Analysis
-
max time kernel
113s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-11-2024 09:38
Static task
static1
Behavioral task
behavioral1
Sample
2f8064be3b287e51dcea77c6135dd088ef54aca28c6a6b171690d8c5ab3a806a.exe
Resource
win10v2004-20241007-en
General
-
Target
2f8064be3b287e51dcea77c6135dd088ef54aca28c6a6b171690d8c5ab3a806a.exe
-
Size
793KB
-
MD5
4e9b3c2b74d2aa74ed163b141852477b
-
SHA1
9bcba2e5bbb15331a7c89c1634a7d4fd4f35f8a4
-
SHA256
2f8064be3b287e51dcea77c6135dd088ef54aca28c6a6b171690d8c5ab3a806a
-
SHA512
9b9be51a4c0a6b6e85f1b4cb2fa406519edc1f21db41dc397712dc599eac7bb1e8b5c87b651688bef41a5e5c526e861f0f935fb6ac0f45033a6f82e9a003e1f5
-
SSDEEP
12288:qMrNy90s+ly3RGMTl2YAV3KguyyQeiRga/T2YvigpZ2pMRTVPuyEdjZDCwol:zyT+ABBT4du/QePl/fp29EdjZJol
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
Processes:
resource yara_rule behavioral1/files/0x0008000000023cb5-19.dat healer behavioral1/memory/2308-22-0x0000000000810000-0x000000000081A000-memory.dmp healer behavioral1/memory/3420-29-0x0000000002320000-0x000000000233A000-memory.dmp healer behavioral1/memory/3420-31-0x0000000002500000-0x0000000002518000-memory.dmp healer behavioral1/memory/3420-47-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/3420-59-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/3420-58-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/3420-56-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/3420-53-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/3420-51-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/3420-49-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/3420-45-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/3420-43-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/3420-41-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/3420-39-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/3420-37-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/3420-35-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/3420-33-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/3420-32-0x0000000002500000-0x0000000002512000-memory.dmp healer -
Healer family
-
Processes:
b2641hv.exec34EM08.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b2641hv.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c34EM08.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b2641hv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b2641hv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b2641hv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b2641hv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c34EM08.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c34EM08.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c34EM08.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c34EM08.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b2641hv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c34EM08.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/1512-67-0x0000000004A60000-0x0000000004AA6000-memory.dmp family_redline behavioral1/memory/1512-68-0x00000000050D0000-0x0000000005114000-memory.dmp family_redline behavioral1/memory/1512-74-0x00000000050D0000-0x000000000510E000-memory.dmp family_redline behavioral1/memory/1512-82-0x00000000050D0000-0x000000000510E000-memory.dmp family_redline behavioral1/memory/1512-102-0x00000000050D0000-0x000000000510E000-memory.dmp family_redline behavioral1/memory/1512-100-0x00000000050D0000-0x000000000510E000-memory.dmp family_redline behavioral1/memory/1512-98-0x00000000050D0000-0x000000000510E000-memory.dmp family_redline behavioral1/memory/1512-96-0x00000000050D0000-0x000000000510E000-memory.dmp family_redline behavioral1/memory/1512-94-0x00000000050D0000-0x000000000510E000-memory.dmp family_redline behavioral1/memory/1512-92-0x00000000050D0000-0x000000000510E000-memory.dmp family_redline behavioral1/memory/1512-88-0x00000000050D0000-0x000000000510E000-memory.dmp family_redline behavioral1/memory/1512-86-0x00000000050D0000-0x000000000510E000-memory.dmp family_redline behavioral1/memory/1512-85-0x00000000050D0000-0x000000000510E000-memory.dmp family_redline behavioral1/memory/1512-80-0x00000000050D0000-0x000000000510E000-memory.dmp family_redline behavioral1/memory/1512-78-0x00000000050D0000-0x000000000510E000-memory.dmp family_redline behavioral1/memory/1512-76-0x00000000050D0000-0x000000000510E000-memory.dmp family_redline behavioral1/memory/1512-90-0x00000000050D0000-0x000000000510E000-memory.dmp family_redline behavioral1/memory/1512-72-0x00000000050D0000-0x000000000510E000-memory.dmp family_redline behavioral1/memory/1512-70-0x00000000050D0000-0x000000000510E000-memory.dmp family_redline behavioral1/memory/1512-69-0x00000000050D0000-0x000000000510E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 5 IoCs
Processes:
tice6183.exetice3498.exeb2641hv.exec34EM08.exednbaR39.exepid Process 4512 tice6183.exe 1224 tice3498.exe 2308 b2641hv.exe 3420 c34EM08.exe 1512 dnbaR39.exe -
Processes:
