Analysis
-
max time kernel
221s -
max time network
318s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05/05/2023, 19:36
Static task
static1
Behavioral task
behavioral1
Sample
cb2daf9cd3f42fc817d7384f8d2869cee882150e94e8791e710711a0b1392612.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
cb2daf9cd3f42fc817d7384f8d2869cee882150e94e8791e710711a0b1392612.exe
Resource
win10v2004-20230220-en
General
-
Target
cb2daf9cd3f42fc817d7384f8d2869cee882150e94e8791e710711a0b1392612.exe
-
Size
810KB
-
MD5
78896751ee7d239881abd5af51d6755c
-
SHA1
74f391a7c43b37cff808360898fbd096648a4ed9
-
SHA256
cb2daf9cd3f42fc817d7384f8d2869cee882150e94e8791e710711a0b1392612
-
SHA512
5fe9c6e8e3f90886deb7b47ef46466a56444493bb39e94b8a3c41cc4e7c50d188228f7afdd578e178c654698e8599076f18cb6c2f33a7eae9fd2c9e3346bba50
-
SSDEEP
12288:4y903S+30PdiOEDG/VDdnR0KL3FV41VPkaKocDZOv8xlxR0OO7il:4yG01iU0+41VPkOcDQ4lxRLvl
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dark
185.161.248.73:4164
-
auth_value
ae85b01f66afe8770afeed560513fc2d
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 35133203.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 35133203.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 35133203.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 35133203.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 35133203.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 35133203.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 1152 un041540.exe 1792 35133203.exe 1596 rk810938.exe 2024 1.exe 2004 si530126.exe -
Loads dropped DLL 12 IoCs
pid Process 1012 cb2daf9cd3f42fc817d7384f8d2869cee882150e94e8791e710711a0b1392612.exe 1152 un041540.exe 1152 un041540.exe 1152 un041540.exe 1792 35133203.exe 1152 un041540.exe 1152 un041540.exe 1596 rk810938.exe 1596 rk810938.exe 2024 1.exe 1012 cb2daf9cd3f42fc817d7384f8d2869cee882150e94e8791e710711a0b1392612.exe 2004 si530126.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 35133203.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 35133203.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce un041540.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un041540.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce cb2daf9cd3f42fc817d7384f8d2869cee882150e94e8791e710711a0b1392612.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cb2daf9cd3f42fc817d7384f8d2869cee882150e94e8791e710711a0b1392612.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1792 35133203.exe 1792 35133203.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1792 35133203.exe Token: SeDebugPrivilege 1596 rk810938.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 1012 wrote to memory of 1152 1012 cb2daf9cd3f42fc817d7384f8d2869cee882150e94e8791e710711a0b1392612.exe 28 PID 1012 wrote to memory of 1152 1012 cb2daf9cd3f42fc817d7384f8d2869cee882150e94e8791e710711a0b1392612.exe 28 PID 1012 wrote to memory of 1152 1012 cb2daf9cd3f42fc817d7384f8d2869cee882150e94e8791e710711a0b1392612.exe 28 PID 1012 wrote to memory of 1152 1012 cb2daf9cd3f42fc817d7384f8d2869cee882150e94e8791e710711a0b1392612.exe 28 PID 1012 wrote to memory of 1152 