Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 09:17
Static task
static1
Behavioral task
behavioral1
Sample
15634ea068b2037427b813becb2036b14d355ef83531c33ab3b3f936b19eb6e2.exe
Resource
win10v2004-20241007-en
General
-
Target
15634ea068b2037427b813becb2036b14d355ef83531c33ab3b3f936b19eb6e2.exe
-
Size
794KB
-
MD5
0d8becfa6a451e00670322cc6d4ae398
-
SHA1
63656efb17d0e7c483f4ec6273b6a9424fb7246b
-
SHA256
15634ea068b2037427b813becb2036b14d355ef83531c33ab3b3f936b19eb6e2
-
SHA512
d81f57d9ef2e035718f67d84b11dda67e6d0159085b853bbaf4646297f7f5802ea62448c5a3b938eaa5ad2646b08bdbc8d96322c5d88b065b9c0c50387072a8c
-
SSDEEP
12288:sMrXy90X0ulw7immrt6XOo0ltAHRNXdLUOGBqY2bBC3ceGn9OV:ryPMbMV02RNXiZ8bBj/AV
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
Processes:
resource yara_rule behavioral1/files/0x000b000000023ba1-19.dat healer behavioral1/memory/1064-22-0x00000000002D0000-0x00000000002DA000-memory.dmp healer behavioral1/memory/4072-29-0x0000000002220000-0x000000000223A000-memory.dmp healer behavioral1/memory/4072-31-0x0000000002490000-0x00000000024A8000-memory.dmp healer behavioral1/memory/4072-53-0x0000000002490000-0x00000000024A2000-memory.dmp healer behavioral1/memory/4072-59-0x0000000002490000-0x00000000024A2000-memory.dmp healer behavioral1/memory/4072-57-0x0000000002490000-0x00000000024A2000-memory.dmp healer behavioral1/memory/4072-55-0x0000000002490000-0x00000000024A2000-memory.dmp healer behavioral1/memory/4072-51-0x0000000002490000-0x00000000024A2000-memory.dmp healer behavioral1/memory/4072-49-0x0000000002490000-0x00000000024A2000-memory.dmp healer behavioral1/memory/4072-47-0x0000000002490000-0x00000000024A2000-memory.dmp healer behavioral1/memory/4072-46-0x0000000002490000-0x00000000024A2000-memory.dmp healer behavioral1/memory/4072-43-0x0000000002490000-0x00000000024A2000-memory.dmp healer behavioral1/memory/4072-41-0x0000000002490000-0x00000000024A2000-memory.dmp healer behavioral1/memory/4072-39-0x0000000002490000-0x00000000024A2000-memory.dmp healer behavioral1/memory/4072-37-0x0000000002490000-0x00000000024A2000-memory.dmp healer behavioral1/memory/4072-35-0x0000000002490000-0x00000000024A2000-memory.dmp healer behavioral1/memory/4072-33-0x0000000002490000-0x00000000024A2000-memory.dmp healer behavioral1/memory/4072-32-0x0000000002490000-0x00000000024A2000-memory.dmp healer -
Healer family
-
Processes:
c39vM61.exeb6491bZ.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c39vM61.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c39vM61.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b6491bZ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b6491bZ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b6491bZ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b6491bZ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b6491bZ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c39vM61.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c39vM61.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c39vM61.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b6491bZ.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c39vM61.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/3848-67-0x00000000026D0000-0x0000000002716000-memory.dmp family_redline behavioral1/memory/3848-68-0x0000000004B10000-0x0000000004B54000-memory.dmp family_redline behavioral1/memory/3848-72-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/3848-80-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/3848-102-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/3848-100-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/3848-98-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/3848-96-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/3848-92-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/3848-90-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/3848-89-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/3848-86-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/3848-84-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/3848-82-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/3848-78-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/3848-76-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/3848-74-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/3848-94-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/3848-70-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/3848-69-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 5 IoCs
Processes:
tice5433.exetice7007.exeb6491bZ.exec39vM61.exedKdGq47.exepid Process 3724 tice5433.exe 2784 tice7007.exe 1064 b6491bZ.exe 4072 c39vM61.exe 3848 dKdGq47.exe -
Processes:
b6491bZ.exec39vM61.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b6491bZ.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c39vM61.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c39vM61.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
15634ea068b2037427b813becb2036b14d355ef83531c33ab3b3f936b19eb6e2.exetice5433.exetice7007.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 15634ea068b2037427b813becb2036b14d355ef83531c33ab3b3f936b19eb6e2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice5433.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice7007.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 4576 4072 WerFault.exe 100 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
tice5433.exetice7007.exec39vM61.exedKdGq47.exe15634ea068b2037427b813becb2036b14d355ef83531c33ab3b3f936b19eb6e2.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice5433.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice7007.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c39vM61.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dKdGq47.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 15634ea068b2037427b813becb2036b14d355ef83531c33ab3b3f936b19eb6e2.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
b6491bZ.exec39vM61.exepid Process 1064 b6491bZ.exe 1064 b6491bZ.exe 4072 c39vM61.exe 4072 c39vM61.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
b6491bZ.exec39vM61.exedKdGq47.exedescription pid Process Token: SeDebugPrivilege 1064 b6491bZ.exe Token: SeDebugPrivilege 4072 c39vM61.exe Token: SeDebugPrivilege 3848 dKdGq47.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
15634ea068b2037427b813becb2036b14d355ef83531c33ab3b3f936b19eb6e2.exetice5433.exetice7007.exedescription pid Process procid_target PID 1608 wrote to memory of 3724 1608 15634ea068b2037427b813becb2036b14d355ef83531c33ab3b3f936b19eb6e2.exe 83 PID 1608 wrote to memory of 3724 1608 15634ea068b2037427b813becb2036b14d355ef83531c33ab3b3f936b19eb6e2.exe 83 PID 1608 wrote to memory of 3724 1608 15634ea068b2037427b813becb2036b14d355ef83531c33ab3b3f936b19eb6e2.exe 83 PID 3724 wrote to memory of 2784 3724 tice5433.exe 84 PID 3724 wrote to memory of 2784 3724 tice5433.exe 84 PID 3724 wrote to memory of 2784 3724 tice5433.exe 84 PID 2784 wrote to memory of 1064 2784 tice7007.exe 85 PID 2784 wrote to memory of 1064 2784 tice7007.exe 85 PID 2784 wrote to memory of 4072 2784 tice7007.exe 100 PID 2784 wrote to memory of 4072 2784 tice7007.exe 100 PID 2784 wrote to memory of 4072 2784 tice7007.exe 100 PID 3724 wrote to memory of 3848 3724 tice5433.exe 111 PID 3724 wrote to memory of 3848 3724 tice5433.exe 111 PID 3724 wrote to memory of 3848 3724 tice5433.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\15634ea068b2037427b813becb2036b14d355ef83531c33ab3b3f936b19eb6e2.exe"C:\Users\Admin\AppData\Local\Temp\15634ea068b2037427b813becb2036b14d355ef83531c33ab3b3f936b19eb6e2.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice5433.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice5433.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice7007.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice7007.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b6491bZ.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b6491bZ.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1064
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c39vM61.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c39vM61.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4072 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4072 -s 10805⤵
- Program crash
PID:4576
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dKdGq47.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dKdGq47.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3848
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4072 -ip 40721⤵PID:1632
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649KB
MD5e1505440f5af35caf625041e1ee4a84d
SHA1efcce76b5ce89a3b371cd94c472661a0064a68d7
SHA2567765d4ba243a714903c0af0280e22561a76d8273d63276f0a78a6e131034dd63
SHA5120d440e8a6c46333f751b0c1e8e6b23a537f8d189fe78f51e8837af99f3dc7e49289c63236362fb056b7fb68ba4d5a55aece51a5b363d5547228caa9f3d81bb19
-
Filesize
284KB
MD57713d34985717d28af9cb93c2de1f353
SHA1ab8cb1608198e8494eaea4ff95e02cff10c38358
SHA256a75499acfecfde805b3b6e3184f1720425709fba02e64093b202ae556366b82d
SHA5122830f8bf0a550e4ff56d2a6f8e647762a987bbda628f91c54ad2953fb0fc960f2df57dd0cfd8147f67492bed1ff8e1550058c682ecb2c4348180fb5f47e7dcce
-
Filesize
324KB
MD5a7216ddd9bc3cc728b73e4f1db8f25f6
SHA156e0c5c58ec5da1abdbb8bcaf180beafcd0997a2
SHA25694e11458baaeed383e8bd7a9fd4ea0648cd2aa9e5c6801de9b4284c588ca7ce0
SHA5127f45d0b175362a2801c3f838b7b8b8deaac0e38d8f58702b52bfe8b2a95e1ed1201ede62a8abd46bfe4e69f0207518715995324cbbd248fffc46811ac9d1f2b9
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
226KB
MD502953d3d72371b104a1a14ba1bddb9e2
SHA19e2122e6b6abe988e32a99fe61a4967361d0f357
SHA25609b0fb0942c58f9eb0fad0df7151ebcf32f1bc9d596cd794bf1d4617272ab489
SHA5127468fd1fa9db268170cc4dcfb3300b44dfeee2c4c7337703dc5622d4326b34af282da629a07569d2cfe1f0b72d6fcbe2a69dc9d445f4a2e3745c494c7704cd99