Analysis
-
max time kernel
142s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 08:22
Static task
static1
Behavioral task
behavioral1
Sample
1508da2e5b66751f22107e5c06c59fb8700a1d957685d9e49af73af6d679461c.exe
Resource
win10v2004-20241007-en
General
-
Target
1508da2e5b66751f22107e5c06c59fb8700a1d957685d9e49af73af6d679461c.exe
-
Size
794KB
-
MD5
90e14acc69abde5756ed4e44dc05f3cc
-
SHA1
f792ab28bbef9fec6c339ccc6add892ab83e8829
-
SHA256
1508da2e5b66751f22107e5c06c59fb8700a1d957685d9e49af73af6d679461c
-
SHA512
754b328f1e15809fe2300e4a6a72c6b95054248e603a1162a64e903be894c424265485afbcaf07f5fa2b396a310aa20623807c930bc68947a59bea611c60d86f
-
SSDEEP
12288:gMrey90vJilZwAI5tQm3ULkWexypPa39GJVn9J0bdVPxRXDugyK+Un:OyIs6AI5t33UL/QOnYzJRXDugyK+y
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
Processes:
resource yara_rule behavioral1/files/0x000b000000023b36-19.dat healer behavioral1/memory/3264-22-0x0000000000E80000-0x0000000000E8A000-memory.dmp healer behavioral1/memory/2604-29-0x0000000002650000-0x000000000266A000-memory.dmp healer behavioral1/memory/2604-31-0x0000000005010000-0x0000000005028000-memory.dmp healer behavioral1/memory/2604-32-0x0000000005010000-0x0000000005022000-memory.dmp healer behavioral1/memory/2604-39-0x0000000005010000-0x0000000005022000-memory.dmp healer behavioral1/memory/2604-57-0x0000000005010000-0x0000000005022000-memory.dmp healer behavioral1/memory/2604-56-0x0000000005010000-0x0000000005022000-memory.dmp healer behavioral1/memory/2604-53-0x0000000005010000-0x0000000005022000-memory.dmp healer behavioral1/memory/2604-51-0x0000000005010000-0x0000000005022000-memory.dmp healer behavioral1/memory/2604-49-0x0000000005010000-0x0000000005022000-memory.dmp healer behavioral1/memory/2604-47-0x0000000005010000-0x0000000005022000-memory.dmp healer behavioral1/memory/2604-45-0x0000000005010000-0x0000000005022000-memory.dmp healer behavioral1/memory/2604-43-0x0000000005010000-0x0000000005022000-memory.dmp healer behavioral1/memory/2604-41-0x0000000005010000-0x0000000005022000-memory.dmp healer behavioral1/memory/2604-37-0x0000000005010000-0x0000000005022000-memory.dmp healer behavioral1/memory/2604-35-0x0000000005010000-0x0000000005022000-memory.dmp healer behavioral1/memory/2604-59-0x0000000005010000-0x0000000005022000-memory.dmp healer behavioral1/memory/2604-33-0x0000000005010000-0x0000000005022000-memory.dmp healer -
Healer family
-
Processes:
c76hL19.exeb3047rZ.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c76hL19.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c76hL19.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b3047rZ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b3047rZ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c76hL19.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c76hL19.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b3047rZ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b3047rZ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b3047rZ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b3047rZ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c76hL19.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c76hL19.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/2844-67-0x0000000004A40000-0x0000000004A86000-memory.dmp family_redline behavioral1/memory/2844-68-0x00000000050B0000-0x00000000050F4000-memory.dmp family_redline behavioral1/memory/2844-74-0x00000000050B0000-0x00000000050EE000-memory.dmp family_redline behavioral1/memory/2844-84-0x00000000050B0000-0x00000000050EE000-memory.dmp family_redline behavioral1/memory/2844-102-0x00000000050B0000-0x00000000050EE000-memory.dmp family_redline behavioral1/memory/2844-100-0x00000000050B0000-0x00000000050EE000-memory.dmp family_redline behavioral1/memory/2844-98-0x00000000050B0000-0x00000000050EE000-memory.dmp family_redline behavioral1/memory/2844-96-0x00000000050B0000-0x00000000050EE000-memory.dmp family_redline behavioral1/memory/2844-94-0x00000000050B0000-0x00000000050EE000-memory.dmp family_redline behavioral1/memory/2844-92-0x00000000050B0000-0x00000000050EE000-memory.dmp family_redline behavioral1/memory/2844-90-0x00000000050B0000-0x00000000050EE000-memory.dmp family_redline behavioral1/memory/2844-88-0x00000000050B0000-0x00000000050EE000-memory.dmp family_redline behavioral1/memory/2844-82-0x00000000050B0000-0x00000000050EE000-memory.dmp family_redline behavioral1/memory/2844-80-0x00000000050B0000-0x00000000050EE000-memory.dmp family_redline behavioral1/memory/2844-78-0x00000000050B0000-0x00000000050EE000-memory.dmp family_redline behavioral1/memory/2844-76-0x00000000050B0000-0x00000000050EE000-memory.dmp family_redline behavioral1/memory/2844-86-0x00000000050B0000-0x00000000050EE000-memory.dmp family_redline behavioral1/memory/2844-72-0x00000000050B0000-0x00000000050EE000-memory.dmp family_redline behavioral1/memory/2844-70-0x00000000050B0000-0x00000000050EE000-memory.dmp family_redline behavioral1/memory/2844-69-0x00000000050B0000-0x00000000050EE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 5 IoCs
Processes:
tice6571.exetice3169.exeb3047rZ.exec76hL19.exedMssL30.exepid Process 1616 tice6571.exe 4028 tice3169.exe 3264 b3047rZ.exe 2604 c76hL19.exe 2844 dMssL30.exe -
