Analysis
-
max time kernel
113s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-11-2024 00:01
Static task
static1
Behavioral task
behavioral1
Sample
805455ed1e7559795d991a62a6dadea1d366bef8e165bb6cabb27cae5688dd89N.exe
Resource
win10v2004-20241007-en
General
-
Target
805455ed1e7559795d991a62a6dadea1d366bef8e165bb6cabb27cae5688dd89N.exe
-
Size
716KB
-
MD5
91ecf1b3791502db650db3c8705e8490
-
SHA1
f473ae09131c764565c3c0ff8f68024fd4bcdeeb
-
SHA256
805455ed1e7559795d991a62a6dadea1d366bef8e165bb6cabb27cae5688dd89
-
SHA512
81180efcae14b64cb0f37fc25035874f79775ea5ab7c42e697bb0b540a3d3ce5a00bfdbfd93cc304c0515f7f1aba040e618a4a00af51928384cb23e1cfd7da39
-
SSDEEP
12288:YMroy90OCieKWuh6b7+arLRD0HAA1rdVTkHHNyluhyWHs3FxJOllK5UFiNoWwPjI:wyJCRig7ZRwHfTEHNyINKSvtsN
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
Processes:
resource yara_rule behavioral1/files/0x0008000000023cb8-12.dat healer behavioral1/memory/3620-15-0x0000000000A60000-0x0000000000A6A000-memory.dmp healer behavioral1/memory/1640-22-0x0000000004AD0000-0x0000000004AEA000-memory.dmp healer behavioral1/memory/1640-24-0x00000000070A0000-0x00000000070B8000-memory.dmp healer behavioral1/memory/1640-25-0x00000000070A0000-0x00000000070B2000-memory.dmp healer behavioral1/memory/1640-32-0x00000000070A0000-0x00000000070B2000-memory.dmp healer behavioral1/memory/1640-52-0x00000000070A0000-0x00000000070B2000-memory.dmp healer behavioral1/memory/1640-50-0x00000000070A0000-0x00000000070B2000-memory.dmp healer behavioral1/memory/1640-48-0x00000000070A0000-0x00000000070B2000-memory.dmp healer behavioral1/memory/1640-46-0x00000000070A0000-0x00000000070B2000-memory.dmp healer behavioral1/memory/1640-44-0x00000000070A0000-0x00000000070B2000-memory.dmp healer behavioral1/memory/1640-42-0x00000000070A0000-0x00000000070B2000-memory.dmp healer behavioral1/memory/1640-40-0x00000000070A0000-0x00000000070B2000-memory.dmp healer behavioral1/memory/1640-38-0x00000000070A0000-0x00000000070B2000-memory.dmp healer behavioral1/memory/1640-36-0x00000000070A0000-0x00000000070B2000-memory.dmp healer behavioral1/memory/1640-34-0x00000000070A0000-0x00000000070B2000-memory.dmp healer behavioral1/memory/1640-30-0x00000000070A0000-0x00000000070B2000-memory.dmp healer behavioral1/memory/1640-28-0x00000000070A0000-0x00000000070B2000-memory.dmp healer behavioral1/memory/1640-26-0x00000000070A0000-0x00000000070B2000-memory.dmp healer -
Healer family
-
Processes:
b0305rm.exec85zJ23.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b0305rm.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c85zJ23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c85zJ23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c85zJ23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b0305rm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b0305rm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b0305rm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c85zJ23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c85zJ23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c85zJ23.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b0305rm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b0305rm.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/1924-60-0x0000000004B90000-0x0000000004BD6000-memory.dmp family_redline behavioral1/memory/1924-61-0x0000000007110000-0x0000000007154000-memory.dmp family_redline behavioral1/memory/1924-75-0x0000000007110000-0x000000000714E000-memory.dmp family_redline behavioral1/memory/1924-95-0x0000000007110000-0x000000000714E000-memory.dmp family_redline behavioral1/memory/1924-93-0x0000000007110000-0x000000000714E000-memory.dmp family_redline behavioral1/memory/1924-91-0x0000000007110000-0x000000000714E000-memory.dmp family_redline behavioral1/memory/1924-89-0x0000000007110000-0x000000000714E000-memory.dmp family_redline behavioral1/memory/1924-87-0x0000000007110000-0x000000000714E000-memory.dmp family_redline behavioral1/memory/1924-85-0x0000000007110000-0x000000000714E000-memory.dmp family_redline behavioral1/memory/1924-83-0x0000000007110000-0x000000000714E000-memory.dmp family_redline behavioral1/memory/1924-81-0x0000000007110000-0x000000000714E000-memory.dmp family_redline behavioral1/memory/1924-79-0x0000000007110000-0x000000000714E000-memory.dmp family_redline behavioral1/memory/1924-77-0x0000000007110000-0x000000000714E000-memory.dmp family_redline behavioral1/memory/1924-73-0x0000000007110000-0x000000000714E000-memory.dmp family_redline behavioral1/memory/1924-71-0x0000000007110000-0x000000000714E000-memory.dmp family_redline behavioral1/memory/1924-70-0x0000000007110000-0x000000000714E000-memory.dmp family_redline behavioral1/memory/1924-68-0x0000000007110000-0x000000000714E000-memory.dmp family_redline behavioral1/memory/1924-65-0x0000000007110000-0x000000000714E000-memory.dmp family_redline behavioral1/memory/1924-63-0x0000000007110000-0x000000000714E000-memory.dmp family_redline behavioral1/memory/1924-62-0x0000000007110000-0x000000000714E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
Processes:
tice4380.exeb0305rm.exec85zJ23.exedMPfL93.exepid Process 2092 tice4380.exe 3620 b0305rm.exe 1640 c85zJ23.exe 1924 dMPfL93.exe -
Processes:
c85zJ23.exeb0305rm.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c85zJ23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c85zJ23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b0305rm.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
805455ed1e7559795d991a62a6dadea1d366bef8e165bb6cabb27cae5688dd89N.exetice4380.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 805455ed1e7559795d991a62a6dadea1d366bef8e165bb6cabb27cae5688dd89N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice4380.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 812 1640 WerFault.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
805455ed1e7559795d991a62a6dadea1d366bef8e165bb6cabb27cae5688dd89N.exetice4380.exec85zJ23.exedMPfL93.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 805455ed1e7559795d991a62a6dadea1d366bef8e165bb6cabb27cae5688dd89N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice4380.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c85zJ23.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dMPfL93.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
b0305rm.exec85zJ23.exepid Process 3620 b0305rm.exe 3620 b0305rm.exe 1640 c85zJ23.exe 1640 c85zJ23.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
b0305rm.exec85zJ23.exedMPfL93.exedescription pid Process Token: SeDebugPrivilege 3620 b0305rm.exe Token: SeDebugPrivilege 1640 c85zJ23.exe Token: SeDebugPrivilege 1924 dMPfL93.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
805455ed1e7559795d991a62a6dadea1d366bef8e165bb6cabb27cae5688dd89N.exetice4380.exedescription pid Process procid_target PID 4492 wrote to memory of 2092 4492 805455ed1e7559795d991a62a6dadea1d366bef8e165bb6cabb27cae5688dd89N.exe 83 PID 4492 wrote to memory of 2092 4492 805455ed1e7559795d991a62a6dadea1d366bef8e165bb6cabb27cae5688dd89N.exe 83 PID 4492 wrote to memory of 2092 4492 805455ed1e7559795d991a62a6dadea1d366bef8e165bb6cabb27cae5688dd89N.exe 83 PID 2092 wrote to memory of 3620 2092 tice4380.exe 84 PID 2092 wrote to memory of 3620 2092 tice4380.exe 84 PID 2092 wrote to memory of 1640 2092 tice4380.exe 93 PID 2092 wrote to memory of 1640 2092 tice4380.exe 93 PID 2092 wrote to memory of 1640 2092 tice4380.exe 93 PID 4492 wrote to memory of 1924 4492 805455ed1e7559795d991a62a6dadea1d366bef8e165bb6cabb27cae5688dd89N.exe 98 PID 4492 wrote to memory of 1924 4492 805455ed1e7559795d991a62a6dadea1d366bef8e165bb6cabb27cae5688dd89N.exe 98 PID 4492 wrote to memory of 1924 4492 805455ed1e7559795d991a62a6dadea1d366bef8e165bb6cabb27cae5688dd89N.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\805455ed1e7559795d991a62a6dadea1d366bef8e165bb6cabb27cae5688dd89N.exe"C:\Users\Admin\AppData\Local\Temp\805455ed1e7559795d991a62a6dadea1d366bef8e165bb6cabb27cae5688dd89N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice4380.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice4380.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b0305rm.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b0305rm.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3620
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c85zJ23.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c85zJ23.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1640 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1640 -s 10804⤵
- Program crash
PID:812
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dMPfL93.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dMPfL93.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1640 -ip 16401⤵PID:1420
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
399KB
MD58f316b365643c230c8eb49a178f9b131
SHA1d7650f717b9e29a6307d7c54c457f42e464c9aec
SHA25611ce63d1194c6c0d62288ecd39ddb8bd0b2e8ccbc056e75e610173c87866da1f
SHA512d5d183483a868ad7852977d1b2daaedf64c6be31ddfff3c8ac5198974e0a4c8997eea5bb3340984b6aa014924680eb852af2aa7461082d91c5b53a622d68cd2b
-
Filesize
358KB
MD5b6a8bb49f5f1f481f293d6aeb6bdb094
SHA16f8717631aee6572ecb5d5b249e91fd13c61fe62
SHA256e79ddacb83f325abd487f49b09638c8eb10cfa9c0feaea1b277d62e063dfe910
SHA512537a0ca7bba28a50ba794fac6e151b3c3a122b9847f5091cf12ab23e235a21213d1c257c20281df72e54f8242a14d87a21eecf705c686844a7884f8bfd60fe2d
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
342KB
MD55f6c7ea6bf246f2baf90b88911af1878
SHA18ff6d8c9c473b3fbf20acd4ce826325b4de5eedd
SHA25612a14763d1620a985774b9de1f15d1640b1e5d71198421337ee67c8409c166bc
SHA5121f610608412f0f46f4a70b7b2c4d382a4e4f880145b27c071d90a5a913582183dc83e3a9b5ab52740ae084e121026ed1b318f415a0a6e8e58521c73238f5fdbd