Analysis
-
max time kernel
112s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-11-2024 03:32
Static task
static1
Behavioral task
behavioral1
Sample
ba1dcd28468ff4c6f5167d07696adb52870c66bc9bdab982341077001647a558N.exe
Resource
win10v2004-20241007-en
General
-
Target
ba1dcd28468ff4c6f5167d07696adb52870c66bc9bdab982341077001647a558N.exe
-
Size
648KB
-
MD5
1cd2da428819fce6f2715d2102fb61e0
-
SHA1
1f72abdf9c110398050d74df743e9ac3440f865a
-
SHA256
ba1dcd28468ff4c6f5167d07696adb52870c66bc9bdab982341077001647a558
-
SHA512
e543b70bb77ba76731add6e3f550e1e5988f9b1390d563e85d5eecbcc9e6af45a5f409b8dca40dd51d5b97326fd86f9bc5cdb46354eba54319e51e31fad0262c
-
SSDEEP
12288:UMr8y90QzdmW46kVQ5DPhsESy3cR/CmuoLQhfovylvlCHZJ1zW040cEWEB:Ayv0DVQ5rhor/CHIS1vlcZZcEWEB
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b6597pr.exe healer behavioral1/memory/4452-15-0x0000000000640000-0x000000000064A000-memory.dmp healer behavioral1/memory/1680-22-0x0000000002300000-0x000000000231A000-memory.dmp healer behavioral1/memory/1680-24-0x00000000024F0000-0x0000000002508000-memory.dmp healer behavioral1/memory/1680-25-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/1680-32-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/1680-52-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/1680-50-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/1680-48-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/1680-46-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/1680-44-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/1680-42-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/1680-40-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/1680-38-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/1680-36-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/1680-34-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/1680-30-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/1680-28-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/1680-26-0x00000000024F0000-0x0000000002502000-memory.dmp healer -
Healer family
-
Processes:
b6597pr.exec54iR94.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b6597pr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b6597pr.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c54iR94.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c54iR94.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c54iR94.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c54iR94.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b6597pr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b6597pr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c54iR94.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c54iR94.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b6597pr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b6597pr.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4052-60-0x00000000024C0000-0x0000000002506000-memory.dmp family_redline behavioral1/memory/4052-61-0x0000000004AF0000-0x0000000004B34000-memory.dmp family_redline behavioral1/memory/4052-65-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/4052-73-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/4052-95-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/4052-93-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/4052-91-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/4052-89-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/4052-87-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/4052-85-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/4052-81-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/4052-79-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/4052-77-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/4052-75-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/4052-71-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/4052-69-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/4052-67-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/4052-83-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/4052-63-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/4052-62-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
Processes:
tice1875.exeb6597pr.exec54iR94.exedrcwt99.exepid process 4556 tice1875.exe 4452 b6597pr.exe 1680 c54iR94.exe 4052 drcwt99.exe -
Processes:
c54iR94.exeb6597pr.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c54iR94.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b6597pr.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c54iR94.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
tice1875.exeba1dcd28468ff4c6f5167d07696adb52870c66bc9bdab982341077001647a558N.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice1875.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ba1dcd28468ff4c6f5167d07696adb52870c66bc9bdab982341077001647a558N.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3888 1680 WerFault.exe c54iR94.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ba1dcd28468ff4c6f5167d07696adb52870c66bc9bdab982341077001647a558N.exetice1875.exec54iR94.exedrcwt99.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ba1dcd28468ff4c6f5167d07696adb52870c66bc9bdab982341077001647a558N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice1875.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c54iR94.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language drcwt99.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
b6597pr.exec54iR94.exepid process 4452 b6597pr.exe 4452 b6597pr.exe 1680 c54iR94.exe 1680 c54iR94.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
b6597pr.exec54iR94.exedrcwt99.exedescription pid process Token: SeDebugPrivilege 4452 b6597pr.exe Token: SeDebugPrivilege 1680 c54iR94.exe Token: SeDebugPrivilege 4052 drcwt99.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
ba1dcd28468ff4c6f5167d07696adb52870c66bc9bdab982341077001647a558N.exetice1875.exedescription pid process target process PID 3096 wrote to memory of 4556 3096 ba1dcd28468ff4c6f5167d07696adb52870c66bc9bdab982341077001647a558N.exe tice1875.exe PID 3096 wrote to memory of 4556 3096 ba1dcd28468ff4c6f5167d07696adb52870c66bc9bdab982341077001647a558N.exe tice1875.exe PID 3096 wrote to memory of 4556 3096 ba1dcd28468ff4c6f5167d07696adb52870c66bc9bdab982341077001647a558N.exe tice1875.exe PID 4556 wrote to memory of 4452 4556 tice1875.exe b6597pr.exe PID 4556 wrote to memory of 4452 4556 tice1875.exe b6597pr.exe PID 4556 wrote to memory of 1680 4556 tice1875.exe c54iR94.exe PID 4556 wrote to memory of 1680 4556 tice1875.exe c54iR94.exe PID 4556 wrote to memory of 1680 4556 tice1875.exe c54iR94.exe PID 3096 wrote to memory of 4052 3096 ba1dcd28468ff4c6f5167d07696adb52870c66bc9bdab982341077001647a558N.exe drcwt99.exe PID 3096 wrote to memory of 4052 3096 ba1dcd28468ff4c6f5167d07696adb52870c66bc9bdab982341077001647a558N.exe drcwt99.exe PID 3096 wrote to memory of 4052 3096 ba1dcd28468ff4c6f5167d07696adb52870c66bc9bdab982341077001647a558N.exe drcwt99.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba1dcd28468ff4c6f5167d07696adb52870c66bc9bdab982341077001647a558N.exe"C:\Users\Admin\AppData\Local\Temp\ba1dcd28468ff4c6f5167d07696adb52870c66bc9bdab982341077001647a558N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice1875.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice1875.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b6597pr.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b6597pr.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4452
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c54iR94.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c54iR94.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1680 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1680 -s 10844⤵
- Program crash
PID:3888
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\drcwt99.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\drcwt99.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1680 -ip 16801⤵PID:1400
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
283KB
MD5e189ceef9569bc60e4a5cca36e335ebe
SHA1cb653d5a8a3f12f5e52bf935d79693a45c54dfef
SHA256c9866cf9cb7edc5ec0aed9d4d5280debb068f9debdf90181e6efd89dfeb64b39
SHA5124830c5f097501071848c9666e07dbf13bd3daaa9e710164550767d7a48c6a93141708edccc0fcccd4c62f19648bdec3418b149788c78db3f812533fe9d66ae7d
-
Filesize
325KB
MD56c311fb4e49cc63a890c1ffe893e8957
SHA1de069d3236efb1dd9f1a1b85b11b02db95b9d1b4
SHA2560f3819b34ff1a597a699e2de8bd2550f8e6c8dc8e0856a07d0a52d66319fb739
SHA51286a71ca239fb219d9f73af078470525c857dffc87e0abb70ee0524a9b131ea34a484e59a54d1eb13acedf63d22a97e6b6e9df497830b1f34f4b387d6b9d5cf04
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
226KB
MD5ba0a672fbb200521a4a09b67a6c327b1
SHA1738c513500309b6ecb42a3f400260b3eed467bf1
SHA2567d4f0569f9d0ccac57cd285c805f5c43f5c5481fc9fe018c06113e841523962e
SHA51203f4b7006027fc528c288c6f4b8e8ea62764d160cfa6fc16b06e701bb6b7c7249b28ed8f6398cb92432270bff36a2bc1f4a99bad24e20ce821be0454bb16d78f