Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20250211-en -
resource tags
arch:x64arch:x86image:win10v2004-20250211-enlocale:en-usos:windows10-2004-x64system -
submitted
16-02-2025 02:08
Static task
static1
Behavioral task
behavioral1
Sample
9d428ebfd2751e01328a3b2c04333c6e6569575fb772f7efba8dffe708891044N.exe
Resource
win10v2004-20250211-en
General
-
Target
9d428ebfd2751e01328a3b2c04333c6e6569575fb772f7efba8dffe708891044N.exe
-
Size
660KB
-
MD5
2b17a8b445936fcb0d4d0608dcc5b6f0
-
SHA1
8df0c61419c1cd38a9e3ff278c67ed9f1a54ebed
-
SHA256
9d428ebfd2751e01328a3b2c04333c6e6569575fb772f7efba8dffe708891044
-
SHA512
61b7f196be45baedc1aaacea8df6cb817ee5b539e13d43475c8667b51d7f880db66139e48d1722da6c21663806fe1968645c57338c641ce0ca8d9e1b82c3c200
-
SSDEEP
12288:5Mrxy90tBhWAVUtyHw8XYQNvbn+X8tAlUImvBlz7sEj:AyMH3VwF8XYQNv3tASLv7z7sk
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000a000000023d3c-12.dat healer behavioral1/memory/652-15-0x0000000000460000-0x000000000046A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" iHU13nv79.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection iHU13nv79.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" iHU13nv79.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" iHU13nv79.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" iHU13nv79.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" iHU13nv79.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" iHU13nv79.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" iHU13nv79.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications iHU13nv79.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" iHU13nv79.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/4584-22-0x0000000002390000-0x00000000023D6000-memory.dmp family_redline behavioral1/memory/4584-24-0x0000000004CD0000-0x0000000004D14000-memory.dmp family_redline behavioral1/memory/4584-26-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4584-25-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4584-86-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4584-88-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4584-84-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4584-82-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4584-80-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4584-76-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4584-72-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4584-70-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4584-68-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4584-64-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4584-62-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4584-60-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4584-58-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4584-54-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4584-52-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4584-78-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4584-74-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4584-66-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4584-56-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4584-51-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4584-48-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4584-46-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4584-44-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4584-42-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4584-40-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4584-38-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4584-36-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4584-34-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4584-32-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4584-30-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4584-28-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline -
Redline family
-
Downloads MZ/PE file 1 IoCs
flow pid Process 27 540 Process not Found -
Executes dropped EXE 3 IoCs
pid Process 2856 szL92sP82.exe 652 iHU13nv79.exe 4584 kjY64Wt48.exe -
Windows security modification 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" iHU13nv79.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9d428ebfd2751e01328a3b2c04333c6e6569575fb772f7efba8dffe708891044N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" szL92sP82.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9d428ebfd2751e01328a3b2c04333c6e6569575fb772f7efba8dffe708891044N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language szL92sP82.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kjY64Wt48.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 7064 MicrosoftEdgeUpdate.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 652 iHU13nv79.exe 652 iHU13nv79.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 652 iHU13nv79.exe Token: SeDebugPrivilege 4584 kjY64Wt48.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3888 wrote to memory of 2856 3888 9d428ebfd2751e01328a3b2c04333c6e6569575fb772f7efba8dffe708891044N.exe 88 PID 3888 wrote to memory of 2856 3888 9d428ebfd2751e01328a3b2c04333c6e6569575fb772f7efba8dffe708891044N.exe 88 PID 3888 wrote to memory of 2856 3888 9d428ebfd2751e01328a3b2c04333c6e6569575fb772f7efba8dffe708891044N.exe 88 PID 2856 wrote to memory of 652 2856 szL92sP82.exe 89 PID 2856 wrote to memory of 652 2856 szL92sP82.exe 89 PID 2856 wrote to memory of 4584 2856 szL92sP82.exe 92 PID 2856 wrote to memory of 4584 2856 szL92sP82.exe 92 PID 2856 wrote to memory of 4584 2856 szL92sP82.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d428ebfd2751e01328a3b2c04333c6e6569575fb772f7efba8dffe708891044N.exe"C:\Users\Admin\AppData\Local\Temp\9d428ebfd2751e01328a3b2c04333c6e6569575fb772f7efba8dffe708891044N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\szL92sP82.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\szL92sP82.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iHU13nv79.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iHU13nv79.exe3⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:652
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kjY64Wt48.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kjY64Wt48.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4584
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI0IiBpbnN0YWxsZGF0ZXRpbWU9IjE3MzkyODM0MTAiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4Mzc1NTUzNjg2NzAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MjcwNjM1MzczIi8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:7064
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
388KB
MD5ef88243c3bebd07ebbdde41b3d8ab4a3
SHA15fbb54db7f9ba80e918af487593743802b89ea32
SHA2561a498ac8151d477c5571f3b085f1f612bbb635e5059e04d3efcc92abd82b55aa
SHA5129525ab0a0b9793574e5b516b3fe533a08eb6544fc6029d06af5ae213eb20d466e9ee6a673892c9c5be4752ba0d60befb1390116f21f556abe7bf0f3b148f15ee
-
Filesize
11KB
MD5c7cdb50197ee7e3e316cdcb2a76dd6a5
SHA11234b0652abbf6f2b7ecad11e33f1572fcb88912
SHA256692ae1219a40b861b45d57a7a55f32a85da5ae6cce8cebbcb5211cd95e25fe59
SHA512b750849be58c2562c29e774478a9a47e5a93855b29403ae029524a1c80d9a077370ff295abb2ba1c5654183bc5e755a70d3c90be17553ea61165d34627c14048
-
Filesize
305KB
MD556b6a3e1f2af8cd917e7014ed425613e
SHA15d4059fed42267b15ace0f3d34a56b8cd2c7066a
SHA256f5648530922c82fc99bd0258ec277f74e7969d7839d286cb1ae03c1ff13789b9
SHA51265ce8da723902ae44b101daf1ffb7cdc074f839357d2fcebbb78407410d2048ce1252b94e1a04020c34411d0718779a514c2f5c822de6b772c490ae9dca56826