Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 09:03
Static task
static1
Behavioral task
behavioral1
Sample
7c036195cb45e76d93660f3353597c61aa7f0a8b55f4d7c7f6f59657572ea363.exe
Resource
win10v2004-20241007-en
General
-
Target
7c036195cb45e76d93660f3353597c61aa7f0a8b55f4d7c7f6f59657572ea363.exe
-
Size
787KB
-
MD5
71fa03791875cf5641f3d8438ede34d9
-
SHA1
ce32e62da6421abf084e530a1382674fa861d00a
-
SHA256
7c036195cb45e76d93660f3353597c61aa7f0a8b55f4d7c7f6f59657572ea363
-
SHA512
97bed48a67cf76230bc44743983bab43c0d15147a70f8117e1b1e5130daadedaf59424eb4a8aa70e8817a7b96ab114bf7501510457cfe13ed22400353a03cbda
-
SSDEEP
12288:OMrPy90erXPE/NRaDDThs4CvL7+AsGiKSlF5Kl0M+D1RD5rWk12I5rKP/VVaANx:JyDPQTSTuvm57KSlF00MM1Ni2rw1L
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
Processes:
resource yara_rule behavioral1/files/0x000b000000023b84-20.dat healer behavioral1/memory/4844-22-0x0000000000DA0000-0x0000000000DAA000-memory.dmp healer behavioral1/memory/388-29-0x0000000002180000-0x000000000219A000-memory.dmp healer behavioral1/memory/388-31-0x0000000004A50000-0x0000000004A68000-memory.dmp healer behavioral1/memory/388-32-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/388-54-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/388-59-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/388-57-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/388-55-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/388-51-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/388-49-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/388-48-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/388-45-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/388-43-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/388-41-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/388-39-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/388-37-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/388-35-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/388-33-0x0000000004A50000-0x0000000004A62000-memory.dmp healer -
Healer family
-
Processes:
c54tu90.exeb1998zs.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c54tu90.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b1998zs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b1998zs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b1998zs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c54tu90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c54tu90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c54tu90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c54tu90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b1998zs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b1998zs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b1998zs.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c54tu90.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/3532-67-0x00000000048C0000-0x0000000004906000-memory.dmp family_redline behavioral1/memory/3532-68-0x0000000005060000-0x00000000050A4000-memory.dmp family_redline behavioral1/memory/3532-72-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/3532-80-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/3532-102-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/3532-100-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/3532-98-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/3532-96-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/3532-92-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/3532-90-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/3532-88-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/3532-86-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/3532-84-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/3532-82-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/3532-78-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/3532-76-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/3532-74-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/3532-94-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/3532-70-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/3532-69-0x0000000005060000-0x000000000509E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 5 IoCs
Processes:
tice4354.exetice8683.exeb1998zs.exec54tu90.exedEzAl53.exepid Process 3716 tice4354.exe 3212 tice8683.exe 4844 b1998zs.exe 388 c54tu90.exe 3532 dEzAl53.exe -
Processes:
b1998zs.exec54tu90.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b1998zs.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c54tu90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c54tu90.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
