Analysis
-
max time kernel
135s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02/05/2023, 10:10
Static task
static1
Behavioral task
behavioral1
Sample
aad674ee7cb1795ac4e338b39a564fa0de8b080fa9312f18e77ecd5d79b10902.exe
Resource
win10v2004-20230220-en
General
-
Target
aad674ee7cb1795ac4e338b39a564fa0de8b080fa9312f18e77ecd5d79b10902.exe
-
Size
774KB
-
MD5
9c6685cde5c9fb41a71275efb3815a3a
-
SHA1
854be14ec473807518ee0ecd397b02320167702a
-
SHA256
aad674ee7cb1795ac4e338b39a564fa0de8b080fa9312f18e77ecd5d79b10902
-
SHA512
c42cf077e510828dbb124eb5266c70a9b76996cd9cdc33f60369316b1904c4f763e8958cedc8d8f59da5f3c6833f7f09e1e87333f4f3e191ba0a3dcb8642a8d9
-
SSDEEP
24576:wy++WqfKt0SSNSo5G98kahDfxF/xOHYffR:3P3SAM989hLz/EYf
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dante
185.161.248.73:4164
-
auth_value
f4066af6b8a6f23125c8ee48288a3f90
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o22711051.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o22711051.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o22711051.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection o22711051.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o22711051.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o22711051.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation m27489873.exe -
Executes dropped EXE 5 IoCs
pid Process 2496 x28767044.exe 3480 m27489873.exe 1872 1.exe 3092 n03966812.exe 2312 o22711051.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features o22711051.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o22711051.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x28767044.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce aad674ee7cb1795ac4e338b39a564fa0de8b080fa9312f18e77ecd5d79b10902.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" aad674ee7cb1795ac4e338b39a564fa0de8b080fa9312f18e77ecd5d79b10902.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x28767044.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3092 n03966812.exe 1872 1.exe 1872 1.exe 3092 n03966812.exe 2312 o22711051.exe 2312 o22711051.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3480 m27489873.exe Token: SeDebugPrivilege 3092 n03966812.exe Token: SeDebugPrivilege 1872 1.exe Token: SeDebugPrivilege 2312 o22711051.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4632 wrote to memory of 2496 4632 aad674ee7cb1795ac4e338b39a564fa0de8b080fa9312f18e77ecd5d79b10902.exe 84 PID 4632 wrote to memory of 2496 4632 aad674ee7cb1795ac4e338b39a564fa0de8b080fa9312f18e77ecd5d79b10902.exe 84 PID 4632 wrote to memory of 2496 4632 aad674ee7cb1795ac4e338b39a564fa0de8b080fa9312f18e77ecd5d79b10902.exe 84 PID 2496 wrote to memory of 3480 2496 x28767044.exe 85 PID 2496 wrote to memory of 3480 2496 x28767044.exe 85 PID 2496 wrote to memory of 3480 2496 x28767044.exe 85 PID 3480 wrote to memory of 1872 3480 m27489873.exe 88 PID 3480 wrote to memory of 1872 3480 m27489873.exe 88 PID 3480 wrote to memory of 1872 3480 m27489873.exe 88 PID 2496 wrote to memory of 3092 2496 x28767044.exe 89 PID 2496 wrote to memory of 3092 2496 x28767044.exe 89 PID 2496 wrote to memory of 3092 2496 x28767044.exe 89 PID 4632 wrote to memory of 2312 4632 aad674ee7cb1795ac4e338b39a564fa0de8b080fa9312f18e77ecd5d79b10902.exe 94 PID 4632 wrote to memory of 2312 4632 aad674ee7cb1795ac4e338b39a564fa0de8b080fa9312f18e77ecd5d79b10902.exe 94 PID 4632 wrote to memory of 2312 4632 aad674ee7cb1795ac4e338b39a564fa0de8b080fa9312f18e77ecd5d79b10902.