Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/11/2024, 05:29
Static task
static1
Behavioral task
behavioral1
Sample
d9db41aa7387ad4e8d3c92933550ea9e8b0ff1904928a42975a502554d9747b5.exe
Resource
win10v2004-20241007-en
General
-
Target
d9db41aa7387ad4e8d3c92933550ea9e8b0ff1904928a42975a502554d9747b5.exe
-
Size
793KB
-
MD5
0b610df1dbaa5cb0f0dfa51fb6e91cc2
-
SHA1
8a10e8905c611224fdeb9bb2a54d01017318ad7c
-
SHA256
d9db41aa7387ad4e8d3c92933550ea9e8b0ff1904928a42975a502554d9747b5
-
SHA512
4b97faa00e35c3ac5f5189bd76a2b31eb78d5a82d05fdae51c9a618de1289a06f836ee1a7b09ed103fc0813ef89ba27ac10e7ce67d27ac8c95aec8675fc2b859
-
SSDEEP
24576:RyBKdVQvZmHESrdvOSRyqjOvhxLNcMEQ:EBKdSvZmkYv9yzLNcl
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
resource yara_rule behavioral1/files/0x0008000000023ca1-19.dat healer behavioral1/memory/1772-22-0x0000000000220000-0x000000000022A000-memory.dmp healer behavioral1/memory/4952-29-0x0000000002250000-0x000000000226A000-memory.dmp healer behavioral1/memory/4952-31-0x0000000002500000-0x0000000002518000-memory.dmp healer behavioral1/memory/4952-58-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/4952-55-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/4952-53-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/4952-51-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/4952-49-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/4952-48-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/4952-45-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/4952-43-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/4952-41-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/4952-39-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/4952-37-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/4952-35-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/4952-59-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/4952-33-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/4952-32-0x0000000002500000-0x0000000002512000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b4171MN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b4171MN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b4171MN.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c54dl18.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c54dl18.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c54dl18.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b4171MN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b4171MN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b4171MN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c54dl18.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c54dl18.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c54dl18.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4024-67-0x0000000002480000-0x00000000024C6000-memory.dmp family_redline behavioral1/memory/4024-68-0x0000000004AD0000-0x0000000004B14000-memory.dmp family_redline behavioral1/memory/4024-74-0x0000000004AD0000-0x0000000004B0E000-memory.dmp family_redline behavioral1/memory/4024-78-0x0000000004AD0000-0x0000000004B0E000-memory.dmp family_redline behavioral1/memory/4024-76-0x0000000004AD0000-0x0000000004B0E000-memory.dmp family_redline behavioral1/memory/4024-100-0x0000000004AD0000-0x0000000004B0E000-memory.dmp family_redline behavioral1/memory/4024-86-0x0000000004AD0000-0x0000000004B0E000-memory.dmp family_redline behavioral1/memory/4024-72-0x0000000004AD0000-0x0000000004B0E000-memory.dmp family_redline behavioral1/memory/4024-70-0x0000000004AD0000-0x0000000004B0E000-memory.dmp family_redline behavioral1/memory/4024-69-0x0000000004AD0000-0x0000000004B0E000-memory.dmp family_redline behavioral1/memory/4024-102-0x0000000004AD0000-0x0000000004B0E000-memory.dmp family_redline behavioral1/memory/4024-98-0x0000000004AD0000-0x0000000004B0E000-memory.dmp family_redline behavioral1/memory/4024-96-0x0000000004AD0000-0x0000000004B0E000-memory.dmp family_redline behavioral1/memory/4024-94-0x0000000004AD0000-0x0000000004B0E000-memory.dmp family_redline behavioral1/memory/4024-92-0x0000000004AD0000-0x0000000004B0E000-memory.dmp family_redline behavioral1/memory/4024-90-0x0000000004AD0000-0x0000000004B0E000-memory.dmp family_redline behavioral1/memory/4024-88-0x0000000004AD0000-0x0000000004B0E000-memory.dmp family_redline behavioral1/memory/4024-84-0x0000000004AD0000-0x0000000004B0E000-memory.dmp family_redline behavioral1/memory/4024-82-0x0000000004AD0000-0x0000000004B0E000-memory.dmp family_redline behavioral1/memory/4024-80-0x0000000004AD0000-0x0000000004B0E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 5 IoCs
