Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/11/2024, 06:17
Static task
static1
Behavioral task
behavioral1
Sample
13abf1cb2185a2f661db03da535711468462a2bacde6f57ed7e0c60b957b1a39.exe
Resource
win10v2004-20241007-en
General
-
Target
13abf1cb2185a2f661db03da535711468462a2bacde6f57ed7e0c60b957b1a39.exe
-
Size
790KB
-
MD5
5f02bf776b52a13b43e55db10a78ee37
-
SHA1
de30ddb980775692351106d2a91b84066c29955d
-
SHA256
13abf1cb2185a2f661db03da535711468462a2bacde6f57ed7e0c60b957b1a39
-
SHA512
2ee5281b521d2312cf8ac989d7750de2a629d6512290205e9e89f780ccf52ec3a671b4142cbd356f7fcce154c3bab486f32315b3740529e165dfbcec41d09c5a
-
SSDEEP
12288:vMrZy90lQ5ea1pU3z9xE1relbbdbzH+dtNR/P8mlhVqyxC162vl6yY3GPEeo:iym4eEM9xENelbVc32KC16G6yKGceo
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
resource yara_rule behavioral1/files/0x000b000000023b72-19.dat healer behavioral1/memory/1700-22-0x0000000000B90000-0x0000000000B9A000-memory.dmp healer behavioral1/memory/372-29-0x0000000002370000-0x000000000238A000-memory.dmp healer behavioral1/memory/372-31-0x0000000004A50000-0x0000000004A68000-memory.dmp healer behavioral1/memory/372-41-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/372-59-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/372-57-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/372-55-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/372-54-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/372-51-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/372-49-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/372-47-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/372-45-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/372-43-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/372-39-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/372-38-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/372-35-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/372-33-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/372-32-0x0000000004A50000-0x0000000004A62000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c59GI21.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c59GI21.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c59GI21.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c59GI21.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c59GI21.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b0131qD.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b0131qD.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b0131qD.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c59GI21.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b0131qD.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b0131qD.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b0131qD.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1108-67-0x0000000002250000-0x0000000002296000-memory.dmp family_redline behavioral1/memory/1108-68-0x0000000002450000-0x0000000002494000-memory.dmp family_redline behavioral1/memory/1108-82-0x0000000002450000-0x000000000248E000-memory.dmp family_redline behavioral1/memory/1108-86-0x0000000002450000-0x000000000248E000-memory.dmp family_redline behavioral1/memory/1108-102-0x0000000002450000-0x000000000248E000-memory.dmp family_redline behavioral1/memory/1108-100-0x0000000002450000-0x000000000248E000-memory.dmp family_redline behavioral1/memory/1108-98-0x0000000002450000-0x000000000248E000-memory.dmp family_redline behavioral1/memory/1108-96-0x0000000002450000-0x000000000248E000-memory.dmp family_redline behavioral1/memory/1108-92-0x0000000002450000-0x000000000248E000-memory.dmp family_redline behavioral1/memory/1108-90-0x0000000002450000-0x000000000248E000-memory.dmp family_redline behavioral1/memory/1108-88-0x0000000002450000-0x000000000248E000-memory.dmp family_redline behavioral1/memory/1108-84-0x0000000002450000-0x000000000248E000-memory.dmp family_redline behavioral1/memory/1108-80-0x0000000002450000-0x000000000248E000-memory.dmp family_redline behavioral1/memory/1108-78-0x0000000002450000-0x000000000248E000-memory.dmp family_redline behavioral1/memory/1108-76-0x0000000002450000-0x000000000248E000-memory.dmp family_redline behavioral1/memory/1108-94-0x0000000002450000-0x000000000248E000-memory.dmp family_redline behavioral1/memory/1108-74-0x0000000002450000-0x000000000248E000-memory.dmp family_redline behavioral1/memory/1108-72-0x0000000002450000-0x000000000248E000-memory.dmp family_redline behavioral1/memory/1108-70-0x0000000002450000-0x000000000248E000-memory.dmp family_redline behavioral1/memory/1108-69-0x0000000002450000-0x000000000248E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 5 IoCs
