Analysis
-
max time kernel
143s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/11/2024, 05:17
Static task
static1
Behavioral task
behavioral1
Sample
2fb51143d88027fb008d121341aac56d7345e0b0492e97cd72c79f048aa01bd8.exe
Resource
win10v2004-20241007-en
General
-
Target
2fb51143d88027fb008d121341aac56d7345e0b0492e97cd72c79f048aa01bd8.exe
-
Size
861KB
-
MD5
a5b9b95dbe023aebdcdd4a907a2818f4
-
SHA1
e5e516534321b334449c6ca2472a47d3b4a34696
-
SHA256
2fb51143d88027fb008d121341aac56d7345e0b0492e97cd72c79f048aa01bd8
-
SHA512
56afb099b3d5d05b3e5837489ac86eeb8b283aa89d9da5c734e214d0a555ef72ee0a539187589fa49bd778f04f5274b430f32dd46ecc948fa34a9e7f6fdd42e5
-
SSDEEP
24576:yyU+LV/UkpPehiEUO2uwmNH21fmfPnon0Icv:ZU+5rPoijOtwmB2R6onfc
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
resource yara_rule behavioral1/files/0x0008000000023cac-19.dat healer behavioral1/memory/5064-22-0x00000000000A0000-0x00000000000AA000-memory.dmp healer behavioral1/memory/756-29-0x0000000007030000-0x000000000704A000-memory.dmp healer behavioral1/memory/756-31-0x00000000070A0000-0x00000000070B8000-memory.dmp healer behavioral1/memory/756-32-0x00000000070A0000-0x00000000070B2000-memory.dmp healer behavioral1/memory/756-39-0x00000000070A0000-0x00000000070B2000-memory.dmp healer behavioral1/memory/756-59-0x00000000070A0000-0x00000000070B2000-memory.dmp healer behavioral1/memory/756-57-0x00000000070A0000-0x00000000070B2000-memory.dmp healer behavioral1/memory/756-55-0x00000000070A0000-0x00000000070B2000-memory.dmp healer behavioral1/memory/756-53-0x00000000070A0000-0x00000000070B2000-memory.dmp healer behavioral1/memory/756-51-0x00000000070A0000-0x00000000070B2000-memory.dmp healer behavioral1/memory/756-49-0x00000000070A0000-0x00000000070B2000-memory.dmp healer behavioral1/memory/756-47-0x00000000070A0000-0x00000000070B2000-memory.dmp healer behavioral1/memory/756-45-0x00000000070A0000-0x00000000070B2000-memory.dmp healer behavioral1/memory/756-43-0x00000000070A0000-0x00000000070B2000-memory.dmp healer behavioral1/memory/756-41-0x00000000070A0000-0x00000000070B2000-memory.dmp healer behavioral1/memory/756-37-0x00000000070A0000-0x00000000070B2000-memory.dmp healer behavioral1/memory/756-35-0x00000000070A0000-0x00000000070B2000-memory.dmp healer behavioral1/memory/756-33-0x00000000070A0000-0x00000000070B2000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b5386nL.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c04Kt31.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c04Kt31.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c04Kt31.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b5386nL.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b5386nL.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b5386nL.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c04Kt31.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c04Kt31.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b5386nL.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b5386nL.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c04Kt31.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3060-67-0x0000000004D70000-0x0000000004DB6000-memory.dmp family_redline behavioral1/memory/3060-68-0x00000000076F0000-0x0000000007734000-memory.dmp family_redline behavioral1/memory/3060-90-0x00000000076F0000-0x000000000772E000-memory.dmp family_redline behavioral1/memory/3060-102-0x00000000076F0000-0x000000000772E000-memory.dmp family_redline behavioral1/memory/3060-100-0x00000000076F0000-0x000000000772E000-memory.dmp family_redline behavioral1/memory/3060-98-0x00000000076F0000-0x000000000772E000-memory.dmp family_redline behavioral1/memory/3060-96-0x00000000076F0000-0x000000000772E000-memory.dmp family_redline behavioral1/memory/3060-94-0x00000000076F0000-0x000000000772E000-memory.dmp family_redline behavioral1/memory/3060-92-0x00000000076F0000-0x000000000772E000-memory.dmp family_redline behavioral1/memory/3060-88-0x00000000076F0000-0x000000000772E000-memory.dmp family_redline behavioral1/memory/3060-86-0x00000000076F0000-0x000000000772E000-memory.dmp family_redline behavioral1/memory/3060-85-0x00000000076F0000-0x000000000772E000-memory.dmp family_redline behavioral1/memory/3060-82-0x00000000076F0000-0x000000000772E000-memory.dmp family_redline behavioral1/memory/3060-81-0x00000000076F0000-0x000000000772E000-memory.dmp family_redline behavioral1/memory/3060-78-0x00000000076F0000-0x000000000772E000-memory.dmp family_redline behavioral1/memory/3060-77-0x00000000076F0000-0x000000000772E000-memory.dmp family_redline behavioral1/memory/3060-74-0x00000000076F0000-0x000000000772E000-memory.dmp family_redline behavioral1/memory/3060-72-0x00000000076F0000-0x000000000772E000-memory.dmp family_redline behavioral1/memory/3060-70-0x00000000076F0000-0x000000000772E000-memory.dmp family_redline behavioral1/memory/3060-69-0x00000000076F0000-0x000000000772E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 5 IoCs
