Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
13-02-2025 06:30
Static task
static1
Behavioral task
behavioral1
Sample
c6acd7bd12bd25fce3cf5aee3f4ac6ead7a3e8d0bcdcb330aab7e61f535e4e81.exe
Resource
win10v2004-20250207-en
General
-
Target
c6acd7bd12bd25fce3cf5aee3f4ac6ead7a3e8d0bcdcb330aab7e61f535e4e81.exe
-
Size
903KB
-
MD5
7a964d6ea7034f53e6e798de342829a3
-
SHA1
662bcaa92fe73b553e6050a44936bfcbdc19e648
-
SHA256
c6acd7bd12bd25fce3cf5aee3f4ac6ead7a3e8d0bcdcb330aab7e61f535e4e81
-
SHA512
78a666e512dc92604e70fc1fd02485a65aca41672fb63a587efbe9d7f67216e8225be975bd50ca413345e8e7f6a8f2e7b442bb03549b9197e2c2ab0661c5dd9c
-
SSDEEP
24576:+ywoD049O8k0+D/+ExZWHhtQbwRWrSyz34J3f3x:NwoIIZk0+nxwHhWbwRbx
Malware Config
Extracted
redline
ronam
193.233.20.17:4139
-
auth_value
125421d19d14dd7fd211bc7f6d4aea6c
Extracted
redline
dubnar
193.233.20.17:4139
-
auth_value
2aa4eb46ad52c4058f24c70a9e67889a
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/3380-25-0x0000000002450000-0x000000000246A000-memory.dmp healer behavioral1/memory/3380-27-0x0000000002600000-0x0000000002618000-memory.dmp healer behavioral1/memory/3380-39-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/3380-55-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/3380-53-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/3380-51-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/3380-49-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/3380-47-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/3380-45-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/3380-44-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/3380-41-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/3380-37-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/3380-35-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/3380-33-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/3380-31-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/3380-29-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/3380-28-0x0000000002600000-0x0000000002612000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" arO30Oe.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" arO30Oe.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection arO30Oe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" arO30Oe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" arO30Oe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" arO30Oe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" arO30Oe.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" arO30Oe.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications arO30Oe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" arO30Oe.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2216-72-0x0000000004930000-0x0000000004976000-memory.dmp family_redline behavioral1/memory/2216-73-0x00000000049F0000-0x0000000004A34000-memory.dmp family_redline behavioral1/files/0x000a000000023d1e-75.dat family_redline behavioral1/memory/2216-95-0x00000000049F0000-0x0000000004A2E000-memory.dmp family_redline behavioral1/memory/2216-101-0x00000000049F0000-0x0000000004A2E000-memory.dmp family_redline behavioral1/memory/2216-105-0x00000000049F0000-0x0000000004A2E000-memory.dmp family_redline behavioral1/memory/3076-276-0x00000000005A0000-0x00000000005D2000-memory.dmp family_redline behavioral1/memory/2216-103-0x00000000049F0000-0x0000000004A2E000-memory.dmp family_redline behavioral1/memory/2216-99-0x00000000049F0000-0x0000000004A2E000-memory.dmp family_redline behavioral1/memory/2216-97-0x00000000049F0000-0x0000000004A2E000-memory.dmp family_redline behavioral1/memory/2216-93-0x00000000049F0000-0x0000000004A2E000-memory.dmp family_redline behavioral1/memory/2216-91-0x00000000049F0000-0x0000000004A2E000-memory.dmp family_redline behavioral1/memory/2216-89-0x00000000049F0000-0x0000000004A2E000-memory.dmp family_redline behavioral1/memory/2216-87-0x00000000049F0000-0x0000000004A2E000-memory.dmp family_redline behavioral1/memory/2216-85-0x00000000049F0000-0x0000000004A2E000-memory.dmp family_redline behavioral1/memory/2216-83-0x00000000049F0000-0x0000000004A2E000-memory.dmp family_redline behavioral1/memory/2216-81-0x00000000049F0000-0x0000000004A2E000-memory.dmp family_redline behavioral1/memory/2216-79-0x00000000049F0000-0x0000000004A2E000-memory.dmp family_redline behavioral1/memory/2216-76-0x00000000049F0000-0x0000000004A2E000-memory.dmp family_redline behavioral1/memory/2216-77-0x00000000049F0000-0x0000000004A2E000-memory.dmp family_redline -
Redline family
-
Downloads MZ/PE file 1 IoCs
flow pid Process 41 5384 Process not Found -
Executes dropped EXE 6 IoCs
pid Process 2132 nrH64jK.exe 4960 nHh07ke.exe 3380 arO30Oe.exe 396 bhT46xU.exe 2216 bhT46xU.exe 3076 dcL31iB.exe -
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features arO30Oe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" arO30Oe.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c6acd7bd12bd25fce3cf5aee3f4ac6ead7a3e8d0bcdcb330aab7e61f535e4e81.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nrH64jK.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" nHh07ke.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 396 set thread context of 2216 396 bhT46xU.exe 99 -
Program crash 1 IoCs
