Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 09:27
Static task
static1
Behavioral task
behavioral1
Sample
d2da29230f2f2335aff75a6181cf4de4d6ae69ee4d21ad9c09757bf613604e6b.exe
Resource
win10v2004-20241007-en
General
-
Target
d2da29230f2f2335aff75a6181cf4de4d6ae69ee4d21ad9c09757bf613604e6b.exe
-
Size
864KB
-
MD5
e3cbab8ce6cae2b4392e6e46d6f7e44d
-
SHA1
80b0fe5410ca616ff9a96c1267b604a25c24198e
-
SHA256
d2da29230f2f2335aff75a6181cf4de4d6ae69ee4d21ad9c09757bf613604e6b
-
SHA512
353eea26a5951aa2246953e82543d78fd36043d2de97afe36bdec23db67e50a39c7f2e05cf0e323bb29b36918843d813632b438f81d8d475b280aa574a998c82
-
SSDEEP
24576:/yxP4Cz8m9r57uUAXnDCph7MZ7V2dB0wrJxjWk9SOa:KxP4Cz757uHDCe7V2zZr2k9SO
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
Processes:
resource yara_rule behavioral1/files/0x0008000000023ca5-19.dat healer behavioral1/memory/2332-22-0x0000000000F30000-0x0000000000F3A000-memory.dmp healer behavioral1/memory/2788-29-0x0000000004730000-0x000000000474A000-memory.dmp healer behavioral1/memory/2788-31-0x0000000004790000-0x00000000047A8000-memory.dmp healer behavioral1/memory/2788-32-0x0000000004790000-0x00000000047A2000-memory.dmp healer behavioral1/memory/2788-59-0x0000000004790000-0x00000000047A2000-memory.dmp healer behavioral1/memory/2788-57-0x0000000004790000-0x00000000047A2000-memory.dmp healer behavioral1/memory/2788-55-0x0000000004790000-0x00000000047A2000-memory.dmp healer behavioral1/memory/2788-54-0x0000000004790000-0x00000000047A2000-memory.dmp healer behavioral1/memory/2788-51-0x0000000004790000-0x00000000047A2000-memory.dmp healer behavioral1/memory/2788-50-0x0000000004790000-0x00000000047A2000-memory.dmp healer behavioral1/memory/2788-47-0x0000000004790000-0x00000000047A2000-memory.dmp healer behavioral1/memory/2788-45-0x0000000004790000-0x00000000047A2000-memory.dmp healer behavioral1/memory/2788-43-0x0000000004790000-0x00000000047A2000-memory.dmp healer behavioral1/memory/2788-41-0x0000000004790000-0x00000000047A2000-memory.dmp healer behavioral1/memory/2788-39-0x0000000004790000-0x00000000047A2000-memory.dmp healer behavioral1/memory/2788-37-0x0000000004790000-0x00000000047A2000-memory.dmp healer behavioral1/memory/2788-35-0x0000000004790000-0x00000000047A2000-memory.dmp healer behavioral1/memory/2788-33-0x0000000004790000-0x00000000047A2000-memory.dmp healer -
Healer family
-
Processes:
b7203Rg.exec40af25.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b7203Rg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b7203Rg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c40af25.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c40af25.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c40af25.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b7203Rg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b7203Rg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b7203Rg.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c40af25.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c40af25.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c40af25.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b7203Rg.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4936-68-0x0000000007120000-0x0000000007164000-memory.dmp family_redline behavioral1/memory/4936-67-0x00000000070A0000-0x00000000070E6000-memory.dmp family_redline behavioral1/memory/4936-92-0x0000000007120000-0x000000000715E000-memory.dmp family_redline behavioral1/memory/4936-97-0x0000000007120000-0x000000000715E000-memory.dmp family_redline behavioral1/memory/4936-100-0x0000000007120000-0x000000000715E000-memory.dmp family_redline behavioral1/memory/4936-98-0x0000000007120000-0x000000000715E000-memory.dmp family_redline behavioral1/memory/4936-94-0x0000000007120000-0x000000000715E000-memory.dmp family_redline behavioral1/memory/4936-90-0x0000000007120000-0x000000000715E000-memory.dmp family_redline behavioral1/memory/4936-88-0x0000000007120000-0x000000000715E000-memory.dmp family_redline behavioral1/memory/4936-86-0x0000000007120000-0x000000000715E000-memory.dmp family_redline behavioral1/memory/4936-85-0x0000000007120000-0x000000000715E000-memory.dmp family_redline behavioral1/memory/4936-82-0x0000000007120000-0x000000000715E000-memory.dmp family_redline behavioral1/memory/4936-78-0x0000000007120000-0x000000000715E000-memory.dmp family_redline behavioral1/memory/4936-76-0x0000000007120000-0x000000000715E000-memory.dmp family_redline behavioral1/memory/4936-74-0x0000000007120000-0x000000000715E000-memory.dmp family_redline behavioral1/memory/4936-102-0x0000000007120000-0x000000000715E000-memory.dmp family_redline behavioral1/memory/4936-80-0x0000000007120000-0x000000000715E000-memory.dmp family_redline behavioral1/memory/4936-72-0x0000000007120000-0x000000000715E000-memory.dmp family_redline behavioral1/memory/4936-70-0x0000000007120000-0x000000000715E000-memory.dmp family_redline behavioral1/memory/4936-69-0x0000000007120000-0x000000000715E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 5 IoCs
Processes:
tice5220.exetice3229.exeb7203Rg.exec40af25.exedNfTO83.exepid Process 2232 tice5220.exe 1276 tice3229.exe 2332 b7203Rg.exe 2788 c40af25.exe 4936 dNfTO83.exe -
Processes:
