Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 08:51
Static task
static1
Behavioral task
behavioral1
Sample
ee8d794e7445209380202361d1806e76c134333456f61d0d9f09634a2f35c1a7.exe
Resource
win10v2004-20241007-en
General
-
Target
ee8d794e7445209380202361d1806e76c134333456f61d0d9f09634a2f35c1a7.exe
-
Size
787KB
-
MD5
6657a70eaebe08956c4195f0d6df0a5e
-
SHA1
3b2589862df201638f020e08d7aefb9595958edf
-
SHA256
ee8d794e7445209380202361d1806e76c134333456f61d0d9f09634a2f35c1a7
-
SHA512
1bcd08aab3b7da40d1b1bb72455b47c868912e5069c25598ed090ae8361a106632c2a14c325da1f9485fc0a50958c41a87f200a524af056fc99bc4803a316553
-
SSDEEP
12288:gMrwy90vT9VXx0pOi92QR/pLccXriflXb9QObNiBXz1qZurnk1Yz7u+OsEKL:AyeVBg/pLpX2lXbKTF10u7TOs/L
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
Processes:
resource yara_rule behavioral1/files/0x0008000000023cbb-19.dat healer behavioral1/memory/4400-22-0x0000000000D20000-0x0000000000D2A000-memory.dmp healer behavioral1/memory/4668-29-0x0000000002160000-0x000000000217A000-memory.dmp healer behavioral1/memory/4668-31-0x0000000002440000-0x0000000002458000-memory.dmp healer behavioral1/memory/4668-59-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/4668-57-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/4668-55-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/4668-54-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/4668-52-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/4668-49-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/4668-47-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/4668-45-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/4668-43-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/4668-41-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/4668-39-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/4668-37-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/4668-35-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/4668-33-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/4668-32-0x0000000002440000-0x0000000002452000-memory.dmp healer -
Healer family
-
Processes:
b1537io.exec92MD85.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b1537io.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c92MD85.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c92MD85.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b1537io.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c92MD85.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c92MD85.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c92MD85.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b1537io.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b1537io.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b1537io.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b1537io.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c92MD85.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/5016-67-0x0000000004A10000-0x0000000004A56000-memory.dmp family_redline behavioral1/memory/5016-68-0x00000000050A0000-0x00000000050E4000-memory.dmp family_redline behavioral1/memory/5016-78-0x00000000050A0000-0x00000000050DE000-memory.dmp family_redline behavioral1/memory/5016-84-0x00000000050A0000-0x00000000050DE000-memory.dmp family_redline behavioral1/memory/5016-102-0x00000000050A0000-0x00000000050DE000-memory.dmp family_redline behavioral1/memory/5016-100-0x00000000050A0000-0x00000000050DE000-memory.dmp family_redline behavioral1/memory/5016-98-0x00000000050A0000-0x00000000050DE000-memory.dmp family_redline behavioral1/memory/5016-96-0x00000000050A0000-0x00000000050DE000-memory.dmp family_redline behavioral1/memory/5016-94-0x00000000050A0000-0x00000000050DE000-memory.dmp family_redline behavioral1/memory/5016-92-0x00000000050A0000-0x00000000050DE000-memory.dmp family_redline behavioral1/memory/5016-90-0x00000000050A0000-0x00000000050DE000-memory.dmp family_redline behavioral1/memory/5016-86-0x00000000050A0000-0x00000000050DE000-memory.dmp family_redline behavioral1/memory/5016-82-0x00000000050A0000-0x00000000050DE000-memory.dmp family_redline behavioral1/memory/5016-81-0x00000000050A0000-0x00000000050DE000-memory.dmp family_redline behavioral1/memory/5016-76-0x00000000050A0000-0x00000000050DE000-memory.dmp family_redline behavioral1/memory/5016-74-0x00000000050A0000-0x00000000050DE000-memory.dmp family_redline behavioral1/memory/5016-88-0x00000000050A0000-0x00000000050DE000-memory.dmp family_redline behavioral1/memory/5016-72-0x00000000050A0000-0x00000000050DE000-memory.dmp family_redline behavioral1/memory/5016-70-0x00000000050A0000-0x00000000050DE000-memory.dmp family_redline behavioral1/memory/5016-69-0x00000000050A0000-0x00000000050DE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 5 IoCs
Processes:
tice2661.exetice7444.exeb1537io.exec92MD85.exedngFC10.exepid Process 396 tice2661.exe 3400 tice7444.exe 4400 b1537io.exe 4668 c92MD85.exe 5016 dngFC10.exe -
Processes:
