Analysis
-
max time kernel
132s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
10/02/2023, 10:37
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20221111-en
General
-
Target
file.exe
-
Size
783KB
-
MD5
f83ef0c72937a6c833bfe8d3511317e5
-
SHA1
5312837ca61166d8ad2998cc6d3a2b594165dec8
-
SHA256
ffdff2d87d032d30d6c3e794b6bc7b033d0cdf97a69ff32a563279e2844d3e13
-
SHA512
6abd653dee3659bcb38d9e72e5a1b56f5ecffa3a4b6372635e9198f6b42229b285648887af2ce04417856d34ef4ba19b0fab4dd256676f76f76f8a4e09cd066c
-
SSDEEP
12288:UMr1y90JGxs99q27rD9OQszK5NMh3u2HM9aoLokYkjwDMFyJaWDns:ZyEGxs9eQGl3xEC74FyAWQ
Malware Config
Extracted
redline
dubna
193.233.20.11:4131
-
auth_value
f324b1269094b7462e56bab025f032f4
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" atn32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" atn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection atn32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" atn32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" atn32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" atn32.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 1560 fxV11fe.exe 1392 faC80kI.exe 324 atn32.exe 1052 bvr38xq.exe -
Loads dropped DLL 7 IoCs
pid Process 1196 file.exe 1560 fxV11fe.exe 1560 fxV11fe.exe 1392 faC80kI.exe 1392 faC80kI.exe 1392 faC80kI.exe 1052 bvr38xq.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features atn32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" atn32.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce fxV11fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" fxV11fe.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce faC80kI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" faC80kI.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 324 atn32.exe 324 atn32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 324 atn32.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1196 wrote to memory of 1560 1196 file.exe 27 PID 1196 wrote to memory of 1560 1196 file.exe 27 PID 1196 wrote to memory of 1560 1196 file.exe 27 PID 1196 wrote to memory of 1560 1196 file.exe 27 PID 1196 wrote to memory of 1560 1196 file.exe 27 PID 1196 wrote to memory of 1560 1196 file.exe 27 PID 1196 wrote to memory of 1560 1196 file.exe 27 PID 1560 wrote to memory of 1392 1560 fxV11fe.exe 28 PID 1560 wrote to memory of 1392 1560 fxV11fe.exe 28 PID 1560 wrote to memory of 1392 1560 fxV11fe.exe 28 PID 1560 wrote to memory of 1392 1560 fxV11fe.exe 28 PID 1560 wrote to memory of 1392 1560 fxV11fe.exe 28 PID 1560 wrote to memory of 1392 1560 fxV11fe.exe 28 PID 1560 wrote to memory of 1392 1560 fxV11fe.exe 28 PID 1392 wrote to memory of 324 1392 faC80kI.exe 29 PID 1392 wrote to memory of 324 1392 faC80kI.exe 29 PID 1392 wrote to memory of 324 1392 faC80kI.exe 29 PID 1392 wrote to memory of 324 1392 faC80kI.exe 29 PID 1392 wrote to memory of 324 1392 faC80kI.exe 29 PID 1392 wrote to memory of 324 1392 faC80kI.exe 29 PID 1392 wrote to memory of 324 1392 faC80kI.exe 29 PID 1392 wrote to memory of 1052 1392 faC80kI.exe 30 PID 1392 wrote to memory of 1052 1392 faC80kI.exe 30 PID 1392 wrote to memory of 1052 1392 faC80kI.exe 30 PID 1392 wrote to memory of 1052 1392 faC80kI.exe 30 PID 1392 wrote to memory of 1052 1392 faC80kI.exe 30 PID 1392 wrote to memory of 1052 1392 faC80kI.exe 30 PID 1392 wrote to memory of 1052 1392 faC80kI.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fxV11fe.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fxV11fe.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\faC80kI.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\faC80kI.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\atn32.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\atn32.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:324
