0x0000000004D70000-0x0000000004D82000-memory.dmp healer behavioral1/memory/3192-48-0x0000000004D70000-0x0000000004D82000-memory.dmp healer behavioral1/memory/3192-43-0x0000000004D70000-0x0000000004D82000-memory.dmp healer behavioral1/memory/3192-42-0x0000000004D70000-0x0000000004D82000-memory.dmp healer behavioral1/memory/3192-39-0x0000000004D70000-0x0000000004D82000-memory.dmp healer behavioral1/memory/3192-37-0x0000000004D70000-0x0000000004D82000-memory.dmp healer behavioral1/memory/3192-36-0x0000000004D70000-0x0000000004D82000-memory.dmp healer behavioral1/memory/3192-33-0x0000000004D70000-0x0000000004D82000-memory.dmp healer behavioral1/memory/3192-32-0x0000000004D70000-0x0000000004D82000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c95Ow42.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b7980Fe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b7980Fe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b7980Fe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b7980Fe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b7980Fe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b7980Fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c95Ow42.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c95Ow42.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c95Ow42.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c95Ow42.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c95Ow42.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4640-66-0x0000000004B60000-0x0000000004BA6000-memory.dmp family_redline behavioral1/memory/4640-67-0x0000000004D00000-0x0000000004D44000-memory.dmp family_redline behavioral1/memory/4640-81-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4640-85-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4640-83-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4640-101-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4640-97-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4640-93-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4640-89-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4640-87-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4640-100-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4640-95-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4640-91-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4640-79-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4640-77-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4640-75-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4640-73-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4640-71-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4640-69-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4640-68-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 5 IoCs
pid Process 2408 tice5620.exe 1256 tice4957.exe 1472 b7980Fe.exe 3192 c95Ow42.exe 4640 dMauW73.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b7980Fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c95Ow42.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c95Ow42.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b4f47b37f2a291ebf179018f59a6bea960a525dbd08293fcc42f139e67a5bc40.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice5620.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice4957.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2144 3192 WerFault.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b4f47b37f2a291ebf179018f59a6bea960a525dbd08293fcc42f139e67a5bc40.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice5620.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice4957.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c95Ow42.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dMauW73.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1472 b7980Fe.exe 1472 b7980Fe.exe 3192 c95Ow42.exe 3192 c95Ow42.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1472 b7980Fe.exe Token: SeDebugPrivilege 3192 c95Ow42.exe Token: SeDebugPrivilege 4640 dMauW73.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1104 wrote to memory of 2408 1104 b4f47b37f2a291ebf179018f59a6bea960a525dbd08293fcc42f139e67a5bc40.exe 84 PID 1104 wrote to memory of 2408 1104 b4f47b37f2a291ebf179018f59a6bea960a525dbd08293fcc42f139e67a5bc40.exe 84 PID 1104 wrote to memory of 2408 1104 b4f47b37f2a291ebf179018f59a6bea960a525dbd08293fcc42f139e67a5bc40.exe 84 PID 2408 wrote to memory of 1256 2408 tice5620.exe 85 PID 2408 wrote to memory of 1256 2408 tice5620.exe 85 PID 2408 wrote to memory of 1256 2408 tice5620.exe 85 PID 1256 wrote to memory of 1472 1256 tice4957.exe 87 PID 1256 wrote to memory of 1472 1256 tice4957.exe 87 PID 1256 wrote to memory of 3192 1256 tice4957.exe 95 PID 1256 wrote to memory of 3192 1256 tice4957.exe 95 PID 1256 wrote to memory of 3192 1256 tice4957.exe 95 PID 2408 wrote to memory of 4640 2408 tice5620.exe 102 PID 2408 wrote to memory of 4640 2408 tice5620.exe 102 PID 2408 wrote to memory of 4640 2408 tice5620.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4f47b37f2a291ebf179018f59a6bea960a525dbd08293fcc42f139e67a5bc40.exe"C:\Users\Admin\AppData\Local\Temp\b4f47b37f2a291ebf179018f59a6bea960a525dbd08293fcc42f139e67a5bc40.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice5620.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice5620.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice4957.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice4957.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7980Fe.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7980Fe.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1472
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c95Ow42.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c95Ow42.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3192 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3192 -s 10805⤵
- Program crash
PID:2144
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dMauW73.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dMauW73.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4640
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3192 -ip 31921⤵PID:2420
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
731KB
MD52453e64b6aa409995bc6d8b45738325a
SHA1957aa886c9a5d9121adff4a9371d70b092a0293f
SHA256174942d48938fccf4d6313a919fcc7ceaaa8690dd6b2d972181dbca9208d5a9b
SHA512ff1fd5d9c555618b603429bbdb6e67896d97df5ba67d707a60e4782bf07d9703a131398c1572e1f55f43d458e104316cc90bb38f089d82d59bdb1b2887948ec7
-
Filesize
409KB
MD5008e88f8c639035f119210b97a7291eb
SHA13fbb2f34b5d1ff10a53d9e69716cae4ff93b7cb5
SHA25605f8ad30ea5dbdd6d3d639cf65326f2c3b6c7c3920f52d2431483fecc3c297f0
SHA51288cb3dedae78d2b9bca415ab2f42d14bc041068b808f6c4586060f9ce2ee075cf1d8ccbb2c80e5231e466ca08b8335f857c70c77d2e80c8be706396a4ba28380
-
Filesize
366KB
MD5df454d135f78be75f6a896ee184539ba
SHA1a1dfb347175968c3b750d0e849dba7cf9037bb21
SHA256f2479c60e8aae54cc5fe3b7b64bccbb8b59b284630cc0fca487f65f2e9941c47
SHA512b4e20575198133bdf3f106e9ae7db6a384fcd53ecefbca0116ee15c171a9d873576e2e3326a90ff45ea1868d1acb16b398b4ef45123a57f5132a6538efc43cc2
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
351KB
MD5ff97201841037b87efcbeb55d17d6670
SHA1b3d6e3043fecb4e19001ae13c7b507a01fce44e5
SHA2567ac9f43b85afcac4f40bdf6abb1182815629a8175fed322042662ffe060fa5d3
SHA512f5f0cb2ad3be383cfa4c24d8841b7a0cbd68852fd4b6f7cbb4fd70fc6436df37df9659e9477b1edefac03ebab2fe8785f8d0d369200470322e575ac01aa7b2c0