Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
12/02/2025, 13:45
Static task
static1
Behavioral task
behavioral1
Sample
0d0eb08455475de62de9365a288f4b0810a5b5f3ac2e29618b8c4252bc8f15ca.exe
Resource
win10v2004-20250207-en
General
-
Target
0d0eb08455475de62de9365a288f4b0810a5b5f3ac2e29618b8c4252bc8f15ca.exe
-
Size
843KB
-
MD5
80deb9683f64cbe5379cbbf0cedff3c2
-
SHA1
3557a6a63c1c3138a798dd447f2839b24c9bcad4
-
SHA256
0d0eb08455475de62de9365a288f4b0810a5b5f3ac2e29618b8c4252bc8f15ca
-
SHA512
d0a866cadf227671b34079325b97dbda3ed67863452929a4f937badaf5db9e57f6e69ea5fd99fdc45350b4c69a50d78ef03064b5b6d45e7c56f5e04c06d751ef
-
SSDEEP
24576:xyJ37pUQeR74/QPRpf4Izq/pwkQe7JjBFUfr34UX:kJrSR7awpjz9SOv
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/1056-24-0x0000000002270000-0x000000000228A000-memory.dmp healer behavioral1/memory/1056-26-0x0000000002440000-0x0000000002458000-memory.dmp healer behavioral1/memory/1056-30-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/1056-54-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/1056-52-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/1056-48-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/1056-46-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/1056-44-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/1056-42-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/1056-40-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/1056-38-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/1056-34-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/1056-28-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/1056-50-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/1056-36-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/1056-32-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/1056-27-0x0000000002440000-0x0000000002452000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" pr615589.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr615589.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr615589.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr615589.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr615589.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr615589.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr615589.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr615589.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications pr615589.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" pr615589.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2004-64-0x0000000002420000-0x0000000002466000-memory.dmp family_redline behavioral1/memory/2004-65-0x0000000004B00000-0x0000000004B44000-memory.dmp family_redline behavioral1/memory/2004-77-0x0000000004B00000-0x0000000004B3F000-memory.dmp family_redline behavioral1/memory/2004-81-0x0000000004B00000-0x0000000004B3F000-memory.dmp family_redline behavioral1/memory/2004-99-0x0000000004B00000-0x0000000004B3F000-memory.dmp family_redline behavioral1/memory/2004-97-0x0000000004B00000-0x0000000004B3F000-memory.dmp family_redline behavioral1/memory/2004-95-0x0000000004B00000-0x0000000004B3F000-memory.dmp family_redline behavioral1/memory/2004-93-0x0000000004B00000-0x0000000004B3F000-memory.dmp family_redline behavioral1/memory/2004-91-0x0000000004B00000-0x0000000004B3F000-memory.dmp family_redline behavioral1/memory/2004-89-0x0000000004B00000-0x0000000004B3F000-memory.dmp family_redline behavioral1/memory/2004-87-0x0000000004B00000-0x0000000004B3F000-memory.dmp family_redline behavioral1/memory/2004-85-0x0000000004B00000-0x0000000004B3F000-memory.dmp family_redline behavioral1/memory/2004-83-0x0000000004B00000-0x0000000004B3F000-memory.dmp family_redline behavioral1/memory/2004-79-0x0000000004B00000-0x0000000004B3F000-memory.dmp family_redline behavioral1/memory/2004-75-0x0000000004B00000-0x0000000004B3F000-memory.dmp family_redline behavioral1/memory/2004-73-0x0000000004B00000-0x0000000004B3F000-memory.dmp family_redline behavioral1/memory/2004-71-0x0000000004B00000-0x0000000004B3F000-memory.dmp family_redline behavioral1/memory/2004-69-0x0000000004B00000-0x0000000004B3F000-memory.dmp family_redline behavioral1/memory/2004-67-0x0000000004B00000-0x0000000004B3F000-memory.dmp family_redline behavioral1/memory/2004-66-0x0000000004B00000-0x0000000004B3F000-memory.dmp family_redline -
Redline family
-
Downloads MZ/PE file 1 IoCs
flow pid Process 67 1116 Process not Found -
Executes dropped EXE 4 IoCs
pid Process 2608 un247162.exe 4848 un929212.exe 1056 pr615589.exe 2004 qu975997.exe -
