Analysis
-
max time kernel
112s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-11-2024 02:27
Static task
static1
Behavioral task
behavioral1
Sample
e32dfbc0a04c690e0b56e012f74875cc840b2df6a078615304c3c358d0ecd0cfN.exe
Resource
win10v2004-20241007-en
General
-
Target
e32dfbc0a04c690e0b56e012f74875cc840b2df6a078615304c3c358d0ecd0cfN.exe
-
Size
648KB
-
MD5
179c20a7d3935d26af5dcd8ffc3d44c0
-
SHA1
8626ff537d5197d49be6ad562c180b73920487f1
-
SHA256
e32dfbc0a04c690e0b56e012f74875cc840b2df6a078615304c3c358d0ecd0cf
-
SHA512
0dc9cad7f22e538e2d5329c352bcd339504d169cfa3f6f72dc22eac4b6e9a679a444f5138a42bc9da12f49a6b5c25eed1d70c57f85ec68264a2c3383611e0ac0
-
SSDEEP
12288:kMrby90wjPcN2Je+gWdYk4sTGQq23SHfTgl36+hwy9:HyDLG+9ukPTJ3SHY
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b3800jR.exe healer behavioral1/memory/4180-15-0x0000000000A70000-0x0000000000A7A000-memory.dmp healer behavioral1/memory/3376-22-0x0000000002250000-0x000000000226A000-memory.dmp healer behavioral1/memory/3376-24-0x0000000002340000-0x0000000002358000-memory.dmp healer behavioral1/memory/3376-25-0x0000000002340000-0x0000000002352000-memory.dmp healer behavioral1/memory/3376-36-0x0000000002340000-0x0000000002352000-memory.dmp healer behavioral1/memory/3376-52-0x0000000002340000-0x0000000002352000-memory.dmp healer behavioral1/memory/3376-50-0x0000000002340000-0x0000000002352000-memory.dmp healer behavioral1/memory/3376-49-0x0000000002340000-0x0000000002352000-memory.dmp healer behavioral1/memory/3376-46-0x0000000002340000-0x0000000002352000-memory.dmp healer behavioral1/memory/3376-44-0x0000000002340000-0x0000000002352000-memory.dmp healer behavioral1/memory/3376-42-0x0000000002340000-0x0000000002352000-memory.dmp healer behavioral1/memory/3376-40-0x0000000002340000-0x0000000002352000-memory.dmp healer behavioral1/memory/3376-38-0x0000000002340000-0x0000000002352000-memory.dmp healer behavioral1/memory/3376-34-0x0000000002340000-0x0000000002352000-memory.dmp healer behavioral1/memory/3376-32-0x0000000002340000-0x0000000002352000-memory.dmp healer behavioral1/memory/3376-30-0x0000000002340000-0x0000000002352000-memory.dmp healer behavioral1/memory/3376-29-0x0000000002340000-0x0000000002352000-memory.dmp healer behavioral1/memory/3376-26-0x0000000002340000-0x0000000002352000-memory.dmp healer -
Healer family
-
Processes:
b3800jR.exec68Yo79.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b3800jR.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b3800jR.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c68Yo79.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c68Yo79.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c68Yo79.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b3800jR.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b3800jR.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b3800jR.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c68Yo79.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c68Yo79.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c68Yo79.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b3800jR.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/760-60-0x00000000024C0000-0x0000000002506000-memory.dmp family_redline behavioral1/memory/760-61-0x0000000005090000-0x00000000050D4000-memory.dmp family_redline behavioral1/memory/760-65-0x0000000005090000-0x00000000050CE000-memory.dmp family_redline behavioral1/memory/760-77-0x0000000005090000-0x00000000050CE000-memory.dmp family_redline behavioral1/memory/760-95-0x0000000005090000-0x00000000050CE000-memory.dmp family_redline behavioral1/memory/760-91-0x0000000005090000-0x00000000050CE000-memory.dmp family_redline behavioral1/memory/760-89-0x0000000005090000-0x00000000050CE000-memory.dmp family_redline behavioral1/memory/760-87-0x0000000005090000-0x00000000050CE000-memory.dmp family_redline behavioral1/memory/760-85-0x0000000005090000-0x00000000050CE000-memory.dmp family_redline behavioral1/memory/760-84-0x0000000005090000-0x00000000050CE000-memory.dmp family_redline behavioral1/memory/760-81-0x0000000005090000-0x00000000050CE000-memory.dmp family_redline behavioral1/memory/760-79-0x0000000005090000-0x00000000050CE000-memory.dmp family_redline behavioral1/memory/760-75-0x0000000005090000-0x00000000050CE000-memory.dmp family_redline behavioral1/memory/760-73-0x0000000005090000-0x00000000050CE000-memory.dmp family_redline behavioral1/memory/760-71-0x0000000005090000-0x00000000050CE000-memory.dmp family_redline behavioral1/memory/760-69-0x0000000005090000-0x00000000050CE000-memory.dmp family_redline behavioral1/memory/760-67-0x0000000005090000-0x00000000050CE000-memory.dmp family_redline behavioral1/memory/760-93-0x0000000005090000-0x00000000050CE000-memory.dmp family_redline behavioral1/memory/760-63-0x0000000005090000-0x00000000050CE000-memory.dmp family_redline behavioral1/memory/760-62-0x0000000005090000-0x00000000050CE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
