Analysis
-
max time kernel
112s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-11-2024 10:06
Static task
static1
Behavioral task
behavioral1
Sample
69211bc04bbfceb8632f0492017f5539513fe3144530e43116a38172a85911c7N.exe
Resource
win10v2004-20241007-en
General
-
Target
69211bc04bbfceb8632f0492017f5539513fe3144530e43116a38172a85911c7N.exe
-
Size
668KB
-
MD5
24fc775b23074d6e1e842eadc3b15b50
-
SHA1
247f48a3c6f07aa6c324c7eff01d83776ba34c33
-
SHA256
69211bc04bbfceb8632f0492017f5539513fe3144530e43116a38172a85911c7
-
SHA512
7e118c728d87ea0c10b3fb0024b0dacebeab163c1b46e479ca5231b994ed8f42986220276c9dee09b5bde582879f6e29a0705cb9a18d3a3e3b9505108437bafc
-
SSDEEP
12288:kMrBy90hLhwkslnczmdgLgvPK+03d+qDxWe+MeVuZsEd232:Ny2LCltPK+0UqVl+78Zx9
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
resource yara_rule behavioral1/files/0x0008000000023c74-12.dat healer behavioral1/memory/4400-15-0x00000000006E0000-0x00000000006EA000-memory.dmp healer behavioral1/memory/1944-22-0x0000000002390000-0x00000000023AA000-memory.dmp healer behavioral1/memory/1944-24-0x00000000024D0000-0x00000000024E8000-memory.dmp healer behavioral1/memory/1944-25-0x00000000024D0000-0x00000000024E2000-memory.dmp healer behavioral1/memory/1944-36-0x00000000024D0000-0x00000000024E2000-memory.dmp healer behavioral1/memory/1944-51-0x00000000024D0000-0x00000000024E2000-memory.dmp healer behavioral1/memory/1944-48-0x00000000024D0000-0x00000000024E2000-memory.dmp healer behavioral1/memory/1944-46-0x00000000024D0000-0x00000000024E2000-memory.dmp healer behavioral1/memory/1944-44-0x00000000024D0000-0x00000000024E2000-memory.dmp healer behavioral1/memory/1944-42-0x00000000024D0000-0x00000000024E2000-memory.dmp healer behavioral1/memory/1944-40-0x00000000024D0000-0x00000000024E2000-memory.dmp healer behavioral1/memory/1944-38-0x00000000024D0000-0x00000000024E2000-memory.dmp healer behavioral1/memory/1944-34-0x00000000024D0000-0x00000000024E2000-memory.dmp healer behavioral1/memory/1944-32-0x00000000024D0000-0x00000000024E2000-memory.dmp healer behavioral1/memory/1944-30-0x00000000024D0000-0x00000000024E2000-memory.dmp healer behavioral1/memory/1944-28-0x00000000024D0000-0x00000000024E2000-memory.dmp healer behavioral1/memory/1944-26-0x00000000024D0000-0x00000000024E2000-memory.dmp healer behavioral1/memory/1944-52-0x00000000024D0000-0x00000000024E2000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b4644IR.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b4644IR.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b4644IR.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b4644IR.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c14GX67.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c14GX67.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b4644IR.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b4644IR.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c14GX67.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c14GX67.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c14GX67.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c14GX67.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/720-60-0x00000000023A0000-0x00000000023E6000-memory.dmp family_redline behavioral1/memory/720-61-0x00000000025A0000-0x00000000025E4000-memory.dmp family_redline behavioral1/memory/720-63-0x00000000025A0000-0x00000000025DE000-memory.dmp family_redline behavioral1/memory/720-76-0x00000000025A0000-0x00000000025DE000-memory.dmp family_redline behavioral1/memory/720-95-0x00000000025A0000-0x00000000025DE000-memory.dmp family_redline behavioral1/memory/720-94-0x00000000025A0000-0x00000000025DE000-memory.dmp family_redline behavioral1/memory/720-91-0x00000000025A0000-0x00000000025DE000-memory.dmp family_redline behavioral1/memory/720-90-0x00000000025A0000-0x00000000025DE000-memory.dmp family_redline behavioral1/memory/720-87-0x00000000025A0000-0x00000000025DE000-memory.dmp family_redline behavioral1/memory/720-85-0x00000000025A0000-0x00000000025DE000-memory.dmp family_redline behavioral1/memory/720-83-0x00000000025A0000-0x00000000025DE000-memory.dmp family_redline behavioral1/memory/720-81-0x00000000025A0000-0x00000000025DE000-memory.dmp family_redline behavioral1/memory/720-79-0x00000000025A0000-0x00000000025DE000-memory.dmp family_redline behavioral1/memory/720-77-0x00000000025A0000-0x00000000025DE000-memory.dmp family_redline behavioral1/memory/720-73-0x00000000025A0000-0x00000000025DE000-memory.dmp family_redline behavioral1/memory/720-71-0x00000000025A0000-0x00000000025DE000-memory.dmp family_redline behavioral1/memory/720-69-0x00000000025A0000-0x00000000025DE000-memory.dmp family_redline behavioral1/memory/720-67-0x00000000025A0000-0x00000000025DE000-memory.dmp family_redline behavioral1/memory/720-65-0x00000000025A0000-0x00000000025DE000-memory.dmp family_redline behavioral1/memory/720-62-0x00000000025A0000-0x00000000025DE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 2908 nice5280.exe 4400 b4644IR.exe 1944 c14GX67.exe 720 doGQo14.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c14GX67.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c14GX67.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b4644IR.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 69211bc04bbfceb8632f0492017f5539513fe3144530e43116a38172a85911c7N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nice5280.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4352 1944 WerFault.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c14GX67.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language doGQo14.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 69211bc04bbfceb8632f0492017f5539513fe3144530e43116a38172a85911c7N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nice5280.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4400 b4644IR.exe 4400 b4644IR.exe 1944 c14GX67.exe 1944 c14GX67.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4400 b4644IR.exe Token: SeDebugPrivilege 1944 c14GX67.exe Token: SeDebugPrivilege 720 doGQo14.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1968 wrote to memory of 2908 1968 69211bc04bbfceb8632f0492017f5539513fe3144530e43116a38172a85911c7N.exe 83 PID 1968 wrote to memory of 2908 1968 69211bc04bbfceb8632f0492017f5539513fe3144530e43116a38172a85911c7N.exe 83 PID 1968 wrote to memory of 2908 1968 69211bc04bbfceb8632f0492017f5539513fe3144530e43116a38172a85911c7N.exe 83 PID 2908 wrote to memory of 4400 2908 nice5280.exe 85 PID 2908 wrote to memory of 4400 2908 nice5280.exe 85 PID 2908 wrote to memory of 1944 2908 nice5280.exe 95 PID 2908 wrote to memory of 1944 2908 nice5280.exe 95 PID 2908 wrote to memory of 1944 2908 nice5280.exe 95 PID 1968 wrote to memory of 720 1968 69211bc04bbfceb8632f0492017f5539513fe3144530e43116a38172a85911c7N.exe 100 PID 1968 wrote to memory of 720 1968 69211bc04bbfceb8632f0492017f5539513fe3144530e43116a38172a85911c7N.exe 100 PID 1968 wrote to memory of 720 1968 69211bc04bbfceb8632f0492017f5539513fe3144530e43116a38172a85911c7N.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\69211bc04bbfceb8632f0492017f5539513fe3144530e43116a38172a85911c7N.exe"C:\Users\Admin\AppData\Local\Temp\69211bc04bbfceb8632f0492017f5539513fe3144530e43116a38172a85911c7N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nice5280.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nice5280.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b4644IR.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b4644IR.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4400
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c14GX67.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c14GX67.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1944 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1944 -s 10884⤵
- Program crash
PID:4352
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\doGQo14.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\doGQo14.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1944 -ip 19441⤵PID:4976
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
308KB
MD50738589e558063c99bb4f6c8ba3f0728
SHA14feb70bf06264e7cc59d4906449dd1d0bc494d55
SHA25606edea7f4ed5045825b7ec37298db0e3e73fc13c58688ff817f8e2d97342ddaf
SHA512b2403cb3859af3975b2176931c998c3a8ba4e6df7e1f5da8d3619ffc97422ff8489be53c632fde43ec31f0cb30945f0e24c460e4da1404bec54c49b13c8aac53
-
Filesize
334KB
MD51406a59f04747d2cf54280695ca1353b
SHA12e2c2520a2088886e1f8b94db1ff6dad144d972e
SHA256d62c63c29dd7fcb6464e9f2b91feb117b25e03a88ac058f6b6b44a31bc8d197f
SHA5129853a37428685e5ad6ce2500ff2bc9ff02f267af6dfe97db179525cf9f6275c7be3e4782b2384a69f8665cde7d49147b5e2cc5114d8d4e6d5b61516f1ff4ba06
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
251KB
MD510c1300db1f5414b855bd0e8a27d3698
SHA16b1b47e589f6aa7be627567b5595ac414f30b495
SHA256293333085ae37904a599690d6195302bc26d0cb51548509492cd3d7f43e5f14c
SHA512948bf9f91ea8b696f1bdfff2f434cd9bb568c2212ce94dce4665d93f12aca8a88c90835489f1b123a160ae91c6762af206afde7f3ce3e8d321bbd3bcbef19996