Analysis
-
max time kernel
112s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 14:27
Static task
static1
Behavioral task
behavioral1
Sample
4944f39770341de75d54c86f456d650e880077e3b1b86122d8922ee5b3a4a869N.exe
Resource
win10v2004-20241007-en
General
-
Target
4944f39770341de75d54c86f456d650e880077e3b1b86122d8922ee5b3a4a869N.exe
-
Size
792KB
-
MD5
ca99d17a17a9cd46ec5f22d4eb3cfd0f
-
SHA1
85830db21dc627ff6c3c5ae60b8f9fe815c240d0
-
SHA256
2592efee7486b805d7dc193550e827335ba4bbc168c3f7aae721a34287f8f115
-
SHA512
3062f40b905fbe45258b6d2d43922f3d42dd1bf1331e2bc9c0693eb0997a4680dbf02aaf66d077bb818f3b3e55b5ff3dfe21fd9bde62dfea05ad0c1298a987c5
-
SSDEEP
12288:eMrdy90/ASEOAE9d8+3hekjtrgZ5FAt2aBHUb5339HB03kKleutnfkId6xTy1uiC:ryOAS2ydb33lG2t2wyNh03D/uVx2qP
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
Processes:
resource yara_rule behavioral1/files/0x000b000000023bb5-19.dat healer behavioral1/memory/4536-22-0x0000000000CA0000-0x0000000000CAA000-memory.dmp healer behavioral1/memory/4944-29-0x0000000002310000-0x000000000232A000-memory.dmp healer behavioral1/memory/4944-31-0x00000000024F0000-0x0000000002508000-memory.dmp healer behavioral1/memory/4944-32-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/4944-39-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/4944-57-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/4944-55-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/4944-51-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/4944-49-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/4944-47-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/4944-46-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/4944-43-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/4944-41-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/4944-37-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/4944-35-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/4944-59-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/4944-33-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/4944-53-0x00000000024F0000-0x0000000002502000-memory.dmp healer -
Healer family
-
Processes:
b6518UU.exec24wR45.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b6518UU.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b6518UU.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b6518UU.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b6518UU.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b6518UU.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c24wR45.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b6518UU.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c24wR45.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c24wR45.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c24wR45.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c24wR45.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c24wR45.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/1640-67-0x00000000025C0000-0x0000000002606000-memory.dmp family_redline behavioral1/memory/1640-68-0x0000000005090000-0x00000000050D4000-memory.dmp family_redline behavioral1/memory/1640-72-0x0000000005090000-0x00000000050CE000-memory.dmp family_redline behavioral1/memory/1640-84-0x0000000005090000-0x00000000050CE000-memory.dmp family_redline behavioral1/memory/1640-102-0x0000000005090000-0x00000000050CE000-memory.dmp family_redline behavioral1/memory/1640-100-0x0000000005090000-0x00000000050CE000-memory.dmp family_redline behavioral1/memory/1640-98-0x0000000005090000-0x00000000050CE000-memory.dmp family_redline behavioral1/memory/1640-96-0x0000000005090000-0x00000000050CE000-memory.dmp family_redline behavioral1/memory/1640-92-0x0000000005090000-0x00000000050CE000-memory.dmp family_redline behavioral1/memory/1640-90-0x0000000005090000-0x00000000050CE000-memory.dmp family_redline behavioral1/memory/1640-88-0x0000000005090000-0x00000000050CE000-memory.dmp family_redline behavioral1/memory/1640-87-0x0000000005090000-0x00000000050CE000-memory.dmp family_redline behavioral1/memory/1640-82-0x0000000005090000-0x00000000050CE000-memory.dmp family_redline behavioral1/memory/1640-80-0x0000000005090000-0x00000000050CE000-memory.dmp family_redline behavioral1/memory/1640-78-0x0000000005090000-0x00000000050CE000-memory.dmp family_redline behavioral1/memory/1640-76-0x0000000005090000-0x00000000050CE000-memory.dmp family_redline behavioral1/memory/1640-74-0x0000000005090000-0x00000000050CE000-memory.dmp family_redline behavioral1/memory/1640-94-0x0000000005090000-0x00000000050CE000-memory.dmp family_redline behavioral1/memory/1640-70-0x0000000005090000-0x00000000050CE000-memory.dmp family_redline behavioral1/memory/1640-69-0x0000000005090000-0x00000000050CE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 5 IoCs
Processes:
tice2016.exetice0368.exeb6518UU.exec24wR45.exedoBrB85.exepid Process 2260 tice2016.exe 1992 tice0368.exe 4536 b6518UU.exe 4944 c24wR45.exe 1640 doBrB85.exe -
Processes:
c24wR45.exeb6518UU.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c24wR45.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c24wR45.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b6518UU.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
4944f39770341de75d54c86f456d650e880077e3b1b86122d8922ee5b3a4a869N.exetice2016.exetice0368.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4944f39770341de75d54c86f456d650e880077e3b1b86122d8922ee5b3a4a869N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice2016.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice0368.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 4640 4944 WerFault.exe 94 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
doBrB85.exe4944f39770341de75d54c86f456d650e880077e3b1b86122d8922ee5b3a4a869N.exetice2016.exetice0368.exec24wR45.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language doBrB85.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4944f39770341de75d54c86f456d650e880077e3b1b86122d8922ee5b3a4a869N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice2016.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice0368.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c24wR45.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
b6518UU.exec24wR45.exepid Process 4536 b6518UU.exe 4536 b6518UU.exe 4944 c24wR45.exe 4944 c24wR45.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
b6518UU.exec24wR45.exedoBrB85.exedescription pid Process Token: SeDebugPrivilege 4536 b6518UU.exe Token: SeDebugPrivilege 4944 c24wR45.exe Token: SeDebugPrivilege 1640 doBrB85.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
4944f39770341de75d54c86f456d650e880077e3b1b86122d8922ee5b3a4a869N.exetice2016.exetice0368.exedescription pid Process procid_target PID 3816 wrote to memory of 2260 3816 4944f39770341de75d54c86f456d650e880077e3b1b86122d8922ee5b3a4a869N.exe 83 PID 3816 wrote to memory of 2260 3816 4944f39770341de75d54c86f456d650e880077e3b1b86122d8922ee5b3a4a869N.exe 83 PID 3816 wrote to memory of 2260 3816 4944f39770341de75d54c86f456d650e880077e3b1b86122d8922ee5b3a4a869N.exe 83 PID 2260 wrote to memory of 1992 2260 tice2016.exe 84 PID 2260 wrote to memory of 1992 2260 tice2016.exe 84 PID 2260 wrote to memory of 1992 2260 tice2016.exe 84 PID 1992 wrote to memory of 4536 1992 tice0368.exe 85 PID 1992 wrote to memory of 4536 1992 tice0368.exe 85 PID 1992 wrote to memory of 4944 1992 tice0368.exe 94 PID 1992 wrote to memory of 4944 1992 tice0368.exe 94 PID 1992 wrote to memory of 4944 1992 tice0368.exe 94 PID 2260 wrote to memory of 1640 2260 tice2016.exe 99 PID 2260 wrote to memory of 1640 2260 tice2016.exe 99 PID 2260 wrote to memory of 1640 2260 tice2016.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\4944f39770341de75d54c86f456d650e880077e3b1b86122d8922ee5b3a4a869N.exe"C:\Users\Admin\AppData\Local\Temp\4944f39770341de75d54c86f456d650e880077e3b1b86122d8922ee5b3a4a869N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice2016.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice2016.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice0368.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice0368.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b6518UU.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b6518UU.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4536
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c24wR45.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c24wR45.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4944 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4944 -s 10845⤵
- Program crash
PID:4640
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\doBrB85.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\doBrB85.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1640
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4944 -ip 49441⤵PID:4140
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
647KB
MD59943d6028fe0782a2b068844d25162bd
SHA14e40ef5c5a9fe6965127d3ec6b2e443f9d8905ac
SHA2562f3494cf6b0f8145608b7e7d61ca699cdf022f06d33f7c32e7eba3957058374d
SHA5124fd562214d96a76199ba347df52de9de0dccdcc6086fc391ca1ea849e40d4a8650998a1129b33a98daf9c7d424b61e972f107ca4a024787b790123174d7bab32
-
Filesize
284KB
MD5b7b4d7bc2420a0ad411d8542e9e914d4
SHA10dc01b8eabf1926d5b045bd515911d80bbe786b2
SHA25630f741e91622ff369f5d52b659110a91b0cc0c62fa39c5f0d19c5996f4afcba4
SHA5121353dbe7600149c0189d6af6b55fd190c8f5ffe4cd5e015ed6811fa54596c50494f61dbe43d058c4daba307a7887b4b7454df76fa94516e28438163c357d8ae5
-
Filesize
324KB
MD5cd30d67407e10833b965628964f5f346
SHA133303125c481d3474192855f6722c79ba6c927d1
SHA25630ac978dfb0724f3ea8c7248f50643773664739999d0ff204c5960a92860b95a
SHA512dfdbe6e3e420c374c0832efb1fe6f7afedad5faf6c97fdef198469abfaef3b4d9f82b41e952453527524b3adf68cb9830335ed1966b413a82e54345d60a722bb
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
226KB
MD5323ca7c3dfbec3c01452cfba1cddfd70
SHA108502348a5b384e1d5336685b9c437a2a2d164be
SHA25647b90638b352d8f3b2bbc8816eddc11adcff4531b149459d152699ff0d6d2aea
SHA51201073a8b5d7d9f768c701a91916ab2b7e475535ebf5fa2090ebb52195da0a7cd7738e3bea7afb0f4108734a2a49cfbfaea97192f2ccae4363e5caa2e83094016