Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/11/2024, 06:35
Static task
static1
Behavioral task
behavioral1
Sample
13623a8d21a23fcb956e19d6c205114ae84848234f08af0f31383caf721741d2.exe
Resource
win10v2004-20241007-en
General
-
Target
13623a8d21a23fcb956e19d6c205114ae84848234f08af0f31383caf721741d2.exe
-
Size
641KB
-
MD5
3862a3fb386d370407c11871226a21d5
-
SHA1
0ce19a83e725aeefd01dab7341babf8f7a4d077e
-
SHA256
13623a8d21a23fcb956e19d6c205114ae84848234f08af0f31383caf721741d2
-
SHA512
642bef7fe0a12f9c13fb4485b5db273bd61a76a4090ad51598a23ff2969055dc5482e90960d49839493eb3dd1d6e089e34ba9dafda57c8b73960cfbb2a1c012f
-
SSDEEP
12288:oMr5y90RuHBAnCWUWzc3PSDIM50K1GZ0ZtB:xycuHBACWUacKD/57LZtB
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
resource yara_rule behavioral1/files/0x000b000000023b6d-12.dat healer behavioral1/memory/2700-15-0x0000000000D50000-0x0000000000D5A000-memory.dmp healer behavioral1/memory/4960-22-0x0000000002320000-0x000000000233A000-memory.dmp healer behavioral1/memory/4960-24-0x00000000024C0000-0x00000000024D8000-memory.dmp healer behavioral1/memory/4960-46-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/4960-52-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/4960-50-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/4960-48-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/4960-44-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/4960-42-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/4960-40-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/4960-38-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/4960-36-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/4960-34-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/4960-32-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/4960-30-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/4960-28-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/4960-26-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/4960-25-0x00000000024C0000-0x00000000024D2000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c16zj18.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b3250cW.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b3250cW.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b3250cW.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c16zj18.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c16zj18.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c16zj18.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c16zj18.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b3250cW.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b3250cW.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b3250cW.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c16zj18.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4332-60-0x00000000022A0000-0x00000000022E6000-memory.dmp family_redline behavioral1/memory/4332-61-0x0000000004AB0000-0x0000000004AF4000-memory.dmp family_redline behavioral1/memory/4332-75-0x0000000004AB0000-0x0000000004AEE000-memory.dmp family_redline behavioral1/memory/4332-79-0x0000000004AB0000-0x0000000004AEE000-memory.dmp family_redline behavioral1/memory/4332-77-0x0000000004AB0000-0x0000000004AEE000-memory.dmp family_redline behavioral1/memory/4332-73-0x0000000004AB0000-0x0000000004AEE000-memory.dmp family_redline behavioral1/memory/4332-71-0x0000000004AB0000-0x0000000004AEE000-memory.dmp family_redline behavioral1/memory/4332-69-0x0000000004AB0000-0x0000000004AEE000-memory.dmp family_redline behavioral1/memory/4332-87-0x0000000004AB0000-0x0000000004AEE000-memory.dmp family_redline behavioral1/memory/4332-67-0x0000000004AB0000-0x0000000004AEE000-memory.dmp family_redline behavioral1/memory/4332-65-0x0000000004AB0000-0x0000000004AEE000-memory.dmp family_redline behavioral1/memory/4332-63-0x0000000004AB0000-0x0000000004AEE000-memory.dmp family_redline behavioral1/memory/4332-62-0x0000000004AB0000-0x0000000004AEE000-memory.dmp family_redline behavioral1/memory/4332-95-0x0000000004AB0000-0x0000000004AEE000-memory.dmp family_redline behavioral1/memory/4332-93-0x0000000004AB0000-0x0000000004AEE000-memory.dmp family_redline behavioral1/memory/4332-91-0x0000000004AB0000-0x0000000004AEE000-memory.dmp family_redline behavioral1/memory/4332-89-0x0000000004AB0000-0x0000000004AEE000-memory.dmp family_redline behavioral1/memory/4332-85-0x0000000004AB0000-0x0000000004AEE000-memory.dmp family_redline behavioral1/memory/4332-83-0x0000000004AB0000-0x0000000004AEE000-memory.dmp family_redline behavioral1/memory/4332-81-0x0000000004AB0000-0x0000000004AEE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 212 nice7417.exe 2700 b3250cW.exe 4960 c16zj18.exe 4332 dmnJt63.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c16zj18.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c16zj18.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b3250cW.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 13623a8d21a23fcb956e19d6c205114ae84848234f08af0f31383caf721741d2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nice7417.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2912 4960 WerFault.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 13623a8d21a23fcb956e19d6c205114ae84848234f08af0f31383caf721741d2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nice7417.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c16zj18.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dmnJt63.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2700 b3250cW.exe 2700 b3250cW.exe 4960 c16zj18.exe 4960 c16zj18.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2700 b3250cW.exe Token: SeDebugPrivilege 4960 c16zj18.exe Token: SeDebugPrivilege 4332 dmnJt63.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1628 wrote to memory of 212 1628 13623a8d21a23fcb956e19d6c205114ae84848234f08af0f31383caf721741d2.exe 83 PID 1628 wrote to memory of 212 1628 13623a8d21a23fcb956e19d6c205114ae84848234f08af0f31383caf721741d2.exe 83 PID 1628 wrote to memory of 212 1628 13623a8d21a23fcb956e19d6c205114ae84848234f08af0f31383caf721741d2.exe 83 PID 212 wrote to memory of 2700 212 nice7417.exe 85 PID 212 wrote to memory of 2700 212 nice7417.exe 85 PID 212 wrote to memory of 4960 212 nice7417.exe 93 PID 212 wrote to memory of 4960 212 nice7417.exe 93 PID 212 wrote to memory of 4960 212 nice7417.exe 93 PID 1628 wrote to memory of 4332 1628 13623a8d21a23fcb956e19d6c205114ae84848234f08af0f31383caf721741d2.exe 97 PID 1628 wrote to memory of 4332 1628 13623a8d21a23fcb956e19d6c205114ae84848234f08af0f31383caf721741d2.exe 97 PID 1628 wrote to memory of 4332 1628 13623a8d21a23fcb956e19d6c205114ae84848234f08af0f31383caf721741d2.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\13623a8d21a23fcb956e19d6c205114ae84848234f08af0f31383caf721741d2.exe"C:\Users\Admin\AppData\Local\Temp\13623a8d21a23fcb956e19d6c205114ae84848234f08af0f31383caf721741d2.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nice7417.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nice7417.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b3250cW.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b3250cW.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c16zj18.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c16zj18.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4960 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4960 -s 10924⤵
- Program crash
PID:2912
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dmnJt63.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dmnJt63.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4332
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4960 -ip 49601⤵PID:2744
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
297KB
MD5d90d0ef1436cea664c5756b0b70a75a6
SHA1496e836117ab595a6dc594f4f4ee0565e2319f8f
SHA25655092ed67190cbd8659c10ef42d1d3a63bc07a9692a080f00ee4252174aed12d
SHA51298be99a18390fe86640a29f1be7bf734c182b583b6d5a558b082be4306eabf5e8639c48947f4a0a4a4d8c34033bc508f590a8bcfeb9ea35a2e4bca69bffcee52
-
Filesize
321KB
MD5f352bcce68701b6db69ec75482f4dbfb
SHA1a3659cb5dae53ecff5d79b81a01b54c667797ec4
SHA256f9d067338c563c5ce539005219ee8cc9992f77732128df83cfb379bb5a012f4b
SHA5124b8a212f8c899c3d0f8f2a36c54f48b085bd29fb34a2d6ef41bc51ca843053c23d3748d1960aaa8ef7fa87c68bee4558f389363cbdbd04e5e8c30af22b93bf17
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
239KB
MD5aa54164181d931d0e912c504d5f6b621
SHA1a50e17169010c8a2167d22a7cdb3136e30fd0a07
SHA256688cb4fa9bea6b27ee72b1008f049e376bcf7c6010250ba303bdf88fed261f14
SHA512fd45abadcb446d026b7538ef8b12008c9a3b17e47f2deb2b31454e90c681c5ff7c590cc94cdac4e86464a893ce7a56f4e960de49db85364f105d45aa17dfd39f