Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/11/2024, 06:51
Static task
static1
Behavioral task
behavioral1
Sample
7a8a3d333c53f0f0674455bf5d9ee4ed247b710e6d5d4f65e494e50e32f5da36.exe
Resource
win10v2004-20241007-en
General
-
Target
7a8a3d333c53f0f0674455bf5d9ee4ed247b710e6d5d4f65e494e50e32f5da36.exe
-
Size
792KB
-
MD5
e4e62b29df2163a224643db489c311e9
-
SHA1
f398b62cc1530cbf30506b1400ca4fcc37f5d479
-
SHA256
7a8a3d333c53f0f0674455bf5d9ee4ed247b710e6d5d4f65e494e50e32f5da36
-
SHA512
4002816f2e5892ef3473b3457cc496fa9a932f356b46d06616258fb848f715765d6cf75f25ac4a7832234b7b4ff572f12ea7548c67cee5bfb526ef7c0283e5ca
-
SSDEEP
12288:WMrMy90KfMg2PkowC90ce0rtAY66DZym0lCZfcppm+Tqfiw9HYUcv:KydfMb8oN99lvDU1CZUztqDYUe
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
resource yara_rule behavioral1/files/0x0008000000023ca2-19.dat healer behavioral1/memory/4864-22-0x00000000004E0000-0x00000000004EA000-memory.dmp healer behavioral1/memory/2788-29-0x0000000002360000-0x000000000237A000-memory.dmp healer behavioral1/memory/2788-31-0x0000000002720000-0x0000000002738000-memory.dmp healer behavioral1/memory/2788-59-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/2788-57-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/2788-55-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/2788-53-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/2788-51-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/2788-49-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/2788-47-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/2788-45-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/2788-43-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/2788-41-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/2788-39-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/2788-37-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/2788-35-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/2788-33-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/2788-32-0x0000000002720000-0x0000000002732000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b0327mP.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b0327mP.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b0327mP.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c50iF56.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c50iF56.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b0327mP.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b0327mP.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c50iF56.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c50iF56.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c50iF56.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c50iF56.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b0327mP.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4580-67-0x0000000002330000-0x0000000002376000-memory.dmp family_redline behavioral1/memory/4580-68-0x0000000002430000-0x0000000002474000-memory.dmp family_redline behavioral1/memory/4580-74-0x0000000002430000-0x000000000246E000-memory.dmp family_redline behavioral1/memory/4580-84-0x0000000002430000-0x000000000246E000-memory.dmp family_redline behavioral1/memory/4580-102-0x0000000002430000-0x000000000246E000-memory.dmp family_redline behavioral1/memory/4580-100-0x0000000002430000-0x000000000246E000-memory.dmp family_redline behavioral1/memory/4580-98-0x0000000002430000-0x000000000246E000-memory.dmp family_redline behavioral1/memory/4580-96-0x0000000002430000-0x000000000246E000-memory.dmp family_redline behavioral1/memory/4580-94-0x0000000002430000-0x000000000246E000-memory.dmp family_redline behavioral1/memory/4580-92-0x0000000002430000-0x000000000246E000-memory.dmp family_redline behavioral1/memory/4580-90-0x0000000002430000-0x000000000246E000-memory.dmp family_redline behavioral1/memory/4580-88-0x0000000002430000-0x000000000246E000-memory.dmp family_redline behavioral1/memory/4580-82-0x0000000002430000-0x000000000246E000-memory.dmp family_redline behavioral1/memory/4580-80-0x0000000002430000-0x000000000246E000-memory.dmp family_redline behavioral1/memory/4580-78-0x0000000002430000-0x000000000246E000-memory.dmp family_redline behavioral1/memory/4580-76-0x0000000002430000-0x000000000246E000-memory.dmp family_redline behavioral1/memory/4580-86-0x0000000002430000-0x000000000246E000-memory.dmp family_redline behavioral1/memory/4580-72-0x0000000002430000-0x000000000246E000-memory.dmp family_redline behavioral1/memory/4580-70-0x0000000002430000-0x000000000246E000-memory.dmp family_redline behavioral1/memory/4580-69-0x0000000002430000-0x000000000246E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 5 IoCs
