Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20250211-en -
resource tags
arch:x64arch:x86image:win10v2004-20250211-enlocale:en-usos:windows10-2004-x64system -
submitted
16-02-2025 14:33
Static task
static1
Behavioral task
behavioral1
Sample
623d879734f42cab0cd23bf39e73f67d960d9969c17f9a4ec6813299e9f316f4.exe
Resource
win10v2004-20250211-en
General
-
Target
623d879734f42cab0cd23bf39e73f67d960d9969c17f9a4ec6813299e9f316f4.exe
-
Size
1.1MB
-
MD5
1ca9dc1b462d871d56a299e00cc46771
-
SHA1
676d3240f271a9872f4ed1b4bdd2f1ea27e4e8a5
-
SHA256
623d879734f42cab0cd23bf39e73f67d960d9969c17f9a4ec6813299e9f316f4
-
SHA512
49eb4599e3bd0a2d99ba311ad4139aa1705085388be91d60be2d783336d8b83e3f04f5f367d4a6bbdefbacf31bc0dea590304530617e5bd4dd48084d161e89eb
-
SSDEEP
24576:ayb57ppwhv3HEuynqXDzQjZlIdDCgkRoHiRT:hb5Xo3kuOkDkjTIdDCxmHiN
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023cb0-32.dat healer behavioral1/memory/2128-35-0x0000000000E30000-0x0000000000E3A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" buEa09ZA24.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection buEa09ZA24.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" buEa09ZA24.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" buEa09ZA24.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" buEa09ZA24.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" buEa09ZA24.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" buEa09ZA24.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" buEa09ZA24.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications buEa09ZA24.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" buEa09ZA24.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/5072-42-0x0000000004BA0000-0x0000000004BE6000-memory.dmp family_redline behavioral1/memory/5072-44-0x0000000007190000-0x00000000071D4000-memory.dmp family_redline behavioral1/memory/5072-54-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/5072-58-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/5072-108-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/5072-106-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/5072-104-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/5072-102-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/5072-100-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/5072-98-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/5072-96-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/5072-92-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/5072-90-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/5072-88-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/5072-86-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/5072-84-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/5072-82-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/5072-80-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/5072-78-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/5072-76-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/5072-72-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/5072-70-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/5072-68-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/5072-66-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/5072-64-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/5072-62-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/5072-60-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/5072-56-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/5072-52-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/5072-50-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/5072-94-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/5072-74-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/5072-48-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/5072-46-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/5072-45-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline -
Redline family
-
Downloads MZ/PE file 1 IoCs
flow pid Process 34 4836 Process not Found -
Executes dropped EXE 6 IoCs
pid Process 1996 plUq13Cd16.exe 4976 pleM37Qh78.exe 2460 plyr33LB00.exe 340 pldO82BE25.exe 2128 buEa09ZA24.exe 5072 caXv66kg14.exe -
