Analysis
-
max time kernel
146s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 10:14
Static task
static1
Behavioral task
behavioral1
Sample
358fc2bdf37c6107c594283228a55225dac0ea15fd2ccd195e7a69fd0157d756.exe
Resource
win10v2004-20241007-en
General
-
Target
358fc2bdf37c6107c594283228a55225dac0ea15fd2ccd195e7a69fd0157d756.exe
-
Size
865KB
-
MD5
a3f3d0f2f18a3dfa193ecf198ffca874
-
SHA1
42112224c49311f3f3978478a0df3f8b6569f5ae
-
SHA256
358fc2bdf37c6107c594283228a55225dac0ea15fd2ccd195e7a69fd0157d756
-
SHA512
a4c68534140167e312fff1a2512497fc5c610b67a3eb09bfabf51bb26daded0ebf9696c730df3145eec9e657a17611c6e6a2cbe09ad8d1c352dbf4ad0c9cceec
-
SSDEEP
24576:Sy0hjWmax/UFFSrQ01Y+cSEDiNrBV5nYIrAZs:5KW/uF26SEDiNFcI
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
Processes:
resource yara_rule behavioral1/files/0x0008000000023ca4-19.dat healer behavioral1/memory/3040-22-0x0000000000E20000-0x0000000000E2A000-memory.dmp healer behavioral1/memory/3284-29-0x00000000049D0000-0x00000000049EA000-memory.dmp healer behavioral1/memory/3284-31-0x0000000004A90000-0x0000000004AA8000-memory.dmp healer behavioral1/memory/3284-39-0x0000000004A90000-0x0000000004AA2000-memory.dmp healer behavioral1/memory/3284-59-0x0000000004A90000-0x0000000004AA2000-memory.dmp healer behavioral1/memory/3284-57-0x0000000004A90000-0x0000000004AA2000-memory.dmp healer behavioral1/memory/3284-56-0x0000000004A90000-0x0000000004AA2000-memory.dmp healer behavioral1/memory/3284-53-0x0000000004A90000-0x0000000004AA2000-memory.dmp healer behavioral1/memory/3284-51-0x0000000004A90000-0x0000000004AA2000-memory.dmp healer behavioral1/memory/3284-49-0x0000000004A90000-0x0000000004AA2000-memory.dmp healer behavioral1/memory/3284-47-0x0000000004A90000-0x0000000004AA2000-memory.dmp healer behavioral1/memory/3284-45-0x0000000004A90000-0x0000000004AA2000-memory.dmp healer behavioral1/memory/3284-43-0x0000000004A90000-0x0000000004AA2000-memory.dmp healer behavioral1/memory/3284-41-0x0000000004A90000-0x0000000004AA2000-memory.dmp healer behavioral1/memory/3284-37-0x0000000004A90000-0x0000000004AA2000-memory.dmp healer behavioral1/memory/3284-35-0x0000000004A90000-0x0000000004AA2000-memory.dmp healer behavioral1/memory/3284-33-0x0000000004A90000-0x0000000004AA2000-memory.dmp healer behavioral1/memory/3284-32-0x0000000004A90000-0x0000000004AA2000-memory.dmp healer -
Healer family
-
Processes:
c88Gm05.exeb9282zK.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c88Gm05.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c88Gm05.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b9282zK.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b9282zK.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b9282zK.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b9282zK.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b9282zK.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b9282zK.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c88Gm05.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c88Gm05.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c88Gm05.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c88Gm05.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/3936-67-0x0000000004B90000-0x0000000004BD6000-memory.dmp family_redline behavioral1/memory/3936-68-0x0000000007740000-0x0000000007784000-memory.dmp family_redline behavioral1/memory/3936-96-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral1/memory/3936-84-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral1/memory/3936-74-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral1/memory/3936-72-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral1/memory/3936-70-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral1/memory/3936-69-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral1/memory/3936-102-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral1/memory/3936-100-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral1/memory/3936-98-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral1/memory/3936-94-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral1/memory/3936-92-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral1/memory/3936-90-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral1/memory/3936-88-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral1/memory/3936-86-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral1/memory/3936-82-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral1/memory/3936-80-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral1/memory/3936-78-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral1/memory/3936-76-0x0000000007740000-0x000000000777E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 5 IoCs
Processes:
tice1908.exetice9906.exeb9282zK.exec88Gm05.exedbJMJ18.exepid Process 4784 tice1908.exe 3100 tice9906.exe 3040 b9282zK.exe 3284 c88Gm05.exe 3936 dbJMJ18.exe -
Processes:
b9282zK.exec88Gm05.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b9282zK.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c88Gm05.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c88Gm05.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