pid Process 5088 tice1183.exe 4908 tice8067.exe 4864 b0327mP.exe 2788 c50iF56.exe 4580 diHFw08.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b0327mP.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c50iF56.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c50iF56.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7a8a3d333c53f0f0674455bf5d9ee4ed247b710e6d5d4f65e494e50e32f5da36.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice1183.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice8067.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1576 2788 WerFault.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7a8a3d333c53f0f0674455bf5d9ee4ed247b710e6d5d4f65e494e50e32f5da36.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice1183.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice8067.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c50iF56.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language diHFw08.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4864 b0327mP.exe 4864 b0327mP.exe 2788 c50iF56.exe 2788 c50iF56.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4864 b0327mP.exe Token: SeDebugPrivilege 2788 c50iF56.exe Token: SeDebugPrivilege 4580 diHFw08.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2992 wrote to memory of 5088 2992 7a8a3d333c53f0f0674455bf5d9ee4ed247b710e6d5d4f65e494e50e32f5da36.exe 83 PID 2992 wrote to memory of 5088 2992 7a8a3d333c53f0f0674455bf5d9ee4ed247b710e6d5d4f65e494e50e32f5da36.exe 83 PID 2992 wrote to memory of 5088 2992 7a8a3d333c53f0f0674455bf5d9ee4ed247b710e6d5d4f65e494e50e32f5da36.exe 83 PID 5088 wrote to memory of 4908 5088 tice1183.exe 84 PID 5088 wrote to memory of 4908 5088 tice1183.exe 84 PID 5088 wrote to memory of 4908 5088 tice1183.exe 84 PID 4908 wrote to memory of 4864 4908 tice8067.exe 85 PID 4908 wrote to memory of 4864 4908 tice8067.exe 85 PID 4908 wrote to memory of 2788 4908 tice8067.exe 97 PID 4908 wrote to memory of 2788 4908 tice8067.exe 97 PID 4908 wrote to memory of 2788 4908 tice8067.exe 97 PID 5088 wrote to memory of 4580 5088 tice1183.exe 102 PID 5088 wrote to memory of 4580 5088 tice1183.exe 102 PID 5088 wrote to memory of 4580 5088 tice1183.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a8a3d333c53f0f0674455bf5d9ee4ed247b710e6d5d4f65e494e50e32f5da36.exe"C:\Users\Admin\AppData\Local\Temp\7a8a3d333c53f0f0674455bf5d9ee4ed247b710e6d5d4f65e494e50e32f5da36.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice1183.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice1183.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice8067.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice8067.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b0327mP.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b0327mP.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4864
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c50iF56.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c50iF56.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2788 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2788 -s 10805⤵
- Program crash
PID:1576
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\diHFw08.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\diHFw08.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4580
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2788 -ip 27881⤵PID:3384
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
647KB
MD5d4553021a9632b8f05b76fa251d8049c
SHA1e04a80b38cece5f496447a0a59ce96afb43fa854
SHA2567ad44290b2846de4297d8bd38ea96dabf4bcdaf5e6a8a90960020c2ad0175b12
SHA512b884090afa367ce2c746e61cd80fcb283e5e642560962f7241b5950428fb3ff13ca4b71d7a2d3929c45e704272c999411677fb46cc7872640a9c85ff4667886e
-
Filesize
283KB
MD5c903ed3a9ce374da4b62cfe9ebcd4ea1
SHA181c95bc0783f9f45bd5e5d274ea124e905ac56f1
SHA256c77aaa3305244b91081387363ad460baa1296bc618c0ff327715bb2a3449cfc4
SHA512d4ab916622354da2561354701d4c32d4a341b3dc00a4bfb0bb6f09515903cef5f705af7dc420d37e4f63e59e1cb101aaeaa296f04a9a5c71d89348da0e11eab7
-
Filesize
324KB
MD5c93e0aaba1573c7ea6f41a83d95222ac
SHA145e01d0ee6105affc7452af4d88bc9da17e844cf
SHA256348e16f29d65f769fbcb55de68c142f5ea44cabd254f4dd5ea2c5506c9854d83
SHA51282bb013cf697bd426ee7b0364c9cd3a56224a1d4add061531a3bf03def77916950a73c9eb6045bac6167ec8387619bd896af9cc627a96ed494695443e3ce9def
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
226KB
MD57f7660ad1c6498425a99f5429b0f622f
SHA10da0f467e49ecfc17c1fd7f4b84464a4ea48ab68
SHA2568e346cf4ab6fb68aebf682e0324ea2dd56bd80796e4c1498c2189d3e23eaadfb
SHA512fd26d28462959c8b7c5939d2eaf2a886097264272d3b56831fbc6b7c161ab124b10c1a1d10127606e5b5876544230e9ee3d2375b9626f7209f80dfdc3286c360