Analysis
-
max time kernel
128s -
max time network
163s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05-05-2023 18:10
Static task
static1
Behavioral task
behavioral1
Sample
14656a7f8c5a007bc00c2a48085f0c0c83b2e16616b046e5b223471c6db4e744.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
14656a7f8c5a007bc00c2a48085f0c0c83b2e16616b046e5b223471c6db4e744.exe
Resource
win10v2004-20230220-en
General
-
Target
14656a7f8c5a007bc00c2a48085f0c0c83b2e16616b046e5b223471c6db4e744.exe
-
Size
1.2MB
-
MD5
e6503e99a5ec0ec9c4b6ea542cce17ab
-
SHA1
70a457aece1b398bdaeca23287308be4e2aa14ab
-
SHA256
14656a7f8c5a007bc00c2a48085f0c0c83b2e16616b046e5b223471c6db4e744
-
SHA512
daeb6385855070423785f96d9ac16790ecb2e7e4fc243851865387ac475ca30e4d6deec28a339c263e8e799936e09f670a7e440bcaf8da1d6f0405258453794b
-
SSDEEP
24576:dy1G22qT4lPzFAXQSXX2cq3I0DWnJE1r8LxHlKPcnP4A:41PBMlbgv2caIKAqV8ZwP
Malware Config
Extracted
redline
lofa
185.161.248.73:4164
-
auth_value
3442ba767c6a30cde747101942f34a3a
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" s69918260.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" s69918260.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" s69918260.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection s69918260.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" s69918260.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" s69918260.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 1968 z37947390.exe 588 z77304489.exe 2040 z70922630.exe 872 s69918260.exe 1212 t73113683.exe -
Loads dropped DLL 10 IoCs
pid Process 1948 14656a7f8c5a007bc00c2a48085f0c0c83b2e16616b046e5b223471c6db4e744.exe 1968 z37947390.exe 1968 z37947390.exe 588 z77304489.exe 588 z77304489.exe 2040 z70922630.exe 2040 z70922630.exe 872 s69918260.exe 2040 z70922630.exe 1212 t73113683.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features s69918260.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" s69918260.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z37947390.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z37947390.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z77304489.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z77304489.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z70922630.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z70922630.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 14656a7f8c5a007bc00c2a48085f0c0c83b2e16616b046e5b223471c6db4e744.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 14656a7f8c5a007bc00c2a48085f0c0c83b2e16616b046e5b223471c6db4e744.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 872 s69918260.exe 872 s69918260.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 872 s69918260.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 1948 wrote to memory of 1968 1948 14656a7f8c5a007bc00c2a48085f0c0c83b2e16616b046e5b223471c6db4e744.exe 28 PID 1948 wrote to memory of 1968 1948 14656a7f8c5a007bc00c2a48085f0c0c83b2e16616b046e5b223471c6db4e744.exe 28 PID 1948 wrote to memory of 1968 1948 14656a7f8c5a007bc00c2a48085f0c0c83b2e16616b046e5b223471c6db4e744.exe 28 PID 1948 wrote to memory of 1968 1948 14656a7f8c5a007bc00c2a48085f0c0c83b2e16616b046e5b223471c6db4e744.exe 28 PID 1948 wrote to memory of 1968 1948 14656a7f8c5a007bc00c2a48085f0c0c83b2e16616b046e5b223471c6db4e744.exe 28 PID 1948 wrote to memory of 1968 1948 14656a7f8c5a007bc00c2a48085f0c0c83b2e16616b046e5b223471c6db4e744.exe 28 PID 1948 wrote to memory of 1968 1948 14656a7f8c5a007bc00c2a48085f0c0c83b2e16616b046e5b223471c6db4e744.exe 28 PID 1968 wrote to memory of 588 1968 z37947390.exe 29 PID 1968 wrote to memory of 588 1968 z37947390.exe 29 PID 1968 wrote to memory of 588 1968 z37947390.exe 29 PID 1968 wrote to memory of 588 1968 z37947390.exe 29 PID 1968 wrote to memory of 588 1968 z37947390.exe 29 PID 1968 wrote to memory of 588 1968 z37947390.exe 29 PID 1968 wrote to memory of 588 1968 z37947390.exe 29 PID 588 wrote to memory of 2040 588 z77304489.exe 30 PID 588 wrote to memory of 2040 588 z77304489.exe 30 PID 588 wrote to memory of 2040 588 z77304489.exe 30 PID 588 wrote to memory of 2040 588 z77304489.exe 30 PID 588 wrote to memory of 2040 588 z77304489.exe 30 PID 588 wrote to memory of 2040 588 z77304489.exe 30 PID 588 wrote to memory of 2040 588 z77304489.exe 30 PID 2040 wrote to memory of 872 2040 z70922630.exe 31 PID 2040 wrote to memory of 872 2040 z70922630.exe 31 PID 2040 wrote to memory of 872 2040 z70922630.exe 31 PID 2040 wrote to memory of 872 2040 z70922630.exe 31 PID 2040 wrote to memory of 872 2040 z70922630.exe 31 PID 2040 wrote to memory of 872 2040 z70922630.exe 31 PID 2040 wrote to memory of 872 2040 z70922630.exe 31 PID 2040 wrote to memory of 1212 2040 z70922630.exe 32 PID 2040 wrote to memory of 1212 2040 z70922630.exe 32 PID 2040 wrote to memory of 1212 2040 z70922630.exe 32 PID 2040 wrote to memory of 1212 2040 z70922630.exe 32 PID 2040 wrote to memory of 1212 2040 z70922630.exe 32 PID 2040 wrote to memory of 1212 2040 z70922630.exe 32 PID 2040 wrote to memory of 1212 2040 z70922630.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\14656a7f8c5a007bc00c2a48085f0c0c83b2e16616b046e5b223471c6db4e744.exe"C:\Users\Admin\AppData\Local\Temp\14656a7f8c5a007bc00c2a48085f0c0c83b2e16616b046e5b223471c6db4e744.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z37947390.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z37947390.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z77304489.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z77304489.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z70922630.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z70922630.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s69918260.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s69918260.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:872
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t73113683.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t73113683.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1212
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
977KB
MD56f7f1c3d5263a6f93c7c903d077a770b
SHA1e7609ac36be56adc9ac81458dddf594b77461c88
SHA256bf384e39584c6dd1f18f7ab6134ebe21853409b6ff2bbcddfaa1133ae3ad97b8
SHA5124105e790e94c9bb07ed41e62de3a810e07ece9bbfa665b666bfd6fffa494b6970a6b79863b5731944656ea1f141535e03e67f8de7fd238fd92df8e4590429edd
-
Filesize
977KB
MD56f7f1c3d5263a6f93c7c903d077a770b
SHA1e7609ac36be56adc9ac81458dddf594b77461c88
SHA256bf384e39584c6dd1f18f7ab6134ebe21853409b6ff2bbcddfaa1133ae3ad97b8
SHA5124105e790e94c9bb07ed41e62de3a810e07ece9bbfa665b666bfd6fffa494b6970a6b79863b5731944656ea1f141535e03e67f8de7fd238fd92df8e4590429edd
-
Filesize
795KB
MD5a623203b8a5c663da05c5fd63ef12586
SHA1ecfc887b1d013a080871a7765704527b3eefee7c
SHA2564662b5906b6d171c8c394e0e1a749bddf1aa9e5789f29c6494d4b351d201b79d
SHA51242857eb6173776bfe48b9725e12896a53cd37085ce29b154756c688c14c65c9a04ebc04ea97afd2461b6d4af7bfb27211572460e0c7a7a1fde048b1c13f4821a
-
Filesize
795KB
MD5a623203b8a5c663da05c5fd63ef12586
SHA1ecfc887b1d013a080871a7765704527b3eefee7c
SHA2564662b5906b6d171c8c394e0e1a749bddf1aa9e5789f29c6494d4b351d201b79d
SHA51242857eb6173776bfe48b9725e12896a53cd37085ce29b154756c688c14c65c9a04ebc04ea97afd2461b6d4af7bfb27211572460e0c7a7a1fde048b1c13f4821a
-
Filesize
310KB
MD5b262b665c720e15342bb413b15fa8a4c
SHA18a5899eceaa07e96c7b8705971ad41bfbade78fc
SHA25673e5f6bc880180cb8fc2fcaa26edf959b4853227d429579871a03141ae51f310
SHA512f8f40aeb97746db943aefefb4a7019bdc486c8600c9bfb6324f8364546721061f2e14805134ee5487e2f631afaaaed06cda61b7e873f8374ae489cf034d27f14
-
Filesize
310KB
MD5b262b665c720e15342bb413b15fa8a4c
SHA18a5899eceaa07e96c7b8705971ad41bfbade78fc
SHA25673e5f6bc880180cb8fc2fcaa26edf959b4853227d429579871a03141ae51f310
SHA512f8f40aeb97746db943aefefb4a7019bdc486c8600c9bfb6324f8364546721061f2e14805134ee5487e2f631afaaaed06cda61b7e873f8374ae489cf034d27f14
-
Filesize
176KB
MD5711ec7b73a48604e88f6666b9963b2e4
SHA11da877e011316ad4249ff30da0a5ab544a746cc0
SHA256241d23410c347d7ceef78379a9043206ff61177a40e7301b427edf1f162bb13b
SHA512e3897fc43e3de0e48781cc3edf984da5ad0b1826f02b111f713637d169f0aa77b24088ad859c4142bed29ab010dfbf614c6f9e0a9732924ce702c457a93f82ee
-
Filesize
176KB
MD5711ec7b73a48604e88f6666b9963b2e4
SHA11da877e011316ad4249ff30da0a5ab544a746cc0
SHA256241d23410c347d7ceef78379a9043206ff61177a40e7301b427edf1f162bb13b
SHA512e3897fc43e3de0e48781cc3edf984da5ad0b1826f02b111f713637d169f0aa77b24088ad859c4142bed29ab010dfbf614c6f9e0a9732924ce702c457a93f82ee
-
Filesize
168KB
MD56d45e53d319f2017b0339ab17f1cc396
SHA1631e5f116c308414a209aa86b531c6adc6d98d11
SHA256bccd8d4cc1049d03f31bee69b596f779a2a8a05ef93d8d830180a38943689f12
SHA51255913e7d918ed342935bc440e7ff31de6e97f2895a60e74095e0c21e4590b723498de407f5d7f5fd94daf07cb751afc83357236a06634e5633819ac536b40077
-
Filesize
168KB
MD56d45e53d319f2017b0339ab17f1cc396
SHA1631e5f116c308414a209aa86b531c6adc6d98d11
SHA256bccd8d4cc1049d03f31bee69b596f779a2a8a05ef93d8d830180a38943689f12
SHA51255913e7d918ed342935bc440e7ff31de6e97f2895a60e74095e0c21e4590b723498de407f5d7f5fd94daf07cb751afc83357236a06634e5633819ac536b40077
-
Filesize
977KB
MD56f7f1c3d5263a6f93c7c903d077a770b
SHA1e7609ac36be56adc9ac81458dddf594b77461c88
SHA256bf384e39584c6dd1f18f7ab6134ebe21853409b6ff2bbcddfaa1133ae3ad97b8
SHA5124105e790e94c9bb07ed41e62de3a810e07ece9bbfa665b666bfd6fffa494b6970a6b79863b5731944656ea1f141535e03e67f8de7fd238fd92df8e4590429edd
-
Filesize
977KB
MD56f7f1c3d5263a6f93c7c903d077a770b
SHA1e7609ac36be56adc9ac81458dddf594b77461c88
SHA256bf384e39584c6dd1f18f7ab6134ebe21853409b6ff2bbcddfaa1133ae3ad97b8
SHA5124105e790e94c9bb07ed41e62de3a810e07ece9bbfa665b666bfd6fffa494b6970a6b79863b5731944656ea1f141535e03e67f8de7fd238fd92df8e4590429edd
-
Filesize
795KB
MD5a623203b8a5c663da05c5fd63ef12586
SHA1ecfc887b1d013a080871a7765704527b3eefee7c
SHA2564662b5906b6d171c8c394e0e1a749bddf1aa9e5789f29c6494d4b351d201b79d
SHA51242857eb6173776bfe48b9725e12896a53cd37085ce29b154756c688c14c65c9a04ebc04ea97afd2461b6d4af7bfb27211572460e0c7a7a1fde048b1c13f4821a
-
Filesize
795KB
MD5a623203b8a5c663da05c5fd63ef12586
SHA1ecfc887b1d013a080871a7765704527b3eefee7c
SHA2564662b5906b6d171c8c394e0e1a749bddf1aa9e5789f29c6494d4b351d201b79d
SHA51242857eb6173776bfe48b9725e12896a53cd37085ce29b154756c688c14c65c9a04ebc04ea97afd2461b6d4af7bfb27211572460e0c7a7a1fde048b1c13f4821a
-
Filesize
310KB
MD5b262b665c720e15342bb413b15fa8a4c
SHA18a5899eceaa07e96c7b8705971ad41bfbade78fc
SHA25673e5f6bc880180cb8fc2fcaa26edf959b4853227d429579871a03141ae51f310
SHA512f8f40aeb97746db943aefefb4a7019bdc486c8600c9bfb6324f8364546721061f2e14805134ee5487e2f631afaaaed06cda61b7e873f8374ae489cf034d27f14
-
Filesize
310KB
MD5b262b665c720e15342bb413b15fa8a4c
SHA18a5899eceaa07e96c7b8705971ad41bfbade78fc
SHA25673e5f6bc880180cb8fc2fcaa26edf959b4853227d429579871a03141ae51f310
SHA512f8f40aeb97746db943aefefb4a7019bdc486c8600c9bfb6324f8364546721061f2e14805134ee5487e2f631afaaaed06cda61b7e873f8374ae489cf034d27f14
-
Filesize
176KB
MD5711ec7b73a48604e88f6666b9963b2e4
SHA11da877e011316ad4249ff30da0a5ab544a746cc0
SHA256241d23410c347d7ceef78379a9043206ff61177a40e7301b427edf1f162bb13b
SHA512e3897fc43e3de0e48781cc3edf984da5ad0b1826f02b111f713637d169f0aa77b24088ad859c4142bed29ab010dfbf614c6f9e0a9732924ce702c457a93f82ee
-
Filesize
176KB
MD5711ec7b73a48604e88f6666b9963b2e4
SHA11da877e011316ad4249ff30da0a5ab544a746cc0
SHA256241d23410c347d7ceef78379a9043206ff61177a40e7301b427edf1f162bb13b
SHA512e3897fc43e3de0e48781cc3edf984da5ad0b1826f02b111f713637d169f0aa77b24088ad859c4142bed29ab010dfbf614c6f9e0a9732924ce702c457a93f82ee
-
Filesize
168KB
MD56d45e53d319f2017b0339ab17f1cc396
SHA1631e5f116c308414a209aa86b531c6adc6d98d11
SHA256bccd8d4cc1049d03f31bee69b596f779a2a8a05ef93d8d830180a38943689f12
SHA51255913e7d918ed342935bc440e7ff31de6e97f2895a60e74095e0c21e4590b723498de407f5d7f5fd94daf07cb751afc83357236a06634e5633819ac536b40077
-
Filesize
168KB
MD56d45e53d319f2017b0339ab17f1cc396
SHA1631e5f116c308414a209aa86b531c6adc6d98d11
SHA256bccd8d4cc1049d03f31bee69b596f779a2a8a05ef93d8d830180a38943689f12
SHA51255913e7d918ed342935bc440e7ff31de6e97f2895a60e74095e0c21e4590b723498de407f5d7f5fd94daf07cb751afc83357236a06634e5633819ac536b40077