Analysis
-
max time kernel
142s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 01:06
Static task
static1
Behavioral task
behavioral1
Sample
6d855887889e35ca86b799ba80988cb84e13876cbf04aad9a7f90d60cb9cd3d5.exe
Resource
win10v2004-20241007-en
General
-
Target
6d855887889e35ca86b799ba80988cb84e13876cbf04aad9a7f90d60cb9cd3d5.exe
-
Size
647KB
-
MD5
8ee00d298cfb42f24bb1c5f1356a2407
-
SHA1
51d5d729606371c8373859e354ae6efd6a44afbc
-
SHA256
6d855887889e35ca86b799ba80988cb84e13876cbf04aad9a7f90d60cb9cd3d5
-
SHA512
e881fb58b305d18c90ee2dc724f1e6aa405b8e6345f5daa135a14be342a1b6ca1e40614292806f5cb80f6662db851e18c4e51a3d2acbfbeafcf81905086e087e
-
SSDEEP
12288:hMrQy908MVtGPlLWbEGBOozcnEcL2zSwI++jiOOtwq0mo:Vyxq0gYlqlmPGt1w
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
resource yara_rule behavioral1/files/0x0008000000023cb7-11.dat healer behavioral1/memory/4308-15-0x0000000000010000-0x000000000001A000-memory.dmp healer behavioral1/memory/1076-22-0x00000000023A0000-0x00000000023BA000-memory.dmp healer behavioral1/memory/1076-24-0x0000000002600000-0x0000000002618000-memory.dmp healer behavioral1/memory/1076-36-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/1076-52-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/1076-50-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/1076-48-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/1076-46-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/1076-44-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/1076-42-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/1076-40-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/1076-39-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/1076-34-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/1076-32-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/1076-30-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/1076-28-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/1076-26-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/1076-25-0x0000000002600000-0x0000000002612000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c70gq54.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b0383xI.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b0383xI.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b0383xI.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c70gq54.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c70gq54.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c70gq54.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c70gq54.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b0383xI.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b0383xI.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b0383xI.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c70gq54.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/60-60-0x00000000049F0000-0x0000000004A36000-memory.dmp family_redline behavioral1/memory/60-61-0x0000000004AA0000-0x0000000004AE4000-memory.dmp family_redline behavioral1/memory/60-71-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/60-84-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/60-95-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/60-94-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/60-91-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/60-89-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/60-88-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/60-85-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/60-81-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/60-79-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/60-77-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/60-75-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/60-73-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/60-69-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/60-67-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/60-65-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/60-63-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/60-62-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 920 nice0927.exe 4308 b0383xI.exe 1076 c70gq54.exe 60 dMoYz11.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b0383xI.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c70gq54.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c70gq54.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6d855887889e35ca86b799ba80988cb84e13876cbf04aad9a7f90d60cb9cd3d5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nice0927.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3708 1076 WerFault.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6d855887889e35ca86b799ba80988cb84e13876cbf04aad9a7f90d60cb9cd3d5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nice0927.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c70gq54.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dMoYz11.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4308 b0383xI.exe 4308 b0383xI.exe 1076 c70gq54.exe 1076 c70gq54.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4308 b0383xI.exe Token: SeDebugPrivilege 1076 c70gq54.exe Token: SeDebugPrivilege 60 dMoYz11.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3428 wrote to memory of 920 3428 6d855887889e35ca86b799ba80988cb84e13876cbf04aad9a7f90d60cb9cd3d5.exe 83 PID 3428 wrote to memory of 920 3428 6d855887889e35ca86b799ba80988cb84e13876cbf04aad9a7f90d60cb9cd3d5.exe 83 PID 3428 wrote to memory of 920 3428 6d855887889e35ca86b799ba80988cb84e13876cbf04aad9a7f90d60cb9cd3d5.exe 83 PID 920 wrote to memory of 4308 920 nice0927.exe 84 PID 920 wrote to memory of 4308 920 nice0927.exe 84 PID 920 wrote to memory of 1076 920 nice0927.exe 93 PID 920 wrote to memory of 1076 920 nice0927.exe 93 PID 920 wrote to memory of 1076 920 nice0927.exe 93 PID 3428 wrote to memory of 60 3428 6d855887889e35ca86b799ba80988cb84e13876cbf04aad9a7f90d60cb9cd3d5.exe 97 PID 3428 wrote to memory of 60 3428 6d855887889e35ca86b799ba80988cb84e13876cbf04aad9a7f90d60cb9cd3d5.exe 97 PID 3428 wrote to memory of 60 3428 6d855887889e35ca86b799ba80988cb84e13876cbf04aad9a7f90d60cb9cd3d5.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d855887889e35ca86b799ba80988cb84e13876cbf04aad9a7f90d60cb9cd3d5.exe"C:\Users\Admin\AppData\Local\Temp\6d855887889e35ca86b799ba80988cb84e13876cbf04aad9a7f90d60cb9cd3d5.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nice0927.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nice0927.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b0383xI.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b0383xI.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4308
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c70gq54.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c70gq54.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1076 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1076 -s 10884⤵
- Program crash
PID:3708
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dMoYz11.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dMoYz11.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:60
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1076 -ip 10761⤵PID:4436
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
305KB
MD56d8433b885bdccea71f1712c75c0de8c
SHA1957a15fa40c7787fe4829fb12bc3f0793577d4d5
SHA2568a02b9f03d26c260ba97dab334f2ccedd911b0e789b57938c6aa6e7e6d5f21b0
SHA512d0db58aebc89db9169d7529a5f89a2a7c209166bb5f4cfae8ece7cd041653e5272dd852dffa9797dad127829a27db785492e1aa3b87221dea85826f89bc62f36
-
Filesize
324KB
MD53394d076c09359c81b4ce4eb7b9b5357
SHA1852c1488cfb492faddd327c748ccddb3daa2ad44
SHA25637a65701220122327df200040d07a4de4210d6e2288aef68bd863f969bc58caa
SHA5122a27994279b409d6f5e8fa660d0e66cf8fdc57a6fd27f60daa4517bdcd442535ab23ff86e3dd0985594548379c6560bdbf2284f316007ed8d8eac296e3485fb2
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
247KB
MD585842a03077894655565a1fd86d8c7ea
SHA1f2aa1dd755030763129fa71ce8b1e75659cfe801
SHA256d6763faa8824f1108fbd82a7babbe55293d7ae02cd88c1c755ecfe75ae293572
SHA512689de477fafe12d28f58830838d0c26988b666bc5597e97b13fe6bb25b319b7d76d7378239dde899309949772290c36848bd1b97063b53e9a891f5c6e71b02dd