Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/11/2024, 07:44
Static task
static1
Behavioral task
behavioral1
Sample
0d89a492e2501112cb4886480b38a45851475250f1c32aab81d9e5f154a665cb.exe
Resource
win10v2004-20241007-en
General
-
Target
0d89a492e2501112cb4886480b38a45851475250f1c32aab81d9e5f154a665cb.exe
-
Size
864KB
-
MD5
2a7cf9fcb304a7a9c98bd4a55d9350ba
-
SHA1
68347cbb5aca06cd421d6eb72792887fda0d6fe3
-
SHA256
0d89a492e2501112cb4886480b38a45851475250f1c32aab81d9e5f154a665cb
-
SHA512
2c1c5a02c19498a8518065c3e3250ace8bbf3bea143b390e292ac162188f13b4db2d72361ca071d8fa4a2ce99cf086e113ee00cf02f7afba7b12a4de68a3f93c
-
SSDEEP
24576:VyD7tCsm5GXPST9Rhcn1fui12db0wVRzFhtK:wDCyST9Tc1ui12xZVRR
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
resource yara_rule behavioral1/files/0x0008000000023c9b-19.dat healer behavioral1/memory/4340-22-0x0000000000DE0000-0x0000000000DEA000-memory.dmp healer behavioral1/memory/1924-29-0x0000000004B20000-0x0000000004B3A000-memory.dmp healer behavioral1/memory/1924-31-0x0000000004C70000-0x0000000004C88000-memory.dmp healer behavioral1/memory/1924-32-0x0000000004C70000-0x0000000004C82000-memory.dmp healer behavioral1/memory/1924-39-0x0000000004C70000-0x0000000004C82000-memory.dmp healer behavioral1/memory/1924-59-0x0000000004C70000-0x0000000004C82000-memory.dmp healer behavioral1/memory/1924-57-0x0000000004C70000-0x0000000004C82000-memory.dmp healer behavioral1/memory/1924-55-0x0000000004C70000-0x0000000004C82000-memory.dmp healer behavioral1/memory/1924-54-0x0000000004C70000-0x0000000004C82000-memory.dmp healer behavioral1/memory/1924-51-0x0000000004C70000-0x0000000004C82000-memory.dmp healer behavioral1/memory/1924-49-0x0000000004C70000-0x0000000004C82000-memory.dmp healer behavioral1/memory/1924-47-0x0000000004C70000-0x0000000004C82000-memory.dmp healer behavioral1/memory/1924-45-0x0000000004C70000-0x0000000004C82000-memory.dmp healer behavioral1/memory/1924-41-0x0000000004C70000-0x0000000004C82000-memory.dmp healer behavioral1/memory/1924-37-0x0000000004C70000-0x0000000004C82000-memory.dmp healer behavioral1/memory/1924-35-0x0000000004C70000-0x0000000004C82000-memory.dmp healer behavioral1/memory/1924-33-0x0000000004C70000-0x0000000004C82000-memory.dmp healer behavioral1/memory/1924-43-0x0000000004C70000-0x0000000004C82000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b6409gc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c08YT37.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c08YT37.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c08YT37.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b6409gc.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c08YT37.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c08YT37.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c08YT37.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b6409gc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b6409gc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b6409gc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b6409gc.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1964-67-0x0000000004B70000-0x0000000004BB6000-memory.dmp family_redline behavioral1/memory/1964-68-0x0000000007100000-0x0000000007144000-memory.dmp family_redline behavioral1/memory/1964-84-0x0000000007100000-0x000000000713E000-memory.dmp family_redline behavioral1/memory/1964-92-0x0000000007100000-0x000000000713E000-memory.dmp family_redline behavioral1/memory/1964-102-0x0000000007100000-0x000000000713E000-memory.dmp family_redline behavioral1/memory/1964-100-0x0000000007100000-0x000000000713E000-memory.dmp family_redline behavioral1/memory/1964-98-0x0000000007100000-0x000000000713E000-memory.dmp family_redline behavioral1/memory/1964-96-0x0000000007100000-0x000000000713E000-memory.dmp family_redline behavioral1/memory/1964-94-0x0000000007100000-0x000000000713E000-memory.dmp family_redline behavioral1/memory/1964-90-0x0000000007100000-0x000000000713E000-memory.dmp family_redline behavioral1/memory/1964-88-0x0000000007100000-0x000000000713E000-memory.dmp family_redline behavioral1/memory/1964-86-0x0000000007100000-0x000000000713E000-memory.dmp family_redline behavioral1/memory/1964-82-0x0000000007100000-0x000000000713E000-memory.dmp family_redline behavioral1/memory/1964-80-0x0000000007100000-0x000000000713E000-memory.dmp family_redline behavioral1/memory/1964-79-0x0000000007100000-0x000000000713E000-memory.dmp family_redline behavioral1/memory/1964-76-0x0000000007100000-0x000000000713E000-memory.dmp family_redline behavioral1/memory/1964-74-0x0000000007100000-0x000000000713E000-memory.dmp family_redline behavioral1/memory/1964-72-0x0000000007100000-0x000000000713E000-memory.dmp family_redline behavioral1/memory/1964-70-0x0000000007100000-0x000000000713E000-memory.dmp family_redline behavioral1/memory/1964-69-0x0000000007100000-0x000000000713E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 5 IoCs
