Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 08:34
Static task
static1
Behavioral task
behavioral1
Sample
9c56a5af1bbd792ce8373b4fd57bfa511faec5453c8886f67c3f4c106213230d.exe
Resource
win10v2004-20241007-en
General
-
Target
9c56a5af1bbd792ce8373b4fd57bfa511faec5453c8886f67c3f4c106213230d.exe
-
Size
693KB
-
MD5
e3049ed7699f3568a7c367195933e5c5
-
SHA1
7a753cfe5c1f406d34f9b056ade011323a013742
-
SHA256
9c56a5af1bbd792ce8373b4fd57bfa511faec5453c8886f67c3f4c106213230d
-
SHA512
9ca2a469e367ce53219f2676eba053f07829e45a2f9f499bbd1867be4f8c856429a8a3216a54c3d0b3358022946481cf153e9d858b5794f3cacc633901c1df56
-
SSDEEP
12288:mMrgy90eCjVxB1s+BA/MK2+Gtig0wivcwiUxz/0gEOVo8c0Tuxt03:SyNoVtNb+GtigovsUxzwuixy3
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/2416-19-0x0000000002390000-0x00000000023AA000-memory.dmp healer behavioral1/memory/2416-21-0x0000000002510000-0x0000000002528000-memory.dmp healer behavioral1/memory/2416-23-0x0000000002510000-0x0000000002522000-memory.dmp healer behavioral1/memory/2416-49-0x0000000002510000-0x0000000002522000-memory.dmp healer behavioral1/memory/2416-47-0x0000000002510000-0x0000000002522000-memory.dmp healer behavioral1/memory/2416-45-0x0000000002510000-0x0000000002522000-memory.dmp healer behavioral1/memory/2416-43-0x0000000002510000-0x0000000002522000-memory.dmp healer behavioral1/memory/2416-41-0x0000000002510000-0x0000000002522000-memory.dmp healer behavioral1/memory/2416-39-0x0000000002510000-0x0000000002522000-memory.dmp healer behavioral1/memory/2416-37-0x0000000002510000-0x0000000002522000-memory.dmp healer behavioral1/memory/2416-35-0x0000000002510000-0x0000000002522000-memory.dmp healer behavioral1/memory/2416-34-0x0000000002510000-0x0000000002522000-memory.dmp healer behavioral1/memory/2416-31-0x0000000002510000-0x0000000002522000-memory.dmp healer behavioral1/memory/2416-30-0x0000000002510000-0x0000000002522000-memory.dmp healer behavioral1/memory/2416-28-0x0000000002510000-0x0000000002522000-memory.dmp healer behavioral1/memory/2416-26-0x0000000002510000-0x0000000002522000-memory.dmp healer behavioral1/memory/2416-22-0x0000000002510000-0x0000000002522000-memory.dmp healer -
Healer family
-
Processes:
b4682kv.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b4682kv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b4682kv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b4682kv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b4682kv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b4682kv.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection b4682kv.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/3244-61-0x00000000024B0000-0x00000000024F6000-memory.dmp family_redline behavioral1/memory/3244-62-0x0000000005080000-0x00000000050C4000-memory.dmp family_redline behavioral1/memory/3244-74-0x0000000005080000-0x00000000050BE000-memory.dmp family_redline behavioral1/memory/3244-78-0x0000000005080000-0x00000000050BE000-memory.dmp family_redline behavioral1/memory/3244-94-0x0000000005080000-0x00000000050BE000-memory.dmp family_redline behavioral1/memory/3244-92-0x0000000005080000-0x00000000050BE000-memory.dmp family_redline behavioral1/memory/3244-91-0x0000000005080000-0x00000000050BE000-memory.dmp family_redline behavioral1/memory/3244-88-0x0000000005080000-0x00000000050BE000-memory.dmp family_redline behavioral1/memory/3244-86-0x0000000005080000-0x00000000050BE000-memory.dmp family_redline behavioral1/memory/3244-84-0x0000000005080000-0x00000000050BE000-memory.dmp family_redline behavioral1/memory/3244-82-0x0000000005080000-0x00000000050BE000-memory.dmp family_redline behavioral1/memory/3244-80-0x0000000005080000-0x00000000050BE000-memory.dmp family_redline behavioral1/memory/3244-76-0x0000000005080000-0x00000000050BE000-memory.dmp family_redline behavioral1/memory/3244-72-0x0000000005080000-0x00000000050BE000-memory.dmp family_redline behavioral1/memory/3244-70-0x0000000005080000-0x00000000050BE000-memory.dmp family_redline behavioral1/memory/3244-68-0x0000000005080000-0x00000000050BE000-memory.dmp family_redline behavioral1/memory/3244-96-0x0000000005080000-0x00000000050BE000-memory.dmp family_redline behavioral1/memory/3244-66-0x0000000005080000-0x00000000050BE000-memory.dmp family_redline behavioral1/memory/3244-64-0x0000000005080000-0x00000000050BE000-memory.dmp family_redline behavioral1/memory/3244-63-0x0000000005080000-0x00000000050BE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
