Analysis
-
max time kernel
112s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
08-02-2025 07:56
Static task
static1
Behavioral task
behavioral1
Sample
5e38f0bf5e990a01a3d000599767a72555dbe2cefaa8131423480edf539a151aN.exe
Resource
win10v2004-20250207-en
General
-
Target
5e38f0bf5e990a01a3d000599767a72555dbe2cefaa8131423480edf539a151aN.exe
-
Size
666KB
-
MD5
697bc8adb11b2ac8ebcd4838dc9eb380
-
SHA1
64dfe94319b2de1984fdf23a3fa08d386caf3593
-
SHA256
5e38f0bf5e990a01a3d000599767a72555dbe2cefaa8131423480edf539a151a
-
SHA512
84351d8f32d134ad8136c28958bfe81259b5f85c9752d0aa30900be93a0b6640429941ef224688d42768f247ee669c224ccc01f6d6e2cda98cbd36edfaee0449
-
SSDEEP
12288:+MrWy90c+Lx/yr1/1ZcjdWpNu9dDhTTwwgGYaEYQlaLMz9pzwOFVx:0ypWUgzFTTwwgGYaZjL4z1J
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
resource yara_rule behavioral1/files/0x0008000000023e13-12.dat healer behavioral1/memory/3052-15-0x0000000000ED0000-0x0000000000EDA000-memory.dmp healer behavioral1/memory/3684-22-0x0000000004BF0000-0x0000000004C0A000-memory.dmp healer behavioral1/memory/3684-24-0x0000000004C70000-0x0000000004C88000-memory.dmp healer behavioral1/memory/3684-52-0x0000000004C70000-0x0000000004C82000-memory.dmp healer behavioral1/memory/3684-26-0x0000000004C70000-0x0000000004C82000-memory.dmp healer behavioral1/memory/3684-50-0x0000000004C70000-0x0000000004C82000-memory.dmp healer behavioral1/memory/3684-48-0x0000000004C70000-0x0000000004C82000-memory.dmp healer behavioral1/memory/3684-46-0x0000000004C70000-0x0000000004C82000-memory.dmp healer behavioral1/memory/3684-42-0x0000000004C70000-0x0000000004C82000-memory.dmp healer behavioral1/memory/3684-40-0x0000000004C70000-0x0000000004C82000-memory.dmp healer behavioral1/memory/3684-36-0x0000000004C70000-0x0000000004C82000-memory.dmp healer behavioral1/memory/3684-30-0x0000000004C70000-0x0000000004C82000-memory.dmp healer behavioral1/memory/3684-25-0x0000000004C70000-0x0000000004C82000-memory.dmp healer behavioral1/memory/3684-44-0x0000000004C70000-0x0000000004C82000-memory.dmp healer behavioral1/memory/3684-38-0x0000000004C70000-0x0000000004C82000-memory.dmp healer behavioral1/memory/3684-35-0x0000000004C70000-0x0000000004C82000-memory.dmp healer behavioral1/memory/3684-32-0x0000000004C70000-0x0000000004C82000-memory.dmp healer behavioral1/memory/3684-28-0x0000000004C70000-0x0000000004C82000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" tz6236.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" v6874zo.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" tz6236.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" tz6236.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection v6874zo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" v6874zo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" v6874zo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" v6874zo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" v6874zo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection tz6236.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" tz6236.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" tz6236.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" tz6236.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" v6874zo.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" tz6236.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" v6874zo.exe -
Modifies Windows Defender notification settings 3 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications tz6236.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" tz6236.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications v6874zo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" v6874zo.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/824-60-0x0000000004A50000-0x0000000004A96000-memory.dmp family_redline behavioral1/memory/824-61-0x0000000004C00000-0x0000000004C44000-memory.dmp family_redline behavioral1/memory/824-89-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/824-95-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/824-93-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/824-92-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/824-87-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/824-83-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/824-81-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/824-79-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/824-77-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/824-85-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/824-75-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/824-73-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/824-71-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/824-69-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/824-67-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/824-65-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/824-63-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/824-62-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline -
Redline family
-
Downloads MZ/PE file 1 IoCs
flow pid Process 29 2880 Process not Found -
Executes dropped EXE 4 IoCs
pid Process 4028 zap3826.exe 3052 tz6236.exe 3684 v6874zo.exe 824 w52sz29.exe -
Windows security modification 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features v6874zo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" v6874zo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" tz6236.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5e38f0bf5e990a01a3d000599767a72555dbe2cefaa8131423480edf539a151aN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zap3826.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1376 3684 WerFault.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5e38f0bf5e990a01a3d000599767a72555dbe2cefaa8131423480edf539a151aN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zap3826.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v6874zo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language w52sz29.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1984 MicrosoftEdgeUpdate.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3052 tz6236.exe 3052 tz6236.exe 3684 v6874zo.exe 3684 v6874zo.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3052 tz6236.exe Token: SeDebugPrivilege 3684 v6874zo.exe Token: SeDebugPrivilege 824 w52sz29.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4388 wrote to memory of 4028 4388 5e38f0bf5e990a01a3d000599767a72555dbe2cefaa8131423480edf539a151aN.exe 87 PID 4388 wrote to memory of 4028 4388 5e38f0bf5e990a01a3d000599767a72555dbe2cefaa8131423480edf539a151aN.exe 87 PID 4388 wrote to memory of 4028 4388 5e38f0bf5e990a01a3d000599767a72555dbe2cefaa8131423480edf539a151aN.exe 87 PID 4028 wrote to memory of 3052 4028 zap3826.exe 88 PID 4028 wrote to memory of 3052 4028 zap3826.exe 88 PID 4028 wrote to memory of 3684 4028 zap3826.exe 91 PID 4028 wrote to memory of 3684 4028 zap3826.exe 91 PID 4028 wrote to memory of 3684 4028 zap3826.exe 91 PID 4388 wrote to memory of 824 4388 5e38f0bf5e990a01a3d000599767a72555dbe2cefaa8131423480edf539a151aN.exe 95 PID 4388 wrote to memory of 824 4388 5e38f0bf5e990a01a3d000599767a72555dbe2cefaa8131423480edf539a151aN.exe 95 PID 4388 wrote to memory of 824 4388 5e38f0bf5e990a01a3d000599767a72555dbe2cefaa8131423480edf539a151aN.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e38f0bf5e990a01a3d000599767a72555dbe2cefaa8131423480edf539a151aN.exe"C:\Users\Admin\AppData\Local\Temp\5e38f0bf5e990a01a3d000599767a72555dbe2cefaa8131423480edf539a151aN.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap3826.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap3826.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tz6236.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tz6236.exe3⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3052
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6874zo.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6874zo.exe3⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3684 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 10844⤵
- Program crash
PID:1376
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w52sz29.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w52sz29.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3684 -ip 36841⤵PID:4156
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIxIiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDU4MTUiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODE1MzQzMTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1NDI4OTE3NTgzIi8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:1984
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342KB
MD59391392ce62abea236c2aba17911eb09
SHA155ecdb7ef14a19121e4e88467083aeab0e94087c
SHA256cbdfed781ff3f6d7368e0182a068f52aff5bd0b95154ff2834a12167fec0888e
SHA512b288297e5afdcee9af39a9d98009490048a5d02c8d3146a0446d0eed6d049e0760dd6e75b8b46706788d688d44360b455661ebbfd651aeb1d29bebe446304504
-
Filesize
330KB
MD5c1611a020c408d74768fdf3d5fddcc6e
SHA1f3b731e65bffc796634de071f21fb7c2ed0b7dac
SHA2563ff2c9b5bd409da87eaf2d89ea26992c3086ec88960420cf73d4f443da0af2b7
SHA512b1829c17b5ff734b50311bad68c39b44e4e809853c19d4ca7b2eef945f3e62dd92c20967a0c93116dac0d3375c6e7a1635ebbd5e18848b0b8b3cd7b277977ae0
-
Filesize
12KB
MD55edb651bbbc7ec7c364478fe81e43299
SHA18a591f63b99b1d02ddbf0a7e112605ff752475ae
SHA2566088313e73ed6644e4c86a84fa1ab12d2f8ce31ee8dd225c79105106544fd655
SHA51274c78b59f7c14eb5747381c0f87b26a3548017e222aeebf11e6b687c858c36eda665ad1e23260089c79e843b6cadd9e80ae33e51b46e6052f15926a1b1e0b9ae
-
Filesize
283KB
MD58f7f279738b5e866837f2a8eb119e2be
SHA135ab65acba029822a74b1cb129657440e65c04eb
SHA256bf5ec219cc8aec70a84e63429e7d261845033545902bb7f12f1e74a53ad12635
SHA5125f6aedea762f18c4972f20073bc4adcedfe2bb3579f60540b15fa2f094f3e6f12f2b1fcedccf31ac00446418a6931106e45316f6d3f56dbfadea5912a2831e67