Analysis
-
max time kernel
113s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/11/2024, 06:11
Static task
static1
Behavioral task
behavioral1
Sample
a6bb969174936ccd1dc23a1675c3aad05fffebb72581e8c9dc914982a10627ccN.exe
Resource
win10v2004-20241007-en
General
-
Target
a6bb969174936ccd1dc23a1675c3aad05fffebb72581e8c9dc914982a10627ccN.exe
-
Size
719KB
-
MD5
f9612bc88624db84cd46aba9d9c2d540
-
SHA1
d382a2d12e46dad491046243c064de07f40ecc40
-
SHA256
a6bb969174936ccd1dc23a1675c3aad05fffebb72581e8c9dc914982a10627cc
-
SHA512
8e74b067a957a0573779fb48524008a35b10b0a6c84fa3532f36fb3163bc07308730a117880d7fc9f0db970b5e4caed3fbb3b42fc1425ec7ab273022cb499b4a
-
SSDEEP
12288:cMr/y90w6EsQ+VBuxX4RASWXwhCB0p0uf5rF1AQ0uZ4jIng95wO/2dU0weWUJ8l:by96EsfVBpRAJgF0uf5rF1E6gvwO/2d8
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
resource yara_rule behavioral1/files/0x000b000000023b96-12.dat healer behavioral1/memory/4332-15-0x00000000008F0000-0x00000000008FA000-memory.dmp healer behavioral1/memory/1568-22-0x0000000004A60000-0x0000000004A7A000-memory.dmp healer behavioral1/memory/1568-24-0x00000000077B0000-0x00000000077C8000-memory.dmp healer behavioral1/memory/1568-50-0x00000000077B0000-0x00000000077C2000-memory.dmp healer behavioral1/memory/1568-52-0x00000000077B0000-0x00000000077C2000-memory.dmp healer behavioral1/memory/1568-48-0x00000000077B0000-0x00000000077C2000-memory.dmp healer behavioral1/memory/1568-46-0x00000000077B0000-0x00000000077C2000-memory.dmp healer behavioral1/memory/1568-44-0x00000000077B0000-0x00000000077C2000-memory.dmp healer behavioral1/memory/1568-42-0x00000000077B0000-0x00000000077C2000-memory.dmp healer behavioral1/memory/1568-40-0x00000000077B0000-0x00000000077C2000-memory.dmp healer behavioral1/memory/1568-38-0x00000000077B0000-0x00000000077C2000-memory.dmp healer behavioral1/memory/1568-36-0x00000000077B0000-0x00000000077C2000-memory.dmp healer behavioral1/memory/1568-34-0x00000000077B0000-0x00000000077C2000-memory.dmp healer behavioral1/memory/1568-32-0x00000000077B0000-0x00000000077C2000-memory.dmp healer behavioral1/memory/1568-30-0x00000000077B0000-0x00000000077C2000-memory.dmp healer behavioral1/memory/1568-28-0x00000000077B0000-0x00000000077C2000-memory.dmp healer behavioral1/memory/1568-26-0x00000000077B0000-0x00000000077C2000-memory.dmp healer behavioral1/memory/1568-25-0x00000000077B0000-0x00000000077C2000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b8846XA.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b8846XA.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b8846XA.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b8846XA.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c59nd06.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c59nd06.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c59nd06.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b8846XA.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b8846XA.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c59nd06.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c59nd06.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c59nd06.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3388-60-0x0000000004B60000-0x0000000004BA6000-memory.dmp family_redline behavioral1/memory/3388-61-0x0000000007140000-0x0000000007184000-memory.dmp family_redline behavioral1/memory/3388-77-0x0000000007140000-0x000000000717E000-memory.dmp family_redline behavioral1/memory/3388-95-0x0000000007140000-0x000000000717E000-memory.dmp family_redline behavioral1/memory/3388-93-0x0000000007140000-0x000000000717E000-memory.dmp family_redline behavioral1/memory/3388-91-0x0000000007140000-0x000000000717E000-memory.dmp family_redline behavioral1/memory/3388-89-0x0000000007140000-0x000000000717E000-memory.dmp family_redline behavioral1/memory/3388-87-0x0000000007140000-0x000000000717E000-memory.dmp family_redline behavioral1/memory/3388-86-0x0000000007140000-0x000000000717E000-memory.dmp family_redline behavioral1/memory/3388-83-0x0000000007140000-0x000000000717E000-memory.dmp family_redline behavioral1/memory/3388-81-0x0000000007140000-0x000000000717E000-memory.dmp family_redline behavioral1/memory/3388-79-0x0000000007140000-0x000000000717E000-memory.dmp family_redline behavioral1/memory/3388-75-0x0000000007140000-0x000000000717E000-memory.dmp family_redline behavioral1/memory/3388-73-0x0000000007140000-0x000000000717E000-memory.dmp family_redline behavioral1/memory/3388-71-0x0000000007140000-0x000000000717E000-memory.dmp family_redline behavioral1/memory/3388-69-0x0000000007140000-0x000000000717E000-memory.dmp family_redline behavioral1/memory/3388-67-0x0000000007140000-0x000000000717E000-memory.dmp family_redline behavioral1/memory/3388-65-0x0000000007140000-0x000000000717E000-memory.dmp family_redline behavioral1/memory/3388-63-0x0000000007140000-0x000000000717E000-memory.dmp family_redline behavioral1/memory/3388-62-0x0000000007140000-0x000000000717E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 1912 tice9926.exe 4332 b8846XA.exe 1568 c59nd06.exe 3388 dywAq36.