Analysis
-
max time kernel
114s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-11-2024 04:20
Static task
static1
Behavioral task
behavioral1
Sample
16db38b90f9bae16a8fc61e074d03ff274f752ad3cd10dc495bb4ffa99a10655.exe
Resource
win10v2004-20241007-en
General
-
Target
16db38b90f9bae16a8fc61e074d03ff274f752ad3cd10dc495bb4ffa99a10655.exe
-
Size
894KB
-
MD5
5e0bcd298d1da8071d506f7e7e626a50
-
SHA1
acef7d617ef8b777048281c9aca2914528f52567
-
SHA256
16db38b90f9bae16a8fc61e074d03ff274f752ad3cd10dc495bb4ffa99a10655
-
SHA512
af48329cf2e4779861ddc3ff33b17577aef7ff28ba679448057b61c125c5c41c9b6e44abe85adde4e6c06f20b7611d048fca045fd0a1684479175575fc5d192a
-
SSDEEP
24576:Jy9+PlDhEpWnASRIHDCfGGhmY+JEJsct0at0MzIL:89gdh8WnAICDCfnB8EJjt0a+MzQ
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
resource yara_rule behavioral1/files/0x0009000000023ba9-20.dat healer behavioral1/memory/1136-22-0x0000000000AB0000-0x0000000000ABA000-memory.dmp healer behavioral1/memory/1852-29-0x0000000004910000-0x000000000492A000-memory.dmp healer behavioral1/memory/1852-31-0x0000000004B60000-0x0000000004B78000-memory.dmp healer behavioral1/memory/1852-33-0x0000000004B60000-0x0000000004B72000-memory.dmp healer behavioral1/memory/1852-59-0x0000000004B60000-0x0000000004B72000-memory.dmp healer behavioral1/memory/1852-57-0x0000000004B60000-0x0000000004B72000-memory.dmp healer behavioral1/memory/1852-55-0x0000000004B60000-0x0000000004B72000-memory.dmp healer behavioral1/memory/1852-54-0x0000000004B60000-0x0000000004B72000-memory.dmp healer behavioral1/memory/1852-51-0x0000000004B60000-0x0000000004B72000-memory.dmp healer behavioral1/memory/1852-47-0x0000000004B60000-0x0000000004B72000-memory.dmp healer behavioral1/memory/1852-45-0x0000000004B60000-0x0000000004B72000-memory.dmp healer behavioral1/memory/1852-43-0x0000000004B60000-0x0000000004B72000-memory.dmp healer behavioral1/memory/1852-41-0x0000000004B60000-0x0000000004B72000-memory.dmp healer behavioral1/memory/1852-39-0x0000000004B60000-0x0000000004B72000-memory.dmp healer behavioral1/memory/1852-37-0x0000000004B60000-0x0000000004B72000-memory.dmp healer behavioral1/memory/1852-35-0x0000000004B60000-0x0000000004B72000-memory.dmp healer behavioral1/memory/1852-32-0x0000000004B60000-0x0000000004B72000-memory.dmp healer behavioral1/memory/1852-49-0x0000000004B60000-0x0000000004B72000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b3357BL.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b3357BL.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b3357BL.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c10ns56.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c10ns56.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b3357BL.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b3357BL.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b3357BL.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c10ns56.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c10ns56.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c10ns56.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c10ns56.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3564-67-0x0000000004840000-0x0000000004886000-memory.dmp family_redline behavioral1/memory/3564-68-0x0000000004BE0000-0x0000000004C24000-memory.dmp family_redline behavioral1/memory/3564-70-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/3564-88-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/3564-102-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/3564-100-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/3564-98-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/3564-96-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/3564-94-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/3564-92-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/3564-90-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/3564-86-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/3564-84-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/3564-82-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/3564-80-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/3564-78-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/3564-74-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/3564-72-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/3564-69-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/3564-76-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 5 IoCs
pid Process 4000 tice9312.exe 1548 tice3945.exe 1136 b3357BL.exe 1852 c10ns56.exe 3564 dkOTy45.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b3357BL.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c10ns56.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c10ns56.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 16db38b90f9bae16a8fc61e074d03ff274f752ad3cd10dc495bb4ffa99a10655.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice9312.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice3945.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4600 1852 WerFault.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dkOTy45.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 16db38b90f9bae16a8fc61e074d03ff274f752ad3cd10dc495bb4ffa99a10655.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice9312.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice3945.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c10ns56.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1136 b3357BL.exe 1136 b3357BL.exe 1852 c10ns56.exe 1852 c10ns56.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1136 b3357BL.exe Token: SeDebugPrivilege 1852 c10ns56.exe Token: SeDebugPrivilege 3564 dkOTy45.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3860 wrote to memory of 4000 3860 16db38b90f9bae16a8fc61e074d03ff274f752ad3cd10dc495bb4ffa99a10655.exe 83 PID 3860 wrote to memory of 4000 3860 16db38b90f9bae16a8fc61e074d03ff274f752ad3cd10dc495bb4ffa99a10655.exe 83 PID 3860 wrote to memory of 4000 3860 16db38b90f9bae16a8fc61e074d03ff274f752ad3cd10dc495bb4ffa99a10655.exe 83 PID 4000 wrote to memory of 1548 4000 tice9312.exe 84 PID 4000 wrote to memory of 1548 4000 tice9312.exe 84 PID 4000 wrote to memory of 1548 4000 tice9312.exe 84 PID 1548 wrote to memory of 1136 1548 tice3945.exe 86 PID 1548 wrote to memory of 1136 1548 tice3945.exe 86 PID 1548 wrote to memory of 1852 1548 tice3945.exe 96 PID 1548 wrote to memory of 1852 1548 tice3945.exe 96 PID 1548 wrote to memory of 1852 1548 tice3945.exe 96 PID 4000 wrote to memory of 3564 4000 tice9312.exe 101 PID 4000 wrote to memory of 3564 4000 tice9312.exe 101 PID 4000 wrote to memory of 3564 4000 tice9312.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\16db38b90f9bae16a8fc61e074d03ff274f752ad3cd10dc495bb4ffa99a10655.exe"C:\Users\Admin\AppData\Local\Temp\16db38b90f9bae16a8fc61e074d03ff274f752ad3cd10dc495bb4ffa99a10655.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice9312.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice9312.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice3945.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice3945.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3357BL.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3357BL.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1136
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c10ns56.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c10ns56.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1852 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1852 -s 10885⤵
- Program crash
PID:4600
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dkOTy45.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dkOTy45.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3564
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1852 -ip 18521⤵PID:1412
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
749KB
MD55a50b37779bbaaa6703e76902250ce5e
SHA13a65e7f947f7a6ab5d17e0f8b07f738b4a69f601
SHA2563e381b3289ba3a5635f25581146ab77704d6063ee1e0bff295ae37fba858affa
SHA512f7de82f4b2d00bbd82227e3ecd690389193988148b6f7fcc31450f636bea0273555b382c5bce804e12df3605c009d6f8114acc9f35aef4b5c4bad42f0883a357
-
Filesize
446KB
MD565c54ba7086f8db1772fdb75d952507f
SHA1d6ab61d5f268a2c2ed6b7033f24c01fdc21fc390
SHA2563ab890e37722283b5367134e0c831896e09f99b49ec7e49767c06256c624820b
SHA5122019c5afa774e39cb672c8e664515a6cb72657c2cfd1c301db0f2cf4bba586db01d8a7dd95a21c7ee6b5d8c9c5a7a6c4b7fea9489ef0d99c6636033b5acdf2d9
-
Filesize
374KB
MD543bceda38102132e3a4765a7fd47ee5a
SHA10d0645d7655e988a246d1e868c780ff4a8278202
SHA256819eb051fdc0bb7c7745965874a7332ca75bcf5aa6930a652b262bc4f937ac0c
SHA512d4f9136f00aae4fc7d4cd1a3fde4c041c2ef0d92beb9a0ae4ed283542124e4a421175d2db6c17ae76b849bbe5a7f0cbb50cabe06b72bc3e4121daf98089bead4
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
388KB
MD5e1a145f50c3fad25c93bab45a3cd9161
SHA12330147b22f768e86ca7db31c3804ce109341dee
SHA256d29fcc97306126b735dc6b44c423fd3acd63985fbd184e4f0ac6948285491ded
SHA5127168d9f0e473048f66d9dc9df23a085355ce476ce81443ebf57cf9ae22b94c5771338eab92937f6456a46e4f597d5a9fabb4550166ad2d76528fd91b8e2216b1