Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 09:15
Static task
static1
Behavioral task
behavioral1
Sample
e124508da2d117d745da94e62fa20085d8ff153d33222a9bd2419cc1c995ed72.exe
Resource
win10v2004-20241007-en
General
-
Target
e124508da2d117d745da94e62fa20085d8ff153d33222a9bd2419cc1c995ed72.exe
-
Size
879KB
-
MD5
b88f21c0567abcf46f6cf16db511f89d
-
SHA1
ff28ba70a54b177721bae637a8ecf9527eed6bdb
-
SHA256
e124508da2d117d745da94e62fa20085d8ff153d33222a9bd2419cc1c995ed72
-
SHA512
2a974655e35fb727b693eff15fbf90160967f5a0838a81a7e2fcb476a684daf9ffe868c102e2770936f21e73a34cb55b10ef9ea268ce48d4bfb8a186ca12a9aa
-
SSDEEP
12288:AMrJy90P5/BXYBx9z1JAN97r8+SPDFph2Nojmi4tU/Us2A6F0OJ8ghgwof5uNLF:ZyaLXqzU38Lxph2Not4Aw0O3ha5ur
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
Processes:
resource yara_rule behavioral1/files/0x0008000000023c9c-19.dat healer behavioral1/memory/976-22-0x00000000000C0000-0x00000000000CA000-memory.dmp healer behavioral1/memory/4888-29-0x0000000007180000-0x000000000719A000-memory.dmp healer behavioral1/memory/4888-31-0x0000000007200000-0x0000000007218000-memory.dmp healer behavioral1/memory/4888-32-0x0000000007200000-0x0000000007212000-memory.dmp healer behavioral1/memory/4888-59-0x0000000007200000-0x0000000007212000-memory.dmp healer behavioral1/memory/4888-57-0x0000000007200000-0x0000000007212000-memory.dmp healer behavioral1/memory/4888-55-0x0000000007200000-0x0000000007212000-memory.dmp healer behavioral1/memory/4888-54-0x0000000007200000-0x0000000007212000-memory.dmp healer behavioral1/memory/4888-52-0x0000000007200000-0x0000000007212000-memory.dmp healer behavioral1/memory/4888-50-0x0000000007200000-0x0000000007212000-memory.dmp healer behavioral1/memory/4888-47-0x0000000007200000-0x0000000007212000-memory.dmp healer behavioral1/memory/4888-45-0x0000000007200000-0x0000000007212000-memory.dmp healer behavioral1/memory/4888-43-0x0000000007200000-0x0000000007212000-memory.dmp healer behavioral1/memory/4888-41-0x0000000007200000-0x0000000007212000-memory.dmp healer behavioral1/memory/4888-39-0x0000000007200000-0x0000000007212000-memory.dmp healer behavioral1/memory/4888-38-0x0000000007200000-0x0000000007212000-memory.dmp healer behavioral1/memory/4888-35-0x0000000007200000-0x0000000007212000-memory.dmp healer behavioral1/memory/4888-33-0x0000000007200000-0x0000000007212000-memory.dmp healer -
Healer family
-
Processes:
b8920aH.exec58WK34.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b8920aH.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b8920aH.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b8920aH.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c58WK34.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c58WK34.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c58WK34.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b8920aH.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b8920aH.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b8920aH.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c58WK34.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c58WK34.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c58WK34.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/3168-67-0x0000000004720000-0x0000000004766000-memory.dmp family_redline behavioral1/memory/3168-68-0x0000000007160000-0x00000000071A4000-memory.dmp family_redline behavioral1/memory/3168-70-0x0000000007160000-0x000000000719E000-memory.dmp family_redline behavioral1/memory/3168-102-0x0000000007160000-0x000000000719E000-memory.dmp family_redline behavioral1/memory/3168-100-0x0000000007160000-0x000000000719E000-memory.dmp family_redline behavioral1/memory/3168-98-0x0000000007160000-0x000000000719E000-memory.dmp family_redline behavioral1/memory/3168-96-0x0000000007160000-0x000000000719E000-memory.dmp family_redline behavioral1/memory/3168-94-0x0000000007160000-0x000000000719E000-memory.dmp family_redline behavioral1/memory/3168-92-0x0000000007160000-0x000000000719E000-memory.dmp family_redline behavioral1/memory/3168-90-0x0000000007160000-0x000000000719E000-memory.dmp family_redline behavioral1/memory/3168-88-0x0000000007160000-0x000000000719E000-memory.dmp family_redline behavioral1/memory/3168-86-0x0000000007160000-0x000000000719E000-memory.dmp family_redline behavioral1/memory/3168-84-0x0000000007160000-0x000000000719E000-memory.dmp family_redline behavioral1/memory/3168-82-0x0000000007160000-0x000000000719E000-memory.dmp family_redline behavioral1/memory/3168-80-0x0000000007160000-0x000000000719E000-memory.dmp family_redline behavioral1/memory/3168-78-0x0000000007160000-0x000000000719E000-memory.dmp family_redline behavioral1/memory/3168-76-0x0000000007160000-0x000000000719E000-memory.dmp family_redline behavioral1/memory/3168-74-0x0000000007160000-0x000000000719E000-memory.dmp family_redline behavioral1/memory/3168-72-0x0000000007160000-0x000000000719E000-memory.dmp family_redline behavioral1/memory/3168-69-0x0000000007160000-0x000000000719E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 5 IoCs
Processes:
tice2053.exetice7230.exeb8920aH.exec58WK34.exedrIhL32.exepid Process 776 tice2053.exe 3968 tice7230.exe 976 b8920aH.exe 4888 c58WK34.exe 3168 drIhL32.exe -
