Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 09:29
Static task
static1
Behavioral task
behavioral1
Sample
fa5b10ee245763f93fcbb9470009cf30b2232de5b7e80774a5e930e9ca2aaa12.exe
Resource
win10v2004-20241007-en
General
-
Target
fa5b10ee245763f93fcbb9470009cf30b2232de5b7e80774a5e930e9ca2aaa12.exe
-
Size
875KB
-
MD5
c0a811e5a6e9ea5d8db573e9c5c9a8f5
-
SHA1
c443005ccd2ab07a452409610b2624bda172b3d8
-
SHA256
fa5b10ee245763f93fcbb9470009cf30b2232de5b7e80774a5e930e9ca2aaa12
-
SHA512
61e4c415a0cf6597211fe3b5f8a3e9fffaececb65f46879c500fbc5b90f4baad83888518c40ea38338b2fa97924429bc781b917f71b0515a9e3c829ec713abef
-
SSDEEP
24576:xywJcVSZ6g5sHQEWVHddqiN/hBHEv25TPuHG:kwJcV0fEW/dpLBHLb
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
Processes:
resource yara_rule behavioral1/files/0x0008000000023cdb-19.dat healer behavioral1/memory/184-21-0x0000000000300000-0x000000000030A000-memory.dmp healer behavioral1/memory/2664-29-0x0000000004880000-0x000000000489A000-memory.dmp healer behavioral1/memory/2664-31-0x0000000004B40000-0x0000000004B58000-memory.dmp healer behavioral1/memory/2664-32-0x0000000004B40000-0x0000000004B52000-memory.dmp healer behavioral1/memory/2664-55-0x0000000004B40000-0x0000000004B52000-memory.dmp healer behavioral1/memory/2664-59-0x0000000004B40000-0x0000000004B52000-memory.dmp healer behavioral1/memory/2664-58-0x0000000004B40000-0x0000000004B52000-memory.dmp healer behavioral1/memory/2664-53-0x0000000004B40000-0x0000000004B52000-memory.dmp healer behavioral1/memory/2664-51-0x0000000004B40000-0x0000000004B52000-memory.dmp healer behavioral1/memory/2664-49-0x0000000004B40000-0x0000000004B52000-memory.dmp healer behavioral1/memory/2664-47-0x0000000004B40000-0x0000000004B52000-memory.dmp healer behavioral1/memory/2664-45-0x0000000004B40000-0x0000000004B52000-memory.dmp healer behavioral1/memory/2664-43-0x0000000004B40000-0x0000000004B52000-memory.dmp healer behavioral1/memory/2664-41-0x0000000004B40000-0x0000000004B52000-memory.dmp healer behavioral1/memory/2664-39-0x0000000004B40000-0x0000000004B52000-memory.dmp healer behavioral1/memory/2664-37-0x0000000004B40000-0x0000000004B52000-memory.dmp healer behavioral1/memory/2664-35-0x0000000004B40000-0x0000000004B52000-memory.dmp healer behavioral1/memory/2664-33-0x0000000004B40000-0x0000000004B52000-memory.dmp healer -
Healer family
-
Processes:
b2942Yp.exec58NT49.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b2942Yp.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c58NT49.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c58NT49.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c58NT49.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c58NT49.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c58NT49.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b2942Yp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b2942Yp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b2942Yp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b2942Yp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b2942Yp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c58NT49.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/2616-67-0x00000000048E0000-0x0000000004926000-memory.dmp family_redline behavioral1/memory/2616-68-0x0000000004BF0000-0x0000000004C34000-memory.dmp family_redline behavioral1/memory/2616-70-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/2616-88-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/2616-102-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/2616-100-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/2616-98-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/2616-96-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/2616-94-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/2616-92-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/2616-90-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/2616-86-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/2616-84-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/2616-82-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/2616-80-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/2616-78-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/2616-76-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/2616-74-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/2616-72-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/2616-69-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 5 IoCs
Processes:
tice0417.exetice0510.exeb2942Yp.exec58NT49.exedhmsg49.exepid Process 216 tice0417.exe 1820 tice0510.exe 184 b2942Yp.exe 2664 c58NT49.exe 2616 dhmsg49.exe -
Processes:
b2942Yp.exec58NT49.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b2942Yp.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c58NT49.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c58NT49.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