7c036195cb45e76d93660f3353597c61aa7f0a8b55f4d7c7f6f59657572ea363.exetice4354.exetice8683.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7c036195cb45e76d93660f3353597c61aa7f0a8b55f4d7c7f6f59657572ea363.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice4354.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice8683.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 1292 388 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
7c036195cb45e76d93660f3353597c61aa7f0a8b55f4d7c7f6f59657572ea363.exetice4354.exetice8683.exec54tu90.exedEzAl53.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7c036195cb45e76d93660f3353597c61aa7f0a8b55f4d7c7f6f59657572ea363.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice4354.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice8683.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c54tu90.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dEzAl53.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
b1998zs.exec54tu90.exepid Process 4844 b1998zs.exe 4844 b1998zs.exe 388 c54tu90.exe 388 c54tu90.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
b1998zs.exec54tu90.exedEzAl53.exedescription pid Process Token: SeDebugPrivilege 4844 b1998zs.exe Token: SeDebugPrivilege 388 c54tu90.exe Token: SeDebugPrivilege 3532 dEzAl53.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
7c036195cb45e76d93660f3353597c61aa7f0a8b55f4d7c7f6f59657572ea363.exetice4354.exetice8683.exedescription pid Process procid_target PID 4456 wrote to memory of 3716 4456 7c036195cb45e76d93660f3353597c61aa7f0a8b55f4d7c7f6f59657572ea363.exe 83 PID 4456 wrote to memory of 3716 4456 7c036195cb45e76d93660f3353597c61aa7f0a8b55f4d7c7f6f59657572ea363.exe 83 PID 4456 wrote to memory of 3716 4456 7c036195cb45e76d93660f3353597c61aa7f0a8b55f4d7c7f6f59657572ea363.exe 83 PID 3716 wrote to memory of 3212 3716 tice4354.exe 85 PID 3716 wrote to memory of 3212 3716 tice4354.exe 85 PID 3716 wrote to memory of 3212 3716 tice4354.exe 85 PID 3212 wrote to memory of 4844 3212 tice8683.exe 86 PID 3212 wrote to memory of 4844 3212 tice8683.exe 86 PID 3212 wrote to memory of 388 3212 tice8683.exe 102 PID 3212 wrote to memory of 388 3212 tice8683.exe 102 PID 3212 wrote to memory of 388 3212 tice8683.exe 102 PID 3716 wrote to memory of 3532 3716 tice4354.exe 110 PID 3716 wrote to memory of 3532 3716 tice4354.exe 110 PID 3716 wrote to memory of 3532 3716 tice4354.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c036195cb45e76d93660f3353597c61aa7f0a8b55f4d7c7f6f59657572ea363.exe"C:\Users\Admin\AppData\Local\Temp\7c036195cb45e76d93660f3353597c61aa7f0a8b55f4d7c7f6f59657572ea363.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice4354.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice4354.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice8683.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice8683.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1998zs.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1998zs.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4844
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c54tu90.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c54tu90.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:388 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 388 -s 10805⤵
- Program crash
PID:1292
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dEzAl53.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dEzAl53.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3532
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 388 -ip 3881⤵PID:376
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
642KB
MD587bddeebff5da875e6efd944a0a7ca78
SHA1d1dad7d8868b95a85d5587b230a275e96d2d2bcf
SHA25610e996d01ce4819d925aeb88bf5e3f68736312a4c33a66b421d2c576a3c2fbd1
SHA51216b78882deb9a8fa34a0edb4537914eecb4c7e2e767818cc0ad7f7ab0b6f4acf56158dff174ee086c7e86278baecd611f8a44f7b528b3f6244bc21f7b19bc5ac
-
Filesize
295KB
MD5d29e1562e99ed853aa7ee078c8607418
SHA1ef4c0d80314e392bb7c3ab41f7c5ae1c30ecdd35
SHA256190cd512357f1ac6317d15716e14b853fbd7f81382d81a837efe16cc9ba85943
SHA5129b4fc9b72aca5f479c1d1ac6f80593f501bb9ed8eefcaa9cdf16a4da1c17db8f1dc6e8d09820a4007900c57e8b2d7d243b21095d010635c29a8981b94a2baaed
-
Filesize
321KB
MD552dc826a71215c47d9ce1055232da66b
SHA1f7c1e51e058e2ab47a533bd31c155c3b16046c23
SHA256bfbfd118851612da0f7766e7e1bacac6150a93750c91d6200158d71ab15b26ab
SHA5125c4063ff71073514d8f2fec2e8c56beaefd17d875cda5b14873e3162a7178b7c8c11f55085d5a39520782be0a2f1228a8312accc617359de7cc982837d5fb924
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
237KB
MD532429aca533c2db69793eb5b5e50fb4e
SHA14b3a367e44a86e0a163fae32ac52eb30bf2e7f32
SHA2561a346452ea90e05dd9f3cf2c19b10d3356707e5d187ecedd836ae7ee06c8edeb
SHA51200ecffd2248a8104f412a983a184ebe3a7f4ea72411e5edfe7a18279597f4419c1f73a22205efc76e9bc540a31e668c932c21cf56efe473caad7961a415576f6