Analysis
-
max time kernel
112s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-11-2024 04:58
Static task
static1
Behavioral task
behavioral1
Sample
23547efe8bffd9f0d9b1baab4d9fa4f9c615be1f3b3223f45fa1cbfa6e997335.exe
Resource
win10v2004-20241007-en
General
-
Target
23547efe8bffd9f0d9b1baab4d9fa4f9c615be1f3b3223f45fa1cbfa6e997335.exe
-
Size
644KB
-
MD5
7166dc838dc38ed47eecd53c920ad9e6
-
SHA1
4435c3ab3743604cb21576ae062f6f8955b09e09
-
SHA256
23547efe8bffd9f0d9b1baab4d9fa4f9c615be1f3b3223f45fa1cbfa6e997335
-
SHA512
273b1ab2373bb93442e83013118b0a6ece84b248fb4cff964aabd6488cc0d3689689e8a1bba0472ed444930d5e225fd8fbe4407d69c0aab7779d2c376b07c310
-
SSDEEP
12288:SMrBy90NNQnu+qHggW6Wl6ESPamUK/ZUpdvlLOgUTMEEO4l:ry1nufTWO6mUK/ZmLOdEO4l
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
Processes:
resource yara_rule behavioral1/files/0x0008000000023cb8-12.dat healer behavioral1/memory/628-15-0x0000000000910000-0x000000000091A000-memory.dmp healer behavioral1/memory/5104-21-0x0000000002060000-0x000000000207A000-memory.dmp healer behavioral1/memory/5104-23-0x0000000002500000-0x0000000002518000-memory.dmp healer behavioral1/memory/5104-24-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/5104-31-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/5104-48-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/5104-51-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/5104-49-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/5104-46-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/5104-43-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/5104-41-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/5104-39-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/5104-27-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/5104-37-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/5104-35-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/5104-33-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/5104-29-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/5104-25-0x0000000002500000-0x0000000002512000-memory.dmp healer -
Healer family
-
Processes:
b2564Sp.exec84Yb20.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b2564Sp.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c84Yb20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c84Yb20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c84Yb20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b2564Sp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b2564Sp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b2564Sp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c84Yb20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c84Yb20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c84Yb20.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b2564Sp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b2564Sp.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/2936-59-0x00000000025C0000-0x0000000002606000-memory.dmp family_redline behavioral1/memory/2936-60-0x0000000004AE0000-0x0000000004B24000-memory.dmp family_redline behavioral1/memory/2936-78-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2936-80-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2936-94-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2936-92-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2936-90-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2936-88-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2936-84-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2936-82-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2936-76-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2936-74-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2936-72-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2936-70-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2936-68-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2936-66-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2936-86-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2936-64-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2936-62-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2936-61-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
Processes:
tice1909.exeb2564Sp.exec84Yb20.exedMxPs63.exepid Process 1168 tice1909.exe 628 b2564Sp.exe 5104 c84Yb20.exe 2936 dMxPs63.exe -
Processes:
b2564Sp.exec84Yb20.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b2564Sp.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c84Yb20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c84Yb20.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
23547efe8bffd9f0d9b1baab4d9fa4f9c615be1f3b3223f45fa1cbfa6e997335.exetice1909.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 23547efe8bffd9f0d9b1baab4d9fa4f9c615be1f3b3223f45fa1cbfa6e997335.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice1909.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 1012 5104 WerFault.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
23547efe8bffd9f0d9b1baab4d9fa4f9c615be1f3b3223f45fa1cbfa6e997335.exetice1909.exec84Yb20.exedMxPs63.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 23547efe8bffd9f0d9b1baab4d9fa4f9c615be1f3b3223f45fa1cbfa6e997335.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice1909.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c84Yb20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dMxPs63.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
b2564Sp.exec84Yb20.exepid Process 628 b2564Sp.exe 628 b2564Sp.exe 5104 c84Yb20.exe 5104 c84Yb20.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
b2564Sp.exec84Yb20.exedMxPs63.exedescription pid Process Token: SeDebugPrivilege 628 b2564Sp.exe Token: SeDebugPrivilege 5104 c84Yb20.exe Token: SeDebugPrivilege 2936 dMxPs63.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
23547efe8bffd9f0d9b1baab4d9fa4f9c615be1f3b3223f45fa1cbfa6e997335.exetice1909.exedescription pid Process procid_target PID 1384 wrote to memory of 1168 1384 23547efe8bffd9f0d9b1baab4d9fa4f9c615be1f3b3223f45fa1cbfa6e997335.exe 83 PID 1384 wrote to memory of 1168 1384 23547efe8bffd9f0d9b1baab4d9fa4f9c615be1f3b3223f45fa1cbfa6e997335.exe 83 PID 1384 wrote to memory of 1168 1384 23547efe8bffd9f0d9b1baab4d9fa4f9c615be1f3b3223f45fa1cbfa6e997335.exe 83 PID 1168 wrote to memory of 628 1168 tice1909.exe 84 PID 1168 wrote to memory of 628 1168 tice1909.exe 84 PID 1168 wrote to memory of 5104 1168 tice1909.exe 96 PID 1168 wrote to memory of 5104 1168 tice1909.exe 96 PID 1168 wrote to memory of 5104 1168 tice1909.exe 96 PID 1384 wrote to memory of 2936 1384 23547efe8bffd9f0d9b1baab4d9fa4f9c615be1f3b3223f45fa1cbfa6e997335.exe 101 PID 1384 wrote to memory of 2936 1384 23547efe8bffd9f0d9b1baab4d9fa4f9c615be1f3b3223f45fa1cbfa6e997335.exe 101 PID 1384 wrote to memory of 2936 1384 23547efe8bffd9f0d9b1baab4d9fa4f9c615be1f3b3223f45fa1cbfa6e997335.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\23547efe8bffd9f0d9b1baab4d9fa4f9c615be1f3b3223f45fa1cbfa6e997335.exe"C:\Users\Admin\AppData\Local\Temp\23547efe8bffd9f0d9b1baab4d9fa4f9c615be1f3b3223f45fa1cbfa6e997335.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice1909.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice1909.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b2564Sp.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b2564Sp.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:628
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c84Yb20.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c84Yb20.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5104 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5104 -s 10804⤵
- Program crash
PID:1012
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dMxPs63.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dMxPs63.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5104 -ip 51041⤵PID:4152
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
296KB
MD55d0933bbed890a1fdf4d8a88b5b893a4
SHA14a356bbb2e79443a166dcb32487de0b5dc4bdf16
SHA256c4d558f0c35836f09ddf522ce0e7d435d1ab0695cfe779fbc2157e2353c63d4c
SHA5127da5d6d7af47765e88a9b6572573ae992772943e988f7d22ef77705b19384b96d76e56cb0a90c7fc45395958955c83c7a2fc786fb76bab3b0d69501b904177c5
-
Filesize
322KB
MD5769274192aaf92d0912dc336ba969eec
SHA1eee5f2c3a64270c377ca1d6ad5ba6a4502aafe50
SHA2568bb8034504b3c95357373c660447d32c6e583b4fe64b4061ef07150687140938
SHA512f6d2924eb3a6a6e540649bbb0a0099166d06e899b5feb205760c5a2faf653eb60b35095791be8058c585d04ec1931c827b5459eccaa6d7b2a1bc2b7379dbcbd6
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
239KB
MD5172f0abd0d0f0a38325054107860e303
SHA1be0555b6e5ecf512c8a14cefca5c53d50725304b
SHA25665f45a919b839db7b0f16c26ee43f6ea29798c2afe4e16935f9faf5dff50cb49
SHA51203baec5c6f0f3d55d6c14d1af7f62cb0b8f63e57b877fc62d33781ef06e1ea35b4c794f9d5c5fb3e6cc6879d9b9f40d125e5effc4920a8e7b334864fdfaf639d