Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 00:49
Static task
static1
Behavioral task
behavioral1
Sample
d4f296ae83f36dca5762be2418307d5d22b217e4eb06afb32339e49a07e18f97.exe
Resource
win10v2004-20241007-en
General
-
Target
d4f296ae83f36dca5762be2418307d5d22b217e4eb06afb32339e49a07e18f97.exe
-
Size
787KB
-
MD5
aab28a1988e2d873ba8a1c509c00cb8f
-
SHA1
7d3b8e7d1f84278e8e16895df30e1411fe906e1e
-
SHA256
d4f296ae83f36dca5762be2418307d5d22b217e4eb06afb32339e49a07e18f97
-
SHA512
9113213d0261133cb9c57ee4dc42b022d0278a8cac84ab385a386ac1c9caf6626722c3397c2bc190a1ee5833ce1813a3100ab3a545212f363d7737fa6d328008
-
SSDEEP
24576:ayLBpY9iLT7YjNrdG4hdMO0Jo27oSmfRBi:hL7Y9iP7Yux/Jo0oSYX
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
resource yara_rule behavioral1/files/0x0008000000023c82-19.dat healer behavioral1/memory/3672-22-0x0000000000DD0000-0x0000000000DDA000-memory.dmp healer behavioral1/memory/956-29-0x0000000002260000-0x000000000227A000-memory.dmp healer behavioral1/memory/956-31-0x0000000002500000-0x0000000002518000-memory.dmp healer behavioral1/memory/956-33-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/956-37-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/956-59-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/956-57-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/956-55-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/956-53-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/956-51-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/956-49-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/956-45-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/956-43-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/956-41-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/956-35-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/956-47-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/956-39-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/956-32-0x0000000002500000-0x0000000002512000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b9456Qh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b9456Qh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b9456Qh.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c55kk89.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c55kk89.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c55kk89.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c55kk89.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b9456Qh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b9456Qh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b9456Qh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c55kk89.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c55kk89.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2432-67-0x00000000023D0000-0x0000000002416000-memory.dmp family_redline behavioral1/memory/2432-68-0x0000000004AF0000-0x0000000004B34000-memory.dmp family_redline behavioral1/memory/2432-74-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/2432-88-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/2432-102-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/2432-98-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/2432-96-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/2432-94-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/2432-92-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/2432-90-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/2432-87-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/2432-84-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/2432-82-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/2432-81-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/2432-78-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/2432-76-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/2432-100-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/2432-72-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/2432-70-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/2432-69-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 5 IoCs
pid Process 2528 tice6895.exe 3792 tice7126.exe 3672 b9456Qh.exe 956 c55kk89.exe 2432 dsqXm79.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b9456Qh.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c55kk89.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c55kk89.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d4f296ae83f36dca5762be2418307d5d22b217e4eb06afb32339e49a07e18f97.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice6895.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice7126.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3808 956 WerFault.exe 98 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c55kk89.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dsqXm79.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d4f296ae83f36dca5762be2418307d5d22b217e4eb06afb32339e49a07e18f97.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice6895.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice7126.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3672 b9456Qh.exe 3672 b9456Qh.exe 956 c55kk89.exe 956 c55kk89.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3672 b9456Qh.exe Token: SeDebugPrivilege 956 c55kk89.exe Token: SeDebugPrivilege 2432 dsqXm79.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4416 wrote to memory of 2528 4416 d4f296ae83f36dca5762be2418307d5d22b217e4eb06afb32339e49a07e18f97.exe 83 PID 4416 wrote to memory of 2528 4416 d4f296ae83f36dca5762be2418307d5d22b217e4eb06afb32339e49a07e18f97.exe 83 PID 4416 wrote to memory of 2528 4416 d4f296ae83f36dca5762be2418307d5d22b217e4eb06afb32339e49a07e18f97.exe 83 PID 2528 wrote to memory of 3792 2528 tice6895.exe 84 PID 2528 wrote to memory of 3792 2528 tice6895.exe 84 PID 2528 wrote to memory of 3792 2528 tice6895.exe 84 PID 3792 wrote to memory of 3672 3792 tice7126.exe 85 PID 3792 wrote to memory of 3672 3792 tice7126.exe 85 PID 3792 wrote to memory of 956 3792 tice7126.exe 98 PID 3792 wrote to memory of 956 3792 tice7126.exe 98 PID 3792 wrote to memory of 956 3792 tice7126.exe 98 PID 2528 wrote to memory of 2432 2528 tice6895.exe 109 PID 2528 wrote to memory of 2432 2528 tice6895.exe 109 PID 2528 wrote to memory of 2432 2528 tice6895.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4f296ae83f36dca5762be2418307d5d22b217e4eb06afb32339e49a07e18f97.exe"C:\Users\Admin\AppData\Local\Temp\d4f296ae83f36dca5762be2418307d5d22b217e4eb06afb32339e49a07e18f97.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice6895.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice6895.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice7126.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice7126.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9456Qh.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9456Qh.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3672
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c55kk89.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c55kk89.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:956 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 956 -s 10845⤵
- Program crash
PID:3808
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dsqXm79.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dsqXm79.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2432
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 956 -ip 9561⤵PID:1660
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
642KB
MD54a60b4d1a3684878a7ea4757195a1488
SHA1391a3c5300809ef43194445699b60a5865b1507e
SHA2569e82303e4dc7a29705e0cdc2995dc4f7b1d68967ac707d0a3d8bac0b47bf1680
SHA512a96c47b247fea9af9b4e3f779ee9b449bbca471b74559c8cf6665158a87a8e9fd97d188925229919f5a78b97deed38a95589bdb0b4326cecc5370931295f2b26
-
Filesize
294KB
MD5258295fd28cf077c70f068d5bd224880
SHA1498e8bff1a51f839fbe1bfddc483b9ddad4b12c7
SHA256c3fff0b1044e4c79988d33b29666ec6aaffa8d2f5d66bc16fa252e35ffe95c0b
SHA5125515954388bc322f74797ccda4ee414c23e522eb6cfbd5b72a74544c36cb96889331820fee03b2fb24ea24e9510601e0fd4a08c5063d93232fa95d882a2eccb1
-
Filesize
322KB
MD57e9fae1626ef40b131c3c964e1936eb9
SHA13b66778f2c212bbe0bc4f527d54ba925d3b254ef
SHA2562b630ef46a8f227060625f757df8b9d12e15b394b871a397025807dd4cfb7f3c
SHA5128fe8a6bdd14827bb84903a84cec9dd6d84b173cbe2240c6db11c760ecf24a9222bdaeda26d964166e9ef64e5b024e78355067f86c0c17fe65531470509ae327f
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
236KB
MD5709a5fb14b4ed75e24bcec63229bcd9a
SHA1b5218085d7d5704a2a002c0920855c23af53f85a
SHA256cc66a2798c1a463d3d2cb32d30977915d01332855c87f832d10aba442d4f8159
SHA5120ccc8aa13bdca04149c19b77d207de736f2f2f6eb4702955b27a41df5fd9c290fbac5fc2bc6e6702df8894215e62921784fa06d76365bcb836c68ca560c69b2b