Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 09:49
Static task
static1
Behavioral task
behavioral1
Sample
38319b663b5660de73901f0f32d815e12c06ef70a8157c6683f3a9c16146578b.exe
Resource
win10v2004-20241007-en
General
-
Target
38319b663b5660de73901f0f32d815e12c06ef70a8157c6683f3a9c16146578b.exe
-
Size
787KB
-
MD5
0cdbee7e1a97bef1c66abfba4077c84c
-
SHA1
fa370ff2d123f2926003a834b3e7247a438d9f43
-
SHA256
38319b663b5660de73901f0f32d815e12c06ef70a8157c6683f3a9c16146578b
-
SHA512
799bc89272a306e7f43680c489cf714b7cfe48e3fa88709775677382896603988a995f5b1de7fe8fd929979dcb2f607465106705bf1ffb56e2eeb22aac90a551
-
SSDEEP
12288:9Mroy90sFs4/zzLr/w/r5sKykqnZpghad+Xjmnvpl1ghceW8g1mN8rAk18DZmrdt:JyU4XIDaKyXqY0TmnvplOK1crtCO6
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
Processes:
resource yara_rule behavioral1/files/0x000b000000023b99-19.dat healer behavioral1/memory/4168-22-0x00000000002A0000-0x00000000002AA000-memory.dmp healer behavioral1/memory/2888-29-0x0000000002530000-0x000000000254A000-memory.dmp healer behavioral1/memory/2888-31-0x0000000004A50000-0x0000000004A68000-memory.dmp healer behavioral1/memory/2888-32-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/2888-39-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/2888-59-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/2888-57-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/2888-55-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/2888-53-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/2888-51-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/2888-49-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/2888-47-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/2888-45-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/2888-43-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/2888-41-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/2888-37-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/2888-35-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/2888-33-0x0000000004A50000-0x0000000004A62000-memory.dmp healer -
Healer family
-
Processes:
c51fq21.exeb9241eV.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c51fq21.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c51fq21.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b9241eV.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b9241eV.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b9241eV.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c51fq21.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c51fq21.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c51fq21.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c51fq21.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b9241eV.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b9241eV.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b9241eV.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/5032-67-0x0000000002570000-0x00000000025B6000-memory.dmp family_redline behavioral1/memory/5032-68-0x00000000049E0000-0x0000000004A24000-memory.dmp family_redline behavioral1/memory/5032-72-0x00000000049E0000-0x0000000004A1E000-memory.dmp family_redline behavioral1/memory/5032-82-0x00000000049E0000-0x0000000004A1E000-memory.dmp family_redline behavioral1/memory/5032-102-0x00000000049E0000-0x0000000004A1E000-memory.dmp family_redline behavioral1/memory/5032-100-0x00000000049E0000-0x0000000004A1E000-memory.dmp family_redline behavioral1/memory/5032-98-0x00000000049E0000-0x0000000004A1E000-memory.dmp family_redline behavioral1/memory/5032-96-0x00000000049E0000-0x0000000004A1E000-memory.dmp family_redline behavioral1/memory/5032-92-0x00000000049E0000-0x0000000004A1E000-memory.dmp family_redline behavioral1/memory/5032-90-0x00000000049E0000-0x0000000004A1E000-memory.dmp family_redline behavioral1/memory/5032-88-0x00000000049E0000-0x0000000004A1E000-memory.dmp family_redline behavioral1/memory/5032-86-0x00000000049E0000-0x0000000004A1E000-memory.dmp family_redline behavioral1/memory/5032-84-0x00000000049E0000-0x0000000004A1E000-memory.dmp family_redline behavioral1/memory/5032-80-0x00000000049E0000-0x0000000004A1E000-memory.dmp family_redline behavioral1/memory/5032-78-0x00000000049E0000-0x0000000004A1E000-memory.dmp family_redline behavioral1/memory/5032-76-0x00000000049E0000-0x0000000004A1E000-memory.dmp family_redline behavioral1/memory/5032-74-0x00000000049E0000-0x0000000004A1E000-memory.dmp family_redline behavioral1/memory/5032-94-0x00000000049E0000-0x0000000004A1E000-memory.dmp family_redline behavioral1/memory/5032-70-0x00000000049E0000-0x0000000004A1E000-memory.dmp family_redline behavioral1/memory/5032-69-0x00000000049E0000-0x0000000004A1E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 5 IoCs
Processes:
tice8617.exetice5040.exeb9241eV.exec51fq21.exedhxkW88.exepid Process 4608 tice8617.exe 2360 tice5040.exe 4168 b9241eV.exe 2888 c51fq21.exe 5032 dhxkW88.exe -
Processes:
b9241eV.exec51fq21.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b9241eV.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c51fq21.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c51fq21.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
38319b663b5660de73901f0f32d815e12c06ef70a8157c6683f3a9c16146578b.exetice8617.exetice5040.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 38319b663b5660de73901f0f32d815e12c06ef70a8157c6683f3a9c16146578b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice8617.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice5040.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 736 2888 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
tice5040.exec51fq21.exedhxkW88.exe38319b663b5660de73901f0f32d815e12c06ef70a8157c6683f3a9c16146578b.exetice8617.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice5040.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c51fq21.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dhxkW88.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 38319b663b5660de73901f0f32d815e12c06ef70a8157c6683f3a9c16146578b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice8617.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
b9241eV.exec51fq21.exepid Process 4168 b9241eV.exe 4168 b9241eV.exe 2888 c51fq21.exe 2888 c51fq21.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
b9241eV.exec51fq21.exedhxkW88.exedescription pid Process Token: SeDebugPrivilege 4168 b9241eV.exe Token: SeDebugPrivilege 2888 c51fq21.exe Token: SeDebugPrivilege 5032 dhxkW88.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
38319b663b5660de73901f0f32d815e12c06ef70a8157c6683f3a9c16146578b.exetice8617.exetice5040.exedescription pid Process procid_target PID 3412 wrote to memory of 4608 3412 38319b663b5660de73901f0f32d815e12c06ef70a8157c6683f3a9c16146578b.exe 85 PID 3412 wrote to memory of 4608 3412 38319b663b5660de73901f0f32d815e12c06ef70a8157c6683f3a9c16146578b.exe 85 PID 3412 wrote to memory of 4608 3412 38319b663b5660de73901f0f32d815e12c06ef70a8157c6683f3a9c16146578b.exe 85 PID 4608 wrote to memory of 2360 4608 tice8617.exe 86 PID 4608 wrote to memory of 2360 4608 tice8617.exe 86 PID 4608 wrote to memory of 2360 4608 tice8617.exe 86 PID 2360 wrote to memory of 4168 2360 tice5040.exe 87 PID 2360 wrote to memory of 4168 2360 tice5040.exe 87 PID 2360 wrote to memory of 2888 2360 tice5040.exe 102 PID 2360 wrote to memory of 2888 2360 tice5040.exe 102 PID 2360 wrote to memory of 2888 2360 tice5040.exe 102 PID 4608 wrote to memory of 5032 4608 tice8617.exe 110 PID 4608 wrote to memory of 5032 4608 tice8617.exe 110 PID 4608 wrote to memory of 5032 4608 tice8617.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\38319b663b5660de73901f0f32d815e12c06ef70a8157c6683f3a9c16146578b.exe"C:\Users\Admin\AppData\Local\Temp\38319b663b5660de73901f0f32d815e12c06ef70a8157c6683f3a9c16146578b.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice8617.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice8617.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice5040.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice5040.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9241eV.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9241eV.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4168
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c51fq21.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c51fq21.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2888 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2888 -s 10805⤵
- Program crash
PID:736
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dhxkW88.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dhxkW88.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5032
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2888 -ip 28881⤵PID:2572
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
642KB
MD5dec5f01f8094941227a2632274244ddd
SHA1ef11115bebf4926abd0d8e75aa3fc60cbaea9ec6
SHA2567013df26f91f1934a7e8a8eb16f197d7a6ff35ef478abc2537e1e455e52e7d6b
SHA512cb1354600b7a44ead1ef95c685c268ce0f6bc73a2bab5af21647cabe1ef17eadd2613999b45273c78cdf1cbc2e6ae192101ba2640956f355fdda334a488f080e
-
Filesize
295KB
MD5bd9ef0c39c581227d2b7519f4cc85981
SHA1f3bfbd64d73d1ac26dc0bf19e599976532d5192e
SHA256f40a8fd4c04c5fc0a5eda6bf7b7eb0bd46e910fae354e73863464410e33036b5
SHA5124ef069bf63052683cca392e226c188553ec10c73670be12ba0bc4d80e2094b204c43457ade396c127310360968e43d42e54035d2ca3e935a32bc23b421d78b5b
-
Filesize
321KB
MD54fa8c58404d80d79e936f28e5195686e
SHA19830b38521f4d7648c14a6f8c63b48b14c0a6e29
SHA25610684b8a9e8ab483c3ff3257f965e4c1716e4a44131e7c212d788a0601cee513
SHA512625dc7d09c450933050852ac80e3405706cb98d0363859ba370bef4f0052c4f25a817cd2757ddef433cc0c80c4569aafbacd3cbf6add2499c288aa2b3e1c7666
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
237KB
MD5a3194e26d55705f1e83b8f7282f1cce5
SHA1e9dedb5af1481030ae57e861ac214fdb6a83973c
SHA2566bb126dda7b980c7ca8425cb163e36ffbaebac7953d49abc5161bb222a1f1204
SHA512f40201bf8720dafaacf309bbd253975d4380ff5acb4831364be4e544d15254dd2aea0b5e4be194127d486f06f4cce6aa55a04afde4135a5db06601e325ac61dd