Analysis
-
max time kernel
142s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:19
Static task
static1
Behavioral task
behavioral1
Sample
3308a91305c6442e1a25b385eef51d19c20acee77dd33d1ebad4d1fc74dabf6c.exe
Resource
win10v2004-20241007-en
General
-
Target
3308a91305c6442e1a25b385eef51d19c20acee77dd33d1ebad4d1fc74dabf6c.exe
-
Size
793KB
-
MD5
2e59c9f7841bdb4aca12c31367b5f796
-
SHA1
53196b8fa606db4ed3232699b4504bf9b435ea56
-
SHA256
3308a91305c6442e1a25b385eef51d19c20acee77dd33d1ebad4d1fc74dabf6c
-
SHA512
9e8541140c43a5e61b24ae2a0557249541d9db45e9275af295b084e748a7398243e2a23fd813d510750e46d5d1158dc543550802efb6802604c0d1713085ce1c
-
SSDEEP
12288:bMrRy90NVpqAEfv/Nsmaybf4wJy0LNxVmhxNWIPwDlP4QKZT/NLg60cBOhpkyD6C:6y6MdH/iWc0JbmXVSWjm6wGlxwspi+O
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
resource yara_rule behavioral1/files/0x0008000000023cdb-19.dat healer behavioral1/memory/1900-22-0x0000000000F50000-0x0000000000F5A000-memory.dmp healer behavioral1/memory/4544-29-0x0000000002450000-0x000000000246A000-memory.dmp healer behavioral1/memory/4544-31-0x0000000002640000-0x0000000002658000-memory.dmp healer behavioral1/memory/4544-32-0x0000000002640000-0x0000000002652000-memory.dmp healer behavioral1/memory/4544-39-0x0000000002640000-0x0000000002652000-memory.dmp healer behavioral1/memory/4544-59-0x0000000002640000-0x0000000002652000-memory.dmp healer behavioral1/memory/4544-57-0x0000000002640000-0x0000000002652000-memory.dmp healer behavioral1/memory/4544-55-0x0000000002640000-0x0000000002652000-memory.dmp healer behavioral1/memory/4544-53-0x0000000002640000-0x0000000002652000-memory.dmp healer behavioral1/memory/4544-51-0x0000000002640000-0x0000000002652000-memory.dmp healer behavioral1/memory/4544-50-0x0000000002640000-0x0000000002652000-memory.dmp healer behavioral1/memory/4544-47-0x0000000002640000-0x0000000002652000-memory.dmp healer behavioral1/memory/4544-45-0x0000000002640000-0x0000000002652000-memory.dmp healer behavioral1/memory/4544-43-0x0000000002640000-0x0000000002652000-memory.dmp healer behavioral1/memory/4544-41-0x0000000002640000-0x0000000002652000-memory.dmp healer behavioral1/memory/4544-37-0x0000000002640000-0x0000000002652000-memory.dmp healer behavioral1/memory/4544-35-0x0000000002640000-0x0000000002652000-memory.dmp healer behavioral1/memory/4544-33-0x0000000002640000-0x0000000002652000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b1001IK.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c25fb93.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c25fb93.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b1001IK.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b1001IK.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b1001IK.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c25fb93.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c25fb93.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c25fb93.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c25fb93.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b1001IK.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b1001IK.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1068-67-0x0000000002430000-0x0000000002476000-memory.dmp family_redline behavioral1/memory/1068-68-0x00000000027B0000-0x00000000027F4000-memory.dmp family_redline behavioral1/memory/1068-88-0x00000000027B0000-0x00000000027EE000-memory.dmp family_redline behavioral1/memory/1068-90-0x00000000027B0000-0x00000000027EE000-memory.dmp family_redline behavioral1/memory/1068-102-0x00000000027B0000-0x00000000027EE000-memory.dmp family_redline behavioral1/memory/1068-100-0x00000000027B0000-0x00000000027EE000-memory.dmp family_redline behavioral1/memory/1068-98-0x00000000027B0000-0x00000000027EE000-memory.dmp family_redline behavioral1/memory/1068-97-0x00000000027B0000-0x00000000027EE000-memory.dmp family_redline behavioral1/memory/1068-94-0x00000000027B0000-0x00000000027EE000-memory.dmp family_redline behavioral1/memory/1068-93-0x00000000027B0000-0x00000000027EE000-memory.dmp family_redline behavioral1/memory/1068-86-0x00000000027B0000-0x00000000027EE000-memory.dmp family_redline behavioral1/memory/1068-84-0x00000000027B0000-0x00000000027EE000-memory.dmp family_redline behavioral1/memory/1068-82-0x00000000027B0000-0x00000000027EE000-memory.dmp family_redline behavioral1/memory/1068-80-0x00000000027B0000-0x00000000027EE000-memory.dmp family_redline behavioral1/memory/1068-78-0x00000000027B0000-0x00000000027EE000-memory.dmp family_redline behavioral1/memory/1068-76-0x00000000027B0000-0x00000000027EE000-memory.dmp family_redline behavioral1/memory/1068-74-0x00000000027B0000-0x00000000027EE000-memory.dmp family_redline behavioral1/memory/1068-72-0x00000000027B0000-0x00000000027EE000-memory.dmp family_redline behavioral1/memory/1068-70-0x00000000027B0000-0x00000000027EE000-memory.dmp family_redline behavioral1/memory/1068-69-0x00000000027B0000-0x00000000027EE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 5 IoCs
pid Process 2104 tice9592.exe 3076 tice1439.exe 1900 b1001IK.exe 4544 c25fb93.exe 1068 dRyaN21.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b1001IK.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c25fb93.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c25fb93.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3308a91305c6442e1a25b385eef51d19c20acee77dd33d1ebad4d1fc74dabf6c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice9592.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice1439.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4856 4544 WerFault.exe 100 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3308a91305c6442e1a25b385eef51d19c20acee77dd33d1ebad4d1fc74dabf6c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice9592.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice1439.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c25fb93.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dRyaN21.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1900 b1001IK.exe 1900 b1001IK.exe 4544 c25fb93.exe 4544 c25fb93.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1900 b1001IK.exe Token: SeDebugPrivilege 4544 c25fb93.exe Token: SeDebugPrivilege 1068 dRyaN21.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1092 wrote to memory of 2104 1092 3308a91305c6442e1a25b385eef51d19c20acee77dd33d1ebad4d1fc74dabf6c.exe 85 PID 1092 wrote to memory of 2104 1092 3308a91305c6442e1a25b385eef51d19c20acee77dd33d1ebad4d1fc74dabf6c.exe 85 PID 1092 wrote to memory of 2104 1092 3308a91305c6442e1a25b385eef51d19c20acee77dd33d1ebad4d1fc74dabf6c.exe 85 PID 2104 wrote to memory of 3076 2104 tice9592.exe 86 PID 2104 wrote to memory of 3076 2104 tice9592.exe 86 PID 2104 wrote to memory of 3076 2104 tice9592.exe 86 PID 3076 wrote to memory of 1900 3076 tice1439.exe 87 PID 3076 wrote to memory of 1900 3076 tice1439.exe 87 PID 3076 wrote to memory of 4544 3076 tice1439.exe 100 PID 3076 wrote to memory of 4544 3076 tice1439.exe 100 PID 3076 wrote to memory of 4544 3076 tice1439.exe 100 PID 2104 wrote to memory of 1068 2104 tice9592.exe 105 PID 2104 wrote to memory of 1068 2104 tice9592.exe 105 PID 2104 wrote to memory of 1068 2104 tice9592.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\3308a91305c6442e1a25b385eef51d19c20acee77dd33d1ebad4d1fc74dabf6c.exe"C:\Users\Admin\AppData\Local\Temp\3308a91305c6442e1a25b385eef51d19c20acee77dd33d1ebad4d1fc74dabf6c.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice9592.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice9592.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice1439.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice1439.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1001IK.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1001IK.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1900
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c25fb93.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c25fb93.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4544 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4544 -s 10165⤵
- Program crash
PID:4856
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dRyaN21.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dRyaN21.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1068
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4544 -ip 45441⤵PID:4868
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
648KB
MD5da515cddc9fa366a4165ebeeebae0019
SHA150040f4810e792646bad790ef82d547b7e450daf
SHA256cd4aeabbd82ffea91bdc61363182de86a33823e03ca96d61df810ae34e581a19
SHA512040f42940b6ff0b86ffce5b17a26ecce4caa840733f77a11cf86ae874a68f084b5e5c57ac085e89b1ee674fd534c410f366835f14a7d5600623b3cdb7afd2d0b
-
Filesize
284KB
MD51fbca08473fc190fcfcafb2c0ff6b722
SHA10ee0a366eff2963266d561da0f6aa80abc34bb96
SHA256e287f09f8ccc9761af47f59e91d904bf944a6ec7d905b8d0b7a425fb0450fbba
SHA512523ac845554d1eb3190523ce585baef5de6dfa2f53376b4a19b5238d4050da41e4231e18c8057ea244a4f4498edef8861980c31dacf1066c94b3c5363c95655d
-
Filesize
324KB
MD5cf85f33d86f8ba77e7c7f0d3e2849df0
SHA104bfc5808175f31d76ab2571ba0e74009eb5151e
SHA25668afb8818a26b9cfe93d262de1225e49cc3739a170656378c843f62fcf93bf07
SHA5121ffe4775bc85cbff50919fb8e1f315742eba3a788835889b19de031be20afaa4665419586fed78d338c28dd0929eada69f6ce1a192ae2fb6d45bac07556c7444
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
226KB
MD5e9ce794d7e869437a6e8e25bcd08241a
SHA1a58c0e49ff1640ce3148028e3ffbaefeb99e4bf2
SHA256d5c26afddce7972614376e96a4e8d3845f2cc756efbd1fe5b4f53802fe2824d2
SHA512f5f4eebd4a5fba323bffbf202182d07f0d3371f354bfe74fb402b3d6ecf7884e4a815c8721f78a91f127432149c7cbd899698d8017728034527c60706bbba4dd