pid Process 556 tice3951.exe 3636 tice3692.exe 1772 b4171MN.exe 4952 c54dl18.exe 4024 dhZky01.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b4171MN.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c54dl18.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c54dl18.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d9db41aa7387ad4e8d3c92933550ea9e8b0ff1904928a42975a502554d9747b5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice3951.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice3692.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2700 sc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1856 4952 WerFault.exe 94 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d9db41aa7387ad4e8d3c92933550ea9e8b0ff1904928a42975a502554d9747b5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice3951.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice3692.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c54dl18.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dhZky01.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1772 b4171MN.exe 1772 b4171MN.exe 4952 c54dl18.exe 4952 c54dl18.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1772 b4171MN.exe Token: SeDebugPrivilege 4952 c54dl18.exe Token: SeDebugPrivilege 4024 dhZky01.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 980 wrote to memory of 556 980 d9db41aa7387ad4e8d3c92933550ea9e8b0ff1904928a42975a502554d9747b5.exe 83 PID 980 wrote to memory of 556 980 d9db41aa7387ad4e8d3c92933550ea9e8b0ff1904928a42975a502554d9747b5.exe 83 PID 980 wrote to memory of 556 980 d9db41aa7387ad4e8d3c92933550ea9e8b0ff1904928a42975a502554d9747b5.exe 83 PID 556 wrote to memory of 3636 556 tice3951.exe 84 PID 556 wrote to memory of 3636 556 tice3951.exe 84 PID 556 wrote to memory of 3636 556 tice3951.exe 84 PID 3636 wrote to memory of 1772 3636 tice3692.exe 86 PID 3636 wrote to memory of 1772 3636 tice3692.exe 86 PID 3636 wrote to memory of 4952 3636 tice3692.exe 94 PID 3636 wrote to memory of 4952 3636 tice3692.exe 94 PID 3636 wrote to memory of 4952 3636 tice3692.exe 94 PID 556 wrote to memory of 4024 556 tice3951.exe 98 PID 556 wrote to memory of 4024 556 tice3951.exe 98 PID 556 wrote to memory of 4024 556 tice3951.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9db41aa7387ad4e8d3c92933550ea9e8b0ff1904928a42975a502554d9747b5.exe"C:\Users\Admin\AppData\Local\Temp\d9db41aa7387ad4e8d3c92933550ea9e8b0ff1904928a42975a502554d9747b5.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice3951.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice3951.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice3692.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice3692.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4171MN.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4171MN.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1772
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c54dl18.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c54dl18.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4952 -s 10845⤵
- Program crash
PID:1856
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dhZky01.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dhZky01.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4024
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4952 -ip 49521⤵PID:4056
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2700
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
648KB
MD5eb51517a9ddbbe76a8e9787511dbeced
SHA151fc64ac1cd4dc82f8e9ca522b76b076a01fb7d1
SHA2568333ab5eb818ef24d3f7fbaeb6888a7b0df3a7308d9f3914affc8b7ec11e429f
SHA512e33f0840addf5d16b5bebd43f2c00c6a69201de32f24dd622cca8cff6d34c4ba8bb283811bde7188aef3ff2441997be571bdb98dde2f12a13a8ef96b6a4f3525
-
Filesize
284KB
MD50a0f197b31d4018db1e2720dd75c87eb
SHA1c4013a2529376133129740e4bad5d56e3d792ff8
SHA256169aa6c877eab49baec3baaf1df5d2c0892013d8492a65fdbb81e785a912e64d
SHA512e60829baba9c1e41a3257877741d7c3501317569b2cc4e1d8d327909f0319327e308fe30897fe17e9ccb301e4360f3fe4c2cffe1c616eadb7a436b5a67b9fba8
-
Filesize
324KB
MD5e694ca67906ac5ae51d3bc960e5a353b
SHA1c734250769e4b48833d6f1e572bf713df1f1dae8
SHA2563a51c60efe024581ccb36291e21bc0200e6d1eb9591c5e3e5949931166b07c5a
SHA5122fa52db9802917ac28a412866cb76a34fa6d167650d0da98cf6be3b4844821125791ef145f822cd94d251b885328c500a973dde60120923028c28ec99fbcf76a
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
226KB
MD518cce37b2ab3c77b46e7a86fbf8b6153
SHA15dc1ae3bc295fa295e7e2ff2e059af5359afceab
SHA256d9541caeab14d4c64aacb094ec442c323c50abc3554596d07ce8ae7d766a4815
SHA512d32ade4fdd2a62d69e27b6c32f4ee6b6decd43ddb9874361299bde53937eefc0008fbff7e9de65bb79b321aa40d18b27cc0c1b0309050b0f8077eb5d73ee5424