b1537io.exec92MD85.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b1537io.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c92MD85.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c92MD85.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
ee8d794e7445209380202361d1806e76c134333456f61d0d9f09634a2f35c1a7.exetice2661.exetice7444.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ee8d794e7445209380202361d1806e76c134333456f61d0d9f09634a2f35c1a7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice2661.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice7444.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 228 4668 WerFault.exe 101 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ee8d794e7445209380202361d1806e76c134333456f61d0d9f09634a2f35c1a7.exetice2661.exetice7444.exec92MD85.exedngFC10.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee8d794e7445209380202361d1806e76c134333456f61d0d9f09634a2f35c1a7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice2661.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice7444.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c92MD85.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dngFC10.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
b1537io.exec92MD85.exepid Process 4400 b1537io.exe 4400 b1537io.exe 4668 c92MD85.exe 4668 c92MD85.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
b1537io.exec92MD85.exedngFC10.exedescription pid Process Token: SeDebugPrivilege 4400 b1537io.exe Token: SeDebugPrivilege 4668 c92MD85.exe Token: SeDebugPrivilege 5016 dngFC10.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
ee8d794e7445209380202361d1806e76c134333456f61d0d9f09634a2f35c1a7.exetice2661.exetice7444.exedescription pid Process procid_target PID 1580 wrote to memory of 396 1580 ee8d794e7445209380202361d1806e76c134333456f61d0d9f09634a2f35c1a7.exe 83 PID 1580 wrote to memory of 396 1580 ee8d794e7445209380202361d1806e76c134333456f61d0d9f09634a2f35c1a7.exe 83 PID 1580 wrote to memory of 396 1580 ee8d794e7445209380202361d1806e76c134333456f61d0d9f09634a2f35c1a7.exe 83 PID 396 wrote to memory of 3400 396 tice2661.exe 84 PID 396 wrote to memory of 3400 396 tice2661.exe 84 PID 396 wrote to memory of 3400 396 tice2661.exe 84 PID 3400 wrote to memory of 4400 3400 tice7444.exe 86 PID 3400 wrote to memory of 4400 3400 tice7444.exe 86 PID 3400 wrote to memory of 4668 3400 tice7444.exe 101 PID 3400 wrote to memory of 4668 3400 tice7444.exe 101 PID 3400 wrote to memory of 4668 3400 tice7444.exe 101 PID 396 wrote to memory of 5016 396 tice2661.exe 109 PID 396 wrote to memory of 5016 396 tice2661.exe 109 PID 396 wrote to memory of 5016 396 tice2661.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee8d794e7445209380202361d1806e76c134333456f61d0d9f09634a2f35c1a7.exe"C:\Users\Admin\AppData\Local\Temp\ee8d794e7445209380202361d1806e76c134333456f61d0d9f09634a2f35c1a7.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice2661.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice2661.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice7444.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice7444.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1537io.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1537io.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4400
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c92MD85.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c92MD85.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4668 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4668 -s 10805⤵
- Program crash
PID:228
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dngFC10.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dngFC10.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5016
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4668 -ip 46681⤵PID:4480
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
642KB
MD589fb94c9dd27e84c33f43a8522305cba
SHA1e648dec167f182bd06ab6774c9a5f2f55f0fdbdd
SHA256a76a18f4195a943de1e6f45e1b5a945c7b5883e21e2812ead998cb1e0d916829
SHA5125c37a8665d9b87265c9a802562360d02635c0571e748022862d17c53188cf71d3f7da251e5921ba8b82de4392e1e2cbb57bf7f1339b6954a9ff12620f933b362
-
Filesize
295KB
MD545abd3f18349bcf745c30ed23c6c1b57
SHA14590f536a569de872901b213ff1be32c9b0906b4
SHA2566578b6cae9d995a13684772d869c51bc07ff3d18fd644fe1f9d19d870adc46cd
SHA512a3c34ab5a0bb9180aedce9f0dfff91dc74fdaabad4f1f50df57cd416a582033f10e8a145b27d296d30c7e20c00b83733aafc8a0fa957d6ec916fbb04fcc284b3
-
Filesize
322KB
MD5be30a229dd8b4f35573aad6c6256fdef
SHA195f0688290131b0466dda63ea0584c7bd0a1fcaa
SHA256cab4e46167b40b6a0203002f8e9523313831e930186e7262aebb9c7b1fa36809
SHA5129d85e7c9071833ca38806cce83590c7290e27ecaa3e1cef90c5727f9c65a54eaa2feaca5f7431e71acb57bb738d4dbac3b3a21a19f28e83dd61a4fab9fb4e4d6
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
237KB
MD52d0740cec4b32f39f4d3bf505255e7e6
SHA1250e29018499172e47809ff4b1cf187935bbfceb
SHA2565841299acf274ebdb0bcb955c0964fe7a45db349b6e799ff73f59cfed618a6ff
SHA512222f4ff7d9951526263ea2b31f687b704c7103c2ebadc4d4ec2914679c2def38a9412212df8662d42a643b249977f4ec802102c42a62b4ecf0ee216a1185d450