Analysis
-
max time kernel
150s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05-05-2023 18:32
Static task
static1
Behavioral task
behavioral1
Sample
7654b7b139d02caf594e3bb76024b436.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
7654b7b139d02caf594e3bb76024b436.exe
Resource
win10v2004-20230220-en
General
-
Target
7654b7b139d02caf594e3bb76024b436.exe
-
Size
480KB
-
MD5
7654b7b139d02caf594e3bb76024b436
-
SHA1
9ab0d7bc3a1e5f69dc0c15074f4ba85a7a907144
-
SHA256
1503129c1499aee0902cfcfa2d78d909e0f5117d9f7091134309eb05564a2e8f
-
SHA512
7a824318084704b92ade92267de286503ce2f111c85097e1a0a2cd65e65f29140e5df45e987482a440d21678ad4ba45b03e7d1bb40dbab42a6bc351b30738356
-
SSDEEP
12288:WMruy90sAoIpon4xyFZaP5xW5VYY2vrARptcjsVmC58pIr3:MyrIon4xynAsd48Rzrb+Or3
Malware Config
Extracted
redline
daris
217.196.96.56:4138
-
auth_value
3491f24ae0250969cd45ce4b3fe77549
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" l4489086.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" l4489086.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" l4489086.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" l4489086.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" l4489086.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection l4489086.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 1864 y3085576.exe 2004 k5575547.exe 1768 l4489086.exe -
Loads dropped DLL 6 IoCs
pid Process 1848 7654b7b139d02caf594e3bb76024b436.exe 1864 y3085576.exe 1864 y3085576.exe 2004 k5575547.exe 1864 y3085576.exe 1768 l4489086.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features l4489086.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" l4489086.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 7654b7b139d02caf594e3bb76024b436.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7654b7b139d02caf594e3bb76024b436.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce y3085576.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y3085576.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2004 k5575547.exe 2004 k5575547.exe 1768 l4489086.exe 1768 l4489086.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2004 k5575547.exe Token: SeDebugPrivilege 1768 l4489086.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1848 wrote to memory of 1864 1848 7654b7b139d02caf594e3bb76024b436.exe 26 PID 1848 wrote to memory of 1864 1848 7654b7b139d02caf594e3bb76024b436.exe 26 PID 1848 wrote to memory of 1864 1848 7654b7b139d02caf594e3bb76024b436.exe 26 PID 1848 wrote to memory of 1864 1848 7654b7b139d02caf594e3bb76024b436.exe 26 PID 1848 wrote to memory of 1864 1848 7654b7b139d02caf594e3bb76024b436.exe 26 PID 1848 wrote to memory of 1864 1848 7654b7b139d02caf594e3bb76024b436.exe 26 PID 1848 wrote to memory of 1864 1848 7654b7b139d02caf594e3bb76024b436.exe 26 PID 1864 wrote to memory of 2004 1864 y3085576.exe 27 PID 1864 wrote to memory of 2004 1864 y3085576.exe 27 PID 1864 wrote to memory of 2004 1864 y3085576.exe 27 PID 1864 wrote to memory of 2004 1864 y3085576.exe 27 PID 1864 wrote to memory of 2004 1864 y3085576.exe 27 PID 1864 wrote to memory of 2004 1864 y3085576.exe 27 PID 1864 wrote to memory of 2004 1864 y3085576.exe 27 PID 1864 wrote to memory of 1768 1864 y3085576.exe 29 PID 1864 wrote to memory of 1768 1864 y3085576.exe 29 PID 1864 wrote to memory of 1768 1864 y3085576.exe 29 PID 1864 wrote to memory of 1768 1864 y3085576.exe 29 PID 1864 wrote to memory of 1768 1864 y3085576.exe 29 PID 1864 wrote to memory of 1768 1864 y3085576.exe 29 PID 1864 wrote to memory of 1768 1864 y3085576.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\7654b7b139d02caf594e3bb76024b436.exe"C:\Users\Admin\AppData\Local\Temp\7654b7b139d02caf594e3bb76024b436.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3085576.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3085576.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k5575547.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k5575547.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2004
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l4489086.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l4489086.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1768
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
308KB
MD50c8c5816f58bb7cc9df5093b60df7211
SHA1ef729dd2ee538acb8f84621bdc960f7fc1529ca3
SHA256a00c0f9cccc086e259d21ede9f2129f6c618ce96cf2e544b827715666b04efbf
SHA5125e89ca9984ad454ac55e2214c3f8467eed6f68c611d4ee7968b63a3b94d262a450949e839e383ecf102e4a1ac05d7ff5387ccf4eb3b67c90fde6861b02b4ed1d
-
Filesize
308KB
MD50c8c5816f58bb7cc9df5093b60df7211
SHA1ef729dd2ee538acb8f84621bdc960f7fc1529ca3
SHA256a00c0f9cccc086e259d21ede9f2129f6c618ce96cf2e544b827715666b04efbf
SHA5125e89ca9984ad454ac55e2214c3f8467eed6f68c611d4ee7968b63a3b94d262a450949e839e383ecf102e4a1ac05d7ff5387ccf4eb3b67c90fde6861b02b4ed1d
-
Filesize
168KB
MD524d9df908e3542b85f406248da09bccd
SHA1f6619e6b403e4889f4946ae5f7b8bb0e1d3bff65
SHA25620488d08992718b3bf98a8375d0b79efdee7bf402db9f57f4efdaedb8bd223f1
SHA5128ee8f0ddbe30ed2ed10df18f9041278de77c0ea57e7c22e16e720cb4a5466d702a7ef5e23820acdc4aeba1ca2eff56203f5ed0273b3f2018457b293440e77838
-
Filesize
168KB
MD524d9df908e3542b85f406248da09bccd
SHA1f6619e6b403e4889f4946ae5f7b8bb0e1d3bff65
SHA25620488d08992718b3bf98a8375d0b79efdee7bf402db9f57f4efdaedb8bd223f1
SHA5128ee8f0ddbe30ed2ed10df18f9041278de77c0ea57e7c22e16e720cb4a5466d702a7ef5e23820acdc4aeba1ca2eff56203f5ed0273b3f2018457b293440e77838
-
Filesize
179KB
MD50948e18c3e62fcdd93b18c56279d10c9
SHA18ffba5e073e62488e75f846477922b3d81c118bf
SHA256c4d65b3bc20562810bc1eeffe5a2af50464f274d3d69d634e5d0c13b21a658c3
SHA5124fa1beeca911d3cdbf6620ae7890c920f9a63942cfdd2df2b5ece1c27788a19cd780df90381ac437e10a64f1df39fda76418a638d1aa71e94f967639ea7fa6eb
-
Filesize
179KB
MD50948e18c3e62fcdd93b18c56279d10c9
SHA18ffba5e073e62488e75f846477922b3d81c118bf
SHA256c4d65b3bc20562810bc1eeffe5a2af50464f274d3d69d634e5d0c13b21a658c3
SHA5124fa1beeca911d3cdbf6620ae7890c920f9a63942cfdd2df2b5ece1c27788a19cd780df90381ac437e10a64f1df39fda76418a638d1aa71e94f967639ea7fa6eb
-
Filesize
308KB
MD50c8c5816f58bb7cc9df5093b60df7211
SHA1ef729dd2ee538acb8f84621bdc960f7fc1529ca3
SHA256a00c0f9cccc086e259d21ede9f2129f6c618ce96cf2e544b827715666b04efbf
SHA5125e89ca9984ad454ac55e2214c3f8467eed6f68c611d4ee7968b63a3b94d262a450949e839e383ecf102e4a1ac05d7ff5387ccf4eb3b67c90fde6861b02b4ed1d
-
Filesize
308KB
MD50c8c5816f58bb7cc9df5093b60df7211
SHA1ef729dd2ee538acb8f84621bdc960f7fc1529ca3
SHA256a00c0f9cccc086e259d21ede9f2129f6c618ce96cf2e544b827715666b04efbf
SHA5125e89ca9984ad454ac55e2214c3f8467eed6f68c611d4ee7968b63a3b94d262a450949e839e383ecf102e4a1ac05d7ff5387ccf4eb3b67c90fde6861b02b4ed1d
-
Filesize
168KB
MD524d9df908e3542b85f406248da09bccd
SHA1f6619e6b403e4889f4946ae5f7b8bb0e1d3bff65
SHA25620488d08992718b3bf98a8375d0b79efdee7bf402db9f57f4efdaedb8bd223f1
SHA5128ee8f0ddbe30ed2ed10df18f9041278de77c0ea57e7c22e16e720cb4a5466d702a7ef5e23820acdc4aeba1ca2eff56203f5ed0273b3f2018457b293440e77838
-
Filesize
168KB
MD524d9df908e3542b85f406248da09bccd
SHA1f6619e6b403e4889f4946ae5f7b8bb0e1d3bff65
SHA25620488d08992718b3bf98a8375d0b79efdee7bf402db9f57f4efdaedb8bd223f1
SHA5128ee8f0ddbe30ed2ed10df18f9041278de77c0ea57e7c22e16e720cb4a5466d702a7ef5e23820acdc4aeba1ca2eff56203f5ed0273b3f2018457b293440e77838
-
Filesize
179KB
MD50948e18c3e62fcdd93b18c56279d10c9
SHA18ffba5e073e62488e75f846477922b3d81c118bf
SHA256c4d65b3bc20562810bc1eeffe5a2af50464f274d3d69d634e5d0c13b21a658c3
SHA5124fa1beeca911d3cdbf6620ae7890c920f9a63942cfdd2df2b5ece1c27788a19cd780df90381ac437e10a64f1df39fda76418a638d1aa71e94f967639ea7fa6eb
-
Filesize
179KB
MD50948e18c3e62fcdd93b18c56279d10c9
SHA18ffba5e073e62488e75f846477922b3d81c118bf
SHA256c4d65b3bc20562810bc1eeffe5a2af50464f274d3d69d634e5d0c13b21a658c3
SHA5124fa1beeca911d3cdbf6620ae7890c920f9a63942cfdd2df2b5ece1c27788a19cd780df90381ac437e10a64f1df39fda76418a638d1aa71e94f967639ea7fa6eb