pid pid_target Process procid_target 3552 3380 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nHh07ke.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arO30Oe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhT46xU.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhT46xU.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dcL31iB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c6acd7bd12bd25fce3cf5aee3f4ac6ead7a3e8d0bcdcb330aab7e61f535e4e81.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nrH64jK.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 5188 MicrosoftEdgeUpdate.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3380 arO30Oe.exe 3380 arO30Oe.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3380 arO30Oe.exe Token: SeDebugPrivilege 2216 bhT46xU.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 3960 wrote to memory of 2132 3960 c6acd7bd12bd25fce3cf5aee3f4ac6ead7a3e8d0bcdcb330aab7e61f535e4e81.exe 85 PID 3960 wrote to memory of 2132 3960 c6acd7bd12bd25fce3cf5aee3f4ac6ead7a3e8d0bcdcb330aab7e61f535e4e81.exe 85 PID 3960 wrote to memory of 2132 3960 c6acd7bd12bd25fce3cf5aee3f4ac6ead7a3e8d0bcdcb330aab7e61f535e4e81.exe 85 PID 2132 wrote to memory of 4960 2132 nrH64jK.exe 86 PID 2132 wrote to memory of 4960 2132 nrH64jK.exe 86 PID 2132 wrote to memory of 4960 2132 nrH64jK.exe 86 PID 4960 wrote to memory of 3380 4960 nHh07ke.exe 87 PID 4960 wrote to memory of 3380 4960 nHh07ke.exe 87 PID 4960 wrote to memory of 3380 4960 nHh07ke.exe 87 PID 4960 wrote to memory of 396 4960 nHh07ke.exe 98 PID 4960 wrote to memory of 396 4960 nHh07ke.exe 98 PID 4960 wrote to memory of 396 4960 nHh07ke.exe 98 PID 396 wrote to memory of 2216 396 bhT46xU.exe 99 PID 396 wrote to memory of 2216 396 bhT46xU.exe 99 PID 396 wrote to memory of 2216 396 bhT46xU.exe 99 PID 396 wrote to memory of 2216 396 bhT46xU.exe 99 PID 396 wrote to memory of 2216 396 bhT46xU.exe 99 PID 396 wrote to memory of 2216 396 bhT46xU.exe 99 PID 396 wrote to memory of 2216 396 bhT46xU.exe 99 PID 396 wrote to memory of 2216 396 bhT46xU.exe 99 PID 396 wrote to memory of 2216 396 bhT46xU.exe 99 PID 2132 wrote to memory of 3076 2132 nrH64jK.exe 100 PID 2132 wrote to memory of 3076 2132 nrH64jK.exe 100 PID 2132 wrote to memory of 3076 2132 nrH64jK.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6acd7bd12bd25fce3cf5aee3f4ac6ead7a3e8d0bcdcb330aab7e61f535e4e81.exe"C:\Users\Admin\AppData\Local\Temp\c6acd7bd12bd25fce3cf5aee3f4ac6ead7a3e8d0bcdcb330aab7e61f535e4e81.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nrH64jK.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nrH64jK.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nHh07ke.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nHh07ke.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\arO30Oe.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\arO30Oe.exe4⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3380 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3380 -s 10525⤵
- Program crash
PID:3552
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bhT46xU.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bhT46xU.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bhT46xU.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bhT46xU.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2216
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dcL31iB.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dcL31iB.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3076
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3380 -ip 33801⤵PID:3036
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI1IiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDU5MjEiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODE5ODA3NzAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MTc3NzI3ODQ4Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:5188
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
680KB
MD5f4e74e9bda41cae0a72aaefc54938eef
SHA19fce6e8e6c0e4b4e41a88bc18732c2e7938a46e1
SHA2565a3b5bced373c533f70faab9fd36a1df461719c5725412a6e6ed50320c15e4a7
SHA51203771cee63e2d3aa3802fd848fd35dbdabb1e75c4acd02401a6018efc55a2c805fb3dbaa3c800a278f571e265cc192fa330fcbe7289db1c8a293cb0689767d2d
-
Filesize
175KB
MD54316e4b02d742ee056129e41c62eaee2
SHA1ccc2b34c53b80b86d98bea17cb3b35356d882d24
SHA256b6deee8ac2de2c2bdb8962008c6ab542357ab80d9074cae440bb2dcfef8b4d44
SHA512dca7aa9568605370a383c1e9676f2fbf162e86875201f75785eb0b99aec7ab5ce2295d571b4140da4c2376c79694afed88c341d08b1b7086ff2c39246a5d6c4d
-
Filesize
535KB
MD597fa7ea33ef16ac40288d10205fbb477
SHA16c4124808e92c67ba563f45b5e7ed25bbfe6a6ff
SHA256b15f35f213bf345f01fa78c5133caacac1129ee67e5db6e60a1e8005903570a8
SHA512a43651241828a0060a2e8e3a2ff641c682dd2db92d13fdff72320bc5822a72012803ccbe48dae7a0c9b33c476d3565ee78fa99590a034d14df5c4c6fb503477e
-
Filesize
244KB
MD52b9d2d65d90ce1b4c60a49f64e568ece
SHA1000f08c4483cca229249fdee49d8831008628267
SHA256b4eb879e1212e6ef4e5cfc38c0e66ac7afa55d448b7d0eb485bb1285cdc80f01
SHA512d65a95a3ed7f1b4c38d40d13e3d8696bed2938e017d62cf4c37477cfd6e7c840cc5c75e2e08c3eb803ff830665f473cba0eacac4323a6952a0428df52a9eb53b
-
Filesize
302KB
MD5b08f65f81cb5d8ef2752114fd68b937f
SHA13fd1269242f2e2aaf3cff39b2a139d47e0339edb
SHA256b534dcd30f7406908dd67a615a647bc89287ec9f42a8a366d87adf19e9c5bb2f
SHA512eea80d9ef49635ba1a75743777d51be073f464e17e0234c84d817234b36ca185b95aa0df89a95c680035c260760dd778675238f01593a05a7d9fc080a8c21366