pid Process 2124 tice6113.exe 4776 tice0957.exe 5064 b5386nL.exe 756 c04Kt31.exe 3060 dXemI36.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b5386nL.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c04Kt31.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c04Kt31.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2fb51143d88027fb008d121341aac56d7345e0b0492e97cd72c79f048aa01bd8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice6113.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice0957.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2628 756 WerFault.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dXemI36.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2fb51143d88027fb008d121341aac56d7345e0b0492e97cd72c79f048aa01bd8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice6113.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice0957.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c04Kt31.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5064 b5386nL.exe 5064 b5386nL.exe 756 c04Kt31.exe 756 c04Kt31.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5064 b5386nL.exe Token: SeDebugPrivilege 756 c04Kt31.exe Token: SeDebugPrivilege 3060 dXemI36.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2816 wrote to memory of 2124 2816 2fb51143d88027fb008d121341aac56d7345e0b0492e97cd72c79f048aa01bd8.exe 83 PID 2816 wrote to memory of 2124 2816 2fb51143d88027fb008d121341aac56d7345e0b0492e97cd72c79f048aa01bd8.exe 83 PID 2816 wrote to memory of 2124 2816 2fb51143d88027fb008d121341aac56d7345e0b0492e97cd72c79f048aa01bd8.exe 83 PID 2124 wrote to memory of 4776 2124 tice6113.exe 84 PID 2124 wrote to memory of 4776 2124 tice6113.exe 84 PID 2124 wrote to memory of 4776 2124 tice6113.exe 84 PID 4776 wrote to memory of 5064 4776 tice0957.exe 85 PID 4776 wrote to memory of 5064 4776 tice0957.exe 85 PID 4776 wrote to memory of 756 4776 tice0957.exe 97 PID 4776 wrote to memory of 756 4776 tice0957.exe 97 PID 4776 wrote to memory of 756 4776 tice0957.exe 97 PID 2124 wrote to memory of 3060 2124 tice6113.exe 102 PID 2124 wrote to memory of 3060 2124 tice6113.exe 102 PID 2124 wrote to memory of 3060 2124 tice6113.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\2fb51143d88027fb008d121341aac56d7345e0b0492e97cd72c79f048aa01bd8.exe"C:\Users\Admin\AppData\Local\Temp\2fb51143d88027fb008d121341aac56d7345e0b0492e97cd72c79f048aa01bd8.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice6113.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice6113.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice0957.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice0957.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5386nL.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5386nL.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5064
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c04Kt31.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c04Kt31.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:756 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 756 -s 10805⤵
- Program crash
PID:2628
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dXemI36.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dXemI36.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3060
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 756 -ip 7561⤵PID:960
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
716KB
MD59d4a7514cd2cf0952ad6c4d678618f18
SHA1b2dc9153aef3a55facb9b247c7bd965d5e426eb5
SHA2569cec0f776d238d141b22ebd3e74546843acbbd9915058b9a8f95311bc5631157
SHA5127c94e71b208ecb4e943b4fdb805daaa37263acd4e592003caef408b4ef56a284b3b37953e8697c42d6690e00a2fcc20342c311e5b1d15f02ced5f4690c40d07a
-
Filesize
399KB
MD5d9e7df3dca901ab9f1a5e72e02fc7d61
SHA1a78bee0e4c79e61f818d22e8a56e9f2c8a03e749
SHA2561ac539a360136effde52629f5bf98ab1bcf0c833d6dde832e78d6e5d8852ee4a
SHA512eb42ac386e5e76fab67a69b58b5b3a9004f425e34129a61cec823d485c18774f64ec762f91a90f4c88e4ff938c1d60b96bc0b7aaac9a1a256f70857e770ddde8
-
Filesize
359KB
MD56482d5467325e11ff410fbd4a604db3a
SHA176f26e43cff73442effae54d8f5039aef5f65b61
SHA25610b3cafedefd071c05ce3d9c5086d63bd6f71efa12ed7bd58f26beba55f05e80
SHA51261c49b0c4683b50f092649ebd4764063a3c6d0b2a0efb3acc53b308c446567516a1a543fd5a88f659f94787c1d763d8460e880ad9ab233f8141f655be4b877b9
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
342KB
MD5bda5564902840d549ce405c3be448f97
SHA107903ac378d16547303a39816bab13154c601743
SHA256efe1164188330f011faee2ac0cf84c0991a4c08be9625060f3e949b2e067fd05
SHA5120529c8d6cec7269873082d1e0c5f1a2632065a0c7e0b37bd1c2237a9faa4f3b8336555017792bdbcd747f14875b5919a2131eaaae0ff5a834955dc7dc2ee77f4