Analysis
-
max time kernel
112s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-11-2024 04:39
Static task
static1
Behavioral task
behavioral1
Sample
7232f2ee5fdeaf103feed68322f10c18bceaf5dfc6d81e6ee48a83133d46daa4.exe
Resource
win10v2004-20241007-en
General
-
Target
7232f2ee5fdeaf103feed68322f10c18bceaf5dfc6d81e6ee48a83133d46daa4.exe
-
Size
642KB
-
MD5
bba2173d1b9fe17bee7e0a77c6c9ba22
-
SHA1
3e15755d793ee5eadc351246959c5615c2cb9c0f
-
SHA256
7232f2ee5fdeaf103feed68322f10c18bceaf5dfc6d81e6ee48a83133d46daa4
-
SHA512
b50a2773ddc887ca58ae7ed5cb09c1531cc68d140c183184b829b9ce666589263c1f3750f76b480698637ae44530c5b6edb4dee71f68f27c971076a9437ab94d
-
SSDEEP
12288:KMrsy9030yAhzS7CVO9uka5lKy31yRf2jdO3GwdkRBK1HZdrQk13wseUtcXJzw:GyXy4S7uOYARRf2jYToE15Z+hw
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b8020uJ.exe healer behavioral1/memory/2564-15-0x0000000000C40000-0x0000000000C4A000-memory.dmp healer behavioral1/memory/4072-22-0x0000000002150000-0x000000000216A000-memory.dmp healer behavioral1/memory/4072-24-0x0000000002740000-0x0000000002758000-memory.dmp healer behavioral1/memory/4072-25-0x0000000002740000-0x0000000002752000-memory.dmp healer behavioral1/memory/4072-32-0x0000000002740000-0x0000000002752000-memory.dmp healer behavioral1/memory/4072-50-0x0000000002740000-0x0000000002752000-memory.dmp healer behavioral1/memory/4072-48-0x0000000002740000-0x0000000002752000-memory.dmp healer behavioral1/memory/4072-46-0x0000000002740000-0x0000000002752000-memory.dmp healer behavioral1/memory/4072-44-0x0000000002740000-0x0000000002752000-memory.dmp healer behavioral1/memory/4072-42-0x0000000002740000-0x0000000002752000-memory.dmp healer behavioral1/memory/4072-40-0x0000000002740000-0x0000000002752000-memory.dmp healer behavioral1/memory/4072-38-0x0000000002740000-0x0000000002752000-memory.dmp healer behavioral1/memory/4072-36-0x0000000002740000-0x0000000002752000-memory.dmp healer behavioral1/memory/4072-34-0x0000000002740000-0x0000000002752000-memory.dmp healer behavioral1/memory/4072-30-0x0000000002740000-0x0000000002752000-memory.dmp healer behavioral1/memory/4072-28-0x0000000002740000-0x0000000002752000-memory.dmp healer behavioral1/memory/4072-26-0x0000000002740000-0x0000000002752000-memory.dmp healer behavioral1/memory/4072-52-0x0000000002740000-0x0000000002752000-memory.dmp healer -
Healer family
-
Processes:
b8020uJ.exec49by00.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b8020uJ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b8020uJ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c49by00.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c49by00.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c49by00.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b8020uJ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b8020uJ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b8020uJ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b8020uJ.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c49by00.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c49by00.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c49by00.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/3308-60-0x00000000024A0000-0x00000000024E6000-memory.dmp family_redline behavioral1/memory/3308-61-0x0000000004AC0000-0x0000000004B04000-memory.dmp family_redline behavioral1/memory/3308-62-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3308-67-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3308-95-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3308-93-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3308-91-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3308-89-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3308-88-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3308-85-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3308-83-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3308-82-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3308-79-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3308-77-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3308-76-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3308-73-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3308-71-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3308-69-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3308-65-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3308-63-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
Processes:
tice1088.exeb8020uJ.exec49by00.exedoYNx78.exepid process 1760 tice1088.exe 2564 b8020uJ.exe 4072 c49by00.exe 3308 doYNx78.exe -
Processes:
b8020uJ.exec49by00.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b8020uJ.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c49by00.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c49by00.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
7232f2ee5fdeaf103feed68322f10c18bceaf5dfc6d81e6ee48a83133d46daa4.exetice1088.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7232f2ee5fdeaf103feed68322f10c18bceaf5dfc6d81e6ee48a83133d46daa4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice1088.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3360 4072 WerFault.exe c49by00.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
7232f2ee5fdeaf103feed68322f10c18bceaf5dfc6d81e6ee48a83133d46daa4.exetice1088.exec49by00.exedoYNx78.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7232f2ee5fdeaf103feed68322f10c18bceaf5dfc6d81e6ee48a83133d46daa4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice1088.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c49by00.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language doYNx78.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
b8020uJ.exec49by00.exepid process 2564 b8020uJ.exe 2564 b8020uJ.exe 4072 c49by00.exe 4072 c49by00.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
b8020uJ.exec49by00.exedoYNx78.exedescription pid process Token: SeDebugPrivilege 2564 b8020uJ.exe Token: SeDebugPrivilege 4072 c49by00.exe Token: SeDebugPrivilege 3308 doYNx78.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
7232f2ee5fdeaf103feed68322f10c18bceaf5dfc6d81e6ee48a83133d46daa4.exetice1088.exedescription pid process target process PID 404 wrote to memory of 1760 404 7232f2ee5fdeaf103feed68322f10c18bceaf5dfc6d81e6ee48a83133d46daa4.exe tice1088.exe PID 404 wrote to memory of 1760 404 7232f2ee5fdeaf103feed68322f10c18bceaf5dfc6d81e6ee48a83133d46daa4.exe tice1088.exe PID 404 wrote to memory of 1760 404 7232f2ee5fdeaf103feed68322f10c18bceaf5dfc6d81e6ee48a83133d46daa4.exe tice1088.exe PID 1760 wrote to memory of 2564 1760 tice1088.exe b8020uJ.exe PID 1760 wrote to memory of 2564 1760 tice1088.exe b8020uJ.exe PID 1760 wrote to memory of 4072 1760 tice1088.exe c49by00.exe PID 1760 wrote to memory of 4072 1760 tice1088.exe c49by00.exe PID 1760 wrote to memory of 4072 1760 tice1088.exe c49by00.exe PID 404 wrote to memory of 3308 404 7232f2ee5fdeaf103feed68322f10c18bceaf5dfc6d81e6ee48a83133d46daa4.exe doYNx78.exe PID 404 wrote to memory of 3308 404 7232f2ee5fdeaf103feed68322f10c18bceaf5dfc6d81e6ee48a83133d46daa4.exe doYNx78.exe PID 404 wrote to memory of 3308 404 7232f2ee5fdeaf103feed68322f10c18bceaf5dfc6d81e6ee48a83133d46daa4.exe doYNx78.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7232f2ee5fdeaf103feed68322f10c18bceaf5dfc6d81e6ee48a83133d46daa4.exe"C:\Users\Admin\AppData\Local\Temp\7232f2ee5fdeaf103feed68322f10c18bceaf5dfc6d81e6ee48a83133d46daa4.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice1088.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice1088.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b8020uJ.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b8020uJ.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2564
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c49by00.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c49by00.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4072 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4072 -s 11004⤵
- Program crash
PID:3360
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\doYNx78.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\doYNx78.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3308
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4072 -ip 40721⤵PID:2360
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
295KB
MD54a2605d9edb33caa405d5ab50d700666
SHA1221a9491a8fbc7a2c4bb921d0c30da9c7f982b6a
SHA256baab9ff6f60d520c17600b2f673dfcb750f9a0c24ee1bc916765a38d507bd925
SHA512774690678bacfa688d89e6037305043baa3e718a75c985edf0a40c3dfdbe4160767ebd37b80c0af446cefd37a0f0cbfb10d4806801a6ea5dc533ab62327d4f3b
-
Filesize
322KB
MD5c4428ebe53eb33cdbb8ea0de30421770
SHA11bf3154be01c108dcd751d7f687dca79084e89e1
SHA256b480ff261b395e73078cfb9845e03fe50453e666d72cbc2d8f1118b8b93060ef
SHA5127897420573da2b828286add90ec4091d084b67674cfaeea28876768695adb38e2bba87c6c733dcdcf4ee3f711d1b0e6f632fceb7711622740ca63306cb32223b
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
237KB
MD5dbdc722b187b9c4b032f528effdd0cf4
SHA146b809149af01848efb7f394a1e9ed805e2389f2
SHA256e3b66dd536f12b053a99e6d9ae7162f4865d8b51fefd701e589988cfefdfc5a0
SHA512855f4927f6ac5192cd4f0a2f9c5b01e0dd141f8764f74b63cd0150e1129ef007e386a1430de348999e701b30dbb9933e5656287cc1b34140f8ec9cdb98396074