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b8846XA.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c59nd06.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c59nd06.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a6bb969174936ccd1dc23a1675c3aad05fffebb72581e8c9dc914982a10627ccN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice9926.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3496 1568 WerFault.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a6bb969174936ccd1dc23a1675c3aad05fffebb72581e8c9dc914982a10627ccN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice9926.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c59nd06.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dywAq36.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4332 b8846XA.exe 4332 b8846XA.exe 1568 c59nd06.exe 1568 c59nd06.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4332 b8846XA.exe Token: SeDebugPrivilege 1568 c59nd06.exe Token: SeDebugPrivilege 3388 dywAq36.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4060 wrote to memory of 1912 4060 a6bb969174936ccd1dc23a1675c3aad05fffebb72581e8c9dc914982a10627ccN.exe 84 PID 4060 wrote to memory of 1912 4060 a6bb969174936ccd1dc23a1675c3aad05fffebb72581e8c9dc914982a10627ccN.exe 84 PID 4060 wrote to memory of 1912 4060 a6bb969174936ccd1dc23a1675c3aad05fffebb72581e8c9dc914982a10627ccN.exe 84 PID 1912 wrote to memory of 4332 1912 tice9926.exe 86 PID 1912 wrote to memory of 4332 1912 tice9926.exe 86 PID 1912 wrote to memory of 1568 1912 tice9926.exe 92 PID 1912 wrote to memory of 1568 1912 tice9926.exe 92 PID 1912 wrote to memory of 1568 1912 tice9926.exe 92 PID 4060 wrote to memory of 3388 4060 a6bb969174936ccd1dc23a1675c3aad05fffebb72581e8c9dc914982a10627ccN.exe 96 PID 4060 wrote to memory of 3388 4060 a6bb969174936ccd1dc23a1675c3aad05fffebb72581e8c9dc914982a10627ccN.exe 96 PID 4060 wrote to memory of 3388 4060 a6bb969174936ccd1dc23a1675c3aad05fffebb72581e8c9dc914982a10627ccN.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6bb969174936ccd1dc23a1675c3aad05fffebb72581e8c9dc914982a10627ccN.exe"C:\Users\Admin\AppData\Local\Temp\a6bb969174936ccd1dc23a1675c3aad05fffebb72581e8c9dc914982a10627ccN.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice9926.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice9926.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b8846XA.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b8846XA.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4332
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c59nd06.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c59nd06.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1568 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 10764⤵
- Program crash
PID:3496
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dywAq36.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dywAq36.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1568 -ip 15681⤵PID:2592
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
399KB
MD5c2d29fdbc0871e20a9d15537175a92c4
SHA17f9f208b4b42a4667aa633b558dd0fa3f15f93b5
SHA256236087a8f21827bdb8713aac668f32cf480eb04bd1903c41faef7fe0da18c791
SHA5124cccb4df1f9167302a60d6cb5b225c5762da14529f314463775061cbdb0b356960c872e6757ac8e85c3e756cf875fbd0d34c996f87344d46b3e378bc92bc805c
-
Filesize
360KB
MD516ff03b23ac56e23440d4fabf6ea8dab
SHA1ac013262d588f2a6d216e62b193811c90562752a
SHA256d7d022bef9aebce36caf3595c578863a7eaf515c2c436354a2436a22b0f8dc70
SHA51226f38ae2ffbc5d4d215f92a0dce53b93a5a4c052380b3a2832b051a07c862383c9bbae5d2fd58217a695b9c731844733c2d54e7a7baf2c64e51d9a1505b6a2c7
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
342KB
MD5db1faff883102cc4aac4125c13bc376e
SHA148afa1211ab5e030b8a933015256c6994ae11185
SHA25647d45e34ba881497475e50a3966437fe01b68e184f40957afcf9a50e93a46b8f
SHA512c10b0da80769edd38be63f3823fbadb3a94799f23d749975333f39cf73a70316a7b77df9e1e9c98a9580a367c0bced6d3b5adfe38f457a0bca2cc1d34b99069b