Analysis
-
max time kernel
114s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
01-02-2025 22:04
Static task
static1
Behavioral task
behavioral1
Sample
64f4c7d7ba229f8634e454adb0af4965717f769288ef48e2f0f7f95b404164fb.exe
Resource
win10v2004-20250129-en
General
-
Target
64f4c7d7ba229f8634e454adb0af4965717f769288ef48e2f0f7f95b404164fb.exe
-
Size
885KB
-
MD5
6c1d86d271d717a9acc2204def44b49c
-
SHA1
c1e1f6652f517bbc0b4b0ff6d717bb26bd937dd0
-
SHA256
64f4c7d7ba229f8634e454adb0af4965717f769288ef48e2f0f7f95b404164fb
-
SHA512
4cf33680466b143640474ee7e9c9a237c0a16bba1d104c08a9ac3057cd6732d0c279eddf86068666e69248bfb283656bf17d753a0049d7355ac0e64833e40ea3
-
SSDEEP
24576:JytXJkoKHmtQAU6eb7/gZJJwYqXM6N2/fI4XlcDujaH:8tXmoKHm6A7SzMJeTn2XI4X2Dujo
Malware Config
Extracted
redline
ronur
193.233.20.20:4134
-
auth_value
f88f86755a528d4b25f6f3628c460965
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/4348-22-0x0000000002360000-0x000000000237A000-memory.dmp healer behavioral1/memory/4348-24-0x00000000050F0000-0x0000000005108000-memory.dmp healer behavioral1/memory/4348-25-0x00000000050F0000-0x0000000005102000-memory.dmp healer behavioral1/memory/4348-32-0x00000000050F0000-0x0000000005102000-memory.dmp healer behavioral1/memory/4348-52-0x00000000050F0000-0x0000000005102000-memory.dmp healer behavioral1/memory/4348-50-0x00000000050F0000-0x0000000005102000-memory.dmp healer behavioral1/memory/4348-48-0x00000000050F0000-0x0000000005102000-memory.dmp healer behavioral1/memory/4348-46-0x00000000050F0000-0x0000000005102000-memory.dmp healer behavioral1/memory/4348-44-0x00000000050F0000-0x0000000005102000-memory.dmp healer behavioral1/memory/4348-40-0x00000000050F0000-0x0000000005102000-memory.dmp healer behavioral1/memory/4348-38-0x00000000050F0000-0x0000000005102000-memory.dmp healer behavioral1/memory/4348-36-0x00000000050F0000-0x0000000005102000-memory.dmp healer behavioral1/memory/4348-34-0x00000000050F0000-0x0000000005102000-memory.dmp healer behavioral1/memory/4348-30-0x00000000050F0000-0x0000000005102000-memory.dmp healer behavioral1/memory/4348-28-0x00000000050F0000-0x0000000005102000-memory.dmp healer behavioral1/memory/4348-26-0x00000000050F0000-0x0000000005102000-memory.dmp healer behavioral1/memory/4348-42-0x00000000050F0000-0x0000000005102000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" iHH71nh.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection iHH71nh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" iHH71nh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" iHH71nh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" iHH71nh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" iHH71nh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" iHH71nh.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" iHH71nh.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications iHH71nh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" iHH71nh.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/5108-60-0x0000000002530000-0x0000000002576000-memory.dmp family_redline behavioral1/memory/5108-61-0x00000000026F0000-0x0000000002734000-memory.dmp family_redline behavioral1/memory/5108-75-0x00000000026F0000-0x000000000272E000-memory.dmp family_redline behavioral1/memory/5108-79-0x00000000026F0000-0x000000000272E000-memory.dmp family_redline behavioral1/memory/5108-95-0x00000000026F0000-0x000000000272E000-memory.dmp family_redline behavioral1/memory/5108-93-0x00000000026F0000-0x000000000272E000-memory.dmp family_redline behavioral1/memory/5108-89-0x00000000026F0000-0x000000000272E000-memory.dmp family_redline behavioral1/memory/5108-87-0x00000000026F0000-0x000000000272E000-memory.dmp family_redline behavioral1/memory/5108-85-0x00000000026F0000-0x000000000272E000-memory.dmp family_redline behavioral1/memory/5108-83-0x00000000026F0000-0x000000000272E000-memory.dmp family_redline behavioral1/memory/5108-81-0x00000000026F0000-0x000000000272E000-memory.dmp family_redline behavioral1/memory/5108-77-0x00000000026F0000-0x000000000272E000-memory.dmp family_redline behavioral1/memory/5108-73-0x00000000026F0000-0x000000000272E000-memory.dmp family_redline behavioral1/memory/5108-71-0x00000000026F0000-0x000000000272E000-memory.dmp family_redline behavioral1/memory/5108-69-0x00000000026F0000-0x000000000272E000-memory.dmp family_redline behavioral1/memory/5108-67-0x00000000026F0000-0x000000000272E000-memory.dmp family_redline behavioral1/memory/5108-91-0x00000000026F0000-0x000000000272E000-memory.dmp family_redline behavioral1/memory/5108-65-0x00000000026F0000-0x000000000272E000-memory.dmp family_redline behavioral1/memory/5108-63-0x00000000026F0000-0x000000000272E000-memory.dmp family_redline behavioral1/memory/5108-62-0x00000000026F0000-0x000000000272E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 4156 sEo98tH.exe 2128 slp02vc.exe 4348 iHH71nh.exe 5108 kfB24An.exe -
