Analysis
-
max time kernel
112s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-11-2024 15:14
Static task
static1
Behavioral task
behavioral1
Sample
2aa585b8467fb60bbf85d150d1e7f3f3a4e32e56529fa95c4624c68aef102570.exe
Resource
win10v2004-20241007-en
General
-
Target
2aa585b8467fb60bbf85d150d1e7f3f3a4e32e56529fa95c4624c68aef102570.exe
-
Size
787KB
-
MD5
33d0e701e05d789f2f9c196f70aba06d
-
SHA1
a28185e77ad8b5a859c2e5b6fd1df79fb1e49bd3
-
SHA256
2aa585b8467fb60bbf85d150d1e7f3f3a4e32e56529fa95c4624c68aef102570
-
SHA512
18c9a361bbaabf85f649203b300760daa1c3f830811f251dff6a2c6d71677f54aa91e31af95728536f2149778b0bef7cd2fd88d50d2a4eb53a74f53993871b8b
-
SSDEEP
24576:NyzSMEvTgvipuOJWFr1NOXSOP/YIQqUl0aeT:o3oduOUZNOCyYIlUvA
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8799SO.exe healer behavioral1/memory/1124-21-0x00000000003A0000-0x00000000003AA000-memory.dmp healer behavioral1/memory/4952-28-0x0000000002440000-0x000000000245A000-memory.dmp healer behavioral1/memory/4952-30-0x0000000004A60000-0x0000000004A78000-memory.dmp healer behavioral1/memory/4952-31-0x0000000004A60000-0x0000000004A72000-memory.dmp healer behavioral1/memory/4952-38-0x0000000004A60000-0x0000000004A72000-memory.dmp healer behavioral1/memory/4952-58-0x0000000004A60000-0x0000000004A72000-memory.dmp healer behavioral1/memory/4952-56-0x0000000004A60000-0x0000000004A72000-memory.dmp healer behavioral1/memory/4952-54-0x0000000004A60000-0x0000000004A72000-memory.dmp healer behavioral1/memory/4952-52-0x0000000004A60000-0x0000000004A72000-memory.dmp healer behavioral1/memory/4952-50-0x0000000004A60000-0x0000000004A72000-memory.dmp healer behavioral1/memory/4952-48-0x0000000004A60000-0x0000000004A72000-memory.dmp healer behavioral1/memory/4952-46-0x0000000004A60000-0x0000000004A72000-memory.dmp healer behavioral1/memory/4952-44-0x0000000004A60000-0x0000000004A72000-memory.dmp healer behavioral1/memory/4952-42-0x0000000004A60000-0x0000000004A72000-memory.dmp healer behavioral1/memory/4952-40-0x0000000004A60000-0x0000000004A72000-memory.dmp healer behavioral1/memory/4952-36-0x0000000004A60000-0x0000000004A72000-memory.dmp healer behavioral1/memory/4952-34-0x0000000004A60000-0x0000000004A72000-memory.dmp healer behavioral1/memory/4952-32-0x0000000004A60000-0x0000000004A72000-memory.dmp healer -
Healer family
-
Processes:
b8799SO.exec43cb40.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b8799SO.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b8799SO.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c43cb40.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c43cb40.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c43cb40.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b8799SO.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b8799SO.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b8799SO.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c43cb40.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c43cb40.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c43cb40.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b8799SO.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4472-66-0x00000000025C0000-0x0000000002606000-memory.dmp family_redline behavioral1/memory/4472-67-0x0000000004AD0000-0x0000000004B14000-memory.dmp family_redline behavioral1/memory/4472-93-0x0000000004AD0000-0x0000000004B0E000-memory.dmp family_redline behavioral1/memory/4472-101-0x0000000004AD0000-0x0000000004B0E000-memory.dmp family_redline behavioral1/memory/4472-99-0x0000000004AD0000-0x0000000004B0E000-memory.dmp family_redline behavioral1/memory/4472-97-0x0000000004AD0000-0x0000000004B0E000-memory.dmp family_redline behavioral1/memory/4472-95-0x0000000004AD0000-0x0000000004B0E000-memory.dmp family_redline behavioral1/memory/4472-91-0x0000000004AD0000-0x0000000004B0E000-memory.dmp family_redline behavioral1/memory/4472-89-0x0000000004AD0000-0x0000000004B0E000-memory.dmp family_redline behavioral1/memory/4472-87-0x0000000004AD0000-0x0000000004B0E000-memory.dmp family_redline behavioral1/memory/4472-85-0x0000000004AD0000-0x0000000004B0E000-memory.dmp family_redline behavioral1/memory/4472-83-0x0000000004AD0000-0x0000000004B0E000-memory.dmp family_redline behavioral1/memory/4472-81-0x0000000004AD0000-0x0000000004B0E000-memory.dmp family_redline behavioral1/memory/4472-79-0x0000000004AD0000-0x0000000004B0E000-memory.dmp family_redline behavioral1/memory/4472-77-0x0000000004AD0000-0x0000000004B0E000-memory.dmp family_redline behavioral1/memory/4472-75-0x0000000004AD0000-0x0000000004B0E000-memory.dmp family_redline behavioral1/memory/4472-73-0x0000000004AD0000-0x0000000004B0E000-memory.dmp family_redline behavioral1/memory/4472-71-0x0000000004AD0000-0x0000000004B0E000-memory.dmp family_redline behavioral1/memory/4472-69-0x0000000004AD0000-0x0000000004B0E000-memory.dmp family_redline behavioral1/memory/4472-68-0x0000000004AD0000-0x0000000004B0E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 5 IoCs
Processes:
tice7397.exetice0715.exeb8799SO.exec43cb40.exedgEoB84.exepid process 4936 tice7397.exe 3572 tice0715.exe 1124 b8799SO.exe 4952 c43cb40.exe 4472 dgEoB84.exe -
Processes:
b8799SO.exec43cb40.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b8799SO.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c43cb40.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c43cb40.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
2aa585b8467fb60bbf85d150d1e7f3f3a4e32e56529fa95c4624c68aef102570.exetice7397.exetice0715.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2aa585b8467fb60bbf85d150d1e7f3f3a4e32e56529fa95c4624c68aef102570.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice7397.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice0715.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3020 4952 WerFault.exe c43cb40.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
c43cb40.exedgEoB84.exe2aa585b8467fb60bbf85d150d1e7f3f3a4e32e56529fa95c4624c68aef102570.exetice7397.exetice0715.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c43cb40.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dgEoB84.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2aa585b8467fb60bbf85d150d1e7f3f3a4e32e56529fa95c4624c68aef102570.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice7397.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice0715.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
b8799SO.exec43cb40.exepid process 1124 b8799SO.exe 1124 b8799SO.exe 4952 c43cb40.exe 4952 c43cb40.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
b8799SO.exec43cb40.exedgEoB84.exedescription pid process Token: SeDebugPrivilege 1124 b8799SO.exe Token: SeDebugPrivilege 4952 c43cb40.exe Token: SeDebugPrivilege 4472 dgEoB84.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
2aa585b8467fb60bbf85d150d1e7f3f3a4e32e56529fa95c4624c68aef102570.exetice7397.exetice0715.exedescription pid process target process PID 1524 wrote to memory of 4936 1524 2aa585b8467fb60bbf85d150d1e7f3f3a4e32e56529fa95c4624c68aef102570.exe tice7397.exe PID 1524 wrote to memory of 4936 1524 2aa585b8467fb60bbf85d150d1e7f3f3a4e32e56529fa95c4624c68aef102570.exe tice7397.exe PID 1524 wrote to memory of 4936 1524 2aa585b8467fb60bbf85d150d1e7f3f3a4e32e56529fa95c4624c68aef102570.exe tice7397.exe PID 4936 wrote to memory of 3572 4936 tice7397.exe tice0715.exe PID 4936 wrote to memory of 3572 4936 tice7397.exe tice0715.exe PID 4936 wrote to memory of 3572 4936 tice7397.exe tice0715.exe PID 3572 wrote to memory of 1124 3572 tice0715.exe b8799SO.exe PID 3572 wrote to memory of 1124 3572 tice0715.exe b8799SO.exe PID 3572 wrote to memory of 4952 3572 tice0715.exe c43cb40.exe PID 3572 wrote to memory of 4952 3572 tice0715.exe c43cb40.exe PID 3572 wrote to memory of 4952 3572 tice0715.exe c43cb40.exe PID 4936 wrote to memory of 4472 4936 tice7397.exe dgEoB84.exe PID 4936 wrote to memory of 4472 4936 tice7397.exe dgEoB84.exe PID 4936 wrote to memory of 4472 4936 tice7397.exe dgEoB84.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2aa585b8467fb60bbf85d150d1e7f3f3a4e32e56529fa95c4624c68aef102570.exe"C:\Users\Admin\AppData\Local\Temp\2aa585b8467fb60bbf85d150d1e7f3f3a4e32e56529fa95c4624c68aef102570.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice7397.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice7397.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice0715.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice0715.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8799SO.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8799SO.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1124
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c43cb40.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c43cb40.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4952 -s 10805⤵
- Program crash
PID:3020
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dgEoB84.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dgEoB84.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4472
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4952 -ip 49521⤵PID:3724
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
642KB
MD5bc51a9e8040b1382777a3460776c5c3f
SHA1fd603bf51005e17db870261017fa5133f32e330d
SHA256f88632042070ab6f96d125d2c01f6697f8b7916cb74d1168bf2bf1f0623562a2
SHA5123515e0b6ae26b5eac996c4cf0a7810e2adca0104184280e9fa69b2fa46b7180bf3722d0e75fbc3444d0026fae09d9f5dbf93147e2939ae3df3fe45f425bda6d0
-
Filesize
294KB
MD567fea7c362f13f92f2028ad800e6a0eb
SHA15624b717fc92e019a210d1e863992ab5b6b0b851
SHA256245cd72755fd00b3f3f36d5b08f0ba395f363094655a8fd6a54f2ed4273343e9
SHA5127c38a6c450e8bf8ae09586eada676395eca117078764bf1a2fed75f4eae22084aa293fbeb07fba5443c3c7af53eb98007606f5d1db5f4159f31864291095394f
-
Filesize
322KB
MD53ebd2d0de0dda7f5f801bb87d8ad0f44
SHA1074fb4c3a5affa0e604b636b83be3164421f2d12
SHA256dfc11e034c2970239e3e0df7abdba97cef691e619876804ed18c7ed946fcb01a
SHA512dea9c987fa93bcc2887e94808d97134a6dce9f9e74cc7e12ce9579d39043bdaf34338daac2e89894e1892e3a8291ec111520e8430af7a9bb1f918a48cac90dfc
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
236KB
MD5c7a6a881515eb7ab0d1c3f67455ca980
SHA1f201499e8d0b2fd82f78687f5a23320b236a6881
SHA256b13855be933840cc9ae22ee6887717cea2a45b9550e6ab4b610c42c795d501b7
SHA512d64e309bf4ad1fa5a17fdf529db3258260ff5c718d828bb86ba1c5b621064724a319396392cc546642f012f7dd9cea4aa21ef254a98fd8e1fa3a9b86e4eda644