Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 10:06
Static task
static1
Behavioral task
behavioral1
Sample
c50676ecc6138b5ba0f3aecc5e99a59d2871f0e89947c1c4c1520f15b3b6188d.exe
Resource
win10v2004-20241007-en
General
-
Target
c50676ecc6138b5ba0f3aecc5e99a59d2871f0e89947c1c4c1520f15b3b6188d.exe
-
Size
860KB
-
MD5
61ed33aab812b91b3a01d2522b6ef4eb
-
SHA1
eb51c3d8cb1ebbd0aa34167521cecb504f5a7534
-
SHA256
c50676ecc6138b5ba0f3aecc5e99a59d2871f0e89947c1c4c1520f15b3b6188d
-
SHA512
c6844a8bd4e283cdcef2effd75b7f130dfcc2eb3ef919abcb91a51e81e94f945ce16e85e806d3ba14bd602e4991c5afffdde70d2a12497eedcee1a95575e8b27
-
SSDEEP
12288:jMrmy90I7K7fT1/9OVFkkEgvM0jAzDnPCL2L4oFFUVckrd0tIQ566tuarm6ybFi:VyR7m/MV6kEkMmLaL4Ta68n3ajpi
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
Processes:
resource yara_rule behavioral1/files/0x000b000000023b72-19.dat healer behavioral1/memory/2364-22-0x0000000000490000-0x000000000049A000-memory.dmp healer behavioral1/memory/640-28-0x0000000004820000-0x000000000483A000-memory.dmp healer behavioral1/memory/640-30-0x0000000004BA0000-0x0000000004BB8000-memory.dmp healer behavioral1/memory/640-31-0x0000000004BA0000-0x0000000004BB2000-memory.dmp healer behavioral1/memory/640-36-0x0000000004BA0000-0x0000000004BB2000-memory.dmp healer behavioral1/memory/640-56-0x0000000004BA0000-0x0000000004BB2000-memory.dmp healer behavioral1/memory/640-54-0x0000000004BA0000-0x0000000004BB2000-memory.dmp healer behavioral1/memory/640-52-0x0000000004BA0000-0x0000000004BB2000-memory.dmp healer behavioral1/memory/640-51-0x0000000004BA0000-0x0000000004BB2000-memory.dmp healer behavioral1/memory/640-48-0x0000000004BA0000-0x0000000004BB2000-memory.dmp healer behavioral1/memory/640-46-0x0000000004BA0000-0x0000000004BB2000-memory.dmp healer behavioral1/memory/640-58-0x0000000004BA0000-0x0000000004BB2000-memory.dmp healer behavioral1/memory/640-44-0x0000000004BA0000-0x0000000004BB2000-memory.dmp healer behavioral1/memory/640-42-0x0000000004BA0000-0x0000000004BB2000-memory.dmp healer behavioral1/memory/640-34-0x0000000004BA0000-0x0000000004BB2000-memory.dmp healer behavioral1/memory/640-32-0x0000000004BA0000-0x0000000004BB2000-memory.dmp healer behavioral1/memory/640-40-0x0000000004BA0000-0x0000000004BB2000-memory.dmp healer behavioral1/memory/640-38-0x0000000004BA0000-0x0000000004BB2000-memory.dmp healer -
Healer family
-
Processes:
b9363QP.exec64eG55.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b9363QP.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b9363QP.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b9363QP.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b9363QP.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c64eG55.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c64eG55.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b9363QP.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b9363QP.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c64eG55.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c64eG55.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c64eG55.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c64eG55.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/3672-66-0x00000000070A0000-0x00000000070E6000-memory.dmp family_redline behavioral1/memory/3672-67-0x00000000076D0000-0x0000000007714000-memory.dmp family_redline behavioral1/memory/3672-93-0x00000000076D0000-0x000000000770E000-memory.dmp family_redline behavioral1/memory/3672-101-0x00000000076D0000-0x000000000770E000-memory.dmp family_redline behavioral1/memory/3672-99-0x00000000076D0000-0x000000000770E000-memory.dmp family_redline behavioral1/memory/3672-97-0x00000000076D0000-0x000000000770E000-memory.dmp family_redline behavioral1/memory/3672-95-0x00000000076D0000-0x000000000770E000-memory.dmp family_redline behavioral1/memory/3672-91-0x00000000076D0000-0x000000000770E000-memory.dmp family_redline behavioral1/memory/3672-89-0x00000000076D0000-0x000000000770E000-memory.dmp family_redline behavioral1/memory/3672-87-0x00000000076D0000-0x000000000770E000-memory.dmp family_redline behavioral1/memory/3672-85-0x00000000076D0000-0x000000000770E000-memory.dmp family_redline behavioral1/memory/3672-81-0x00000000076D0000-0x000000000770E000-memory.dmp family_redline behavioral1/memory/3672-79-0x00000000076D0000-0x000000000770E000-memory.dmp family_redline behavioral1/memory/3672-77-0x00000000076D0000-0x000000000770E000-memory.dmp family_redline behavioral1/memory/3672-75-0x00000000076D0000-0x000000000770E000-memory.dmp family_redline behavioral1/memory/3672-73-0x00000000076D0000-0x000000000770E000-memory.dmp family_redline behavioral1/memory/3672-83-0x00000000076D0000-0x000000000770E000-memory.dmp family_redline behavioral1/memory/3672-71-0x00000000076D0000-0x000000000770E000-memory.dmp family_redline behavioral1/memory/3672-69-0x00000000076D0000-0x000000000770E000-memory.dmp family_redline behavioral1/memory/3672-68-0x00000000076D0000-0x000000000770E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 5 IoCs
Processes:
tice7761.exetice0778.exeb9363QP.exec64eG55.exedKAGp50.exepid Process 3592 tice7761.exe 4628 tice0778.exe 2364 b9363QP.exe 640 c64eG55.exe 3672 dKAGp50.exe -
Processes:
c64eG55.exeb9363QP.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c64eG55.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b9363QP.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c64eG55.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
tice0778.exec50676ecc6138b5ba0f3aecc5e99a59d2871f0e89947c1c4c1520f15b3b6188d.exetice7761.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice0778.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c50676ecc6138b5ba0f3aecc5e99a59d2871f0e89947c1c4c1520f15b3b6188d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice7761.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 3948 640 WerFault.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
tice0778.exec64eG55.exedKAGp50.exec50676ecc6138b5ba0f3aecc5e99a59d2871f0e89947c1c4c1520f15b3b6188d.exetice7761.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice0778.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c64eG55.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dKAGp50.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c50676ecc6138b5ba0f3aecc5e99a59d2871f0e89947c1c4c1520f15b3b6188d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice7761.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
b9363QP.exec64eG55.exepid Process 2364 b9363QP.exe 2364 b9363QP.exe 640 c64eG55.exe 640 c64eG55.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
b9363QP.exec64eG55.exedKAGp50.exedescription pid Process Token: SeDebugPrivilege 2364 b9363QP.exe Token: SeDebugPrivilege 640 c64eG55.exe Token: SeDebugPrivilege 3672 dKAGp50.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
c50676ecc6138b5ba0f3aecc5e99a59d2871f0e89947c1c4c1520f15b3b6188d.exetice7761.exetice0778.exedescription pid Process procid_target PID 1780 wrote to memory of 3592 1780 c50676ecc6138b5ba0f3aecc5e99a59d2871f0e89947c1c4c1520f15b3b6188d.exe 83 PID 1780 wrote to memory of 3592 1780 c50676ecc6138b5ba0f3aecc5e99a59d2871f0e89947c1c4c1520f15b3b6188d.exe 83 PID 1780 wrote to memory of 3592 1780 c50676ecc6138b5ba0f3aecc5e99a59d2871f0e89947c1c4c1520f15b3b6188d.exe 83 PID 3592 wrote to memory of 4628 3592 tice7761.exe 84 PID 3592 wrote to memory of 4628 3592 tice7761.exe 84 PID 3592 wrote to memory of 4628 3592 tice7761.exe 84 PID 4628 wrote to memory of 2364 4628 tice0778.exe 85 PID 4628 wrote to memory of 2364 4628 tice0778.exe 85 PID 4628 wrote to memory of 640 4628 tice0778.exe 97 PID 4628 wrote to memory of 640 4628 tice0778.exe 97 PID 4628 wrote to memory of 640 4628 tice0778.exe 97 PID 3592 wrote to memory of 3672 3592 tice7761.exe 102 PID 3592 wrote to memory of 3672 3592 tice7761.exe 102 PID 3592 wrote to memory of 3672 3592 tice7761.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\c50676ecc6138b5ba0f3aecc5e99a59d2871f0e89947c1c4c1520f15b3b6188d.exe"C:\Users\Admin\AppData\Local\Temp\c50676ecc6138b5ba0f3aecc5e99a59d2871f0e89947c1c4c1520f15b3b6188d.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice7761.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice7761.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice0778.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice0778.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9363QP.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9363QP.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2364
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c64eG55.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c64eG55.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:640 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 10805⤵
- Program crash
PID:3948
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dKAGp50.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dKAGp50.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3672
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 640 -ip 6401⤵PID:2268
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
715KB
MD5b0406fb7dbe62317ffaa4fd4b637e9f6
SHA1b3e0f0a0ac1fa453f98fa2fd2eccd048999aeb00
SHA25685299eca770a9759f4925dbfeda4b5760d0e4f4b9b54b29111f70567afe7116a
SHA5127bc496f80cc45c94c06e02d5b4862b619b8265814fafb3e41d59b82c24c48c75ef80a3f1649f3d5c75b5a5a73ae540eabf2c6db469a5455f1dcd243d44c70df6
-
Filesize
399KB
MD5ffbffee3f5d1c2bd772e0ff7975adc48
SHA1a5a4de5cf0c398be81f9d073bc8f36c9b6344b04
SHA256ef9821b72281d1a031df38d68a4ba76537b830e5406714bdc19a70ed6f7e220b
SHA51287078e6ec10e5f74132b3560f6b9993f0b6c1485c5ff683218e252c336270baa576886cdbaac53bb691627d20ba78cad165b8b25e0e8591ededda61b1a24533d
-
Filesize
358KB
MD5879b7fde6e73348eade6954160f2ec46
SHA15c54b1fec02f9a6fb688eb72891a0d60b4753153
SHA2564f35bc7159a6f1a2523eb345aff4e416677d239212338aa7bac6be78826fe550
SHA512fbcdaebc1b52846c91fd3b765530dc5108fa72e420b48ee76e2e07dc597faeb7f781c4f77832c072fa91a1d452d5f630910c4b82f47767965fbeb1b31db03dba
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
341KB
MD5ebc438297cfb6a9cef06841912c02155
SHA1cd12a833ed8f11751916aba88e6112951b9217bf
SHA256f6296e5ca34ca4a3ed9b726bedd6b27da3da6d4172de07c2e4473f6ee5348e98
SHA512a35bc9f5205626f02bb3762d7173c07c23c309c2f22486981182ff00449068a6bb1945676edb6289a00e42cc1e01293ee16de4ce2f2e5e66b10a4d89d62f7acc