pid Process 3548 tice3789.exe 2072 tice0796.exe 1700 b0131qD.exe 372 c59GI21.exe 1108 dQkqp79.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b0131qD.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c59GI21.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c59GI21.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice3789.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice0796.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 13abf1cb2185a2f661db03da535711468462a2bacde6f57ed7e0c60b957b1a39.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 652 372 WerFault.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 13abf1cb2185a2f661db03da535711468462a2bacde6f57ed7e0c60b957b1a39.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice3789.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice0796.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c59GI21.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dQkqp79.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1700 b0131qD.exe 1700 b0131qD.exe 372 c59GI21.exe 372 c59GI21.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1700 b0131qD.exe Token: SeDebugPrivilege 372 c59GI21.exe Token: SeDebugPrivilege 1108 dQkqp79.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2816 wrote to memory of 3548 2816 13abf1cb2185a2f661db03da535711468462a2bacde6f57ed7e0c60b957b1a39.exe 83 PID 2816 wrote to memory of 3548 2816 13abf1cb2185a2f661db03da535711468462a2bacde6f57ed7e0c60b957b1a39.exe 83 PID 2816 wrote to memory of 3548 2816 13abf1cb2185a2f661db03da535711468462a2bacde6f57ed7e0c60b957b1a39.exe 83 PID 3548 wrote to memory of 2072 3548 tice3789.exe 85 PID 3548 wrote to memory of 2072 3548 tice3789.exe 85 PID 3548 wrote to memory of 2072 3548 tice3789.exe 85 PID 2072 wrote to memory of 1700 2072 tice0796.exe 86 PID 2072 wrote to memory of 1700 2072 tice0796.exe 86 PID 2072 wrote to memory of 372 2072 tice0796.exe 97 PID 2072 wrote to memory of 372 2072 tice0796.exe 97 PID 2072 wrote to memory of 372 2072 tice0796.exe 97 PID 3548 wrote to memory of 1108 3548 tice3789.exe 102 PID 3548 wrote to memory of 1108 3548 tice3789.exe 102 PID 3548 wrote to memory of 1108 3548 tice3789.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\13abf1cb2185a2f661db03da535711468462a2bacde6f57ed7e0c60b957b1a39.exe"C:\Users\Admin\AppData\Local\Temp\13abf1cb2185a2f661db03da535711468462a2bacde6f57ed7e0c60b957b1a39.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice3789.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice3789.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice0796.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice0796.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b0131qD.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b0131qD.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1700
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c59GI21.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c59GI21.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:372 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 372 -s 10645⤵
- Program crash
PID:652
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dQkqp79.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dQkqp79.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1108
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 372 -ip 3721⤵PID:5040
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
645KB
MD571a7a9b7083cac041a105ec193ace579
SHA121177efbc1be67e4a2429fe5ff5bf1a92fb12e85
SHA25693d4387b2f756bf7224635ed6ea83be2c5bdeb5af35ffafc918b2b7c25ed7993
SHA5123c3e29b53ebaeeb52141abe299bc7feacab050b24c33b70192ae75b0e9c3a296c4182ad132ac05146a5cf59ce480394ee13ae8ae9657dad6c85aa62f03848b18
-
Filesize
296KB
MD5e742a62d74fdc76296d875e3f08e8755
SHA1e8d8def09ac270b0083d10b566d29a5c8be88d42
SHA256da987922e81f29728fec4d7b778cbfa22831285edea1f203fe787ddd588ce019
SHA512f50951b6e4720c6bdf95d7052c844f5e9ee86ca9bf7bb8b4880f4894c8303b0061b213762b5a60f28334557fe09944ed79acf01ec98625d3a664d0d71aa1301b
-
Filesize
323KB
MD5c128709b83e07b152893736f69966d3b
SHA18dd1ac90e1b79ddb9c07443d259be3c8638971a6
SHA256d3b2225ffbeebe441461360563d23ed152b1be178b82b7e21a8c43f3486b4ba9
SHA512b297dbe9739ae6e186d6cad50434b86d5aae699c47ec7bb3750640682263a800ae76c1fa7ecc1bd112025fa302d95282721a38212d1cd5e387c2d1ab2e63d0d0
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
239KB
MD53bc8324c494b93c6e16bd38db55b238c
SHA1b34a89a4317d9f54837b2a07c9b0ab2ff94d11e1
SHA2563693de9b4cc9c4aeec338a6edbadc253dfe87eed4543da97720621cbe34bea05
SHA512fa8d36910102c9038e20dd80646099865a6eb2d0d8ce9471c147c3afc7c0575b2ec07d2c1ec638ee4581a1d27a2d16365f16f6271def3b2497ee96841e14e98a