pid Process 2908 tice5548.exe 2632 tice9838.exe 4340 b6409gc.exe 1924 c08YT37.exe 1964 dHTny63.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b6409gc.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c08YT37.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c08YT37.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0d89a492e2501112cb4886480b38a45851475250f1c32aab81d9e5f154a665cb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice5548.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice9838.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5632 sc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 5016 1924 WerFault.exe 99 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0d89a492e2501112cb4886480b38a45851475250f1c32aab81d9e5f154a665cb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice5548.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice9838.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c08YT37.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dHTny63.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4340 b6409gc.exe 4340 b6409gc.exe 1924 c08YT37.exe 1924 c08YT37.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4340 b6409gc.exe Token: SeDebugPrivilege 1924 c08YT37.exe Token: SeDebugPrivilege 1964 dHTny63.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4892 wrote to memory of 2908 4892 0d89a492e2501112cb4886480b38a45851475250f1c32aab81d9e5f154a665cb.exe 85 PID 4892 wrote to memory of 2908 4892 0d89a492e2501112cb4886480b38a45851475250f1c32aab81d9e5f154a665cb.exe 85 PID 4892 wrote to memory of 2908 4892 0d89a492e2501112cb4886480b38a45851475250f1c32aab81d9e5f154a665cb.exe 85 PID 2908 wrote to memory of 2632 2908 tice5548.exe 86 PID 2908 wrote to memory of 2632 2908 tice5548.exe 86 PID 2908 wrote to memory of 2632 2908 tice5548.exe 86 PID 2632 wrote to memory of 4340 2632 tice9838.exe 88 PID 2632 wrote to memory of 4340 2632 tice9838.exe 88 PID 2632 wrote to memory of 1924 2632 tice9838.exe 99 PID 2632 wrote to memory of 1924 2632 tice9838.exe 99 PID 2632 wrote to memory of 1924 2632 tice9838.exe 99 PID 2908 wrote to memory of 1964 2908 tice5548.exe 104 PID 2908 wrote to memory of 1964 2908 tice5548.exe 104 PID 2908 wrote to memory of 1964 2908 tice5548.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d89a492e2501112cb4886480b38a45851475250f1c32aab81d9e5f154a665cb.exe"C:\Users\Admin\AppData\Local\Temp\0d89a492e2501112cb4886480b38a45851475250f1c32aab81d9e5f154a665cb.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice5548.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice5548.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice9838.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice9838.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b6409gc.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b6409gc.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4340
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c08YT37.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c08YT37.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1924 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1924 -s 10925⤵
- Program crash
PID:5016
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dHTny63.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dHTny63.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1964
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 1924 -ip 19241⤵PID:5048
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:5632
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
719KB
MD502d7d3ce2061864f70ada0f0fd1cf8ef
SHA1a81df0e87200e949225fad2fe129d58a86e987cf
SHA2567e8a03c9e7bdffc5b5ff89ea193538aa8955f072f2c45f18ddb20284ea20c3a1
SHA5122ff4dd859672625a584717875b5b601fb73a3f22965ca900247ecb3ca4f1f11098ea8a588ada195ea05e546711d016015e401493bedd7551579d96bf97f02f31
-
Filesize
399KB
MD5a15908f6ca8951698d65b017ee7deb4e
SHA181580fe1587691adb7f87fdbea0cc40f9d03af20
SHA256340231b3d30edc555e59e4a0ac1ed2f5b4f874435c611426188773ea11fb60af
SHA512b7b75bf67a93ec471902cab0225b68f79016af9a248f06dd2a6fe54c8529fa3e7f6ba808e1018856ce31ca0176a4311c738420f6e3b0f0e9f637962c631a4ecd
-
Filesize
360KB
MD5f3593a847c07390601f9257ea0104fab
SHA18cfab3c68ba0c04d0442cdcb2fe4a2b64857ae4a
SHA256a03f3d99b2a7f33845534a3a9656ef9629b4c6eec9d0eaf6d6a1d90839e2e585
SHA512390292ef71a41f0efb6c9cf0f5aa82424bdd5c5e667c389fdb72a66b7cd57588e9ab5651fae1b418668bc97f63219a4cd9376024e05ce96d13bd8dd473cc6da9
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
342KB
MD5f712df9447bf041f2a553d0e392cc6f1
SHA12c4ca1dcb1cd0537d14e7f503503361d1f32b77a
SHA25609671432de49b240cf728f0aead0a7c6a28edc886a7fcf023387ced728e15025
SHA51241680e928f033377e7193175c423af9c71ac37be5460b0ae1cac446325b4346cafff486ce1c5e83b8e5b8d01d4672569e152d080b6f3b9d2fb2fe16d383c7da9