Analysis
-
max time kernel
127s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 08:59
Static task
static1
Behavioral task
behavioral1
Sample
f71f53e12ec7ff3bb4f3c3dbd88e0e4c8fbde5419a9cae7f141efb0b6523fd94.exe
Resource
win10v2004-20230220-en
General
-
Target
f71f53e12ec7ff3bb4f3c3dbd88e0e4c8fbde5419a9cae7f141efb0b6523fd94.exe
-
Size
1.0MB
-
MD5
4e26b1c571e5577a06cb8f3722a2bc69
-
SHA1
38dfebcbfbc49019af5f9f619763d1cdc8c53b17
-
SHA256
f71f53e12ec7ff3bb4f3c3dbd88e0e4c8fbde5419a9cae7f141efb0b6523fd94
-
SHA512
db787c8e5de00a0b497552101a232bef34d53707ba606c57b29f958e25d1ffbaf2a902bf4c9d2a8166ba900d80627c945ecafdc7cdc5b9d0e3cfc222b4a99070
-
SSDEEP
24576:Ry+udmt+al4A+Gfn1a9FNG8U44Trm71cpFgmPW7G:E+ug4am1Gfn1GTG8UKqc
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
it738090.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it738090.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it738090.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it738090.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it738090.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it738090.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it738090.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
jr575454.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation jr575454.exe -
Executes dropped EXE 6 IoCs
Processes:
ziXs7925.exeziNa1421.exeit738090.exejr575454.exe1.exekp877051.exepid process 4040 ziXs7925.exe 4208 ziNa1421.exe 216 it738090.exe 3484 jr575454.exe 4996 1.exe 4896 kp877051.exe -
Processes:
it738090.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it738090.exe -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
ziXs7925.exeziNa1421.exef71f53e12ec7ff3bb4f3c3dbd88e0e4c8fbde5419a9cae7f141efb0b6523fd94.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziXs7925.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziXs7925.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziNa1421.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziNa1421.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f71f53e12ec7ff3bb4f3c3dbd88e0e4c8fbde5419a9cae7f141efb0b6523fd94.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f71f53e12ec7ff3bb4f3c3dbd88e0e4c8fbde5419a9cae7f141efb0b6523fd94.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
it738090.exepid process 216 it738090.exe 216 it738090.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
it738090.exejr575454.exedescription pid process Token: SeDebugPrivilege 216 it738090.exe Token: SeDebugPrivilege 3484 jr575454.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
f71f53e12ec7ff3bb4f3c3dbd88e0e4c8fbde5419a9cae7f141efb0b6523fd94.exeziXs7925.exeziNa1421.exejr575454.exedescription pid process target process PID 3212 wrote to memory of 4040 3212 f71f53e12ec7ff3bb4f3c3dbd88e0e4c8fbde5419a9cae7f141efb0b6523fd94.exe ziXs7925.exe PID 3212 wrote to memory of 4040 3212 f71f53e12ec7ff3bb4f3c3dbd88e0e4c8fbde5419a9cae7f141efb0b6523fd94.exe ziXs7925.exe PID 3212 wrote to memory of 4040 3212 f71f53e12ec7ff3bb4f3c3dbd88e0e4c8fbde5419a9cae7f141efb0b6523fd94.exe ziXs7925.exe PID 4040 wrote to memory of 4208 4040 ziXs7925.exe ziNa1421.exe PID 4040 wrote to memory of 4208 4040 ziXs7925.exe ziNa1421.exe PID 4040 wrote to memory of 4208 4040 ziXs7925.exe ziNa1421.exe PID 4208 wrote to memory of 216 4208 ziNa1421.exe it738090.exe PID 4208 wrote to memory of 216 4208 ziNa1421.exe it738090.exe PID 4208 wrote to memory of 3484 4208 ziNa1421.exe jr575454.exe PID 4208 wrote to memory of 3484 4208 ziNa1421.exe jr575454.exe PID 4208 wrote to memory of 3484 4208 ziNa1421.exe jr575454.exe PID 3484 wrote to memory of 4996 3484 jr575454.exe 1.exe PID 3484 wrote to memory of 4996 3484 jr575454.exe 1.exe PID 3484 wrote to memory of 4996 3484 jr575454.exe 1.exe PID 4040 wrote to memory of 4896 4040 ziXs7925.exe kp877051.exe PID 4040 wrote to memory of 4896 4040 ziXs7925.exe kp877051.exe PID 4040 wrote to memory of 4896 4040 ziXs7925.exe kp877051.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f71f53e12ec7ff3bb4f3c3dbd88e0e4c8fbde5419a9cae7f141efb0b6523fd94.exe"C:\Users\Admin\AppData\Local\Temp\f71f53e12ec7ff3bb4f3c3dbd88e0e4c8fbde5419a9cae7f141efb0b6523fd94.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziXs7925.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziXs7925.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziNa1421.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziNa1421.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it738090.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it738090.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:216