Processes:
c58WK34.exeb8920aH.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c58WK34.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b8920aH.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c58WK34.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
e124508da2d117d745da94e62fa20085d8ff153d33222a9bd2419cc1c995ed72.exetice2053.exetice7230.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e124508da2d117d745da94e62fa20085d8ff153d33222a9bd2419cc1c995ed72.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice2053.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice7230.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 416 4888 WerFault.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
tice7230.exec58WK34.exedrIhL32.exee124508da2d117d745da94e62fa20085d8ff153d33222a9bd2419cc1c995ed72.exetice2053.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice7230.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c58WK34.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language drIhL32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e124508da2d117d745da94e62fa20085d8ff153d33222a9bd2419cc1c995ed72.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice2053.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
b8920aH.exec58WK34.exepid Process 976 b8920aH.exe 976 b8920aH.exe 4888 c58WK34.exe 4888 c58WK34.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
b8920aH.exec58WK34.exedrIhL32.exedescription pid Process Token: SeDebugPrivilege 976 b8920aH.exe Token: SeDebugPrivilege 4888 c58WK34.exe Token: SeDebugPrivilege 3168 drIhL32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
e124508da2d117d745da94e62fa20085d8ff153d33222a9bd2419cc1c995ed72.exetice2053.exetice7230.exedescription pid Process procid_target PID 1744 wrote to memory of 776 1744 e124508da2d117d745da94e62fa20085d8ff153d33222a9bd2419cc1c995ed72.exe 83 PID 1744 wrote to memory of 776 1744 e124508da2d117d745da94e62fa20085d8ff153d33222a9bd2419cc1c995ed72.exe 83 PID 1744 wrote to memory of 776 1744 e124508da2d117d745da94e62fa20085d8ff153d33222a9bd2419cc1c995ed72.exe 83 PID 776 wrote to memory of 3968 776 tice2053.exe 84 PID 776 wrote to memory of 3968 776 tice2053.exe 84 PID 776 wrote to memory of 3968 776 tice2053.exe 84 PID 3968 wrote to memory of 976 3968 tice7230.exe 85 PID 3968 wrote to memory of 976 3968 tice7230.exe 85 PID 3968 wrote to memory of 4888 3968 tice7230.exe 96 PID 3968 wrote to memory of 4888 3968 tice7230.exe 96 PID 3968 wrote to memory of 4888 3968 tice7230.exe 96 PID 776 wrote to memory of 3168 776 tice2053.exe 101 PID 776 wrote to memory of 3168 776 tice2053.exe 101 PID 776 wrote to memory of 3168 776 tice2053.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\e124508da2d117d745da94e62fa20085d8ff153d33222a9bd2419cc1c995ed72.exe"C:\Users\Admin\AppData\Local\Temp\e124508da2d117d745da94e62fa20085d8ff153d33222a9bd2419cc1c995ed72.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice2053.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice2053.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice7230.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice7230.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8920aH.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8920aH.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:976
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c58WK34.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c58WK34.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4888 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4888 -s 10965⤵
- Program crash
PID:416
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\drIhL32.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\drIhL32.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3168
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4888 -ip 48881⤵PID:4876
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
734KB
MD5476c19da881f3d1ba0a955305913a5d1
SHA132e2fe202a9fbeb434609f19ba237eca397e8d41
SHA256bd88b97c39bfaa4e0db94536b660b0a9279c2d338290518aef52d7a89fd01553
SHA512f44c79353a2efa5be5c7c869cfcf4ab6a61ac33e148521c6a9cf2c3cb1578cf93134ea269e6b21d3dc8684e8bf68ec355056eaa4cf46aac45fb54b8e78fdb437
-
Filesize
408KB
MD51ef10c291e5f1fb0a142d6ccdca8edb6
SHA134a1130eb194438c47392c029eb8e273934cb86f
SHA2560bd7de031bba1047834efbb916fbda56028ae104f71c31793fbddebb63a5f62d
SHA5128e6c9bf803247ec7cde135eabd723ddc0d8cd6f53d8c5838db08fcd80aaeb8a75245658077415149951fee8f8c2e8ab71af7bd05063faf73ca91a3f99e053520
-
Filesize
375KB
MD57e4ca6df5f5fb9c405673bfd62b58aac
SHA1815a33231c1714a5fa928a305dbc2183286fc10e
SHA256fb6679dedfb1647773f2a1c2717fb5b435c75c6b619be5f6fa6b844e9c85d710
SHA512d5355b392029e955a7ded9d69240a27fb07db70b425ab76a9cc94e0cd3235c3ea1f828b5fea9468cff7a83a83bd8bf89352e5e3f1e7585b6b3f15ce819593121
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
388KB
MD5b2039733c5be405268909d73d7bbda25
SHA14044b91903b56a92fc90b1bfc907a7d7591d81b4
SHA256a40d5157b3e1bf59b3f105f3173aedfa4e39fe28c5fc481613f02f727d526e49
SHA512863636fe54508313ad9073378aa54f31d8537d6b82ed6d660d15c449c60c7be0e9d8fb4e3043a862f87fe437e53f29e2bb67b690979177433e00c03518e2128b