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr615589.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr615589.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un929212.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0d0eb08455475de62de9365a288f4b0810a5b5f3ac2e29618b8c4252bc8f15ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un247162.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3812 1056 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu975997.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0d0eb08455475de62de9365a288f4b0810a5b5f3ac2e29618b8c4252bc8f15ca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un247162.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un929212.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr615589.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 6676 MicrosoftEdgeUpdate.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1056 pr615589.exe 1056 pr615589.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1056 pr615589.exe Token: SeDebugPrivilege 2004 qu975997.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 408 wrote to memory of 2608 408 0d0eb08455475de62de9365a288f4b0810a5b5f3ac2e29618b8c4252bc8f15ca.exe 86 PID 408 wrote to memory of 2608 408 0d0eb08455475de62de9365a288f4b0810a5b5f3ac2e29618b8c4252bc8f15ca.exe 86 PID 408 wrote to memory of 2608 408 0d0eb08455475de62de9365a288f4b0810a5b5f3ac2e29618b8c4252bc8f15ca.exe 86 PID 2608 wrote to memory of 4848 2608 un247162.exe 88 PID 2608 wrote to memory of 4848 2608 un247162.exe 88 PID 2608 wrote to memory of 4848 2608 un247162.exe 88 PID 4848 wrote to memory of 1056 4848 un929212.exe 90 PID 4848 wrote to memory of 1056 4848 un929212.exe 90 PID 4848 wrote to memory of 1056 4848 un929212.exe 90 PID 4848 wrote to memory of 2004 4848 un929212.exe 95 PID 4848 wrote to memory of 2004 4848 un929212.exe 95 PID 4848 wrote to memory of 2004 4848 un929212.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d0eb08455475de62de9365a288f4b0810a5b5f3ac2e29618b8c4252bc8f15ca.exe"C:\Users\Admin\AppData\Local\Temp\0d0eb08455475de62de9365a288f4b0810a5b5f3ac2e29618b8c4252bc8f15ca.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un247162.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un247162.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un929212.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un929212.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr615589.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr615589.exe4⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1056 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1056 -s 10965⤵
- Program crash
PID:3812
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu975997.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu975997.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2004
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1056 -ip 10561⤵PID:4024
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI0IiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDY0MzMiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODc1OTU2NTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MDcwMDk2NjU1Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:6676
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
661KB
MD50a0be2694f3fe47682cb93397547af32
SHA124caa9b58c37ea7bb1b341832edbca99fbbf910a
SHA2565de43cf33febf0d5bdb14acdb69be72c8af8c21aa308ba5876c70bc3a8e10759
SHA512113ddfe26226d3dad841ed0d292289b0ae544ab28bf7c0ec4489413f9fb171d3aac558cf4e814df91239e8c182115bab1c39542570263781c651c6f5d762e6eb
-
Filesize
519KB
MD55c6f0b460ef0cefd28d9419732c620d7
SHA156e2c88490fd963d43d42ef5108a312ccd1a00a5
SHA2561201f68492a30272b146752b3cfaee9f41873239d59b5c844f734bb970f3fa2b
SHA512e4549c536deef0b877ca9c2a6eca097696952b96b1d4839fe9281e85142512ecad80f88b0349103f28d40495b142f1177504ab09906b4f8febf63d62130dcf64
-
Filesize
239KB
MD57a49846d26a262816469b5c159063517
SHA1c9c40c2a44bc3c5898bdbf95b010704ddb61651a
SHA256e60b9f6e52de2cfa36d4c59d2fc8ef07cb7524270c9673ea6e7eed556a22d9b8
SHA512c0e13f7aabe8faffab244a27171754fb3a63d52209e980c5c87c776753ae6d17fef7cccb4b33404e2c907355eb073525644b23c84c36ee0d9776647859eac9a8
-
Filesize
299KB
MD52e1e5920ee1ae0501c080e7a273940f2
SHA1fb7e95a1fc54264d6595f296e6523c1abbaf615e
SHA25645202d324d9d54ad22b6b59fdde88a1be1ddf3876f9a4fb21165aca6e22c24eb
SHA512905fb946612c0a63eaa96cd841604308b92c7f0249597655b555ae64c9d80d1c5d016c53d303e154d4f6af62d0fae7b9b4f09af559a15ee8b9ac1a0376fc11c0