Analysis
-
max time kernel
142s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 00:56
Static task
static1
Behavioral task
behavioral1
Sample
8ac81b5a358c0ea15b382cd5968c3ddb49e476e9959a7c643a62af081cb33ac2.exe
Resource
win10v2004-20241007-en
General
-
Target
8ac81b5a358c0ea15b382cd5968c3ddb49e476e9959a7c643a62af081cb33ac2.exe
-
Size
641KB
-
MD5
243ed9a8b6f6f3807e337e4ceed037d6
-
SHA1
09d603fa184584eb6be464f15358de9634ad5864
-
SHA256
8ac81b5a358c0ea15b382cd5968c3ddb49e476e9959a7c643a62af081cb33ac2
-
SHA512
8491f6a99d5a5a15a11468d50c0654e500d67c537e50b19926e4c6db0e139e6b3d3df95f875f1b8b52981e8ce33b91b6cacf0814f6dacce00c46e299db992945
-
SSDEEP
12288:8Mrdy90BQ9sVRnytki2iTaq8uMMXueRXDCJFT3t+vhz/AEgpr:xy+QWVRaN2iu13MeqKT3tEhJgpr
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
resource yara_rule behavioral1/files/0x000b000000023b8b-12.dat healer behavioral1/memory/3480-15-0x0000000000370000-0x000000000037A000-memory.dmp healer behavioral1/memory/4872-22-0x0000000000860000-0x000000000087A000-memory.dmp healer behavioral1/memory/4872-24-0x0000000002320000-0x0000000002338000-memory.dmp healer behavioral1/memory/4872-52-0x0000000002320000-0x0000000002332000-memory.dmp healer behavioral1/memory/4872-50-0x0000000002320000-0x0000000002332000-memory.dmp healer behavioral1/memory/4872-48-0x0000000002320000-0x0000000002332000-memory.dmp healer behavioral1/memory/4872-47-0x0000000002320000-0x0000000002332000-memory.dmp healer behavioral1/memory/4872-44-0x0000000002320000-0x0000000002332000-memory.dmp healer behavioral1/memory/4872-42-0x0000000002320000-0x0000000002332000-memory.dmp healer behavioral1/memory/4872-40-0x0000000002320000-0x0000000002332000-memory.dmp healer behavioral1/memory/4872-38-0x0000000002320000-0x0000000002332000-memory.dmp healer behavioral1/memory/4872-36-0x0000000002320000-0x0000000002332000-memory.dmp healer behavioral1/memory/4872-35-0x0000000002320000-0x0000000002332000-memory.dmp healer behavioral1/memory/4872-32-0x0000000002320000-0x0000000002332000-memory.dmp healer behavioral1/memory/4872-30-0x0000000002320000-0x0000000002332000-memory.dmp healer behavioral1/memory/4872-28-0x0000000002320000-0x0000000002332000-memory.dmp healer behavioral1/memory/4872-26-0x0000000002320000-0x0000000002332000-memory.dmp healer behavioral1/memory/4872-25-0x0000000002320000-0x0000000002332000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b2722FV.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b2722FV.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b2722FV.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c87Cn49.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c87Cn49.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b2722FV.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b2722FV.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c87Cn49.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c87Cn49.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c87Cn49.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c87Cn49.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b2722FV.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1152-60-0x00000000049B0000-0x00000000049F6000-memory.dmp family_redline behavioral1/memory/1152-61-0x0000000004AA0000-0x0000000004AE4000-memory.dmp family_redline behavioral1/memory/1152-83-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/1152-85-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/1152-95-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/1152-93-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/1152-91-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/1152-89-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/1152-87-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/1152-81-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/1152-79-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/1152-77-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/1152-75-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/1152-73-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/1152-71-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/1152-69-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/1152-67-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/1152-65-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/1152-63-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/1152-62-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 4968 nice7974.exe 3480 b2722FV.exe 4872 c87Cn49.exe 1152 dpFSz07.