Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-11-2024 06:17
Static task
static1
Behavioral task
behavioral1
Sample
a6bb969174936ccd1dc23a1675c3aad05fffebb72581e8c9dc914982a10627ccN.exe
Resource
win10v2004-20241007-en
General
-
Target
a6bb969174936ccd1dc23a1675c3aad05fffebb72581e8c9dc914982a10627ccN.exe
-
Size
719KB
-
MD5
f9612bc88624db84cd46aba9d9c2d540
-
SHA1
d382a2d12e46dad491046243c064de07f40ecc40
-
SHA256
a6bb969174936ccd1dc23a1675c3aad05fffebb72581e8c9dc914982a10627cc
-
SHA512
8e74b067a957a0573779fb48524008a35b10b0a6c84fa3532f36fb3163bc07308730a117880d7fc9f0db970b5e4caed3fbb3b42fc1425ec7ab273022cb499b4a
-
SSDEEP
12288:cMr/y90w6EsQ+VBuxX4RASWXwhCB0p0uf5rF1AQ0uZ4jIng95wO/2dU0weWUJ8l:by96EsfVBpRAJgF0uf5rF1E6gvwO/2d8
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
resource yara_rule behavioral1/files/0x000b000000023b94-12.dat healer behavioral1/memory/1984-15-0x00000000000A0000-0x00000000000AA000-memory.dmp healer behavioral1/memory/1540-22-0x0000000004850000-0x000000000486A000-memory.dmp healer behavioral1/memory/1540-24-0x00000000071F0000-0x0000000007208000-memory.dmp healer behavioral1/memory/1540-25-0x00000000071F0000-0x0000000007202000-memory.dmp healer behavioral1/memory/1540-32-0x00000000071F0000-0x0000000007202000-memory.dmp healer behavioral1/memory/1540-52-0x00000000071F0000-0x0000000007202000-memory.dmp healer behavioral1/memory/1540-50-0x00000000071F0000-0x0000000007202000-memory.dmp healer behavioral1/memory/1540-46-0x00000000071F0000-0x0000000007202000-memory.dmp healer behavioral1/memory/1540-44-0x00000000071F0000-0x0000000007202000-memory.dmp healer behavioral1/memory/1540-43-0x00000000071F0000-0x0000000007202000-memory.dmp healer behavioral1/memory/1540-41-0x00000000071F0000-0x0000000007202000-memory.dmp healer behavioral1/memory/1540-38-0x00000000071F0000-0x0000000007202000-memory.dmp healer behavioral1/memory/1540-36-0x00000000071F0000-0x0000000007202000-memory.dmp healer behavioral1/memory/1540-34-0x00000000071F0000-0x0000000007202000-memory.dmp healer behavioral1/memory/1540-30-0x00000000071F0000-0x0000000007202000-memory.dmp healer behavioral1/memory/1540-28-0x00000000071F0000-0x0000000007202000-memory.dmp healer behavioral1/memory/1540-26-0x00000000071F0000-0x0000000007202000-memory.dmp healer behavioral1/memory/1540-48-0x00000000071F0000-0x0000000007202000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c59nd06.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b8846XA.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b8846XA.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b8846XA.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c59nd06.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c59nd06.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c59nd06.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c59nd06.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b8846XA.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b8846XA.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b8846XA.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c59nd06.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4232-60-0x0000000004910000-0x0000000004956000-memory.dmp family_redline behavioral1/memory/4232-61-0x0000000004DD0000-0x0000000004E14000-memory.dmp family_redline behavioral1/memory/4232-65-0x0000000004DD0000-0x0000000004E0E000-memory.dmp family_redline behavioral1/memory/4232-77-0x0000000004DD0000-0x0000000004E0E000-memory.dmp family_redline behavioral1/memory/4232-95-0x0000000004DD0000-0x0000000004E0E000-memory.dmp family_redline behavioral1/memory/4232-91-0x0000000004DD0000-0x0000000004E0E000-memory.dmp family_redline behavioral1/memory/4232-89-0x0000000004DD0000-0x0000000004E0E000-memory.dmp family_redline behavioral1/memory/4232-87-0x0000000004DD0000-0x0000000004E0E000-memory.dmp family_redline behavioral1/memory/4232-85-0x0000000004DD0000-0x0000000004E0E000-memory.dmp family_redline behavioral1/memory/4232-83-0x0000000004DD0000-0x0000000004E0E000-memory.dmp family_redline behavioral1/memory/4232-81-0x0000000004DD0000-0x0000000004E0E000-memory.dmp family_redline behavioral1/memory/4232-79-0x0000000004DD0000-0x0000000004E0E000-memory.dmp family_redline behavioral1/memory/4232-75-0x0000000004DD0000-0x0000000004E0E000-memory.dmp family_redline behavioral1/memory/4232-73-0x0000000004DD0000-0x0000000004E0E000-memory.dmp family_redline behavioral1/memory/4232-71-0x0000000004DD0000-0x0000000004E0E000-memory.dmp family_redline behavioral1/memory/4232-69-0x0000000004DD0000-0x0000000004E0E000-memory.dmp family_redline behavioral1/memory/4232-67-0x0000000004DD0000-0x0000000004E0E000-memory.dmp family_redline behavioral1/memory/4232-93-0x0000000004DD0000-0x0000000004E0E000-memory.dmp family_redline behavioral1/memory/4232-63-0x0000000004DD0000-0x0000000004E0E000-memory.dmp family_redline behavioral1/memory/4232-62-0x0000000004DD0000-0x0000000004E0E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 4472 tice9926.exe 1984 b8846XA.exe 1540 c59nd06.exe 4232 dywAq36.