Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 09:28
Static task
static1
Behavioral task
behavioral1
Sample
978313ae6fae36af5d07f9ea70c463ea72a9eeeeaad031c057bdaacc6854a964.exe
Resource
win10v2004-20241007-en
General
-
Target
978313ae6fae36af5d07f9ea70c463ea72a9eeeeaad031c057bdaacc6854a964.exe
-
Size
787KB
-
MD5
b0341836bb3885b2db25c21fb7e00e30
-
SHA1
c7acdc44b60d071cf0e3771357f1b344d7c0f672
-
SHA256
978313ae6fae36af5d07f9ea70c463ea72a9eeeeaad031c057bdaacc6854a964
-
SHA512
12292e38ee79a3e592ef31499be57899b57f3c67e330bdf86cd468436d2c811f8dd2ef9957690c43811ac42010e73f503a6f3063b85b9b5e3ddb350c18ba5692
-
SSDEEP
24576:6ynh9q05OuxB1SubsEmWw2uD4J1rkE14:Bnh9q053bbNmz2ao1rd
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
Processes:
resource yara_rule behavioral1/files/0x0008000000023c8c-19.dat healer behavioral1/memory/1368-22-0x00000000008D0000-0x00000000008DA000-memory.dmp healer behavioral1/memory/2856-29-0x0000000004AD0000-0x0000000004AEA000-memory.dmp healer behavioral1/memory/2856-31-0x0000000005150000-0x0000000005168000-memory.dmp healer behavioral1/memory/2856-59-0x0000000005150000-0x0000000005162000-memory.dmp healer behavioral1/memory/2856-57-0x0000000005150000-0x0000000005162000-memory.dmp healer behavioral1/memory/2856-56-0x0000000005150000-0x0000000005162000-memory.dmp healer behavioral1/memory/2856-54-0x0000000005150000-0x0000000005162000-memory.dmp healer behavioral1/memory/2856-51-0x0000000005150000-0x0000000005162000-memory.dmp healer behavioral1/memory/2856-49-0x0000000005150000-0x0000000005162000-memory.dmp healer behavioral1/memory/2856-47-0x0000000005150000-0x0000000005162000-memory.dmp healer behavioral1/memory/2856-46-0x0000000005150000-0x0000000005162000-memory.dmp healer behavioral1/memory/2856-43-0x0000000005150000-0x0000000005162000-memory.dmp healer behavioral1/memory/2856-41-0x0000000005150000-0x0000000005162000-memory.dmp healer behavioral1/memory/2856-39-0x0000000005150000-0x0000000005162000-memory.dmp healer behavioral1/memory/2856-37-0x0000000005150000-0x0000000005162000-memory.dmp healer behavioral1/memory/2856-35-0x0000000005150000-0x0000000005162000-memory.dmp healer behavioral1/memory/2856-32-0x0000000005150000-0x0000000005162000-memory.dmp healer behavioral1/memory/2856-33-0x0000000005150000-0x0000000005162000-memory.dmp healer -
Healer family
-
Processes:
b2763Al.exec54xL34.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b2763Al.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b2763Al.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c54xL34.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b2763Al.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b2763Al.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b2763Al.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c54xL34.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c54xL34.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c54xL34.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c54xL34.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c54xL34.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b2763Al.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4828-67-0x00000000021A0000-0x00000000021E6000-memory.dmp family_redline behavioral1/memory/4828-68-0x00000000050A0000-0x00000000050E4000-memory.dmp family_redline behavioral1/memory/4828-80-0x00000000050A0000-0x00000000050DE000-memory.dmp family_redline behavioral1/memory/4828-82-0x00000000050A0000-0x00000000050DE000-memory.dmp family_redline behavioral1/memory/4828-102-0x00000000050A0000-0x00000000050DE000-memory.dmp family_redline behavioral1/memory/4828-100-0x00000000050A0000-0x00000000050DE000-memory.dmp family_redline behavioral1/memory/4828-98-0x00000000050A0000-0x00000000050DE000-memory.dmp family_redline behavioral1/memory/4828-94-0x00000000050A0000-0x00000000050DE000-memory.dmp family_redline behavioral1/memory/4828-92-0x00000000050A0000-0x00000000050DE000-memory.dmp family_redline behavioral1/memory/4828-90-0x00000000050A0000-0x00000000050DE000-memory.dmp family_redline behavioral1/memory/4828-88-0x00000000050A0000-0x00000000050DE000-memory.dmp family_redline behavioral1/memory/4828-86-0x00000000050A0000-0x00000000050DE000-memory.dmp family_redline behavioral1/memory/4828-84-0x00000000050A0000-0x00000000050DE000-memory.dmp family_redline behavioral1/memory/4828-78-0x00000000050A0000-0x00000000050DE000-memory.dmp family_redline behavioral1/memory/4828-76-0x00000000050A0000-0x00000000050DE000-memory.dmp family_redline behavioral1/memory/4828-96-0x00000000050A0000-0x00000000050DE000-memory.dmp family_redline behavioral1/memory/4828-74-0x00000000050A0000-0x00000000050DE000-memory.dmp family_redline behavioral1/memory/4828-72-0x00000000050A0000-0x00000000050DE000-memory.dmp family_redline behavioral1/memory/4828-70-0x00000000050A0000-0x00000000050DE000-memory.dmp family_redline behavioral1/memory/4828-69-0x00000000050A0000-0x00000000050DE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 5 IoCs
Processes:
tice4588.exetice8462.exeb2763Al.exec54xL34.exedYIaF01.exepid Process 432 tice4588.exe 5112 tice8462.exe 1368 b2763Al.exe 2856 c54xL34.exe 4828 dYIaF01.exe -
