Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/11/2024, 05:18
Static task
static1
Behavioral task
behavioral1
Sample
457daabdcf57a4733caf50d349e4c31e2cae2ffb3d8dd5ad067802c5ecad50b4.exe
Resource
win10v2004-20241007-en
General
-
Target
457daabdcf57a4733caf50d349e4c31e2cae2ffb3d8dd5ad067802c5ecad50b4.exe
-
Size
787KB
-
MD5
a40dd455d5f6f18b83ea38d6e26a9e32
-
SHA1
08af0348ebede6da5f671e40adc743142ee69689
-
SHA256
457daabdcf57a4733caf50d349e4c31e2cae2ffb3d8dd5ad067802c5ecad50b4
-
SHA512
f7b432809985854c031213b7d80f873d95667dcd762cc5a1c3174ca3254236afd771ee7f54559319036f4ecbf3c3f3069fa1a6d5e7d5973ec327672051d2eb5a
-
SSDEEP
12288:NMrby908FUJVU02SskBFmP8tVQYPOCRQFJ0TZIFyzDZmgq214I6r8k1Z28mV0XNX:WyniVcbkKkrQmOC+zFi0K13w8cx1
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
resource yara_rule behavioral1/files/0x000b000000023bad-19.dat healer behavioral1/memory/1264-22-0x00000000004D0000-0x00000000004DA000-memory.dmp healer behavioral1/memory/2108-29-0x0000000002230000-0x000000000224A000-memory.dmp healer behavioral1/memory/2108-31-0x0000000004B90000-0x0000000004BA8000-memory.dmp healer behavioral1/memory/2108-32-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/2108-41-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/2108-59-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/2108-57-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/2108-55-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/2108-53-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/2108-51-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/2108-49-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/2108-47-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/2108-45-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/2108-43-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/2108-39-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/2108-37-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/2108-35-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/2108-33-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c54Ya87.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c54Ya87.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b3007gl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b3007gl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b3007gl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b3007gl.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c54Ya87.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b3007gl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b3007gl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c54Ya87.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c54Ya87.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c54Ya87.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1852-67-0x0000000004A00000-0x0000000004A46000-memory.dmp family_redline behavioral1/memory/1852-68-0x0000000005070000-0x00000000050B4000-memory.dmp family_redline behavioral1/memory/1852-74-0x0000000005070000-0x00000000050AE000-memory.dmp family_redline behavioral1/memory/1852-82-0x0000000005070000-0x00000000050AE000-memory.dmp family_redline behavioral1/memory/1852-80-0x0000000005070000-0x00000000050AE000-memory.dmp family_redline behavioral1/memory/1852-78-0x0000000005070000-0x00000000050AE000-memory.dmp family_redline behavioral1/memory/1852-76-0x0000000005070000-0x00000000050AE000-memory.dmp family_redline behavioral1/memory/1852-94-0x0000000005070000-0x00000000050AE000-memory.dmp family_redline behavioral1/memory/1852-72-0x0000000005070000-0x00000000050AE000-memory.dmp family_redline behavioral1/memory/1852-70-0x0000000005070000-0x00000000050AE000-memory.dmp family_redline behavioral1/memory/1852-69-0x0000000005070000-0x00000000050AE000-memory.dmp family_redline behavioral1/memory/1852-84-0x0000000005070000-0x00000000050AE000-memory.dmp family_redline behavioral1/memory/1852-102-0x0000000005070000-0x00000000050AE000-memory.dmp family_redline behavioral1/memory/1852-100-0x0000000005070000-0x00000000050AE000-memory.dmp family_redline behavioral1/memory/1852-98-0x0000000005070000-0x00000000050AE000-memory.dmp family_redline behavioral1/memory/1852-96-0x0000000005070000-0x00000000050AE000-memory.dmp family_redline behavioral1/memory/1852-92-0x0000000005070000-0x00000000050AE000-memory.dmp family_redline behavioral1/memory/1852-90-0x0000000005070000-0x00000000050AE000-memory.dmp family_redline behavioral1/memory/1852-88-0x0000000005070000-0x00000000050AE000-memory.dmp family_redline behavioral1/memory/1852-86-0x0000000005070000-0x00000000050AE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 5 IoCs
pid Process 2648 tice9295.exe 2340 tice0637.exe 1264 b3007gl.exe 2108 c54Ya87.exe 1852 djqup32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b3007gl.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c54Ya87.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c54Ya87.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 457daabdcf57a4733caf50d349e4c31e2cae2ffb3d8dd5ad067802c5ecad50b4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice9295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice0637.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1108 2108 WerFault.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice0637.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c54Ya87.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djqup32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 457daabdcf57a4733caf50d349e4c31e2cae2ffb3d8dd5ad067802c5ecad50b4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice9295.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1264 b3007gl.exe 1264 b3007gl.exe 2108 c54Ya87.exe 2108 c54Ya87.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1264 b3007gl.exe Token: SeDebugPrivilege 2108 c54Ya87.exe Token: SeDebugPrivilege 1852 djqup32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1956 wrote to memory of 2648 1956 457daabdcf57a4733caf50d349e4c31e2cae2ffb3d8dd5ad067802c5ecad50b4.exe 83 PID 1956 wrote to memory of 2648 1956 457daabdcf57a4733caf50d349e4c31e2cae2ffb3d8dd5ad067802c5ecad50b4.exe 83 PID 1956 wrote to memory of 2648 1956 457daabdcf57a4733caf50d349e4c31e2cae2ffb3d8dd5ad067802c5ecad50b4.exe 83 PID 2648 wrote to memory of 2340 2648 tice9295.exe 84 PID 2648 wrote to memory of 2340 2648 tice9295.exe 84 PID 2648 wrote to memory of 2340 2648 tice9295.exe 84 PID 2340 wrote to memory of 1264 2340 tice0637.exe 85 PID 2340 wrote to memory of 1264 2340 tice0637.exe 85 PID 2340 wrote to memory of 2108 2340 tice0637.exe 97 PID 2340 wrote to memory of 2108 2340 tice0637.exe 97 PID 2340 wrote to memory of 2108 2340 tice0637.exe 97 PID 2648 wrote to memory of 1852 2648 tice9295.exe 102 PID 2648 wrote to memory of 1852 2648 tice9295.exe 102 PID 2648 wrote to memory of 1852 2648 tice9295.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\457daabdcf57a4733caf50d349e4c31e2cae2ffb3d8dd5ad067802c5ecad50b4.exe"C:\Users\Admin\AppData\Local\Temp\457daabdcf57a4733caf50d349e4c31e2cae2ffb3d8dd5ad067802c5ecad50b4.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice9295.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice9295.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice0637.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice0637.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3007gl.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3007gl.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1264
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c54Ya87.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c54Ya87.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2108 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2108 -s 10805⤵
- Program crash
PID:1108
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\djqup32.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\djqup32.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1852
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2108 -ip 21081⤵PID:3368
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
642KB
MD511d9e29a9210d9d18aeab9ce357ca638
SHA1caa1d6588312a3a93b619ac644d3b6d881b97bed
SHA25607667e8ec6eef9b35200fd1ad5973c2a1fb02d643fcd383dc52bcb933cee88a2
SHA512bd280d7438b0589e3ca4f446d5278310185bc002d2808ade1fb0fca8f84462279764c383d078f62f31673c5a7fbd247e7b16979def7b8bacedd4564ec83c79a7
-
Filesize
295KB
MD57cb099b2c9b62358d833b5e434033c42
SHA14f4bd62c820ae0950c95467e9e05711b911399f8
SHA2566fc9745394f1163b48cd6d51b7d35082094162e848b42e49cd3b7e4627cea0df
SHA5120bdf8fbb71c75e8863a19a8b449ff388ab54c839871b069d67bc27390d54bd44906771e0abbce18a38bf9fc52d31878fcd017d08b572765f3f9ffdbcf1023cb7
-
Filesize
321KB
MD50fb28644dd66ac4bcf23b34a5d61db7b
SHA1780f4802ae349c26495a97c54b81432e43829d26
SHA256a0c46873e554aff78cde3afdfe4123ce32bcce7910944523871b4161e134720b
SHA5120bb7fad2b47ddaf0391a5ce1a8454ddfbac3ab17b76951b137e5e38389598080c1e25e61128f0b4c2bc8d6eb97e1be6b13adb5c3a0ac9b52da3c1b06d7df3a90
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
237KB
MD53cf336916ca8fcbc7743b6938a71b854
SHA1870f29d083f88093229e04b340d9cfc0e9be2835
SHA256b2d9d4f2a5d52a09acde1cf77c9feb26540f981b0a5d346574290d8dbc6c2ec3
SHA512f8c6d26b8c9cffcf78939aff7de4c66b3fee5ce9d9ec72b75dedce3c31428d4d7ca9af5551112f0ad8950753deafe2a113f4d5197f5576240527d80d84975a15