tice9906.exe358fc2bdf37c6107c594283228a55225dac0ea15fd2ccd195e7a69fd0157d756.exetice1908.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice9906.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 358fc2bdf37c6107c594283228a55225dac0ea15fd2ccd195e7a69fd0157d756.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice1908.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid Process 4152 sc.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 2348 3284 WerFault.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
tice9906.exec88Gm05.exedbJMJ18.exe358fc2bdf37c6107c594283228a55225dac0ea15fd2ccd195e7a69fd0157d756.exetice1908.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice9906.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c88Gm05.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dbJMJ18.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 358fc2bdf37c6107c594283228a55225dac0ea15fd2ccd195e7a69fd0157d756.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice1908.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
b9282zK.exec88Gm05.exepid Process 3040 b9282zK.exe 3040 b9282zK.exe 3284 c88Gm05.exe 3284 c88Gm05.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
b9282zK.exec88Gm05.exedbJMJ18.exedescription pid Process Token: SeDebugPrivilege 3040 b9282zK.exe Token: SeDebugPrivilege 3284 c88Gm05.exe Token: SeDebugPrivilege 3936 dbJMJ18.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
358fc2bdf37c6107c594283228a55225dac0ea15fd2ccd195e7a69fd0157d756.exetice1908.exetice9906.exedescription pid Process procid_target PID 4528 wrote to memory of 4784 4528 358fc2bdf37c6107c594283228a55225dac0ea15fd2ccd195e7a69fd0157d756.exe 83 PID 4528 wrote to memory of 4784 4528 358fc2bdf37c6107c594283228a55225dac0ea15fd2ccd195e7a69fd0157d756.exe 83 PID 4528 wrote to memory of 4784 4528 358fc2bdf37c6107c594283228a55225dac0ea15fd2ccd195e7a69fd0157d756.exe 83 PID 4784 wrote to memory of 3100 4784 tice1908.exe 84 PID 4784 wrote to memory of 3100 4784 tice1908.exe 84 PID 4784 wrote to memory of 3100 4784 tice1908.exe 84 PID 3100 wrote to memory of 3040 3100 tice9906.exe 86 PID 3100 wrote to memory of 3040 3100 tice9906.exe 86 PID 3100 wrote to memory of 3284 3100 tice9906.exe 97 PID 3100 wrote to memory of 3284 3100 tice9906.exe 97 PID 3100 wrote to memory of 3284 3100 tice9906.exe 97 PID 4784 wrote to memory of 3936 4784 tice1908.exe 102 PID 4784 wrote to memory of 3936 4784 tice1908.exe 102 PID 4784 wrote to memory of 3936 4784 tice1908.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\358fc2bdf37c6107c594283228a55225dac0ea15fd2ccd195e7a69fd0157d756.exe"C:\Users\Admin\AppData\Local\Temp\358fc2bdf37c6107c594283228a55225dac0ea15fd2ccd195e7a69fd0157d756.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice1908.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice1908.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice9906.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice9906.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9282zK.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9282zK.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3040
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c88Gm05.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c88Gm05.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3284 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3284 -s 11125⤵
- Program crash
PID:2348
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dbJMJ18.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dbJMJ18.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3936
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3284 -ip 32841⤵PID:4132
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4152
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
719KB
MD5150e00f7c8a5c20c7be4a4ee38c93b86
SHA12aaa189b20b3eef34d4e0ea07afba30308696735
SHA2568bdc40b5b887f14c8e76a609b90341115952833a827765f5fc8c7d110df6b8ee
SHA5123ea6772e3f797971f0778283e03d30a5eff09aa0dd23018a4f3661019a4e34d057089bc26f0389761afd47776151b8b2424dccb998a7a5f13b41f7adfeb2dcd9
-
Filesize
399KB
MD5fdb2534e7e0bb2519279d000c8bf7d00
SHA1089e7291a91a3255e33e58fef47110351d1ec8d1
SHA256f933ec7b7b4753575480f1f1baa77af7716522948e0269b218a8d6ff9f80182a
SHA512bf3f38afbd7bce487c06e3cb620b26d10eb5dc598a2223b909bdeaf9484806d9976e744c7326ba0b241da76c16939d2ddf0fc12ddd5f3a4b08c96e3761f0a7d2
-
Filesize
360KB
MD59877b65129614f99ed2c27b86634f0ee
SHA1621ddea5127c432abe35b4d885502e6f484e58a3
SHA256401781612f7322065fc519fd9fe03fd1b7608f300d888396cacdb1e3d16af03d
SHA51262eb2f036867b766ccf01c40f5a2761e2b9294a2336a8ff0f3c6716d2fb18411d2ff95a47bdaa4b7adbba049635df91bec356bdf6108ab234a01e33f7fdb6536
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
342KB
MD56ec29bb3418d203038acc36eb3e97bfa
SHA1be02affde8db6334f828e8600de1b0cee77c0a0f
SHA256e2f3c20c3133f64c2fdc85843ec68db0c298e9544bb13b23a12f29f046f51f71
SHA5126463d1d5dbf86f53c43983b5dbddbb15347c4d8ae489f56cb8ed7d1a5fd57736e73b24c5f728419acb5bc27e62fa5d7753f96c74570182d61bb73a74cae6a18c