Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 10:06
Static task
static1
Behavioral task
behavioral1
Sample
7a51a1acde9b9c93004a253baa81506deb8bf5eef4ad1a07a2f9946989e54d20.exe
Resource
win10v2004-20241007-en
General
-
Target
7a51a1acde9b9c93004a253baa81506deb8bf5eef4ad1a07a2f9946989e54d20.exe
-
Size
787KB
-
MD5
b9bee0dcc78f57cf7f74e06abbf7e1b3
-
SHA1
eaa126b30934ddae98bd9d39c932187e7b056e7d
-
SHA256
7a51a1acde9b9c93004a253baa81506deb8bf5eef4ad1a07a2f9946989e54d20
-
SHA512
5298d65e2a714fdee8de168d997df512f8c1016c1ac6f50a76e441e2235789e2ab203de5fbab05adabf5eea6783b1621abdcee97a14bab4c43d22fdb66e095fd
-
SSDEEP
12288:pMr3y90bo72PE17VbdNesCrDwwNLHIQLoQUL0JrFkW0s1PGgrik1Gq+MX8oXQ:+yie2PZpQwNLHtUQnTl1u5q+MFXQ
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
Processes:
resource yara_rule behavioral1/files/0x000c000000023bae-19.dat healer behavioral1/memory/1560-22-0x0000000000680000-0x000000000068A000-memory.dmp healer behavioral1/memory/2744-29-0x0000000002140000-0x000000000215A000-memory.dmp healer behavioral1/memory/2744-31-0x0000000004A50000-0x0000000004A68000-memory.dmp healer behavioral1/memory/2744-32-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/2744-41-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/2744-57-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/2744-55-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/2744-53-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/2744-51-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/2744-49-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/2744-47-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/2744-45-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/2744-43-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/2744-39-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/2744-37-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/2744-59-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/2744-35-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/2744-33-0x0000000004A50000-0x0000000004A62000-memory.dmp healer -
Healer family
-
Processes:
b6745Nf.exec68aO88.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b6745Nf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b6745Nf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b6745Nf.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c68aO88.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c68aO88.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c68aO88.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b6745Nf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b6745Nf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c68aO88.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c68aO88.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c68aO88.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b6745Nf.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/3404-67-0x00000000023F0000-0x0000000002436000-memory.dmp family_redline behavioral1/memory/3404-68-0x00000000050C0000-0x0000000005104000-memory.dmp family_redline behavioral1/memory/3404-84-0x00000000050C0000-0x00000000050FE000-memory.dmp family_redline behavioral1/memory/3404-102-0x00000000050C0000-0x00000000050FE000-memory.dmp family_redline behavioral1/memory/3404-100-0x00000000050C0000-0x00000000050FE000-memory.dmp family_redline behavioral1/memory/3404-98-0x00000000050C0000-0x00000000050FE000-memory.dmp family_redline behavioral1/memory/3404-96-0x00000000050C0000-0x00000000050FE000-memory.dmp family_redline behavioral1/memory/3404-94-0x00000000050C0000-0x00000000050FE000-memory.dmp family_redline behavioral1/memory/3404-92-0x00000000050C0000-0x00000000050FE000-memory.dmp family_redline behavioral1/memory/3404-90-0x00000000050C0000-0x00000000050FE000-memory.dmp family_redline behavioral1/memory/3404-88-0x00000000050C0000-0x00000000050FE000-memory.dmp family_redline behavioral1/memory/3404-86-0x00000000050C0000-0x00000000050FE000-memory.dmp family_redline behavioral1/memory/3404-82-0x00000000050C0000-0x00000000050FE000-memory.dmp family_redline behavioral1/memory/3404-80-0x00000000050C0000-0x00000000050FE000-memory.dmp family_redline behavioral1/memory/3404-78-0x00000000050C0000-0x00000000050FE000-memory.dmp family_redline behavioral1/memory/3404-77-0x00000000050C0000-0x00000000050FE000-memory.dmp family_redline behavioral1/memory/3404-74-0x00000000050C0000-0x00000000050FE000-memory.dmp family_redline behavioral1/memory/3404-72-0x00000000050C0000-0x00000000050FE000-memory.dmp family_redline behavioral1/memory/3404-70-0x00000000050C0000-0x00000000050FE000-memory.dmp family_redline behavioral1/memory/3404-69-0x00000000050C0000-0x00000000050FE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 5 IoCs
Processes:
tice5503.exetice0054.exeb6745Nf.exec68aO88.exedrlXh61.exepid Process 3620 tice5503.exe 2100 tice0054.exe 1560 b6745Nf.exe 2744 c68aO88.exe 3404 drlXh61.exe -
Processes:
b6745Nf.exec68aO88.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b6745Nf.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c68aO88.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c68aO88.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
tice0054.exe7a51a1acde9b9c93004a253baa81506deb8bf5eef4ad1a07a2f9946989e54d20.exetice5503.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice0054.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7a51a1acde9b9c93004a253baa81506deb8bf5eef4ad1a07a2f9946989e54d20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice5503.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 2380 2744 WerFault.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
c68aO88.exedrlXh61.exe7a51a1acde9b9c93004a253baa81506deb8bf5eef4ad1a07a2f9946989e54d20.exetice5503.exetice0054.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c68aO88.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language drlXh61.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7a51a1acde9b9c93004a253baa81506deb8bf5eef4ad1a07a2f9946989e54d20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice5503.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice0054.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
b6745Nf.exec68aO88.exepid Process 1560 b6745Nf.exe 1560 b6745Nf.exe 2744 c68aO88.exe 2744 c68aO88.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
b6745Nf.exec68aO88.exedrlXh61.exedescription pid Process Token: SeDebugPrivilege 1560 b6745Nf.exe Token: SeDebugPrivilege 2744 c68aO88.exe Token: SeDebugPrivilege 3404 drlXh61.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
7a51a1acde9b9c93004a253baa81506deb8bf5eef4ad1a07a2f9946989e54d20.exetice5503.exetice0054.exedescription pid Process procid_target PID 1516 wrote to memory of 3620 1516 7a51a1acde9b9c93004a253baa81506deb8bf5eef4ad1a07a2f9946989e54d20.exe 83 PID 1516 wrote to memory of 3620 1516 7a51a1acde9b9c93004a253baa81506deb8bf5eef4ad1a07a2f9946989e54d20.exe 83 PID 1516 wrote to memory of 3620 1516 7a51a1acde9b9c93004a253baa81506deb8bf5eef4ad1a07a2f9946989e54d20.exe 83 PID 3620 wrote to memory of 2100 3620 tice5503.exe 84 PID 3620 wrote to memory of 2100 3620 tice5503.exe 84 PID 3620 wrote to memory of 2100 3620 tice5503.exe 84 PID 2100 wrote to memory of 1560 2100 tice0054.exe 86 PID 2100 wrote to memory of 1560 2100 tice0054.exe 86 PID 2100 wrote to memory of 2744 2100 tice0054.exe 97 PID 2100 wrote to memory of 2744 2100 tice0054.exe 97 PID 2100 wrote to memory of 2744 2100 tice0054.exe 97 PID 3620 wrote to memory of 3404 3620 tice5503.exe 102 PID 3620 wrote to memory of 3404 3620 tice5503.exe 102 PID 3620 wrote to memory of 3404 3620 tice5503.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a51a1acde9b9c93004a253baa81506deb8bf5eef4ad1a07a2f9946989e54d20.exe"C:\Users\Admin\AppData\Local\Temp\7a51a1acde9b9c93004a253baa81506deb8bf5eef4ad1a07a2f9946989e54d20.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice5503.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice5503.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice0054.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice0054.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b6745Nf.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b6745Nf.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1560
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c68aO88.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c68aO88.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2744 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2744 -s 10845⤵
- Program crash
PID:2380
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\drlXh61.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\drlXh61.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3404
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2744 -ip 27441⤵PID:3332
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
642KB
MD5e97a351a72505d1b41019667f529d7b2
SHA16d8f07a4d5a9fb21cf65a2cf21cdfb4731384648
SHA256f16de4e641ca2a20c5781af48f4e784c3c6f88ea0ef682d25f6458ee0d1f64ab
SHA5123c19c434207df2eab98a8aa37900bd4fe8bb27e74b7f5bb02c69760056720171d0290e45735d4a3b76b276fa12cedf2e2cbe5dd20736c46252412613dfb82e86
-
Filesize
295KB
MD5524d6128ad2189edab88a504a8ba4d0e
SHA1d6c542a5baf6464833aadb4b914ef7dc9013e5e6
SHA2562169379cf7808fa33c18e7f59af8735cea9c2ed25e72adbfffb8eec5a70a1ffb
SHA5128a8ab9b11f35dae11a0737d0ad40a6268588a3f1a16f5e5c6296100ab39db237b3fd3ca8b9aba88cb32b48f5014671210d81c352d33a870d34f4882119703a88
-
Filesize
322KB
MD520c918bf40715f5b8c12981bd431d70e
SHA1b66c559c07408c414aebc6ab832baffc3477c0cf
SHA2567fb0410f77980c9b6030b965c12f407f70069f5df777e158724d481c77c9e605
SHA512dab2af358edcba8e76ba25fb0e085468cffdc11eab3367b360dbf74adeab4b856a5d77617446330e1364c56b0cbabdbdb3a14d13295c61e9b1ce0f9cfdf45e77
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
237KB
MD5428d747a825b7981d7eeafd590014554
SHA19d2b6411e39271231b388311ddaa801d7cf83169
SHA2565c2ed167462f28a31bf74f7bab00bf46f7743cac139afb8f5c4b37a4ceb26015
SHA512999928aba735fbd06742e14dfe984e7eb689ec1386333a199447de8ea762b80661bea8eeac5f85da1039db8ef00c02b55d3e685f0a776539323dc2e7575792c0