Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/11/2024, 06:40
Static task
static1
Behavioral task
behavioral1
Sample
2516b991e5ec1abc1ec01f9bc6f0e368168457b27af28b07375a19826188e65e.exe
Resource
win10v2004-20241007-en
General
-
Target
2516b991e5ec1abc1ec01f9bc6f0e368168457b27af28b07375a19826188e65e.exe
-
Size
788KB
-
MD5
976a4ca09756537c26c93b0a6ec78071
-
SHA1
059ead80425036cf9350d1c7257019b8304f8224
-
SHA256
2516b991e5ec1abc1ec01f9bc6f0e368168457b27af28b07375a19826188e65e
-
SHA512
b3e5d5cab7a129c51dfb4076643c426b3cbcc9992467c4d1affc2a489f2298ecdc37442845ec8261459127581c341820cfdb7d4fdf7bdc03b979377070ce8812
-
SSDEEP
12288:ZMrVy90eTsPRT02OvO48wsqxqPdERcebunWLkY91qV879YaeR1iqaYn7Pyyrd2Td:8ynQPKZPMpySKtebiqaY7L2Td
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
resource yara_rule behavioral1/files/0x0008000000023c93-19.dat healer behavioral1/memory/3128-22-0x0000000000BA0000-0x0000000000BAA000-memory.dmp healer behavioral1/memory/1584-29-0x0000000002410000-0x000000000242A000-memory.dmp healer behavioral1/memory/1584-31-0x0000000002570000-0x0000000002588000-memory.dmp healer behavioral1/memory/1584-32-0x0000000002570000-0x0000000002582000-memory.dmp healer behavioral1/memory/1584-39-0x0000000002570000-0x0000000002582000-memory.dmp healer behavioral1/memory/1584-59-0x0000000002570000-0x0000000002582000-memory.dmp healer behavioral1/memory/1584-58-0x0000000002570000-0x0000000002582000-memory.dmp healer behavioral1/memory/1584-55-0x0000000002570000-0x0000000002582000-memory.dmp healer behavioral1/memory/1584-53-0x0000000002570000-0x0000000002582000-memory.dmp healer behavioral1/memory/1584-51-0x0000000002570000-0x0000000002582000-memory.dmp healer behavioral1/memory/1584-49-0x0000000002570000-0x0000000002582000-memory.dmp healer behavioral1/memory/1584-47-0x0000000002570000-0x0000000002582000-memory.dmp healer behavioral1/memory/1584-45-0x0000000002570000-0x0000000002582000-memory.dmp healer behavioral1/memory/1584-43-0x0000000002570000-0x0000000002582000-memory.dmp healer behavioral1/memory/1584-41-0x0000000002570000-0x0000000002582000-memory.dmp healer behavioral1/memory/1584-37-0x0000000002570000-0x0000000002582000-memory.dmp healer behavioral1/memory/1584-35-0x0000000002570000-0x0000000002582000-memory.dmp healer behavioral1/memory/1584-33-0x0000000002570000-0x0000000002582000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c22aZ36.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c22aZ36.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b5674OB.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b5674OB.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b5674OB.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b5674OB.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b5674OB.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c22aZ36.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b5674OB.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c22aZ36.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c22aZ36.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c22aZ36.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4868-67-0x0000000004A20000-0x0000000004A66000-memory.dmp family_redline behavioral1/memory/4868-68-0x0000000004AE0000-0x0000000004B24000-memory.dmp family_redline behavioral1/memory/4868-70-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/4868-86-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/4868-102-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/4868-100-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/4868-98-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/4868-96-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/4868-94-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/4868-92-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/4868-88-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/4868-84-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/4868-82-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/4868-80-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/4868-78-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/4868-76-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/4868-74-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/4868-72-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/4868-90-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/4868-69-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 5 IoCs
pid Process 3556 tice3048.exe 1772 tice5128.exe 3128 b5674OB.exe 1584 c22aZ36.exe 4868 deLXx30.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c22aZ36.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b5674OB.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c22aZ36.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2516b991e5ec1abc1ec01f9bc6f0e368168457b27af28b07375a19826188e65e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice3048.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice5128.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4632 1584 WerFault.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2516b991e5ec1abc1ec01f9bc6f0e368168457b27af28b07375a19826188e65e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice3048.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice5128.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c22aZ36.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language deLXx30.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3128 b5674OB.exe 3128 b5674OB.exe 1584 c22aZ36.exe 1584 c22aZ36.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3128 b5674OB.exe Token: SeDebugPrivilege 1584 c22aZ36.exe Token: SeDebugPrivilege 4868 deLXx30.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 396 wrote to memory of 3556 396 2516b991e5ec1abc1ec01f9bc6f0e368168457b27af28b07375a19826188e65e.exe 85 PID 396 wrote to memory of 3556 396 2516b991e5ec1abc1ec01f9bc6f0e368168457b27af28b07375a19826188e65e.exe 85 PID 396 wrote to memory of 3556 396 2516b991e5ec1abc1ec01f9bc6f0e368168457b27af28b07375a19826188e65e.exe 85 PID 3556 wrote to memory of 1772 3556 tice3048.exe 86 PID 3556 wrote to memory of 1772 3556 tice3048.exe 86 PID 3556 wrote to memory of 1772 3556 tice3048.exe 86 PID 1772 wrote to memory of 3128 1772 tice5128.exe 87 PID 1772 wrote to memory of 3128 1772 tice5128.exe 87 PID 1772 wrote to memory of 1584 1772 tice5128.exe 97 PID 1772 wrote to memory of 1584 1772 tice5128.exe 97 PID 1772 wrote to memory of 1584 1772 tice5128.exe 97 PID 3556 wrote to memory of 4868 3556 tice3048.exe 102 PID 3556 wrote to memory of 4868 3556 tice3048.exe 102 PID 3556 wrote to memory of 4868 3556 tice3048.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\2516b991e5ec1abc1ec01f9bc6f0e368168457b27af28b07375a19826188e65e.exe"C:\Users\Admin\AppData\Local\Temp\2516b991e5ec1abc1ec01f9bc6f0e368168457b27af28b07375a19826188e65e.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice3048.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice3048.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice5128.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice5128.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5674OB.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5674OB.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3128
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c22aZ36.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c22aZ36.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1584 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1584 -s 10205⤵
- Program crash
PID:4632
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\deLXx30.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\deLXx30.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4868
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1584 -ip 15841⤵PID:2488
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
643KB
MD5ede876ba83c876c8ebea834a1c166efe
SHA16a47a3391250d97fdca869169e9451b29d99351c
SHA2562c97b8e37d75575804b7d5c8b7dfd076a36cd8e7283df50e7506e53eeeb62fde
SHA512b988ad00df229724bde36314c29d9a76d42f28468ea4a67097a806b4584a2e8a675373636828bb372eba013e1cbf56313cb6cf46ffeb6e45e469825064a0876e
-
Filesize
295KB
MD57f6c601cb8c45f388bedb3fcafd7815c
SHA1fe4c70bbed5ea3a2f167f3062aa32ae1262f3076
SHA2562811b792379c1a40ce507d01cca66e4c1082ff3c49ecafcfa0bb644e5e5f1670
SHA51219b621b05d531d60a30e432668138dc997fd76c47023c7f8455747b1e85fdc689acbec34e4dcf64f37bbbc680e2eafb70a30e0da27f327d2505974d3d970ad38
-
Filesize
322KB
MD5b5b98d0ea311bbd4c524395b5604bc64
SHA140f0691f27fe89f651d2d5abb13170eaa5b89102
SHA25604d5e554ff23e4c18773cb6546b9aca4ca6eff024e232ee7afcaf5c8ef68a8a3
SHA512dda285fee32131097b72a2d01a013379ede9d75bf62348bde81f39931f54358a373b0a59ed511259f9ebee9b39534d2a24bdc0991b17437bb33c250c9e15b2de
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
237KB
MD59230003adc579a9ee8ee4bc2a87d8700
SHA1e564090fcca8268516873caa71d253e3913e2373
SHA2569d812fefc4d7e67754f92b4652744c420413903ec6141f8acdf813282562236e
SHA5120e82599247493c1a8b14804cf3954ee8c231221280d0eaead9e77857512a35186c738a26a5a3ba59e10c9c3b66c5fb144b49098c7dc83f4d13d0dc0f08fe348d