Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
08-02-2025 04:45
Static task
static1
Behavioral task
behavioral1
Sample
bf00733c84913b65d7fe57ffd51f9b09447a74ff087e1089d63af16c926e6d63.exe
Resource
win10v2004-20250207-en
General
-
Target
bf00733c84913b65d7fe57ffd51f9b09447a74ff087e1089d63af16c926e6d63.exe
-
Size
654KB
-
MD5
3a5bc97dd959b0ef81d72aa5bbdb1414
-
SHA1
9f136ecf1d42ce506a85bcd35873f2293aa5303d
-
SHA256
bf00733c84913b65d7fe57ffd51f9b09447a74ff087e1089d63af16c926e6d63
-
SHA512
9fd22f67a75f60abadcdf735bf433ac2ff8567dd52c4ee47b7f274e711611305040e07a3b3b9afd9662bba02cf9223b19c6df7ef128c80150cc7a32bda4d7e42
-
SSDEEP
12288:yMrqy90psFcr/YiJwCapNeoujjgW7rGUTJNpNa+hdh:UyfFcrwiJW/uHdfGshdh
Malware Config
Extracted
redline
ronur
193.233.20.20:4134
-
auth_value
f88f86755a528d4b25f6f3628c460965
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/2276-17-0x00000000023B0000-0x00000000023CA000-memory.dmp healer behavioral1/memory/2276-19-0x00000000026A0000-0x00000000026B8000-memory.dmp healer behavioral1/memory/2276-20-0x00000000026A0000-0x00000000026B2000-memory.dmp healer behavioral1/memory/2276-25-0x00000000026A0000-0x00000000026B2000-memory.dmp healer behavioral1/memory/2276-47-0x00000000026A0000-0x00000000026B2000-memory.dmp healer behavioral1/memory/2276-45-0x00000000026A0000-0x00000000026B2000-memory.dmp healer behavioral1/memory/2276-41-0x00000000026A0000-0x00000000026B2000-memory.dmp healer behavioral1/memory/2276-40-0x00000000026A0000-0x00000000026B2000-memory.dmp healer behavioral1/memory/2276-37-0x00000000026A0000-0x00000000026B2000-memory.dmp healer behavioral1/memory/2276-35-0x00000000026A0000-0x00000000026B2000-memory.dmp healer behavioral1/memory/2276-33-0x00000000026A0000-0x00000000026B2000-memory.dmp healer behavioral1/memory/2276-31-0x00000000026A0000-0x00000000026B2000-memory.dmp healer behavioral1/memory/2276-29-0x00000000026A0000-0x00000000026B2000-memory.dmp healer behavioral1/memory/2276-27-0x00000000026A0000-0x00000000026B2000-memory.dmp healer behavioral1/memory/2276-23-0x00000000026A0000-0x00000000026B2000-memory.dmp healer behavioral1/memory/2276-21-0x00000000026A0000-0x00000000026B2000-memory.dmp healer behavioral1/memory/2276-43-0x00000000026A0000-0x00000000026B2000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" aWP26RV.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection aWP26RV.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" aWP26RV.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" aWP26RV.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" aWP26RV.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" aWP26RV.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" aWP26RV.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" aWP26RV.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" aWP26RV.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications aWP26RV.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1072-58-0x00000000023B0000-0x00000000023F6000-memory.dmp family_redline behavioral1/memory/1072-59-0x0000000002620000-0x0000000002664000-memory.dmp family_redline behavioral1/memory/1072-63-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/1072-67-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/1072-91-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/1072-87-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/1072-86-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/1072-83-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/1072-81-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/1072-79-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/1072-77-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/1072-73-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/1072-71-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/1072-69-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/1072-65-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/1072-93-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/1072-89-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/1072-75-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/1072-61-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/1072-60-0x0000000002620000-0x000000000265E000-memory.dmp family_redline -
Redline family
-
Downloads MZ/PE file 1 IoCs
flow pid Process 11 4100 Process not Found -
Executes dropped EXE 3 IoCs
pid Process 320 nsG14Qn.exe 2276 aWP26RV.exe 1072 blk75Tp.exe -
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features aWP26RV.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" aWP26RV.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bf00733c84913b65d7fe57ffd51f9b09447a74ff087e1089d63af16c926e6d63.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nsG14Qn.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1868 2276 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language blk75Tp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bf00733c84913b65d7fe57ffd51f9b09447a74ff087e1089d63af16c926e6d63.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nsG14Qn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aWP26RV.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2376 MicrosoftEdgeUpdate.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2276 aWP26RV.exe 2276 aWP26RV.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2276 aWP26RV.exe Token: SeDebugPrivilege 1072 blk75Tp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5048 wrote to memory of 320 5048 bf00733c84913b65d7fe57ffd51f9b09447a74ff087e1089d63af16c926e6d63.exe 87 PID 5048 wrote to memory of 320 5048 bf00733c84913b65d7fe57ffd51f9b09447a74ff087e1089d63af16c926e6d63.exe 87 PID 5048 wrote to memory of 320 5048 bf00733c84913b65d7fe57ffd51f9b09447a74ff087e1089d63af16c926e6d63.exe 87 PID 320 wrote to memory of 2276 320 nsG14Qn.exe 88 PID 320 wrote to memory of 2276 320 nsG14Qn.exe 88 PID 320 wrote to memory of 2276 320 nsG14Qn.exe 88 PID 320 wrote to memory of 1072 320 nsG14Qn.exe 97 PID 320 wrote to memory of 1072 320 nsG14Qn.exe 97 PID 320 wrote to memory of 1072 320 nsG14Qn.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf00733c84913b65d7fe57ffd51f9b09447a74ff087e1089d63af16c926e6d63.exe"C:\Users\Admin\AppData\Local\Temp\bf00733c84913b65d7fe57ffd51f9b09447a74ff087e1089d63af16c926e6d63.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nsG14Qn.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nsG14Qn.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\aWP26RV.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\aWP26RV.exe3⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2276 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2276 -s 10844⤵
- Program crash
PID:1868
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\blk75Tp.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\blk75Tp.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1072
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIxIiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDU1NzgiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODAxNjUyMzAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI0ODE1ODM5MzQzIi8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2276 -ip 22761⤵PID:3468
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
509KB
MD58721209efd1838908f2bd638cc01f9c9
SHA1ae36b082ad841532eed1b21c82bb43f33e42e000
SHA256837da52cbe8a70a5ffe6e65d06cfe0f550de777fbd0191a7fc9ab6b6dadec930
SHA512b5565b530929d15771bb178f2e044ca5714439c64b4242ecde933d50715e3b74dddc48d156295312bd43fcb81b492834f3bfdb208a78ed8acbf7452d7f60b94c
-
Filesize
209KB
MD5625b69f47a1624361b0f83f75f832ae7
SHA10b632c6637b664380005a013975f51d86ecec244
SHA256fa547fb05cc356d7dc75fcea95614517761316e5b6ab324197d03c24e39b9b75
SHA512ea24f2c885545e1ef16ed928c3735e477ae82d80afee11c455f440e90862853e0598f1adaba1fea1ee58d7dfbc098301ca80a89df97f6f726002b9a04b5fe3b1
-
Filesize
267KB
MD58588ae534aa1576d29e9c6462232cc0f
SHA1ac5cccf5a46f2ab7e66901e99c09700b5bd4403d
SHA2562c9c5dbdb68863ae4863c444c9ec8b67968be535fab0808ccef55800370950cb
SHA512fa7c55cc10fe5dfeb505a94ac95515dcc10f6adc797b7d4a5f7e56160ff0d1c13e5762cb29429c39bf9502be459cddcbe4f84a457264db08f9cdc5f6a17e122c