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bvr38xq.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bvr38xq.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1052
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
596KB
MD5ac6fb170803555e15da3a1ba13cbc6d3
SHA166e210cb20912a8fb82cfbed0742541a41fcc25c
SHA256d7339ecac493636fe5b4af1f418bff9a21f355d74d814391b115c7ff05dfd9ac
SHA512c868f9e2cbd8fc1c68ce2156a1b91a5c65a0e7722a380f2dc0194d113acff4192d76289ce6513e05b6a0e85a0fcb2803e716cc0bc40d4095775c2a8191b704f7
-
Filesize
596KB
MD5ac6fb170803555e15da3a1ba13cbc6d3
SHA166e210cb20912a8fb82cfbed0742541a41fcc25c
SHA256d7339ecac493636fe5b4af1f418bff9a21f355d74d814391b115c7ff05dfd9ac
SHA512c868f9e2cbd8fc1c68ce2156a1b91a5c65a0e7722a380f2dc0194d113acff4192d76289ce6513e05b6a0e85a0fcb2803e716cc0bc40d4095775c2a8191b704f7
-
Filesize
202KB
MD5afc0e8e01e2b88123841047710836075
SHA13566bb517e62d0bc0fa0d222f57afa8484b4c4bb
SHA2560b770e8b3f94a5619f73d87065904a0aac0b53c6af95556e19f0c37a82c472bb
SHA512d90f2ced0a2ed5f92b76cb95c0aeea456247034d843958e253a1d2f0de853a4e07d7c0237e4762802f1e1b73c8b637ac4445d9d16ec310eb483538be0fdce025
-
Filesize
202KB
MD5afc0e8e01e2b88123841047710836075
SHA13566bb517e62d0bc0fa0d222f57afa8484b4c4bb
SHA2560b770e8b3f94a5619f73d87065904a0aac0b53c6af95556e19f0c37a82c472bb
SHA512d90f2ced0a2ed5f92b76cb95c0aeea456247034d843958e253a1d2f0de853a4e07d7c0237e4762802f1e1b73c8b637ac4445d9d16ec310eb483538be0fdce025
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
175KB
MD5ef8079cf160510d0da7162bc08f753d8
SHA1e786cc8bee83e4a37433ddccf9d3540e1f6533fe
SHA256a6416ca607f03e7d02dd9c8b546113c71f421c0ba8438dafb941d25f8cf2c9e6
SHA512959b08126358527b794a276f6e9f818250f888d9f108b46766f6c2e50186acc8f406acbeb94ca97b5f0e329b27f3851003446715d5d040b5c0fef4010011a2c3
-
Filesize
175KB
MD5ef8079cf160510d0da7162bc08f753d8
SHA1e786cc8bee83e4a37433ddccf9d3540e1f6533fe
SHA256a6416ca607f03e7d02dd9c8b546113c71f421c0ba8438dafb941d25f8cf2c9e6
SHA512959b08126358527b794a276f6e9f818250f888d9f108b46766f6c2e50186acc8f406acbeb94ca97b5f0e329b27f3851003446715d5d040b5c0fef4010011a2c3
-
Filesize
596KB
MD5ac6fb170803555e15da3a1ba13cbc6d3
SHA166e210cb20912a8fb82cfbed0742541a41fcc25c
SHA256d7339ecac493636fe5b4af1f418bff9a21f355d74d814391b115c7ff05dfd9ac
SHA512c868f9e2cbd8fc1c68ce2156a1b91a5c65a0e7722a380f2dc0194d113acff4192d76289ce6513e05b6a0e85a0fcb2803e716cc0bc40d4095775c2a8191b704f7
-
Filesize
596KB
MD5ac6fb170803555e15da3a1ba13cbc6d3
SHA166e210cb20912a8fb82cfbed0742541a41fcc25c
SHA256d7339ecac493636fe5b4af1f418bff9a21f355d74d814391b115c7ff05dfd9ac
SHA512c868f9e2cbd8fc1c68ce2156a1b91a5c65a0e7722a380f2dc0194d113acff4192d76289ce6513e05b6a0e85a0fcb2803e716cc0bc40d4095775c2a8191b704f7
-
Filesize
202KB
MD5afc0e8e01e2b88123841047710836075
SHA13566bb517e62d0bc0fa0d222f57afa8484b4c4bb
SHA2560b770e8b3f94a5619f73d87065904a0aac0b53c6af95556e19f0c37a82c472bb
SHA512d90f2ced0a2ed5f92b76cb95c0aeea456247034d843958e253a1d2f0de853a4e07d7c0237e4762802f1e1b73c8b637ac4445d9d16ec310eb483538be0fdce025
-
Filesize
202KB
MD5afc0e8e01e2b88123841047710836075
SHA13566bb517e62d0bc0fa0d222f57afa8484b4c4bb
SHA2560b770e8b3f94a5619f73d87065904a0aac0b53c6af95556e19f0c37a82c472bb
SHA512d90f2ced0a2ed5f92b76cb95c0aeea456247034d843958e253a1d2f0de853a4e07d7c0237e4762802f1e1b73c8b637ac4445d9d16ec310eb483538be0fdce025
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
175KB
MD5ef8079cf160510d0da7162bc08f753d8
SHA1e786cc8bee83e4a37433ddccf9d3540e1f6533fe
SHA256a6416ca607f03e7d02dd9c8b546113c71f421c0ba8438dafb941d25f8cf2c9e6
SHA512959b08126358527b794a276f6e9f818250f888d9f108b46766f6c2e50186acc8f406acbeb94ca97b5f0e329b27f3851003446715d5d040b5c0fef4010011a2c3
-
Filesize
175KB
MD5ef8079cf160510d0da7162bc08f753d8
SHA1e786cc8bee83e4a37433ddccf9d3540e1f6533fe
SHA256a6416ca607f03e7d02dd9c8b546113c71f421c0ba8438dafb941d25f8cf2c9e6
SHA512959b08126358527b794a276f6e9f818250f888d9f108b46766f6c2e50186acc8f406acbeb94ca97b5f0e329b27f3851003446715d5d040b5c0fef4010011a2c3