Analysis
-
max time kernel
132s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05-05-2023 18:48
Static task
static1
Behavioral task
behavioral1
Sample
a45b3ac0d54f74237c09e1722fd234b7beb1cc560408a5846234ae2ce952fa3b.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
a45b3ac0d54f74237c09e1722fd234b7beb1cc560408a5846234ae2ce952fa3b.exe
Resource
win10v2004-20230220-en
General
-
Target
a45b3ac0d54f74237c09e1722fd234b7beb1cc560408a5846234ae2ce952fa3b.exe
-
Size
1.3MB
-
MD5
cbedc989ed8d9872f1d696366848d10e
-
SHA1
a7467f46e03678b5a4a81dcac94bf4c091e8856b
-
SHA256
a45b3ac0d54f74237c09e1722fd234b7beb1cc560408a5846234ae2ce952fa3b
-
SHA512
56c3a8fef58a48fe16bc4e49ae7d59302a16b32d91895a1aa4fe56362f8c9cdcf94972ff9fd9895560ab2991a917fcf14c10960f50fc759da6af33706d855474
-
SSDEEP
24576:kyi/egwMjKKF/Mfj9YnmBFNJysmxU0UtuUmON8o86AuopvBkJf4lW:z6egVKc0fj+nmR85TU8qPAuGud4
Malware Config
Extracted
redline
luser
185.161.248.73:4164
-
auth_value
cf14a84de9a3b6b7b8981202f3b616fb
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection s49833757.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" s49833757.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" s49833757.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" s49833757.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" s49833757.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" s49833757.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 1736 z92145068.exe 672 z68677973.exe 520 z52559985.exe 1272 s49833757.exe 540 t79882300.exe -
Loads dropped DLL 11 IoCs
pid Process 1092 a45b3ac0d54f74237c09e1722fd234b7beb1cc560408a5846234ae2ce952fa3b.exe 1736 z92145068.exe 1736 z92145068.exe 672 z68677973.exe 672 z68677973.exe 520 z52559985.exe 520 z52559985.exe 520 z52559985.exe 1272 s49833757.exe 520 z52559985.exe 540 t79882300.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" s49833757.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features s49833757.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z52559985.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z52559985.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce a45b3ac0d54f74237c09e1722fd234b7beb1cc560408a5846234ae2ce952fa3b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a45b3ac0d54f74237c09e1722fd234b7beb1cc560408a5846234ae2ce952fa3b.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z92145068.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z92145068.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z68677973.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z68677973.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1272 s49833757.exe 1272 s49833757.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1272 s49833757.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 1092 wrote to memory of 1736 1092 a45b3ac0d54f74237c09e1722fd234b7beb1cc560408a5846234ae2ce952fa3b.exe 28 PID 1092 wrote to memory of 1736 1092 a45b3ac0d54f74237c09e1722fd234b7beb1cc560408a5846234ae2ce952fa3b.exe 28 PID 1092 wrote to memory of 1736 1092 a45b3ac0d54f74237c09e1722fd234b7beb1cc560408a5846234ae2ce952fa3b.exe 28 PID 1092 wrote to memory of 1736 1092 a45b3ac0d54f74237c09e1722fd234b7beb1cc560408a5846234ae2ce952fa3b.exe 28 PID 1092 wrote to memory of 1736 1092 a45b3ac0d54f74237c09e1722fd234b7beb1cc560408a5846234ae2ce952fa3b.exe 28 PID 1092 wrote to memory of 1736 1092 a45b3ac0d54f74237c09e1722fd234b7beb1cc560408a5846234ae2ce952fa3b.exe 28 PID 1092 wrote to memory of 1736 1092 a45b3ac0d54f74237c09e1722fd234b7beb1cc560408a5846234ae2ce952fa3b.exe 28 PID 1736 wrote to memory of 672 1736 z92145068.exe 29 PID 1736 wrote to memory of 672 1736 z92145068.exe 29 PID 1736 wrote to memory of 672 1736 z92145068.exe 29 PID 1736 wrote to memory of 672 1736 z92145068.exe 29 PID 1736 wrote to memory of 672 1736 z92145068.exe 29 PID 1736 wrote to memory of 672 1736 z92145068.exe 29 PID 1736 wrote to memory of 672 1736 z92145068.exe 29 PID 672 wrote to memory of 520 672 z68677973.exe 30 PID 672 wrote to memory of 520 672 z68677973.exe 30 PID 672 wrote to memory of 520 672 z68677973.exe 30 PID 672 wrote to memory of 520 672 z68677973.exe 30 PID 672 wrote to memory of 520 672 z68677973.exe 30 PID 672 wrote to memory of 520 672 z68677973.exe 30 PID 672 wrote to memory of 520 672 z68677973.exe 30 PID 520 wrote to memory of 1272 520 z52559985.exe 31 PID 520 wrote to memory of 1272 520 z52559985.exe 31 PID 520 wrote to memory of 1272 520 z52559985.exe 31 PID 520 wrote to memory of 1272 520 z52559985.exe 31 PID 520 wrote to memory of 1272 520 z52559985.exe 31 PID 520 wrote to memory of 1272 520 z52559985.exe 31 PID 520 wrote to memory of 1272 520 z52559985.exe 31 PID 520 wrote to memory of 540 520 z52559985.exe 32 PID 520 wrote to memory of 540 520 z52559985.exe 32 PID 520 wrote to memory of 540 520 z52559985.exe 32 PID 520 wrote to memory of 540 520 z52559985.exe 32 PID 520 wrote to memory of 540 520 z52559985.exe 32 PID 520 wrote to memory of 540 520 z52559985.exe 32 PID 520 wrote to memory of 540 520 z52559985.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\a45b3ac0d54f74237c09e1722fd234b7beb1cc560408a5846234ae2ce952fa3b.exe"C:\Users\Admin\AppData\Local\Temp\a45b3ac0d54f74237c09e1722fd234b7beb1cc560408a5846234ae2ce952fa3b.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z92145068.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z92145068.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z68677973.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z68677973.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z52559985.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z52559985.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s49833757.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s49833757.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1272
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t79882300.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t79882300.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:540
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5cefef0c5c49d094b952cdbc9afc486f3
SHA1beaa4dcf85dfaa86e7f718dd7994d8c15d7a79ee
SHA256ed487e245c698b104ae2db1138858a4c38e83e8400e477ef415f015be83203bf
SHA512aed531a3dd28c919e0a037009d2cf53ff4a06a8e2ec463441e70db9030acc92b1c6836b23b38f06690e9350004b37a8b80553c32608d29f137b9c649f2e516ae
-
Filesize
1.1MB
MD5cefef0c5c49d094b952cdbc9afc486f3
SHA1beaa4dcf85dfaa86e7f718dd7994d8c15d7a79ee
SHA256ed487e245c698b104ae2db1138858a4c38e83e8400e477ef415f015be83203bf
SHA512aed531a3dd28c919e0a037009d2cf53ff4a06a8e2ec463441e70db9030acc92b1c6836b23b38f06690e9350004b37a8b80553c32608d29f137b9c649f2e516ae
-
Filesize
895KB
MD5b5cd3919fde92f3d441f43c24f4a88ce
SHA162b9097e2d9e41a6b7e30de690ef7da54aaafe41
SHA2561be527bc2ee8a7d40f45cc6a5959cab9cc7459dd4e23163cdcf8e3e94cf64dcc
SHA512f1665c38970614a42a319a0251c8b3f79cf1ecbf4d8eed66ac93dde2118e53574befe6838fc95cba1de4d57a19306c762a10f10e8da18edf94a6a18f7663df35
-
Filesize
895KB
MD5b5cd3919fde92f3d441f43c24f4a88ce
SHA162b9097e2d9e41a6b7e30de690ef7da54aaafe41
SHA2561be527bc2ee8a7d40f45cc6a5959cab9cc7459dd4e23163cdcf8e3e94cf64dcc
SHA512f1665c38970614a42a319a0251c8b3f79cf1ecbf4d8eed66ac93dde2118e53574befe6838fc95cba1de4d57a19306c762a10f10e8da18edf94a6a18f7663df35
-
Filesize
410KB
MD55b7db11974a25a79f395ff425cb61b8e
SHA1587b660abaddc27e0d728047d05e40f01e959274
SHA2563bbba3929a2a916580e573e6811cc67938b27cdde94935ad169c4f9d54bf0256
SHA512e5037212b3c44246893936bc559e86ee5bf4a88889a5b8b0b0394bcbfe0658d17de51c3f35ff4996d6efbd439ac9db60c25175d0e440d0370d7a4a6ded9853a4
-
Filesize
410KB
MD55b7db11974a25a79f395ff425cb61b8e
SHA1587b660abaddc27e0d728047d05e40f01e959274
SHA2563bbba3929a2a916580e573e6811cc67938b27cdde94935ad169c4f9d54bf0256
SHA512e5037212b3c44246893936bc559e86ee5bf4a88889a5b8b0b0394bcbfe0658d17de51c3f35ff4996d6efbd439ac9db60c25175d0e440d0370d7a4a6ded9853a4
-
Filesize
347KB
MD51bc6419a91b007056d89b8868e46b537
SHA1c1cef88f3b9dc6f987f03374616b6fa76d74b7c5
SHA256466ef23fa27b4bb5ad3fe87208c17246faa94255c488ff16c30a9c3a075a1457
SHA5127847ccb8f8d71cf93daaf9cca5a26226d7129eb02c418ec6a64fddadbace6f5f6946a867fc84038ec74e95ddadfadde395b703f6ddb8c13450d4229736449377
-
Filesize
347KB
MD51bc6419a91b007056d89b8868e46b537
SHA1c1cef88f3b9dc6f987f03374616b6fa76d74b7c5
SHA256466ef23fa27b4bb5ad3fe87208c17246faa94255c488ff16c30a9c3a075a1457
SHA5127847ccb8f8d71cf93daaf9cca5a26226d7129eb02c418ec6a64fddadbace6f5f6946a867fc84038ec74e95ddadfadde395b703f6ddb8c13450d4229736449377
-
Filesize
347KB
MD51bc6419a91b007056d89b8868e46b537
SHA1c1cef88f3b9dc6f987f03374616b6fa76d74b7c5
SHA256466ef23fa27b4bb5ad3fe87208c17246faa94255c488ff16c30a9c3a075a1457
SHA5127847ccb8f8d71cf93daaf9cca5a26226d7129eb02c418ec6a64fddadbace6f5f6946a867fc84038ec74e95ddadfadde395b703f6ddb8c13450d4229736449377
-
Filesize
168KB
MD5b8b66c5068d42dfe5a5881afee5255d6
SHA1d64180fa8c84df12980cd512c5558e64570f05c1
SHA2564e99dbd9e05496bd8f2f310a03d5ae714fe0b10ad20c906c81b23d74df7d7af8
SHA51228e96750076d6ad1dd1c4ca54965f95b2edf19ff601f02901f2671751cc2a262ceda31ca4b3b9eb60ac0f571ce75cf1b98916de8125440fa54ac1869eb469b6e
-
Filesize
168KB
MD5b8b66c5068d42dfe5a5881afee5255d6
SHA1d64180fa8c84df12980cd512c5558e64570f05c1
SHA2564e99dbd9e05496bd8f2f310a03d5ae714fe0b10ad20c906c81b23d74df7d7af8
SHA51228e96750076d6ad1dd1c4ca54965f95b2edf19ff601f02901f2671751cc2a262ceda31ca4b3b9eb60ac0f571ce75cf1b98916de8125440fa54ac1869eb469b6e
-
Filesize
1.1MB
MD5cefef0c5c49d094b952cdbc9afc486f3
SHA1beaa4dcf85dfaa86e7f718dd7994d8c15d7a79ee
SHA256ed487e245c698b104ae2db1138858a4c38e83e8400e477ef415f015be83203bf
SHA512aed531a3dd28c919e0a037009d2cf53ff4a06a8e2ec463441e70db9030acc92b1c6836b23b38f06690e9350004b37a8b80553c32608d29f137b9c649f2e516ae
-
Filesize
1.1MB
MD5cefef0c5c49d094b952cdbc9afc486f3
SHA1beaa4dcf85dfaa86e7f718dd7994d8c15d7a79ee
SHA256ed487e245c698b104ae2db1138858a4c38e83e8400e477ef415f015be83203bf
SHA512aed531a3dd28c919e0a037009d2cf53ff4a06a8e2ec463441e70db9030acc92b1c6836b23b38f06690e9350004b37a8b80553c32608d29f137b9c649f2e516ae
-
Filesize
895KB
MD5b5cd3919fde92f3d441f43c24f4a88ce
SHA162b9097e2d9e41a6b7e30de690ef7da54aaafe41
SHA2561be527bc2ee8a7d40f45cc6a5959cab9cc7459dd4e23163cdcf8e3e94cf64dcc
SHA512f1665c38970614a42a319a0251c8b3f79cf1ecbf4d8eed66ac93dde2118e53574befe6838fc95cba1de4d57a19306c762a10f10e8da18edf94a6a18f7663df35
-
Filesize
895KB
MD5b5cd3919fde92f3d441f43c24f4a88ce
SHA162b9097e2d9e41a6b7e30de690ef7da54aaafe41
SHA2561be527bc2ee8a7d40f45cc6a5959cab9cc7459dd4e23163cdcf8e3e94cf64dcc
SHA512f1665c38970614a42a319a0251c8b3f79cf1ecbf4d8eed66ac93dde2118e53574befe6838fc95cba1de4d57a19306c762a10f10e8da18edf94a6a18f7663df35
-
Filesize
410KB
MD55b7db11974a25a79f395ff425cb61b8e
SHA1587b660abaddc27e0d728047d05e40f01e959274
SHA2563bbba3929a2a916580e573e6811cc67938b27cdde94935ad169c4f9d54bf0256
SHA512e5037212b3c44246893936bc559e86ee5bf4a88889a5b8b0b0394bcbfe0658d17de51c3f35ff4996d6efbd439ac9db60c25175d0e440d0370d7a4a6ded9853a4
-
Filesize
410KB
MD55b7db11974a25a79f395ff425cb61b8e
SHA1587b660abaddc27e0d728047d05e40f01e959274
SHA2563bbba3929a2a916580e573e6811cc67938b27cdde94935ad169c4f9d54bf0256
SHA512e5037212b3c44246893936bc559e86ee5bf4a88889a5b8b0b0394bcbfe0658d17de51c3f35ff4996d6efbd439ac9db60c25175d0e440d0370d7a4a6ded9853a4
-
Filesize
347KB
MD51bc6419a91b007056d89b8868e46b537
SHA1c1cef88f3b9dc6f987f03374616b6fa76d74b7c5
SHA256466ef23fa27b4bb5ad3fe87208c17246faa94255c488ff16c30a9c3a075a1457
SHA5127847ccb8f8d71cf93daaf9cca5a26226d7129eb02c418ec6a64fddadbace6f5f6946a867fc84038ec74e95ddadfadde395b703f6ddb8c13450d4229736449377
-
Filesize
347KB
MD51bc6419a91b007056d89b8868e46b537
SHA1c1cef88f3b9dc6f987f03374616b6fa76d74b7c5
SHA256466ef23fa27b4bb5ad3fe87208c17246faa94255c488ff16c30a9c3a075a1457
SHA5127847ccb8f8d71cf93daaf9cca5a26226d7129eb02c418ec6a64fddadbace6f5f6946a867fc84038ec74e95ddadfadde395b703f6ddb8c13450d4229736449377
-
Filesize
347KB
MD51bc6419a91b007056d89b8868e46b537
SHA1c1cef88f3b9dc6f987f03374616b6fa76d74b7c5
SHA256466ef23fa27b4bb5ad3fe87208c17246faa94255c488ff16c30a9c3a075a1457
SHA5127847ccb8f8d71cf93daaf9cca5a26226d7129eb02c418ec6a64fddadbace6f5f6946a867fc84038ec74e95ddadfadde395b703f6ddb8c13450d4229736449377
-
Filesize
168KB
MD5b8b66c5068d42dfe5a5881afee5255d6
SHA1d64180fa8c84df12980cd512c5558e64570f05c1
SHA2564e99dbd9e05496bd8f2f310a03d5ae714fe0b10ad20c906c81b23d74df7d7af8
SHA51228e96750076d6ad1dd1c4ca54965f95b2edf19ff601f02901f2671751cc2a262ceda31ca4b3b9eb60ac0f571ce75cf1b98916de8125440fa54ac1869eb469b6e
-
Filesize
168KB
MD5b8b66c5068d42dfe5a5881afee5255d6
SHA1d64180fa8c84df12980cd512c5558e64570f05c1
SHA2564e99dbd9e05496bd8f2f310a03d5ae714fe0b10ad20c906c81b23d74df7d7af8
SHA51228e96750076d6ad1dd1c4ca54965f95b2edf19ff601f02901f2671751cc2a262ceda31ca4b3b9eb60ac0f571ce75cf1b98916de8125440fa54ac1869eb469b6e