Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250211-en -
resource tags
arch:x64arch:x86image:win10v2004-20250211-enlocale:en-usos:windows10-2004-x64system -
submitted
12/02/2025, 22:54
Static task
static1
Behavioral task
behavioral1
Sample
4835bebc63e99fdc8f1004ebdd219a64bf04198b07b6d9265e9f99e377119f9b.exe
Resource
win10v2004-20250211-en
General
-
Target
4835bebc63e99fdc8f1004ebdd219a64bf04198b07b6d9265e9f99e377119f9b.exe
-
Size
1.0MB
-
MD5
6d043ff3c8aab213b20cfd1d0d8ed5ec
-
SHA1
a3daadd8416db42be6a0f2aa1c83a659f26c1dec
-
SHA256
4835bebc63e99fdc8f1004ebdd219a64bf04198b07b6d9265e9f99e377119f9b
-
SHA512
c278a8f31ddc897d7e74fae9c0dd5fc168fb69fd1b6e880f3ad274cf509829982e7abf652d1d6dee9398312b4f165ab178b65fa4dacf0fb7a90f1f263a973bbd
-
SSDEEP
24576:9yno5feE4whYLJGaxAqACzTbce/pyrc+j+XOJWMB9CzdImV:Yno5WDEYLJGaxADCvbc6yw+jeOJWMLCx
Malware Config
Extracted
redline
ronur
193.233.20.20:4134
-
auth_value
f88f86755a528d4b25f6f3628c460965
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023cc3-27.dat healer behavioral1/memory/3980-28-0x0000000000B30000-0x0000000000B3A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" arl20pW.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" arl20pW.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection arl20pW.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" arl20pW.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" arl20pW.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" arl20pW.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" arl20pW.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" arl20pW.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications arl20pW.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" arl20pW.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/3120-34-0x0000000002510000-0x0000000002556000-memory.dmp family_redline behavioral1/memory/3120-36-0x0000000004BD0000-0x0000000004C14000-memory.dmp family_redline behavioral1/memory/3120-96-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3120-100-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3120-98-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3120-94-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3120-90-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3120-88-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3120-84-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3120-80-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3120-78-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3120-74-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3120-70-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3120-66-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3120-62-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3120-58-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3120-92-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3120-86-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3120-82-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3120-76-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3120-72-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3120-68-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3120-64-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3120-60-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3120-56-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3120-54-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3120-52-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3120-50-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3120-48-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3120-46-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3120-44-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3120-42-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3120-40-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3120-38-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline behavioral1/memory/3120-37-0x0000000004BD0000-0x0000000004C0E000-memory.dmp family_redline -
Redline family
-
Downloads MZ/PE file 1 IoCs
flow pid Process 28 6432 Process not Found -
Executes dropped EXE 5 IoCs
pid Process 4728 nTS16Bn.exe 4072 nrQ87sL.exe 3500 nvK26oP.exe 3980 arl20pW.exe 3120 bVt23EB81.exe -
Windows security modification 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" arl20pW.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4835bebc63e99fdc8f1004ebdd219a64bf04198b07b6d9265e9f99e377119f9b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nTS16Bn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" nrQ87sL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" nvK26oP.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4835bebc63e99fdc8f1004ebdd219a64bf04198b07b6d9265e9f99e377119f9b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nTS16Bn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nrQ87sL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nvK26oP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bVt23EB81.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 6312 MicrosoftEdgeUpdate.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3980 arl20pW.exe 3980 arl20pW.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3980 arl20pW.exe Token: SeDebugPrivilege 3120 bVt23EB81.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4208 wrote to memory of 4728 4208 4835bebc63e99fdc8f1004ebdd219a64bf04198b07b6d9265e9f99e377119f9b.exe 87 PID 4208 wrote to memory of 4728 4208 4835bebc63e99fdc8f1004ebdd219a64bf04198b07b6d9265e9f99e377119f9b.exe 87 PID 4208 wrote to memory of 4728 4208 4835bebc63e99fdc8f1004ebdd219a64bf04198b07b6d9265e9f99e377119f9b.exe 87 PID 4728 wrote to memory of 4072 4728 nTS16Bn.exe 88 PID 4728 wrote to memory of 4072 4728 nTS16Bn.exe 88 PID 4728 wrote to memory of 4072 4728 nTS16Bn.exe 88 PID 4072 wrote to memory of 3500 4072 nrQ87sL.exe 89 PID 4072 wrote to memory of 3500 4072 nrQ87sL.exe 89 PID 4072 wrote to memory of 3500 4072 nrQ87sL.exe 89 PID 3500 wrote to memory of 3980 3500 nvK26oP.exe 90 PID 3500 wrote to memory of 3980 3500 nvK26oP.exe 90 PID 3500 wrote to memory of 3120 3500 nvK26oP.exe 96 PID 3500 wrote to memory of 3120 3500 nvK26oP.exe 96 PID 3500 wrote to memory of 3120 3500 nvK26oP.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\4835bebc63e99fdc8f1004ebdd219a64bf04198b07b6d9265e9f99e377119f9b.exe"C:\Users\Admin\AppData\Local\Temp\4835bebc63e99fdc8f1004ebdd219a64bf04198b07b6d9265e9f99e377119f9b.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nTS16Bn.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nTS16Bn.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nrQ87sL.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nrQ87sL.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nvK26oP.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nvK26oP.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\arl20pW.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\arl20pW.exe5⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3980
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bVt23EB81.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bVt23EB81.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3120
-
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIxIiBpbnN0YWxsZGF0ZXRpbWU9IjE3MzkyODIxNjkiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4Mzc1MzE4NTEwMTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI0OTY3ODA0MjEwIi8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:6312
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
883KB
MD58df68997bd2bcea3afc549ea2f8709cb
SHA11bfbc0f1121a6a0a84d65be940f2da9dc854f423
SHA2562f3516226f2df44bad100db5c4e1d06679f543f07ea98389f7360199f0076e4a
SHA5120b677eb0b50dc6654436b1256040570052fea52ec2971ed327098f3780d408cb507188b6abbdb230b9a55d9fc6728b28b80e108f06bef22b4b6c097def196e2a
-
Filesize
661KB
MD584cc7e60fc42eb3d106346198eb5be52
SHA1604cbd25fce3e223f91f1beb9684a4c70c2d31b4
SHA256931c1b02c588a96a85654159aa2b971d4241546fab4c3a95ab7ba107eba8da97
SHA512fd9e5be6f8dc360ea03da94154fe383bb477569ecbc6a428c66552603480e3ff61b98e1fb7bc7d5567f55e1a4257e8b87d5ae29c182f746643c75ddf57dfe422
-
Filesize
388KB
MD596ea622f1dd6d49ad6ca3ce94d0de019
SHA145b7e53cc6d9fd09e635db2fa205298cc5aab155
SHA2568cbc2a5893f09afe14a17ab10169df125118de8f971070c586e36406b46d22fb
SHA51265db004b0a5cd5d59cc25534b7e66a8bab87cc8a4eb1172c92adb21072eece680cb69bd87f5c07ecb2fb0331f20e905cca9c100492609bd0aaa59f2f73052586
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
301KB
MD5726fa7d3e3e620d8ffc1ddbba23eab22
SHA124f358ce29c6e9195636560971245d3d345b1e57
SHA25642545d609e7c76810ad63ea4da09e1182d94c9f3b9ee2cdc769a0f9d04d484fe
SHA5120c287ef0c0a1ebcc7c34a88c8144c84ca38b7609e838375f8702521038e6f20876b6dee149bbabcb5f67bcdbc9723ec96d0f84317c64c480abf2a9434ad9060a