tice0510.exefa5b10ee245763f93fcbb9470009cf30b2232de5b7e80774a5e930e9ca2aaa12.exetice0417.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice0510.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fa5b10ee245763f93fcbb9470009cf30b2232de5b7e80774a5e930e9ca2aaa12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice0417.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 4528 2664 WerFault.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
fa5b10ee245763f93fcbb9470009cf30b2232de5b7e80774a5e930e9ca2aaa12.exetice0417.exetice0510.exec58NT49.exedhmsg49.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fa5b10ee245763f93fcbb9470009cf30b2232de5b7e80774a5e930e9ca2aaa12.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice0417.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice0510.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c58NT49.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dhmsg49.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
b2942Yp.exec58NT49.exepid Process 184 b2942Yp.exe 184 b2942Yp.exe 2664 c58NT49.exe 2664 c58NT49.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
b2942Yp.exec58NT49.exedhmsg49.exedescription pid Process Token: SeDebugPrivilege 184 b2942Yp.exe Token: SeDebugPrivilege 2664 c58NT49.exe Token: SeDebugPrivilege 2616 dhmsg49.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
fa5b10ee245763f93fcbb9470009cf30b2232de5b7e80774a5e930e9ca2aaa12.exetice0417.exetice0510.exedescription pid Process procid_target PID 4684 wrote to memory of 216 4684 fa5b10ee245763f93fcbb9470009cf30b2232de5b7e80774a5e930e9ca2aaa12.exe 84 PID 4684 wrote to memory of 216 4684 fa5b10ee245763f93fcbb9470009cf30b2232de5b7e80774a5e930e9ca2aaa12.exe 84 PID 4684 wrote to memory of 216 4684 fa5b10ee245763f93fcbb9470009cf30b2232de5b7e80774a5e930e9ca2aaa12.exe 84 PID 216 wrote to memory of 1820 216 tice0417.exe 85 PID 216 wrote to memory of 1820 216 tice0417.exe 85 PID 216 wrote to memory of 1820 216 tice0417.exe 85 PID 1820 wrote to memory of 184 1820 tice0510.exe 86 PID 1820 wrote to memory of 184 1820 tice0510.exe 86 PID 1820 wrote to memory of 2664 1820 tice0510.exe 96 PID 1820 wrote to memory of 2664 1820 tice0510.exe 96 PID 1820 wrote to memory of 2664 1820 tice0510.exe 96 PID 216 wrote to memory of 2616 216 tice0417.exe 101 PID 216 wrote to memory of 2616 216 tice0417.exe 101 PID 216 wrote to memory of 2616 216 tice0417.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa5b10ee245763f93fcbb9470009cf30b2232de5b7e80774a5e930e9ca2aaa12.exe"C:\Users\Admin\AppData\Local\Temp\fa5b10ee245763f93fcbb9470009cf30b2232de5b7e80774a5e930e9ca2aaa12.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice0417.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice0417.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice0510.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice0510.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2942Yp.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2942Yp.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:184
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c58NT49.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c58NT49.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2664 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2664 -s 10805⤵
- Program crash
PID:4528
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dhmsg49.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dhmsg49.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2664 -ip 26641⤵PID:4360
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
730KB
MD5d7c799198ec374b69cd7b1a86f0d216e
SHA14053d85e2e9859cddbaa60c63db5bfd21455c46f
SHA25620fa39965ad054abb01983cdbce26698d5a913709042430214fbe592f15faa15
SHA51211d0aa0ba93cf810edcdd25aba2ef233b15bd7486705854746eeb2a62455c239578655638ffa7461f6ee76cff7a8af4dcc20fb02cb59fe53c1901a055db23b9a
-
Filesize
408KB
MD5fa47621773b442a86590921e64bf63c9
SHA1154ec617438429409b5eafc1a8e7b43427346714
SHA256709614f6636b0bf25293d56256aee7687400a94a449e0c2a1873ac54ca59c9bf
SHA51270310c57edddab8091a4cc5b8e29a343a84745bd99f1783c4e59ef4eca2c0baf134c726f1cba103c616ee3af85178f2ebc66f7300064182ec82d493a216009e6
-
Filesize
365KB
MD553f36e8708e21ad5402ba7a9533bdb2d
SHA1a3d0564079ff009cbcce79220a601206a1321615
SHA2560076be8d3961f895a7ec386534e40d634c49e656f1b29cbc45fa51d7fd47793b
SHA5122d030399aaf39e704b238647579157b45bec6a697c6ea5a7ee2a33e766f6ff03e579071ad8ec11bd72fdca24e885841c8f38a33bd6defd736423f6e72b9a56a6
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
351KB
MD56f5febb1d273588c706260933b9a2371
SHA104d340419eb4063fcc02992fa08f5ef1b476e114
SHA2564afa96befafbcfff02ff86ff653091a1d75578d15d33a6fed0f36ba8815b3438
SHA512314e9d6c93bc027cf1eacd5bf30b50bd42d16ca29453eda7b039f669220138958c2ae3fe6cd4332a38e56e10554bae81d37cb7b8f306003469f70f95f439d0da