Processes:
b3047rZ.exec76hL19.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b3047rZ.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c76hL19.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c76hL19.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
1508da2e5b66751f22107e5c06c59fb8700a1d957685d9e49af73af6d679461c.exetice6571.exetice3169.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1508da2e5b66751f22107e5c06c59fb8700a1d957685d9e49af73af6d679461c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice6571.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice3169.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 460 2604 WerFault.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1508da2e5b66751f22107e5c06c59fb8700a1d957685d9e49af73af6d679461c.exetice6571.exetice3169.exec76hL19.exedMssL30.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1508da2e5b66751f22107e5c06c59fb8700a1d957685d9e49af73af6d679461c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice6571.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice3169.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c76hL19.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dMssL30.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
b3047rZ.exec76hL19.exepid Process 3264 b3047rZ.exe 3264 b3047rZ.exe 2604 c76hL19.exe 2604 c76hL19.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
b3047rZ.exec76hL19.exedMssL30.exedescription pid Process Token: SeDebugPrivilege 3264 b3047rZ.exe Token: SeDebugPrivilege 2604 c76hL19.exe Token: SeDebugPrivilege 2844 dMssL30.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
1508da2e5b66751f22107e5c06c59fb8700a1d957685d9e49af73af6d679461c.exetice6571.exetice3169.exedescription pid Process procid_target PID 3088 wrote to memory of 1616 3088 1508da2e5b66751f22107e5c06c59fb8700a1d957685d9e49af73af6d679461c.exe 83 PID 3088 wrote to memory of 1616 3088 1508da2e5b66751f22107e5c06c59fb8700a1d957685d9e49af73af6d679461c.exe 83 PID 3088 wrote to memory of 1616 3088 1508da2e5b66751f22107e5c06c59fb8700a1d957685d9e49af73af6d679461c.exe 83 PID 1616 wrote to memory of 4028 1616 tice6571.exe 84 PID 1616 wrote to memory of 4028 1616 tice6571.exe 84 PID 1616 wrote to memory of 4028 1616 tice6571.exe 84 PID 4028 wrote to memory of 3264 4028 tice3169.exe 85 PID 4028 wrote to memory of 3264 4028 tice3169.exe 85 PID 4028 wrote to memory of 2604 4028 tice3169.exe 96 PID 4028 wrote to memory of 2604 4028 tice3169.exe 96 PID 4028 wrote to memory of 2604 4028 tice3169.exe 96 PID 1616 wrote to memory of 2844 1616 tice6571.exe 101 PID 1616 wrote to memory of 2844 1616 tice6571.exe 101 PID 1616 wrote to memory of 2844 1616 tice6571.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\1508da2e5b66751f22107e5c06c59fb8700a1d957685d9e49af73af6d679461c.exe"C:\Users\Admin\AppData\Local\Temp\1508da2e5b66751f22107e5c06c59fb8700a1d957685d9e49af73af6d679461c.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice6571.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice6571.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice3169.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice3169.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3047rZ.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3047rZ.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3264
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c76hL19.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c76hL19.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2604 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2604 -s 10125⤵
- Program crash
PID:460
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dMssL30.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dMssL30.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2844
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2604 -ip 26041⤵PID:4724
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649KB
MD591589f68760cc6c011a0dbcded454ef3
SHA10694da0ef56ab37a2d8da3dde054113e135e4896
SHA25633fc94d4adeb28a6e8127ee202bf0c32e8a3aadbe0d296d1d823db5d3139c621
SHA51280ecc9310c4cced43316bfa3e152ca5ea0f143015ea899c4bbfad9483dcb5a555d587ade24377e4b5d42e7ad704082b220ea0f3df146241f8058bde1da559740
-
Filesize
284KB
MD5df3da28d9701d3331d198abf06b1a916
SHA1942fafa123c78fc90c57137be8661439ac2d2814
SHA256458174d67dd752346b4c45f96e6ebe1200829c28124c5fca89f60892409ca5a5
SHA51250036d4113227d6ab9d97e529fbafe722d1ffad0ad220dca23b08341a4db72d30b1e3a91240b08c43fea8587763f721b65926101db2e67570fe54d903ff0b1b4
-
Filesize
324KB
MD542fc2b6e7f44ea253b84094270420755
SHA1331a6da8415f8e7c971fc80ee37fd99ee218b7c3
SHA25624fddbcd1450b74f2ca6e8c97e8c33cf29cfbb3539256ab3bea167c0f63ca659
SHA5120a023fde1ceb801dca948698a7a90b4dd5d6a94c9d0f8a0a1ca58348f55951721d45ad5d496e2b1f08294283a9407deba0853df8143a556964a23452be87b731
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
226KB
MD58216c9847a8b897d3960f7ea26374575
SHA12b21facf7d78c8675627e5200cfb93fd9bf83594
SHA2565da12d1027f95a0fef1a70608f3642aca3bf58df93d3ca93c6c2b56f0618c2f4
SHA5129ace55b033e0f21f2b7c2b509405e25046f7ffa5e70b4df4cc85d6a6b254701b1f929d652f87c468df8a80c50f1c27ef9c0b2dcc403418440947145dbcf2615b