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features iHH71nh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" iHH71nh.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 64f4c7d7ba229f8634e454adb0af4965717f769288ef48e2f0f7f95b404164fb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" sEo98tH.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" slp02vc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1860 4348 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iHH71nh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kfB24An.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 64f4c7d7ba229f8634e454adb0af4965717f769288ef48e2f0f7f95b404164fb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sEo98tH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language slp02vc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4348 iHH71nh.exe 4348 iHH71nh.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4348 iHH71nh.exe Token: SeDebugPrivilege 5108 kfB24An.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 352 wrote to memory of 4156 352 64f4c7d7ba229f8634e454adb0af4965717f769288ef48e2f0f7f95b404164fb.exe 86 PID 352 wrote to memory of 4156 352 64f4c7d7ba229f8634e454adb0af4965717f769288ef48e2f0f7f95b404164fb.exe 86 PID 352 wrote to memory of 4156 352 64f4c7d7ba229f8634e454adb0af4965717f769288ef48e2f0f7f95b404164fb.exe 86 PID 4156 wrote to memory of 2128 4156 sEo98tH.exe 88 PID 4156 wrote to memory of 2128 4156 sEo98tH.exe 88 PID 4156 wrote to memory of 2128 4156 sEo98tH.exe 88 PID 2128 wrote to memory of 4348 2128 slp02vc.exe 89 PID 2128 wrote to memory of 4348 2128 slp02vc.exe 89 PID 2128 wrote to memory of 4348 2128 slp02vc.exe 89 PID 2128 wrote to memory of 5108 2128 slp02vc.exe 95 PID 2128 wrote to memory of 5108 2128 slp02vc.exe 95 PID 2128 wrote to memory of 5108 2128 slp02vc.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\64f4c7d7ba229f8634e454adb0af4965717f769288ef48e2f0f7f95b404164fb.exe"C:\Users\Admin\AppData\Local\Temp\64f4c7d7ba229f8634e454adb0af4965717f769288ef48e2f0f7f95b404164fb.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:352 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sEo98tH.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sEo98tH.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\slp02vc.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\slp02vc.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\iHH71nh.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\iHH71nh.exe4⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4348 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 10805⤵
- Program crash
PID:1860
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kfB24An.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kfB24An.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5108
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4348 -ip 43481⤵PID:4912
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
653KB
MD531340d7608127c0b2e176bba235948d8
SHA15673a484eba9578c7542fa0d65b6940fbf4918ba
SHA256dd44a49988de1bd1397e0250a693b6d092db345f83ad23ff38ca13ba00a5af4a
SHA512d412965e8f51ab8dfc928a8af0310e97781fa4ddde2ac683e8665da3a0c9ae998ba0d5c302974bd8e572d8fc61852c47ccfad625a43a0c07462cd0ea53374842
-
Filesize
508KB
MD5a98e07b447cffc5b4b1a08f691610b25
SHA12dcd2f74d1c139d376ac09b261b7861e7c316554
SHA256bcd074004d8655f8d10796f242e00a90fbd7fcf07d7bbeb91c77d20bd4e7457a
SHA5121336eca90260a0676612028cf4ebdbf67d37bb80323717640539e7ca838e863501af902ec74af6f1fdc43281f8a38b5189f7029ede02c4a136b2f8c6436f09cb
-
Filesize
208KB
MD573d9853c7c29411ab7bef562b691cd08
SHA16ea51e017ba3e9661154619b0af625b4386f43c9
SHA25673367e2ff3a15c96429dea894506c9c5e26508b19b6e5e5b5d4eb0bd55c1f294
SHA5121eb1185c87d65e300278dbb471f3070fd13d40fb00eebf62f96a5b670a3b0274c1fa83747df7bce8f63e97ebd4e3585fb2d90d222298f5d50429037d9316eec1
-
Filesize
265KB
MD5cc342d428aa7ee7b7c58048d2e398dce
SHA1ed172bcf429e71c56195dfe0b795934d2141653b
SHA256bc5b6b0e77db4d4509fa67b210f8b7af16a435283749c9d6ba1969f0d32b432c
SHA512d9be01f9bd8eced265952bb076aeb41e6e1ae7d025576bf5cff2fc29552590aaedb67472c0fa10c9ba431c2f91b18954a2842e088dad273fa9269e54313e2bc6