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b2722FV.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c87Cn49.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c87Cn49.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8ac81b5a358c0ea15b382cd5968c3ddb49e476e9959a7c643a62af081cb33ac2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nice7974.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1628 sc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2020 4872 WerFault.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nice7974.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c87Cn49.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpFSz07.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8ac81b5a358c0ea15b382cd5968c3ddb49e476e9959a7c643a62af081cb33ac2.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3480 b2722FV.exe 3480 b2722FV.exe 4872 c87Cn49.exe 4872 c87Cn49.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3480 b2722FV.exe Token: SeDebugPrivilege 4872 c87Cn49.exe Token: SeDebugPrivilege 1152 dpFSz07.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 316 wrote to memory of 4968 316 8ac81b5a358c0ea15b382cd5968c3ddb49e476e9959a7c643a62af081cb33ac2.exe 83 PID 316 wrote to memory of 4968 316 8ac81b5a358c0ea15b382cd5968c3ddb49e476e9959a7c643a62af081cb33ac2.exe 83 PID 316 wrote to memory of 4968 316 8ac81b5a358c0ea15b382cd5968c3ddb49e476e9959a7c643a62af081cb33ac2.exe 83 PID 4968 wrote to memory of 3480 4968 nice7974.exe 84 PID 4968 wrote to memory of 3480 4968 nice7974.exe 84 PID 4968 wrote to memory of 4872 4968 nice7974.exe 93 PID 4968 wrote to memory of 4872 4968 nice7974.exe 93 PID 4968 wrote to memory of 4872 4968 nice7974.exe 93 PID 316 wrote to memory of 1152 316 8ac81b5a358c0ea15b382cd5968c3ddb49e476e9959a7c643a62af081cb33ac2.exe 97 PID 316 wrote to memory of 1152 316 8ac81b5a358c0ea15b382cd5968c3ddb49e476e9959a7c643a62af081cb33ac2.exe 97 PID 316 wrote to memory of 1152 316 8ac81b5a358c0ea15b382cd5968c3ddb49e476e9959a7c643a62af081cb33ac2.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ac81b5a358c0ea15b382cd5968c3ddb49e476e9959a7c643a62af081cb33ac2.exe"C:\Users\Admin\AppData\Local\Temp\8ac81b5a358c0ea15b382cd5968c3ddb49e476e9959a7c643a62af081cb33ac2.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nice7974.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nice7974.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b2722FV.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b2722FV.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3480
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c87Cn49.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c87Cn49.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4872 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 10684⤵
- Program crash
PID:2020
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dpFSz07.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dpFSz07.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1152
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4872 -ip 48721⤵PID:4352
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:1628
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
297KB
MD54eb9a6a493399242859c04b2bf46d1a7
SHA14b7b6d3c6a5fa2eda54df94521f564ef52e6c58b
SHA2567d9bc4e6a41938d1ea67f1e6b41ca2c2458311c09f62a09d1c403c4ba7916e88
SHA512e10e5ec68778156846f76324352041e1317920eca92a23aeef07e785611933a9529e99712a8658207080d98997799022e71906bd86f125b8f7b9b596c90808ce
-
Filesize
321KB
MD55cc415c370da0a97eb89daf6b125bb9e
SHA13090685895f714da1dc39e619ff7789d12fa891a
SHA256a0995fd8f873e0dcba89746bbdc12cdb6d2b35ebe2dc22705d6704dadd110aab
SHA512488f5f3faedf488cd6e067ee1e04dd78178d9e0f7ca9531a8c1183c01f022095198ef15fdeffb2fb53666916c168b6ed70780d31f265971aa216d9650c8991a2
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
239KB
MD52555fe06d48f1362fadafaedc0488554
SHA1c6ac8ee53d966a0a844bc7dfa7fc7e170d1df49b
SHA2562f2e7e9cc1e87471ba2986b5a24b38d7689785d3d35f9c9d89b80a22bc6c041b
SHA512f30653dcf9dd6c6d208614cc92f25913a864b8ce28440200d45dd9e873a0685a08043c85e3cf33059a684b33e05243c8c4397d5cdee38290b532a5c9980ca78a