b7203Rg.exec40af25.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b7203Rg.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c40af25.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c40af25.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
d2da29230f2f2335aff75a6181cf4de4d6ae69ee4d21ad9c09757bf613604e6b.exetice5220.exetice3229.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d2da29230f2f2335aff75a6181cf4de4d6ae69ee4d21ad9c09757bf613604e6b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice5220.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice3229.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid Process 4084 sc.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 1656 2788 WerFault.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
d2da29230f2f2335aff75a6181cf4de4d6ae69ee4d21ad9c09757bf613604e6b.exetice5220.exetice3229.exec40af25.exedNfTO83.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d2da29230f2f2335aff75a6181cf4de4d6ae69ee4d21ad9c09757bf613604e6b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice5220.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice3229.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c40af25.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dNfTO83.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
b7203Rg.exec40af25.exepid Process 2332 b7203Rg.exe 2332 b7203Rg.exe 2788 c40af25.exe 2788 c40af25.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
b7203Rg.exec40af25.exedNfTO83.exedescription pid Process Token: SeDebugPrivilege 2332 b7203Rg.exe Token: SeDebugPrivilege 2788 c40af25.exe Token: SeDebugPrivilege 4936 dNfTO83.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
d2da29230f2f2335aff75a6181cf4de4d6ae69ee4d21ad9c09757bf613604e6b.exetice5220.exetice3229.exedescription pid Process procid_target PID 1992 wrote to memory of 2232 1992 d2da29230f2f2335aff75a6181cf4de4d6ae69ee4d21ad9c09757bf613604e6b.exe 83 PID 1992 wrote to memory of 2232 1992 d2da29230f2f2335aff75a6181cf4de4d6ae69ee4d21ad9c09757bf613604e6b.exe 83 PID 1992 wrote to memory of 2232 1992 d2da29230f2f2335aff75a6181cf4de4d6ae69ee4d21ad9c09757bf613604e6b.exe 83 PID 2232 wrote to memory of 1276 2232 tice5220.exe 84 PID 2232 wrote to memory of 1276 2232 tice5220.exe 84 PID 2232 wrote to memory of 1276 2232 tice5220.exe 84 PID 1276 wrote to memory of 2332 1276 tice3229.exe 86 PID 1276 wrote to memory of 2332 1276 tice3229.exe 86 PID 1276 wrote to memory of 2788 1276 tice3229.exe 97 PID 1276 wrote to memory of 2788 1276 tice3229.exe 97 PID 1276 wrote to memory of 2788 1276 tice3229.exe 97 PID 2232 wrote to memory of 4936 2232 tice5220.exe 102 PID 2232 wrote to memory of 4936 2232 tice5220.exe 102 PID 2232 wrote to memory of 4936 2232 tice5220.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2da29230f2f2335aff75a6181cf4de4d6ae69ee4d21ad9c09757bf613604e6b.exe"C:\Users\Admin\AppData\Local\Temp\d2da29230f2f2335aff75a6181cf4de4d6ae69ee4d21ad9c09757bf613604e6b.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice5220.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice5220.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice3229.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice3229.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7203Rg.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7203Rg.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2332
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c40af25.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c40af25.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2788 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2788 -s 11005⤵
- Program crash
PID:1656
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dNfTO83.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dNfTO83.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4936
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2788 -ip 27881⤵PID:3540
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4084
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
719KB
MD5848cdd96ff97bdc9c0f861ca92145af4
SHA16b12d03a777706a1ded979e1eb74342b8d53fc38
SHA256e3e2649bd3ec9323166be9f763d6774f77f4f6f5a35129ed9b6a80dc85caa52c
SHA5124d27f37015961507f3965b0ec7acd3409b7feca91f838c3ae63f408bafb70657a564a50fcccca7fda3085aa58ec44f5a83a90a17aedec189506dbbc9044f2d16
-
Filesize
399KB
MD5f99b3a3834b2664b7522a0239496b254
SHA134ef339bd691a9647b5c05885af48e0b2626c93c
SHA256fbfb3de56805db7610679dee4d9673a262244d19066006ad79086378f1a39d2e
SHA5122e64f760782750d690b15905d7ab5037691e3005fb95a42b6f8463537bca380f28528b0c33da159efff17c704cc7e274b59405a6d8c3807f85135faf4ff036ca
-
Filesize
360KB
MD5e6422a102ef2ac0513649bbe17fdae2e
SHA1c9accd7fabd48ad3ff688e40d4ee1e98d748fd7e
SHA2563373f43efadb4de6b2ef2662fb7bec78adc9572d0897d39ae2d9148d5f8300be
SHA512a9108deefd506c46da4f9477cccc6f578c17a8fffed4517b9623fe17f0e69f6dd6ca6f3bed4f93392b6b992c47ba802a979cdde308ff1aa41853c1d24ca867b8
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
342KB
MD5d2b62f69db1d4c535b8ab033fdb25210
SHA1a6eb7b22c779839f9cafd804b86f35c134e56b86
SHA256885dd71c7947a10336c16d69e020ef487e084b155456592e0eab03f545130800
SHA512166299c4fa80a52efd05c7a9d3d5862521a22a164628c52879b5d28023b8c14b90cdde7b2794a2ba019f6031065b2d49d7c316763553e15893b4fe494ca4d37f