1012 cb2daf9cd3f42fc817d7384f8d2869cee882150e94e8791e710711a0b1392612.exe 28 PID 1012 wrote to memory of 1152 1012 cb2daf9cd3f42fc817d7384f8d2869cee882150e94e8791e710711a0b1392612.exe 28 PID 1012 wrote to memory of 1152 1012 cb2daf9cd3f42fc817d7384f8d2869cee882150e94e8791e710711a0b1392612.exe 28 PID 1152 wrote to memory of 1792 1152 un041540.exe 29 PID 1152 wrote to memory of 1792 1152 un041540.exe 29 PID 1152 wrote to memory of 1792 1152 un041540.exe 29 PID 1152 wrote to memory of 1792 1152 un041540.exe 29 PID 1152 wrote to memory of 1792 1152 un041540.exe 29 PID 1152 wrote to memory of 1792 1152 un041540.exe 29 PID 1152 wrote to memory of 1792 1152 un041540.exe 29 PID 1152 wrote to memory of 1596 1152 un041540.exe 30 PID 1152 wrote to memory of 1596 1152 un041540.exe 30 PID 1152 wrote to memory of 1596 1152 un041540.exe 30 PID 1152 wrote to memory of 1596 1152 un041540.exe 30 PID 1152 wrote to memory of 1596 1152 un041540.exe 30 PID 1152 wrote to memory of 1596 1152 un041540.exe 30 PID 1152 wrote to memory of 1596 1152 un041540.exe 30 PID 1596 wrote to memory of 2024 1596 rk810938.exe 31 PID 1596 wrote to memory of 2024 1596 rk810938.exe 31 PID 1596 wrote to memory of 2024 1596 rk810938.exe 31 PID 1596 wrote to memory of 2024 1596 rk810938.exe 31 PID 1596 wrote to memory of 2024 1596 rk810938.exe 31 PID 1596 wrote to memory of 2024 1596 rk810938.exe 31 PID 1596 wrote to memory of 2024 1596 rk810938.exe 31 PID 1012 wrote to memory of 2004 1012 cb2daf9cd3f42fc817d7384f8d2869cee882150e94e8791e710711a0b1392612.exe 32 PID 1012 wrote to memory of 2004 1012 cb2daf9cd3f42fc817d7384f8d2869cee882150e94e8791e710711a0b1392612.exe 32 PID 1012 wrote to memory of 2004 1012 cb2daf9cd3f42fc817d7384f8d2869cee882150e94e8791e710711a0b1392612.exe 32 PID 1012 wrote to memory of 2004 1012 cb2daf9cd3f42fc817d7384f8d2869cee882150e94e8791e710711a0b1392612.exe 32 PID 1012 wrote to memory of 2004 1012 cb2daf9cd3f42fc817d7384f8d2869cee882150e94e8791e710711a0b1392612.exe 32 PID 1012 wrote to memory of 2004 1012 cb2daf9cd3f42fc817d7384f8d2869cee882150e94e8791e710711a0b1392612.exe 32 PID 1012 wrote to memory of 2004 1012 cb2daf9cd3f42fc817d7384f8d2869cee882150e94e8791e710711a0b1392612.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb2daf9cd3f42fc817d7384f8d2869cee882150e94e8791e710711a0b1392612.exe"C:\Users\Admin\AppData\Local\Temp\cb2daf9cd3f42fc817d7384f8d2869cee882150e94e8791e710711a0b1392612.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un041540.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un041540.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\35133203.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\35133203.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1792
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk810938.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk810938.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2024
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si530126.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si530126.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2004
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
170KB
MD542fe792019a9aedfd60629ebdd8e599d
SHA183fe6087f20d20dbc0f011e0ece45f03333a4e74
SHA25620c577c653805e09f77bc716d4e6ca6b17bd582de00abbe718cabec704fd7f16
SHA512ca5a81418f44751d4113df1be4676e4f7f0907eb7a202a63564e6b20da53e0842b0f69c3f659b203a695fc3ebea3763e30b141901d5758ca81213dfd1dcfe135
-
Filesize
170KB
MD542fe792019a9aedfd60629ebdd8e599d
SHA183fe6087f20d20dbc0f011e0ece45f03333a4e74
SHA25620c577c653805e09f77bc716d4e6ca6b17bd582de00abbe718cabec704fd7f16
SHA512ca5a81418f44751d4113df1be4676e4f7f0907eb7a202a63564e6b20da53e0842b0f69c3f659b203a695fc3ebea3763e30b141901d5758ca81213dfd1dcfe135
-
Filesize
657KB
MD534dba7b052b7f9ea70cdd4232f977328
SHA16e5f61b2516220bf396353f9285e2ad5f8063838
SHA25646278755437205d6192b88522ad5a2786a7dc6d4f03d3e551cb435101edb367b
SHA512f17511bb042acfa6f0cbd85890bdd9f5f5741ee9988f5fbf055e088b09e3297a2884b4963061d133f8a41cd08b73904eb7c08ee15ac7b50bdd84727984c11ba3
-
Filesize
657KB
MD534dba7b052b7f9ea70cdd4232f977328
SHA16e5f61b2516220bf396353f9285e2ad5f8063838
SHA25646278755437205d6192b88522ad5a2786a7dc6d4f03d3e551cb435101edb367b
SHA512f17511bb042acfa6f0cbd85890bdd9f5f5741ee9988f5fbf055e088b09e3297a2884b4963061d133f8a41cd08b73904eb7c08ee15ac7b50bdd84727984c11ba3
-
Filesize
391KB
MD5e93868caf453c1443c2dd6f3c100ac3d
SHA130371d886bb65822b8ac65001cdcdf0cea634b83
SHA256e55ca4db0cdaf1675bd2ec242951836dd86403cca5049b5442067204e09bcfad
SHA5129ff0f0f1fdabab019bea7d23ae5fafe42968861687383c24d3fb82e888fbaa2da12b47abefdb97734b2766bd17f59a3329650da2694a795f963d7cecb73f9f4e
-
Filesize
391KB
MD5e93868caf453c1443c2dd6f3c100ac3d
SHA130371d886bb65822b8ac65001cdcdf0cea634b83
SHA256e55ca4db0cdaf1675bd2ec242951836dd86403cca5049b5442067204e09bcfad
SHA5129ff0f0f1fdabab019bea7d23ae5fafe42968861687383c24d3fb82e888fbaa2da12b47abefdb97734b2766bd17f59a3329650da2694a795f963d7cecb73f9f4e
-
Filesize
391KB
MD5e93868caf453c1443c2dd6f3c100ac3d
SHA130371d886bb65822b8ac65001cdcdf0cea634b83
SHA256e55ca4db0cdaf1675bd2ec242951836dd86403cca5049b5442067204e09bcfad
SHA5129ff0f0f1fdabab019bea7d23ae5fafe42968861687383c24d3fb82e888fbaa2da12b47abefdb97734b2766bd17f59a3329650da2694a795f963d7cecb73f9f4e
-
Filesize
574KB
MD545476ca224ef007d03b8118d76378f40
SHA1145e1fd28abaa452009b26acc7659ab2a9697943
SHA25617c4c6686c519714708f5859a7b369d9be24dac709d160abdd81d574e61e62fd
SHA51276761bfdc0a4f74a0955b352cf87332c9290ba94d6fee4ce9c3db15db7e027ccb14adb03b71126d995858ddfe4a879a2458ce38679afa6c34c8a5e73c066ef99
-
Filesize
574KB
MD545476ca224ef007d03b8118d76378f40
SHA1145e1fd28abaa452009b26acc7659ab2a9697943
SHA25617c4c6686c519714708f5859a7b369d9be24dac709d160abdd81d574e61e62fd
SHA51276761bfdc0a4f74a0955b352cf87332c9290ba94d6fee4ce9c3db15db7e027ccb14adb03b71126d995858ddfe4a879a2458ce38679afa6c34c8a5e73c066ef99
-
Filesize
574KB
MD545476ca224ef007d03b8118d76378f40
SHA1145e1fd28abaa452009b26acc7659ab2a9697943
SHA25617c4c6686c519714708f5859a7b369d9be24dac709d160abdd81d574e61e62fd
SHA51276761bfdc0a4f74a0955b352cf87332c9290ba94d6fee4ce9c3db15db7e027ccb14adb03b71126d995858ddfe4a879a2458ce38679afa6c34c8a5e73c066ef99
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
170KB
MD542fe792019a9aedfd60629ebdd8e599d
SHA183fe6087f20d20dbc0f011e0ece45f03333a4e74
SHA25620c577c653805e09f77bc716d4e6ca6b17bd582de00abbe718cabec704fd7f16
SHA512ca5a81418f44751d4113df1be4676e4f7f0907eb7a202a63564e6b20da53e0842b0f69c3f659b203a695fc3ebea3763e30b141901d5758ca81213dfd1dcfe135
-
Filesize
170KB
MD542fe792019a9aedfd60629ebdd8e599d
SHA183fe6087f20d20dbc0f011e0ece45f03333a4e74
SHA25620c577c653805e09f77bc716d4e6ca6b17bd582de00abbe718cabec704fd7f16
SHA512ca5a81418f44751d4113df1be4676e4f7f0907eb7a202a63564e6b20da53e0842b0f69c3f659b203a695fc3ebea3763e30b141901d5758ca81213dfd1dcfe135
-
Filesize
657KB
MD534dba7b052b7f9ea70cdd4232f977328
SHA16e5f61b2516220bf396353f9285e2ad5f8063838
SHA25646278755437205d6192b88522ad5a2786a7dc6d4f03d3e551cb435101edb367b
SHA512f17511bb042acfa6f0cbd85890bdd9f5f5741ee9988f5fbf055e088b09e3297a2884b4963061d133f8a41cd08b73904eb7c08ee15ac7b50bdd84727984c11ba3
-
Filesize
657KB
MD534dba7b052b7f9ea70cdd4232f977328
SHA16e5f61b2516220bf396353f9285e2ad5f8063838
SHA25646278755437205d6192b88522ad5a2786a7dc6d4f03d3e551cb435101edb367b
SHA512f17511bb042acfa6f0cbd85890bdd9f5f5741ee9988f5fbf055e088b09e3297a2884b4963061d133f8a41cd08b73904eb7c08ee15ac7b50bdd84727984c11ba3
-
Filesize
391KB
MD5e93868caf453c1443c2dd6f3c100ac3d
SHA130371d886bb65822b8ac65001cdcdf0cea634b83
SHA256e55ca4db0cdaf1675bd2ec242951836dd86403cca5049b5442067204e09bcfad
SHA5129ff0f0f1fdabab019bea7d23ae5fafe42968861687383c24d3fb82e888fbaa2da12b47abefdb97734b2766bd17f59a3329650da2694a795f963d7cecb73f9f4e
-
Filesize
391KB
MD5e93868caf453c1443c2dd6f3c100ac3d
SHA130371d886bb65822b8ac65001cdcdf0cea634b83
SHA256e55ca4db0cdaf1675bd2ec242951836dd86403cca5049b5442067204e09bcfad
SHA5129ff0f0f1fdabab019bea7d23ae5fafe42968861687383c24d3fb82e888fbaa2da12b47abefdb97734b2766bd17f59a3329650da2694a795f963d7cecb73f9f4e
-
Filesize
391KB
MD5e93868caf453c1443c2dd6f3c100ac3d
SHA130371d886bb65822b8ac65001cdcdf0cea634b83
SHA256e55ca4db0cdaf1675bd2ec242951836dd86403cca5049b5442067204e09bcfad
SHA5129ff0f0f1fdabab019bea7d23ae5fafe42968861687383c24d3fb82e888fbaa2da12b47abefdb97734b2766bd17f59a3329650da2694a795f963d7cecb73f9f4e
-
Filesize
574KB
MD545476ca224ef007d03b8118d76378f40
SHA1145e1fd28abaa452009b26acc7659ab2a9697943
SHA25617c4c6686c519714708f5859a7b369d9be24dac709d160abdd81d574e61e62fd
SHA51276761bfdc0a4f74a0955b352cf87332c9290ba94d6fee4ce9c3db15db7e027ccb14adb03b71126d995858ddfe4a879a2458ce38679afa6c34c8a5e73c066ef99
-
Filesize
574KB
MD545476ca224ef007d03b8118d76378f40
SHA1145e1fd28abaa452009b26acc7659ab2a9697943
SHA25617c4c6686c519714708f5859a7b369d9be24dac709d160abdd81d574e61e62fd
SHA51276761bfdc0a4f74a0955b352cf87332c9290ba94d6fee4ce9c3db15db7e027ccb14adb03b71126d995858ddfe4a879a2458ce38679afa6c34c8a5e73c066ef99
-
Filesize
574KB
MD545476ca224ef007d03b8118d76378f40
SHA1145e1fd28abaa452009b26acc7659ab2a9697943
SHA25617c4c6686c519714708f5859a7b369d9be24dac709d160abdd81d574e61e62fd
SHA51276761bfdc0a4f74a0955b352cf87332c9290ba94d6fee4ce9c3db15db7e027ccb14adb03b71126d995858ddfe4a879a2458ce38679afa6c34c8a5e73c066ef99
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf