Analysis

  • max time kernel
    143s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250207-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/02/2025, 09:43

General

  • Target

    d8e320833e90898006afdfcbf2f0ea784d3815edb432b386a5f55c446bbb2017.exe

  • Size

    666KB

  • MD5

    ed3ae97c0d40bc20e202366da3265d8b

  • SHA1

    9dfe95c90d89d38fdb2b169ba4b9afbbe163cdeb

  • SHA256

    d8e320833e90898006afdfcbf2f0ea784d3815edb432b386a5f55c446bbb2017

  • SHA512

    f15567e96bdc1d4c83412a61b6ea641158d6b15166e08db3bd1343c8d12842f15d799205770ed7d2e45e3314bee33f733b046670e988dfad3eb261c58f0125b8

  • SSDEEP

    12288:+MrYy90hol7B+b5rKWBpZRy5JeiKVIk8IxOAeKjGQoqBi1yyiOmKFM:+ysUsdrKWB1y/k8wOW6QDg+OxM

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 19 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 2 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 2 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 4 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Downloads MZ/PE file 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d8e320833e90898006afdfcbf2f0ea784d3815edb432b386a5f55c446bbb2017.exe
    "C:\Users\Admin\AppData\Local\Temp\d8e320833e90898006afdfcbf2f0ea784d3815edb432b386a5f55c446bbb2017.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2460
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina6085.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina6085.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3952
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bu104248.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bu104248.exe
        3⤵
        • Modifies Windows Defender DisableAntiSpyware settings
        • Modifies Windows Defender Real-time Protection settings
        • Modifies Windows Defender TamperProtection settings
        • Modifies Windows Defender notification settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4136
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cor0864.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cor0864.exe
        3⤵
        • Modifies Windows Defender DisableAntiSpyware settings
        • Modifies Windows Defender Real-time Protection settings
        • Modifies Windows Defender TamperProtection settings
        • Modifies Windows Defender notification settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1844
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1844 -s 1076
          4⤵
          • Program crash
          PID:3468
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dMW83s71.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dMW83s71.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:3672
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1844 -ip 1844
    1⤵
      PID:3048
    • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
      "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7NDhEODlFMDktODE1OS00MDFDLTk4RjUtMTcwNDUwMUU2RjM1fSIgdXNlcmlkPSJ7QkE0N0NENTctMjU0Ni00RDk3LUFBRDEtMEU4OTFDNjBCRTU0fSIgaW5zdGFsbHNvdXJjZT0ibGltaXRlZCIgcmVxdWVzdGlkPSJ7RDlFRDdCMDYtMkY1Ny00MzNCLTg1NUItRTMxMTkwODRFOTUwfSIgZGVkdXA9ImNyIiBkb21haW5qb2luZWQ9IjAiPjxodyBsb2dpY2FsX2NwdXM9IjIiIHBoeXNtZW1vcnk9IjQiIGRpc2tfdHlwZT0iMiIgc3NlPSIxIiBzc2UyPSIxIiBzc2UzPSIxIiBzc3NlMz0iMSIgc3NlNDE9IjEiIHNzZTQyPSIxIiBhdng9IjEiLz48b3MgcGxhdGZvcm09IndpbiIgdmVyc2lvbj0iMTAuMC4xOTA0MS4xMjg4IiBzcD0iIiBhcmNoPSJ4NjQiIHByb2R1Y3RfdHlwZT0iNDgiIGlzX3dpcD0iMCIgaXNfaW5fbG9ja2Rvd25fbW9kZT0iMCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiZxdW90O0UreGJBejZZNnNVMTI4OWJTNnFsNFZSTGJramZCVUdUTUpzanJIcjQ0aUk9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIzIiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDY4MzAiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxOTE0Njg3NjAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MDYzMTI3OTgwIi8-PC9hcHA-PC9yZXF1ZXN0Pg
      1⤵
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      PID:440

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dMW83s71.exe

      Filesize

      354KB

      MD5

      2fece8d0426822f9dc1b5b57cf5b602b

      SHA1

      6f576923eab42aa7b06dbe587e7159229b3f688f

      SHA256

      c52bab48dfb7adc7c9eda8bc447bb6fa372f740732a2fc14443ccb7dd864b909

      SHA512

      8364413df53969225c115576f624d084e469e5d28e9fa26729b8e72b4712ce80bfb50854aadc395c2cb5b1e280000391cd4d41016abc35352e8e7e76414fa8d4

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina6085.exe

      Filesize

      329KB

      MD5

      4c2063d6c939c8198cd97e33de24a54f

      SHA1

      b5fb1a898bc07255c23cbc1374510b9094db7490

      SHA256

      915149676cab2c5dd3b570f4c5b2988e6561393c6b6989d2203e5a4e7a6d85ad

      SHA512

      c84001f555a6b5b45f7d2702d78d8b57515323dd684eb96b9041164ed793b9d76b65fc0e97945d796a6ae551963b7d32ebcc1a91abacb057fa9014b26aaefed7

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bu104248.exe

      Filesize

      11KB

      MD5

      bee9a4e20eb95147a40258a778f60e82

      SHA1

      b2671da8c58e8056ec60776b02e5a37e1f326c2c

      SHA256

      b7f87429788383858c37a079c197b43224909c60ca650f68c1796a6101a7a52e

      SHA512

      dd0513d99459bcfe9a49d4a02e1af05f1594490dda9bdd269cefa5a2e299fa3a968cdd5aafc4a1b1a109fa8e64a16b0782557b20d46e2d4f930b5c327f75c298

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cor0864.exe

      Filesize

      295KB

      MD5

      d77d78a8721395888211772d09fe1a47

      SHA1

      f139826e5481db735a02e6e1e624f2781db8d0fe

      SHA256

      020a9562d40b8d96dc098be96f0f0fa5d324605b7afcea9a3c2eacb9a8840019

      SHA512

      d6e5d14fe17395cbccde74cb75d45ea77e40d8bf21929dba9e990763e93fa9f5eda142d95fbea42a2d29a61ce30ec02414b3140074f0441651a25535a4a29cd1

    • memory/1844-22-0x0000000004A20000-0x0000000004A3A000-memory.dmp

      Filesize

      104KB

    • memory/1844-23-0x00000000072A0000-0x0000000007844000-memory.dmp

      Filesize

      5.6MB

    • memory/1844-24-0x0000000007110000-0x0000000007128000-memory.dmp

      Filesize

      96KB

    • memory/1844-25-0x0000000007110000-0x0000000007122000-memory.dmp

      Filesize

      72KB

    • memory/1844-30-0x0000000007110000-0x0000000007122000-memory.dmp

      Filesize

      72KB

    • memory/1844-52-0x0000000007110000-0x0000000007122000-memory.dmp

      Filesize

      72KB

    • memory/1844-50-0x0000000007110000-0x0000000007122000-memory.dmp

      Filesize

      72KB

    • memory/1844-49-0x0000000007110000-0x0000000007122000-memory.dmp

      Filesize

      72KB

    • memory/1844-47-0x0000000007110000-0x0000000007122000-memory.dmp

      Filesize

      72KB

    • memory/1844-44-0x0000000007110000-0x0000000007122000-memory.dmp

      Filesize

      72KB

    • memory/1844-42-0x0000000007110000-0x0000000007122000-memory.dmp

      Filesize

      72KB

    • memory/1844-40-0x0000000007110000-0x0000000007122000-memory.dmp

      Filesize

      72KB

    • memory/1844-38-0x0000000007110000-0x0000000007122000-memory.dmp

      Filesize

      72KB

    • memory/1844-36-0x0000000007110000-0x0000000007122000-memory.dmp

      Filesize

      72KB

    • memory/1844-34-0x0000000007110000-0x0000000007122000-memory.dmp

      Filesize

      72KB

    • memory/1844-32-0x0000000007110000-0x0000000007122000-memory.dmp

      Filesize

      72KB

    • memory/1844-28-0x0000000007110000-0x0000000007122000-memory.dmp

      Filesize

      72KB

    • memory/1844-26-0x0000000007110000-0x0000000007122000-memory.dmp

      Filesize

      72KB

    • memory/1844-53-0x0000000000400000-0x0000000002B78000-memory.dmp

      Filesize

      39.5MB

    • memory/1844-55-0x0000000000400000-0x0000000002B78000-memory.dmp

      Filesize

      39.5MB

    • memory/3672-60-0x00000000049A0000-0x00000000049E6000-memory.dmp

      Filesize

      280KB

    • memory/3672-61-0x00000000071B0000-0x00000000071F4000-memory.dmp

      Filesize

      272KB

    • memory/3672-62-0x00000000071B0000-0x00000000071EF000-memory.dmp

      Filesize

      252KB

    • memory/3672-95-0x00000000071B0000-0x00000000071EF000-memory.dmp

      Filesize

      252KB

    • memory/3672-93-0x00000000071B0000-0x00000000071EF000-memory.dmp

      Filesize

      252KB

    • memory/3672-91-0x00000000071B0000-0x00000000071EF000-memory.dmp

      Filesize

      252KB

    • memory/3672-89-0x00000000071B0000-0x00000000071EF000-memory.dmp

      Filesize

      252KB

    • memory/3672-87-0x00000000071B0000-0x00000000071EF000-memory.dmp

      Filesize

      252KB

    • memory/3672-86-0x00000000071B0000-0x00000000071EF000-memory.dmp

      Filesize

      252KB

    • memory/3672-83-0x00000000071B0000-0x00000000071EF000-memory.dmp

      Filesize

      252KB

    • memory/3672-81-0x00000000071B0000-0x00000000071EF000-memory.dmp

      Filesize

      252KB

    • memory/3672-77-0x00000000071B0000-0x00000000071EF000-memory.dmp

      Filesize

      252KB

    • memory/3672-75-0x00000000071B0000-0x00000000071EF000-memory.dmp

      Filesize

      252KB

    • memory/3672-73-0x00000000071B0000-0x00000000071EF000-memory.dmp

      Filesize

      252KB

    • memory/3672-71-0x00000000071B0000-0x00000000071EF000-memory.dmp

      Filesize

      252KB

    • memory/3672-69-0x00000000071B0000-0x00000000071EF000-memory.dmp

      Filesize

      252KB

    • memory/3672-67-0x00000000071B0000-0x00000000071EF000-memory.dmp

      Filesize

      252KB

    • memory/3672-65-0x00000000071B0000-0x00000000071EF000-memory.dmp

      Filesize

      252KB

    • memory/3672-63-0x00000000071B0000-0x00000000071EF000-memory.dmp

      Filesize

      252KB

    • memory/3672-79-0x00000000071B0000-0x00000000071EF000-memory.dmp

      Filesize

      252KB

    • memory/3672-968-0x0000000007900000-0x0000000007F18000-memory.dmp

      Filesize

      6.1MB

    • memory/3672-969-0x0000000007FA0000-0x00000000080AA000-memory.dmp

      Filesize

      1.0MB

    • memory/3672-970-0x00000000080E0000-0x00000000080F2000-memory.dmp

      Filesize

      72KB

    • memory/3672-971-0x0000000008100000-0x000000000813C000-memory.dmp

      Filesize

      240KB

    • memory/3672-972-0x0000000008250000-0x000000000829C000-memory.dmp

      Filesize

      304KB

    • memory/4136-14-0x00007FFFDC963000-0x00007FFFDC965000-memory.dmp

      Filesize

      8KB

    • memory/4136-15-0x00000000006B0000-0x00000000006BA000-memory.dmp

      Filesize

      40KB

    • memory/4136-16-0x00007FFFDC963000-0x00007FFFDC965000-memory.dmp

      Filesize

      8KB