noR0373WG.exeb4682kv.exec54ho75.exepid Process 2492 noR0373WG.exe 2416 b4682kv.exe 3244 c54ho75.exe -
Processes:
b4682kv.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features b4682kv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" b4682kv.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
9c56a5af1bbd792ce8373b4fd57bfa511faec5453c8886f67c3f4c106213230d.exenoR0373WG.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9c56a5af1bbd792ce8373b4fd57bfa511faec5453c8886f67c3f4c106213230d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" noR0373WG.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
9c56a5af1bbd792ce8373b4fd57bfa511faec5453c8886f67c3f4c106213230d.exenoR0373WG.exeb4682kv.exec54ho75.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9c56a5af1bbd792ce8373b4fd57bfa511faec5453c8886f67c3f4c106213230d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language noR0373WG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b4682kv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c54ho75.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
b4682kv.exepid Process 2416 b4682kv.exe 2416 b4682kv.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
b4682kv.exec54ho75.exedescription pid Process Token: SeDebugPrivilege 2416 b4682kv.exe Token: SeDebugPrivilege 3244 c54ho75.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
9c56a5af1bbd792ce8373b4fd57bfa511faec5453c8886f67c3f4c106213230d.exenoR0373WG.exedescription pid Process procid_target PID 2036 wrote to memory of 2492 2036 9c56a5af1bbd792ce8373b4fd57bfa511faec5453c8886f67c3f4c106213230d.exe 83 PID 2036 wrote to memory of 2492 2036 9c56a5af1bbd792ce8373b4fd57bfa511faec5453c8886f67c3f4c106213230d.exe 83 PID 2036 wrote to memory of 2492 2036 9c56a5af1bbd792ce8373b4fd57bfa511faec5453c8886f67c3f4c106213230d.exe 83 PID 2492 wrote to memory of 2416 2492 noR0373WG.exe 85 PID 2492 wrote to memory of 2416 2492 noR0373WG.exe 85 PID 2492 wrote to memory of 2416 2492 noR0373WG.exe 85 PID 2492 wrote to memory of 3244 2492 noR0373WG.exe 98 PID 2492 wrote to memory of 3244 2492 noR0373WG.exe 98 PID 2492 wrote to memory of 3244 2492 noR0373WG.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c56a5af1bbd792ce8373b4fd57bfa511faec5453c8886f67c3f4c106213230d.exe"C:\Users\Admin\AppData\Local\Temp\9c56a5af1bbd792ce8373b4fd57bfa511faec5453c8886f67c3f4c106213230d.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\noR0373WG.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\noR0373WG.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b4682kv.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b4682kv.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2416
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c54ho75.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c54ho75.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3244
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
548KB
MD586f390890be38002ad4e50c0847ed499
SHA163964cccf83b1e805d2b0e83b21669b3afa657cb
SHA256fa32510b0a45eb5ef5cf722e8c3e352e4f9e345a38b7b17b5225811fcd49c8f2
SHA5124ded4fd88ff7876fe9f09d9628be0ad33e233a21296938c5013b8862f8649a2076fdc4e3b4d7916bd8a7fdbc07531ea6c2096378bae0ec43710dd7aba206a6eb
-
Filesize
323KB
MD5ee43881ab62092621b2d2e22a0295878
SHA10339221e3f787602fea6a0541817565d751a293c
SHA2562764ed1001c0289c438398b43297206b64e883f65c34eec0418f809392bab22d
SHA512df6b636d896665a3ec9ee572dc8dcb79169c02316741d9a693d7c09be7ce419e373b1c4d0635c8ecda95e936313750820fb97ee31111a005b334f44ec6112f6c
-
Filesize
380KB
MD5cd30df0759fea97083bdf62f610ec081
SHA1864bf5a66a31bf4bd217fa7c5496c9759211da26
SHA2567ac406e27ae45f23178785c807d52d6cf2954038e445f33f09b1fc5fa0e78ce0
SHA51213491b8f0b4a4c890f741825a8cf5903f857c33503a8f7ce61c543174693c9925f8ceb4847a92a148394d892adf8d9fed095cdac5cdbc9d84302f0f3c620883b