b2641hv.exec34EM08.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b2641hv.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c34EM08.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c34EM08.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
tice3498.exe2f8064be3b287e51dcea77c6135dd088ef54aca28c6a6b171690d8c5ab3a806a.exetice6183.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice3498.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2f8064be3b287e51dcea77c6135dd088ef54aca28c6a6b171690d8c5ab3a806a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice6183.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 1004 3420 WerFault.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
dnbaR39.exe2f8064be3b287e51dcea77c6135dd088ef54aca28c6a6b171690d8c5ab3a806a.exetice6183.exetice3498.exec34EM08.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dnbaR39.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2f8064be3b287e51dcea77c6135dd088ef54aca28c6a6b171690d8c5ab3a806a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice6183.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice3498.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c34EM08.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
b2641hv.exec34EM08.exepid Process 2308 b2641hv.exe 2308 b2641hv.exe 3420 c34EM08.exe 3420 c34EM08.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
b2641hv.exec34EM08.exednbaR39.exedescription pid Process Token: SeDebugPrivilege 2308 b2641hv.exe Token: SeDebugPrivilege 3420 c34EM08.exe Token: SeDebugPrivilege 1512 dnbaR39.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
2f8064be3b287e51dcea77c6135dd088ef54aca28c6a6b171690d8c5ab3a806a.exetice6183.exetice3498.exedescription pid Process procid_target PID 4732 wrote to memory of 4512 4732 2f8064be3b287e51dcea77c6135dd088ef54aca28c6a6b171690d8c5ab3a806a.exe 83 PID 4732 wrote to memory of 4512 4732 2f8064be3b287e51dcea77c6135dd088ef54aca28c6a6b171690d8c5ab3a806a.exe 83 PID 4732 wrote to memory of 4512 4732 2f8064be3b287e51dcea77c6135dd088ef54aca28c6a6b171690d8c5ab3a806a.exe 83 PID 4512 wrote to memory of 1224 4512 tice6183.exe 84 PID 4512 wrote to memory of 1224 4512 tice6183.exe 84 PID 4512 wrote to memory of 1224 4512 tice6183.exe 84 PID 1224 wrote to memory of 2308 1224 tice3498.exe 85 PID 1224 wrote to memory of 2308 1224 tice3498.exe 85 PID 1224 wrote to memory of 3420 1224 tice3498.exe 97 PID 1224 wrote to memory of 3420 1224 tice3498.exe 97 PID 1224 wrote to memory of 3420 1224 tice3498.exe 97 PID 4512 wrote to memory of 1512 4512 tice6183.exe 102 PID 4512 wrote to memory of 1512 4512 tice6183.exe 102 PID 4512 wrote to memory of 1512 4512 tice6183.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f8064be3b287e51dcea77c6135dd088ef54aca28c6a6b171690d8c5ab3a806a.exe"C:\Users\Admin\AppData\Local\Temp\2f8064be3b287e51dcea77c6135dd088ef54aca28c6a6b171690d8c5ab3a806a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice6183.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice6183.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice3498.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice3498.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2641hv.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2641hv.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2308
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c34EM08.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c34EM08.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3420 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3420 -s 11085⤵
- Program crash
PID:1004
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dnbaR39.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dnbaR39.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1512
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3420 -ip 34201⤵PID:940
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
648KB
MD5b723ee3f9aa0f0105bf2f4a379d08f18
SHA1bcff75fc972920a5a07fc0d8d31a418bd0b02382
SHA25682f413473ed823dd06fb1d1d0266dfdfee0c4b7fadbb5dcc42e0b3fb92973b02
SHA512aa8b1172c25dd9acdedf9bb87dd4deab554efdaa95ccbc5c7ff245cb5c2e39fccc4fee7e9bf6974427ea8c98bf5e3b0263850dad9f9efa6d0099b7bade2a487b
-
Filesize
284KB
MD58462550dfbaf96ce77b26bb073130201
SHA1c646472fb07acbc50c7232c4548cd0d626b7bc2b
SHA2563c848627540c2a03e23b0b813f064f72c4ec06ef1242f80cbf38f09f04b15135
SHA512eb5b177d5695dc93b33ea795a4b0f7e3c345d20d0dcccd6242e7f54a822d0636316db225e042cda23ff175bcf2733b4543dafb8ec6610ef4c91c015acb63d971
-
Filesize
324KB
MD54e71848a7687adb16b8b8ab5d2713c50
SHA17687695af3d3c59e02d9a0a214df78a817b57f5c
SHA25674b924ec3b2f72d3d1ada5114ea8fe0cdb648866ac50f89cffcc60e92c397296
SHA512bd52d9a8d05adfafa57f77bfc99479a1e2b6ab6d8260bdc3b001f34c97431bf66f600c78bde0f7ac3ae8d03ae801bf543f73ad2adad5bc72939e3eebafed4f03
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
226KB
MD578747779c43dde523a1e7bdbc30bcc26
SHA10e817778ca44651ee51e653502731e64bbba8b80
SHA25673a4cb5bba867e85ef473df5c38d64fb983fcbc466bea38c9aa7d64a7cca1a31
SHA5123daaacded0aae5a7093fce236692c0cc2fc73b5a5e3d1ae41332fc86666b6927c00433fc4e58d71889af897fa81c6735d799c47a952eb50b84ecf8ea48c5bb9d