Processes:
tice5493.exeb3800jR.exec68Yo79.exedAPQV55.exepid process 3256 tice5493.exe 4180 b3800jR.exe 3376 c68Yo79.exe 760 dAPQV55.exe -
Processes:
b3800jR.exec68Yo79.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b3800jR.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c68Yo79.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c68Yo79.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
tice5493.exee32dfbc0a04c690e0b56e012f74875cc840b2df6a078615304c3c358d0ecd0cfN.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice5493.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e32dfbc0a04c690e0b56e012f74875cc840b2df6a078615304c3c358d0ecd0cfN.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4740 3376 WerFault.exe c68Yo79.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
e32dfbc0a04c690e0b56e012f74875cc840b2df6a078615304c3c358d0ecd0cfN.exetice5493.exec68Yo79.exedAPQV55.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e32dfbc0a04c690e0b56e012f74875cc840b2df6a078615304c3c358d0ecd0cfN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice5493.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c68Yo79.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dAPQV55.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
b3800jR.exec68Yo79.exepid process 4180 b3800jR.exe 4180 b3800jR.exe 3376 c68Yo79.exe 3376 c68Yo79.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
b3800jR.exec68Yo79.exedAPQV55.exedescription pid process Token: SeDebugPrivilege 4180 b3800jR.exe Token: SeDebugPrivilege 3376 c68Yo79.exe Token: SeDebugPrivilege 760 dAPQV55.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
e32dfbc0a04c690e0b56e012f74875cc840b2df6a078615304c3c358d0ecd0cfN.exetice5493.exedescription pid process target process PID 1512 wrote to memory of 3256 1512 e32dfbc0a04c690e0b56e012f74875cc840b2df6a078615304c3c358d0ecd0cfN.exe tice5493.exe PID 1512 wrote to memory of 3256 1512 e32dfbc0a04c690e0b56e012f74875cc840b2df6a078615304c3c358d0ecd0cfN.exe tice5493.exe PID 1512 wrote to memory of 3256 1512 e32dfbc0a04c690e0b56e012f74875cc840b2df6a078615304c3c358d0ecd0cfN.exe tice5493.exe PID 3256 wrote to memory of 4180 3256 tice5493.exe b3800jR.exe PID 3256 wrote to memory of 4180 3256 tice5493.exe b3800jR.exe PID 3256 wrote to memory of 3376 3256 tice5493.exe c68Yo79.exe PID 3256 wrote to memory of 3376 3256 tice5493.exe c68Yo79.exe PID 3256 wrote to memory of 3376 3256 tice5493.exe c68Yo79.exe PID 1512 wrote to memory of 760 1512 e32dfbc0a04c690e0b56e012f74875cc840b2df6a078615304c3c358d0ecd0cfN.exe dAPQV55.exe PID 1512 wrote to memory of 760 1512 e32dfbc0a04c690e0b56e012f74875cc840b2df6a078615304c3c358d0ecd0cfN.exe dAPQV55.exe PID 1512 wrote to memory of 760 1512 e32dfbc0a04c690e0b56e012f74875cc840b2df6a078615304c3c358d0ecd0cfN.exe dAPQV55.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e32dfbc0a04c690e0b56e012f74875cc840b2df6a078615304c3c358d0ecd0cfN.exe"C:\Users\Admin\AppData\Local\Temp\e32dfbc0a04c690e0b56e012f74875cc840b2df6a078615304c3c358d0ecd0cfN.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice5493.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice5493.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b3800jR.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b3800jR.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4180
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c68Yo79.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c68Yo79.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3376 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3376 -s 10804⤵
- Program crash
PID:4740
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dAPQV55.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dAPQV55.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3376 -ip 33761⤵PID:4568
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
283KB
MD5fb37bf50ffd90eb3e2de335c0e896213
SHA14cb4a5b7d0e47d0f9654c1dafe24ca03437abcd8
SHA2569085ee5bbc81123f18b0cb61e05cb0a8f8d3a1a649b1da9ca7c0507aec54ac68
SHA5124166fe8386877194237d44b75f11a525ca60224d2e60cbc95de51a72025f875510fa7da20746dbc6b5afdd515a87e1dc204d492003a0db3a1ec1197702eaa4dd
-
Filesize
324KB
MD5926d6b94c1337a54cb7f111a2b1ff23c
SHA14003aa5566bc2e2dbc77ab8c79f5cad9ce81ec01
SHA25698616ea6ff46b901bad031aa9c5df0c0f91abc1fc236bcb5f2ccd5e089b95241
SHA512c4096a06eb3b8544618849b78e2d7aff1827915f7aa00b6b7b584ca3b733b7463b60a2e72e950707fa52c9700631e720847b0d23d88b92f958cf7d6dec4a1a5d
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
226KB
MD59840d7d4d30c5480201b63c5f80d6162
SHA14e1774d6d80752763d3ec487252f97e793682f1f
SHA256226a9b1344bd8942435d39b5acbe4a938c5e294eed4b2cbf46f0d0f270f2aff0
SHA512430d6eeda67ff48f8e1905d28fb5922db0daa3b5e39a4c920ebc0f75f248fa3b1b44a9986134e17e6273169debfeb5de50ee5c5ad4838afeefc3fe0f6283dc41