Processes:
b2763Al.exec54xL34.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b2763Al.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c54xL34.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c54xL34.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
978313ae6fae36af5d07f9ea70c463ea72a9eeeeaad031c057bdaacc6854a964.exetice4588.exetice8462.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 978313ae6fae36af5d07f9ea70c463ea72a9eeeeaad031c057bdaacc6854a964.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice4588.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice8462.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 1300 2856 WerFault.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
tice4588.exetice8462.exec54xL34.exedYIaF01.exe978313ae6fae36af5d07f9ea70c463ea72a9eeeeaad031c057bdaacc6854a964.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice4588.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice8462.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c54xL34.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dYIaF01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 978313ae6fae36af5d07f9ea70c463ea72a9eeeeaad031c057bdaacc6854a964.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
b2763Al.exec54xL34.exepid Process 1368 b2763Al.exe 1368 b2763Al.exe 2856 c54xL34.exe 2856 c54xL34.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
b2763Al.exec54xL34.exedYIaF01.exedescription pid Process Token: SeDebugPrivilege 1368 b2763Al.exe Token: SeDebugPrivilege 2856 c54xL34.exe Token: SeDebugPrivilege 4828 dYIaF01.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
978313ae6fae36af5d07f9ea70c463ea72a9eeeeaad031c057bdaacc6854a964.exetice4588.exetice8462.exedescription pid Process procid_target PID 5008 wrote to memory of 432 5008 978313ae6fae36af5d07f9ea70c463ea72a9eeeeaad031c057bdaacc6854a964.exe 83 PID 5008 wrote to memory of 432 5008 978313ae6fae36af5d07f9ea70c463ea72a9eeeeaad031c057bdaacc6854a964.exe 83 PID 5008 wrote to memory of 432 5008 978313ae6fae36af5d07f9ea70c463ea72a9eeeeaad031c057bdaacc6854a964.exe 83 PID 432 wrote to memory of 5112 432 tice4588.exe 84 PID 432 wrote to memory of 5112 432 tice4588.exe 84 PID 432 wrote to memory of 5112 432 tice4588.exe 84 PID 5112 wrote to memory of 1368 5112 tice8462.exe 86 PID 5112 wrote to memory of 1368 5112 tice8462.exe 86 PID 5112 wrote to memory of 2856 5112 tice8462.exe 96 PID 5112 wrote to memory of 2856 5112 tice8462.exe 96 PID 5112 wrote to memory of 2856 5112 tice8462.exe 96 PID 432 wrote to memory of 4828 432 tice4588.exe 101 PID 432 wrote to memory of 4828 432 tice4588.exe 101 PID 432 wrote to memory of 4828 432 tice4588.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\978313ae6fae36af5d07f9ea70c463ea72a9eeeeaad031c057bdaacc6854a964.exe"C:\Users\Admin\AppData\Local\Temp\978313ae6fae36af5d07f9ea70c463ea72a9eeeeaad031c057bdaacc6854a964.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice4588.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice4588.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice8462.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice8462.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2763Al.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2763Al.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1368
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c54xL34.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c54xL34.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2856 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2856 -s 10965⤵
- Program crash
PID:1300
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dYIaF01.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dYIaF01.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4828
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2856 -ip 28561⤵PID:64
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
642KB
MD5a4aadf5dbfefeb8fde8c1c748f114656
SHA10e090feeaa0c8efc6fb0a1c4ac61c6fabc7a9887
SHA256ef92f490c33d95c4836bfd60768402c198ed3ca20351f48ebd5ee85888a1a113
SHA512e1295bad5093cc623804beab160b4f0a49fb15a232a1f31c80dbce5f0648010733b3ea8964cc5c6b5f721566a328e873820adb6baa030e394246a7ffb07287d5
-
Filesize
295KB
MD5bc29c2dfc6ca49da583a76559dead377
SHA1343442da23047447b364f473b2e53c549d8f0246
SHA2567c0ce7a5e9101dcf244ec974e86c7581d923f530bbd59ad7266b0b0a5b5eb7f2
SHA5121cb1a3ee7d7129fddf0650bee01ea9eaf9289c9061665908a0175c5d69e2988e848a2b8a756f569f3cf821e949b3362344e82aff4b0e3804812d12f808a5b52c
-
Filesize
321KB
MD5bbb50d19ea34c5d043b0c062a612d94b
SHA18290a17a6587df4ff38d5aead7c0a185cf88548b
SHA256a0138cff09789229bccb6c28fdb5660718d7cad3fe785ae0707920fbeaadf068
SHA51213484deb92ca45c03972b63dfb03de1f1b6e1b9ea7a1bc330be4a399aec56792f7839fa1b67677f036b8cb2908505e8e462a839d35d061064146fd12a70b334c
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
237KB
MD5d81171bb6cc88a623c51734f14fc480b
SHA1ea6274b4525cc4998644a29ff94b3fc315d905d6
SHA256b7a4560f868f5758982038f4dbde0931b0a255a51f030b0986b52948382d9159
SHA512627414f8d45219009851bfe4bca4108d5b42f328b7ff93977feef03cec90d3979457e71e32ffb294510e0f51e25beef54517b72389ba09cb17bf80ed105e1a0c