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\aad674ee7cb1795ac4e338b39a564fa0de8b080fa9312f18e77ecd5d79b10902.exe"C:\Users\Admin\AppData\Local\Temp\aad674ee7cb1795ac4e338b39a564fa0de8b080fa9312f18e77ecd5d79b10902.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x28767044.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x28767044.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m27489873.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m27489873.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1872
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n03966812.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n03966812.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3092
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\o22711051.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\o22711051.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2312
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
177KB
MD5eeda211952ef613a0b8595ba99dabd11
SHA1ed84d555df2e27dc4711eb7c48ce2f877599548e
SHA2568abc3cb78ce94c85bb9159695d3788559879a15730a7e978f3a0b7f75b83e44f
SHA5126d6a3d559821c10ca8b7c4254b9700ae1cafba9ea2882e5ca142d628f89b0c3da8c0dc578e79802c620a384474886034cdfc91ca60365eef0aa4102464c432c5
-
Filesize
177KB
MD5eeda211952ef613a0b8595ba99dabd11
SHA1ed84d555df2e27dc4711eb7c48ce2f877599548e
SHA2568abc3cb78ce94c85bb9159695d3788559879a15730a7e978f3a0b7f75b83e44f
SHA5126d6a3d559821c10ca8b7c4254b9700ae1cafba9ea2882e5ca142d628f89b0c3da8c0dc578e79802c620a384474886034cdfc91ca60365eef0aa4102464c432c5
-
Filesize
570KB
MD56c15f3d62b6ad8a4907113c5cdad57d6
SHA1f67031ef6ef5af1d8c97ec147a9c09b508173d4d
SHA2561d53e9ffce0a07dac0c5d78b6f85f736ae2cf90d680583d7a7e7a4d477deaac7
SHA512640e99c4561a80a62dfe745c0690b2437c9a218d4172bebe88aa5ae812c85b77a3c12af7c953d16b4b901692827f9ba5d80a3ec5f91cdc8f0f2ba7f82866880c
-
Filesize
570KB
MD56c15f3d62b6ad8a4907113c5cdad57d6
SHA1f67031ef6ef5af1d8c97ec147a9c09b508173d4d
SHA2561d53e9ffce0a07dac0c5d78b6f85f736ae2cf90d680583d7a7e7a4d477deaac7
SHA512640e99c4561a80a62dfe745c0690b2437c9a218d4172bebe88aa5ae812c85b77a3c12af7c953d16b4b901692827f9ba5d80a3ec5f91cdc8f0f2ba7f82866880c
-
Filesize
476KB
MD54e2542b4e8701d76ad726f81cc310752
SHA1b5e069ecb22ecc919a488050354d7a4bed689c82
SHA2564ec03d945ee04b5ee844b0483d773ee408fe0668cef6e0021782153cbb41b833
SHA512071f4b8632a9ad5c0587d530dfee4a86a88a5b481cf62798b5c975ebb44564f328222b2b4487313738d6b034e340230cd61810bdcc19282ab620cf0d7695be8d
-
Filesize
476KB
MD54e2542b4e8701d76ad726f81cc310752
SHA1b5e069ecb22ecc919a488050354d7a4bed689c82
SHA2564ec03d945ee04b5ee844b0483d773ee408fe0668cef6e0021782153cbb41b833
SHA512071f4b8632a9ad5c0587d530dfee4a86a88a5b481cf62798b5c975ebb44564f328222b2b4487313738d6b034e340230cd61810bdcc19282ab620cf0d7695be8d
-
Filesize
169KB
MD5be12ae9f77acc227d2d7bd475d3fecfb
SHA1ddb5d3a1d7efc620d56c9f2481f6804abc184d47
SHA256b92cbbe170189e09fe3c66ed7efd6b883c3b7d3c98b11213b1026b8e2c22102c
SHA5124cf5d7fc2faa9f0ae52e23bbd03cad69e904ae62bebdb9221c8f0f12d56ae39cc5d8ea2cfd43ea10d521e632613cc615dd684cd5552da6b079750b596b10839a
-
Filesize
169KB
MD5be12ae9f77acc227d2d7bd475d3fecfb
SHA1ddb5d3a1d7efc620d56c9f2481f6804abc184d47
SHA256b92cbbe170189e09fe3c66ed7efd6b883c3b7d3c98b11213b1026b8e2c22102c
SHA5124cf5d7fc2faa9f0ae52e23bbd03cad69e904ae62bebdb9221c8f0f12d56ae39cc5d8ea2cfd43ea10d521e632613cc615dd684cd5552da6b079750b596b10839a
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf