Analysis
-
max time kernel
182s -
max time network
191s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06-05-2023 21:56
Static task
static1
Behavioral task
behavioral1
Sample
52c5912f7ca5b628965265f7b8dbd77a.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
52c5912f7ca5b628965265f7b8dbd77a.exe
Resource
win10v2004-20230220-en
General
-
Target
52c5912f7ca5b628965265f7b8dbd77a.exe
-
Size
950KB
-
MD5
52c5912f7ca5b628965265f7b8dbd77a
-
SHA1
652251488d446d952d594c926c95c817c97f9f10
-
SHA256
57689ff4aa3286eedf063b4b3547c70ddba999def7960258f21207a725ba82de
-
SHA512
72c7dd81dd4b0700fb6b697df71bbc47a748d31ec6836d3255288715ed35f4ee44a9f1d4223acb2742013a540f59bff540abc64fcb15511892b6ab60a37e86ab
-
SSDEEP
24576:Wyu6VH9OKfKBiinIrDwntMREDVM3YlG9qHRJ7c:lBHAbiinPntMRkwYlUqHRJ7
Malware Config
Extracted
redline
dark
185.161.248.73:4164
-
auth_value
ae85b01f66afe8770afeed560513fc2d
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 1220 un168857.exe 804 62014584.exe 684 1.exe 1756 rk559853.exe 1952 si510567.exe -
Loads dropped DLL 11 IoCs
pid Process 1412 52c5912f7ca5b628965265f7b8dbd77a.exe 1220 un168857.exe 1220 un168857.exe 1220 un168857.exe 804 62014584.exe 804 62014584.exe 1220 un168857.exe 1220 un168857.exe 1756 rk559853.exe 1412 52c5912f7ca5b628965265f7b8dbd77a.exe 1952 si510567.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 1.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 52c5912f7ca5b628965265f7b8dbd77a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 52c5912f7ca5b628965265f7b8dbd77a.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce un168857.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un168857.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 684 1.exe 684 1.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 804 62014584.exe Token: SeDebugPrivilege 1756 rk559853.exe Token: SeDebugPrivilege 684 1.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 1412 wrote to memory of 1220 1412 52c5912f7ca5b628965265f7b8dbd77a.exe 28 PID 1412 wrote to memory of 1220 1412 52c5912f7ca5b628965265f7b8dbd77a.exe 28 PID 1412 wrote to memory of 1220 1412 52c5912f7ca5b628965265f7b8dbd77a.exe 28 PID 1412 wrote to memory of 1220 1412 52c5912f7ca5b628965265f7b8dbd77a.exe 28 PID 1412 wrote to memory of 1220 1412 52c5912f7ca5b628965265f7b8dbd77a.exe 28 PID 1412 wrote to memory of 1220 1412 52c5912f7ca5b628965265f7b8dbd77a.exe 28 PID 1412 wrote to memory of 1220 1412 52c5912f7ca5b628965265f7b8dbd77a.exe 28 PID 1220 wrote to memory of 804 1220 un168857.exe 29 PID 1220 wrote to memory of 804 1220 un168857.exe 29 PID 1220 wrote to memory of 804 1220 un168857.exe 29 PID 1220 wrote to memory of 804 1220 un168857.exe 29 PID 1220 wrote to memory of 804 1220 un168857.exe 29 PID 1220 wrote to memory of 804 1220 un168857.exe 29 PID 1220 wrote to memory of 804 1220 un168857.exe 29 PID 804 wrote to memory of 684 804 62014584.exe 30 PID 804 wrote to memory of 684 804 62014584.exe 30 PID 804 wrote to memory of 684 804 62014584.exe 30 PID 804 wrote to memory of 684 804 62014584.exe 30 PID 804 wrote to memory of 684 804 62014584.exe 30 PID 804 wrote to memory of 684 804 62014584.exe 30 PID 804 wrote to memory of 684 804 62014584.exe 30 PID 1220 wrote to memory of 1756 1220 un168857.exe 31 PID 1220 wrote to memory of 1756 1220 un168857.exe 31 PID 1220 wrote to memory of 1756 1220 un168857.exe 31 PID 1220 wrote to memory of 1756 1220 un168857.exe 31 PID 1220 wrote to memory of 1756 1220 un168857.exe 31 PID 1220 wrote to memory of 1756 1220 un168857.exe 31 PID 1220 wrote to memory of 1756 1220 un168857.exe 31 PID 1412 wrote to memory of 1952 1412 52c5912f7ca5b628965265f7b8dbd77a.exe 32 PID 1412 wrote to memory of 1952 1412 52c5912f7ca5b628965265f7b8dbd77a.exe 32 PID 1412 wrote to memory of 1952 1412 52c5912f7ca5b628965265f7b8dbd77a.exe 32 PID 1412 wrote to memory of 1952 1412 52c5912f7ca5b628965265f7b8dbd77a.exe 32 PID 1412 wrote to memory of 1952 1412 52c5912f7ca5b628965265f7b8dbd77a.exe 32 PID 1412 wrote to memory of 1952 1412 52c5912f7ca5b628965265f7b8dbd77a.exe 32 PID 1412 wrote to memory of 1952 1412 52c5912f7ca5b628965265f7b8dbd77a.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\52c5912f7ca5b628965265f7b8dbd77a.exe"C:\Users\Admin\AppData\Local\Temp\52c5912f7ca5b628965265f7b8dbd77a.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un168857.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un168857.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\62014584.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\62014584.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:684
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk559853.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk559853.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1756
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si510567.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si510567.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1952
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD55e6bbcee00b2119dff185498d9179ee5
SHA1c89f5e6bb629822bad324c7351cd5de6de7864dc
SHA2563c004a3e38ea4ce0ad1bee01eba22c6ddf57443a789cb4dbd957342838d8692e
SHA512f100033e0b1c7735c2abf7d9e536a6510b44614ddeb4c2a4cdc222be8fe3e6d07842a49a340ca2648ff561746f89830294368d1278f969672844f03204c6662a
-
Filesize
168KB
MD55e6bbcee00b2119dff185498d9179ee5
SHA1c89f5e6bb629822bad324c7351cd5de6de7864dc
SHA2563c004a3e38ea4ce0ad1bee01eba22c6ddf57443a789cb4dbd957342838d8692e
SHA512f100033e0b1c7735c2abf7d9e536a6510b44614ddeb4c2a4cdc222be8fe3e6d07842a49a340ca2648ff561746f89830294368d1278f969672844f03204c6662a
-
Filesize
796KB
MD5e9222df4caa6ce7f74b851b974c6e5da
SHA1ec51f6a94534b445ac9dcd4476fc49f2ca09c2e4
SHA256dac70269d6d116041f18450a424f64aff4b2cb842e93f4691354626335cce63c
SHA512a89d39d1652ba071b9767b6ff634fa73bbc06def186b14dfe13b1c900cae679d05b791c33d6f0bed382d1483532205cf09d779e8de508acd9d71d9ae39eb81a0
-
Filesize
796KB
MD5e9222df4caa6ce7f74b851b974c6e5da
SHA1ec51f6a94534b445ac9dcd4476fc49f2ca09c2e4
SHA256dac70269d6d116041f18450a424f64aff4b2cb842e93f4691354626335cce63c
SHA512a89d39d1652ba071b9767b6ff634fa73bbc06def186b14dfe13b1c900cae679d05b791c33d6f0bed382d1483532205cf09d779e8de508acd9d71d9ae39eb81a0
-
Filesize
479KB
MD51a09ab46e31ffa3102390d22ab38cee9
SHA19118e415cf2594154d0d848bf12e86750516b957
SHA256bd51576d4ea6262b53083ec131c0b151d31c8a55cde539d73930947115675fde
SHA512d79decd19d13496e0c9ec282af8831f0a66521a5d22f0c1575c84d5260322ea8d9f15289cdd6452600de5b48def76b62f6fd12f3e6172cf9e53ea9ea46c1027f
-
Filesize
479KB
MD51a09ab46e31ffa3102390d22ab38cee9
SHA19118e415cf2594154d0d848bf12e86750516b957
SHA256bd51576d4ea6262b53083ec131c0b151d31c8a55cde539d73930947115675fde
SHA512d79decd19d13496e0c9ec282af8831f0a66521a5d22f0c1575c84d5260322ea8d9f15289cdd6452600de5b48def76b62f6fd12f3e6172cf9e53ea9ea46c1027f
-
Filesize
479KB
MD51a09ab46e31ffa3102390d22ab38cee9
SHA19118e415cf2594154d0d848bf12e86750516b957
SHA256bd51576d4ea6262b53083ec131c0b151d31c8a55cde539d73930947115675fde
SHA512d79decd19d13496e0c9ec282af8831f0a66521a5d22f0c1575c84d5260322ea8d9f15289cdd6452600de5b48def76b62f6fd12f3e6172cf9e53ea9ea46c1027f
-
Filesize
539KB
MD5b3af29a7159964d25d9c4ffb4be1b972
SHA1731139d0a2cf70502a6a68a143ef5c09056d6bd2
SHA2563d81563856e4f36baa410338c1aa091258d30eb450c4bbfdd87f70786b852e08
SHA512ca31dd25db92164c5c9b89cf02369e40ed95c2cd1b652c35d39279628a588e41d98c935e5f2426d3e55ff2a26cf732379849ac18da85141ad61c15aaa74af85b
-
Filesize
539KB
MD5b3af29a7159964d25d9c4ffb4be1b972
SHA1731139d0a2cf70502a6a68a143ef5c09056d6bd2
SHA2563d81563856e4f36baa410338c1aa091258d30eb450c4bbfdd87f70786b852e08
SHA512ca31dd25db92164c5c9b89cf02369e40ed95c2cd1b652c35d39279628a588e41d98c935e5f2426d3e55ff2a26cf732379849ac18da85141ad61c15aaa74af85b
-
Filesize
539KB
MD5b3af29a7159964d25d9c4ffb4be1b972
SHA1731139d0a2cf70502a6a68a143ef5c09056d6bd2
SHA2563d81563856e4f36baa410338c1aa091258d30eb450c4bbfdd87f70786b852e08
SHA512ca31dd25db92164c5c9b89cf02369e40ed95c2cd1b652c35d39279628a588e41d98c935e5f2426d3e55ff2a26cf732379849ac18da85141ad61c15aaa74af85b
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
168KB
MD55e6bbcee00b2119dff185498d9179ee5
SHA1c89f5e6bb629822bad324c7351cd5de6de7864dc
SHA2563c004a3e38ea4ce0ad1bee01eba22c6ddf57443a789cb4dbd957342838d8692e
SHA512f100033e0b1c7735c2abf7d9e536a6510b44614ddeb4c2a4cdc222be8fe3e6d07842a49a340ca2648ff561746f89830294368d1278f969672844f03204c6662a
-
Filesize
168KB
MD55e6bbcee00b2119dff185498d9179ee5
SHA1c89f5e6bb629822bad324c7351cd5de6de7864dc
SHA2563c004a3e38ea4ce0ad1bee01eba22c6ddf57443a789cb4dbd957342838d8692e
SHA512f100033e0b1c7735c2abf7d9e536a6510b44614ddeb4c2a4cdc222be8fe3e6d07842a49a340ca2648ff561746f89830294368d1278f969672844f03204c6662a
-
Filesize
796KB
MD5e9222df4caa6ce7f74b851b974c6e5da
SHA1ec51f6a94534b445ac9dcd4476fc49f2ca09c2e4
SHA256dac70269d6d116041f18450a424f64aff4b2cb842e93f4691354626335cce63c
SHA512a89d39d1652ba071b9767b6ff634fa73bbc06def186b14dfe13b1c900cae679d05b791c33d6f0bed382d1483532205cf09d779e8de508acd9d71d9ae39eb81a0
-
Filesize
796KB
MD5e9222df4caa6ce7f74b851b974c6e5da
SHA1ec51f6a94534b445ac9dcd4476fc49f2ca09c2e4
SHA256dac70269d6d116041f18450a424f64aff4b2cb842e93f4691354626335cce63c
SHA512a89d39d1652ba071b9767b6ff634fa73bbc06def186b14dfe13b1c900cae679d05b791c33d6f0bed382d1483532205cf09d779e8de508acd9d71d9ae39eb81a0
-
Filesize
479KB
MD51a09ab46e31ffa3102390d22ab38cee9
SHA19118e415cf2594154d0d848bf12e86750516b957
SHA256bd51576d4ea6262b53083ec131c0b151d31c8a55cde539d73930947115675fde
SHA512d79decd19d13496e0c9ec282af8831f0a66521a5d22f0c1575c84d5260322ea8d9f15289cdd6452600de5b48def76b62f6fd12f3e6172cf9e53ea9ea46c1027f
-
Filesize
479KB
MD51a09ab46e31ffa3102390d22ab38cee9
SHA19118e415cf2594154d0d848bf12e86750516b957
SHA256bd51576d4ea6262b53083ec131c0b151d31c8a55cde539d73930947115675fde
SHA512d79decd19d13496e0c9ec282af8831f0a66521a5d22f0c1575c84d5260322ea8d9f15289cdd6452600de5b48def76b62f6fd12f3e6172cf9e53ea9ea46c1027f
-
Filesize
479KB
MD51a09ab46e31ffa3102390d22ab38cee9
SHA19118e415cf2594154d0d848bf12e86750516b957
SHA256bd51576d4ea6262b53083ec131c0b151d31c8a55cde539d73930947115675fde
SHA512d79decd19d13496e0c9ec282af8831f0a66521a5d22f0c1575c84d5260322ea8d9f15289cdd6452600de5b48def76b62f6fd12f3e6172cf9e53ea9ea46c1027f
-
Filesize
539KB
MD5b3af29a7159964d25d9c4ffb4be1b972
SHA1731139d0a2cf70502a6a68a143ef5c09056d6bd2
SHA2563d81563856e4f36baa410338c1aa091258d30eb450c4bbfdd87f70786b852e08
SHA512ca31dd25db92164c5c9b89cf02369e40ed95c2cd1b652c35d39279628a588e41d98c935e5f2426d3e55ff2a26cf732379849ac18da85141ad61c15aaa74af85b
-
Filesize
539KB
MD5b3af29a7159964d25d9c4ffb4be1b972
SHA1731139d0a2cf70502a6a68a143ef5c09056d6bd2
SHA2563d81563856e4f36baa410338c1aa091258d30eb450c4bbfdd87f70786b852e08
SHA512ca31dd25db92164c5c9b89cf02369e40ed95c2cd1b652c35d39279628a588e41d98c935e5f2426d3e55ff2a26cf732379849ac18da85141ad61c15aaa74af85b
-
Filesize
539KB
MD5b3af29a7159964d25d9c4ffb4be1b972
SHA1731139d0a2cf70502a6a68a143ef5c09056d6bd2
SHA2563d81563856e4f36baa410338c1aa091258d30eb450c4bbfdd87f70786b852e08
SHA512ca31dd25db92164c5c9b89cf02369e40ed95c2cd1b652c35d39279628a588e41d98c935e5f2426d3e55ff2a26cf732379849ac18da85141ad61c15aaa74af85b
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91