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr575454.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr575454.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
PID:4996
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp877051.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp877051.exe3⤵
- Executes dropped EXE
PID:4896
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
724KB
MD50d2b8da4f3466724a28d814626857adf
SHA154d187ce91ddab096c8fa2e76fadee105926b97c
SHA256f33b17cf2610e31489dc0ab7bc88a11fd4b4ccbf88fc3d639700cfd3d81beb6c
SHA512f4e95716ba9f7ae41bb9af0cb193e290f923cd5fb4b470e1a831d1c56ad6e86aed99ba06554ac5bcf72203d00e9814fa293212c0686838e5cd2d9fc62493b736
-
Filesize
724KB
MD50d2b8da4f3466724a28d814626857adf
SHA154d187ce91ddab096c8fa2e76fadee105926b97c
SHA256f33b17cf2610e31489dc0ab7bc88a11fd4b4ccbf88fc3d639700cfd3d81beb6c
SHA512f4e95716ba9f7ae41bb9af0cb193e290f923cd5fb4b470e1a831d1c56ad6e86aed99ba06554ac5bcf72203d00e9814fa293212c0686838e5cd2d9fc62493b736
-
Filesize
169KB
MD58dd92d1ad5df3cb6207021d8614df1c0
SHA17467f26332ec5f65b186bb9f7f654f86a30faa29
SHA2565109900e7d6fae252d47ba3062780d3d01cf281f6cb24df2be39c52e957a8ac3
SHA5120f1b7f9990456a525233c2ac881a54322cc96ffaa2a19e2f0d3f03d921e5f00e6700c49b907d45ee7246f30404ba1cc19451718b9a980ba74c07e932862a07b3
-
Filesize
169KB
MD58dd92d1ad5df3cb6207021d8614df1c0
SHA17467f26332ec5f65b186bb9f7f654f86a30faa29
SHA2565109900e7d6fae252d47ba3062780d3d01cf281f6cb24df2be39c52e957a8ac3
SHA5120f1b7f9990456a525233c2ac881a54322cc96ffaa2a19e2f0d3f03d921e5f00e6700c49b907d45ee7246f30404ba1cc19451718b9a980ba74c07e932862a07b3
-
Filesize
570KB
MD56d13687315133d230ee693a85ecaaf72
SHA107bcfff4c2c42a80730936012354c2247964a08b
SHA2563497e4dc73ab1d5c3eeabacf90edb473e315777c38faaa255ec49682c53a9af2
SHA512f08e4ab16e80e69f07054f780fb03efb2adc313e4e78e86d7e69173cdac375b0f7078413c395986dc57de3bd8067ac2bf5f543ecdd0005464a281a7356226768
-
Filesize
570KB
MD56d13687315133d230ee693a85ecaaf72
SHA107bcfff4c2c42a80730936012354c2247964a08b
SHA2563497e4dc73ab1d5c3eeabacf90edb473e315777c38faaa255ec49682c53a9af2
SHA512f08e4ab16e80e69f07054f780fb03efb2adc313e4e78e86d7e69173cdac375b0f7078413c395986dc57de3bd8067ac2bf5f543ecdd0005464a281a7356226768
-
Filesize
11KB
MD59047f06f90f6bcfc55824596c7d9f6ed
SHA1f1f3342a87a4435e82123523d1f82c65347ed2b4
SHA256357f195c3f5dd7b9c25b37254b8163d60a84266b4db5fa0316043316cdf9eefe
SHA5122dba7866b439eb6084979be042b0c7ab6ce93b783dceb9891a464dbdbff5ed34e69e6d10bb13c74af7919c6e73fad2b393e9c8564ffcbf8ab8ea2dd76c77cdd2
-
Filesize
11KB
MD59047f06f90f6bcfc55824596c7d9f6ed
SHA1f1f3342a87a4435e82123523d1f82c65347ed2b4
SHA256357f195c3f5dd7b9c25b37254b8163d60a84266b4db5fa0316043316cdf9eefe
SHA5122dba7866b439eb6084979be042b0c7ab6ce93b783dceb9891a464dbdbff5ed34e69e6d10bb13c74af7919c6e73fad2b393e9c8564ffcbf8ab8ea2dd76c77cdd2
-
Filesize
588KB
MD51bc554d9481be510d86ee752d4673c89
SHA10ead02b6ee7157fa9978e99dc746d03cd5df26e4
SHA256c22e60291360c555c9cd4e09f27afb1637c99d46aeda26c73882f52654dae231
SHA5122147036877adf895d90f9b728fc9ed73496e72a721af14aca334782546780d0845a35829546feee2adbd55f8bfd67327e0343eb4390b8d36ab5cc04b05ce61f3
-
Filesize
588KB
MD51bc554d9481be510d86ee752d4673c89
SHA10ead02b6ee7157fa9978e99dc746d03cd5df26e4
SHA256c22e60291360c555c9cd4e09f27afb1637c99d46aeda26c73882f52654dae231
SHA5122147036877adf895d90f9b728fc9ed73496e72a721af14aca334782546780d0845a35829546feee2adbd55f8bfd67327e0343eb4390b8d36ab5cc04b05ce61f3
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1