Windows security modification 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" buEa09ZA24.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 623d879734f42cab0cd23bf39e73f67d960d9969c17f9a4ec6813299e9f316f4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" plUq13Cd16.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" pleM37Qh78.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" plyr33LB00.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" pldO82BE25.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plUq13Cd16.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pleM37Qh78.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plyr33LB00.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pldO82BE25.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language caXv66kg14.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 623d879734f42cab0cd23bf39e73f67d960d9969c17f9a4ec6813299e9f316f4.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2192 MicrosoftEdgeUpdate.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2128 buEa09ZA24.exe 2128 buEa09ZA24.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2128 buEa09ZA24.exe Token: SeDebugPrivilege 5072 caXv66kg14.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2916 wrote to memory of 1996 2916 623d879734f42cab0cd23bf39e73f67d960d9969c17f9a4ec6813299e9f316f4.exe 87 PID 2916 wrote to memory of 1996 2916 623d879734f42cab0cd23bf39e73f67d960d9969c17f9a4ec6813299e9f316f4.exe 87 PID 2916 wrote to memory of 1996 2916 623d879734f42cab0cd23bf39e73f67d960d9969c17f9a4ec6813299e9f316f4.exe 87 PID 1996 wrote to memory of 4976 1996 plUq13Cd16.exe 88 PID 1996 wrote to memory of 4976 1996 plUq13Cd16.exe 88 PID 1996 wrote to memory of 4976 1996 plUq13Cd16.exe 88 PID 4976 wrote to memory of 2460 4976 pleM37Qh78.exe 89 PID 4976 wrote to memory of 2460 4976 pleM37Qh78.exe 89 PID 4976 wrote to memory of 2460 4976 pleM37Qh78.exe 89 PID 2460 wrote to memory of 340 2460 plyr33LB00.exe 90 PID 2460 wrote to memory of 340 2460 plyr33LB00.exe 90 PID 2460 wrote to memory of 340 2460 plyr33LB00.exe 90 PID 340 wrote to memory of 2128 340 pldO82BE25.exe 91 PID 340 wrote to memory of 2128 340 pldO82BE25.exe 91 PID 340 wrote to memory of 5072 340 pldO82BE25.exe 95 PID 340 wrote to memory of 5072 340 pldO82BE25.exe 95 PID 340 wrote to memory of 5072 340 pldO82BE25.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\623d879734f42cab0cd23bf39e73f67d960d9969c17f9a4ec6813299e9f316f4.exe"C:\Users\Admin\AppData\Local\Temp\623d879734f42cab0cd23bf39e73f67d960d9969c17f9a4ec6813299e9f316f4.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plUq13Cd16.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plUq13Cd16.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pleM37Qh78.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pleM37Qh78.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plyr33LB00.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plyr33LB00.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\pldO82BE25.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\pldO82BE25.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buEa09ZA24.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buEa09ZA24.exe6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2128
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caXv66kg14.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caXv66kg14.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5072
-
-
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI1IiBpbnN0YWxsZGF0ZXRpbWU9IjE3MzkyODMzNzEiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4Mzc1NDE5Mjc1MzAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI0ODcxMjUwMzQ5Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2192
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1009KB
MD526b327f7288c7ed7f4602174b9fe18c4
SHA1b78363b0798fa0555225bbb5c72128e13a1dd3df
SHA25664b641d7c521e13ddd0aae74d5e3d98518289109299533a5d62b2d381a4e9117
SHA5122ccbe49556533bae64b36a27610c4f3e6a56fae5152b0ac122563cb4daf3699cb8915219892748259ed8e829d932e078dc5bb3e7fa0bdea69971792e92ec89e6
-
Filesize
906KB
MD514eb272af95df42ff1873dbacdafc5ed
SHA12c2b07710ab559a53053f794ac302ae3ae63fa31
SHA256989126436627491e48798132effdb1870ff5cb6f18ccd0f409daa7cd89bd6bd8
SHA512fc4e16950ebd5d826e4f731220a02acd74904af35268562edfc200b1ccfa5c12b25faaa8d3ef306d8d0c2f1f8613a60a29128c2a98d7b054c0be4bdc344447a1
-
Filesize
682KB
MD5854371217e49a9fb0e6beee12329b3f9
SHA10adb6552a69d7b3944437cad80a1523dbf391180
SHA256bfe448a8b1898bee1a0b1f1475c91c1911b49d6adb29044d6a1d295c558a86d7
SHA512906c60d0b053927f382f79c66499f311121da2a156c0ccef0a95f50fbf2c83c59803a16fc368b24d83b6d1f6ef3b25eee18e8726c0c418e66899f2b1ba4225b9
-
Filesize
399KB
MD5d56abf22fae8e47c3d0ce9ca7a4edea8
SHA1b480f1ce07db681f9272cd0748b1a5a88f0de992
SHA2569ac8863cdf347e26664a8098fff3d2fb2fa5029a259824cf49807fcb7d043143
SHA512c79df7d7765d7c4456ffa5eb576572238f8b3abccf2500e337e12681352bdb4dfd4f9acb26f265511002a58b1f69f90b3638ac3e71dee6fb21dc29f334f020b7
-
Filesize
12KB
MD5a0e70241520eff3e4b5b6eb4e8b7d34e
SHA128cb3dcdbaef7f2781da50704d16aa36ce4e576c
SHA256b9ee2eb95e784610bc9c397f10741b0631dc578592d2b3ca086b1dbea1405df2
SHA512336bd6898363a1d0aec65bae699650c917f7a0edc2fe3097d1bc6c93c02ca7a05871d94f5807dab443984a45254d3df4faf661a92d273be0af7aeed742f3d7b2
-
Filesize
375KB
MD55ff32f757fe387c14ed8b1388ed9ec51
SHA143465ddc0d2b6107b9ec69f4852abedc6dc7a3e3
SHA256ed7b94310be80b1aadad0043ae5539fbdf5a5b57626e275cf1e93cda3a307c60
SHA512f89a31e03ae0ec6116b58136b1362bab031f04a340738d5878152905ca69964c833fb5b58c339af3e71fc804e6f727983e8a9db43e58ac37875fb1e2d83a2c92