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c59nd06.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c59nd06.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b8846XA.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a6bb969174936ccd1dc23a1675c3aad05fffebb72581e8c9dc914982a10627ccN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice9926.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1520 sc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4884 1540 WerFault.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice9926.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c59nd06.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dywAq36.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a6bb969174936ccd1dc23a1675c3aad05fffebb72581e8c9dc914982a10627ccN.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1984 b8846XA.exe 1984 b8846XA.exe 1540 c59nd06.exe 1540 c59nd06.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1984 b8846XA.exe Token: SeDebugPrivilege 1540 c59nd06.exe Token: SeDebugPrivilege 4232 dywAq36.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 5036 wrote to memory of 4472 5036 a6bb969174936ccd1dc23a1675c3aad05fffebb72581e8c9dc914982a10627ccN.exe 84 PID 5036 wrote to memory of 4472 5036 a6bb969174936ccd1dc23a1675c3aad05fffebb72581e8c9dc914982a10627ccN.exe 84 PID 5036 wrote to memory of 4472 5036 a6bb969174936ccd1dc23a1675c3aad05fffebb72581e8c9dc914982a10627ccN.exe 84 PID 4472 wrote to memory of 1984 4472 tice9926.exe 85 PID 4472 wrote to memory of 1984 4472 tice9926.exe 85 PID 4472 wrote to memory of 1540 4472 tice9926.exe 95 PID 4472 wrote to memory of 1540 4472 tice9926.exe 95 PID 4472 wrote to memory of 1540 4472 tice9926.exe 95 PID 5036 wrote to memory of 4232 5036 a6bb969174936ccd1dc23a1675c3aad05fffebb72581e8c9dc914982a10627ccN.exe 100 PID 5036 wrote to memory of 4232 5036 a6bb969174936ccd1dc23a1675c3aad05fffebb72581e8c9dc914982a10627ccN.exe 100 PID 5036 wrote to memory of 4232 5036 a6bb969174936ccd1dc23a1675c3aad05fffebb72581e8c9dc914982a10627ccN.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6bb969174936ccd1dc23a1675c3aad05fffebb72581e8c9dc914982a10627ccN.exe"C:\Users\Admin\AppData\Local\Temp\a6bb969174936ccd1dc23a1675c3aad05fffebb72581e8c9dc914982a10627ccN.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice9926.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice9926.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b8846XA.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b8846XA.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1984
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c59nd06.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c59nd06.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1540 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1540 -s 10804⤵
- Program crash
PID:4884
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dywAq36.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dywAq36.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1540 -ip 15401⤵PID:3836
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:1520
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
399KB
MD5c2d29fdbc0871e20a9d15537175a92c4
SHA17f9f208b4b42a4667aa633b558dd0fa3f15f93b5
SHA256236087a8f21827bdb8713aac668f32cf480eb04bd1903c41faef7fe0da18c791
SHA5124cccb4df1f9167302a60d6cb5b225c5762da14529f314463775061cbdb0b356960c872e6757ac8e85c3e756cf875fbd0d34c996f87344d46b3e378bc92bc805c
-
Filesize
360KB
MD516ff03b23ac56e23440d4fabf6ea8dab
SHA1ac013262d588f2a6d216e62b193811c90562752a
SHA256d7d022bef9aebce36caf3595c578863a7eaf515c2c436354a2436a22b0f8dc70
SHA51226f38ae2ffbc5d4d215f92a0dce53b93a5a4c052380b3a2832b051a07c862383c9bbae5d2fd58217a695b9c731844733c2d54e7a7baf2c64e51d9a1505b6a2c7
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
342KB
MD5db1faff883102cc4aac4125c13bc376e
SHA148afa1211ab5e030b8a933015256c6994ae11185
SHA25647d45e34ba881497475e50a3966437fe01b68e184f40957afcf9a50e93a46b8f
SHA512c10b0da80769edd38be63f3823fbadb3a94799f23d749975333f39cf73a70316a7b77df9e1e9c98a9580a367c0bced6d3b5adfe38f457a0bca2cc1d34b99069b