Analysis
-
max time kernel
132s -
max time network
168s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06-05-2023 21:58
Static task
static1
Behavioral task
behavioral1
Sample
54bda633f7806608e383aca26f5c0679637392b44878cfb106d3ffad50f70b21.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
54bda633f7806608e383aca26f5c0679637392b44878cfb106d3ffad50f70b21.exe
Resource
win10v2004-20230220-en
General
-
Target
54bda633f7806608e383aca26f5c0679637392b44878cfb106d3ffad50f70b21.exe
-
Size
1.5MB
-
MD5
56a940f65410c9b385bf084652feabbb
-
SHA1
145d3750e37060f6d75495c31c3b62a1a92d75ff
-
SHA256
54bda633f7806608e383aca26f5c0679637392b44878cfb106d3ffad50f70b21
-
SHA512
b1f35e95402e270570297f8a45b0b810c006153f702599ec4bb6513164d6523514c50dccc21c08921102772b7d21898f539afb38ffd9c737b29f4bec6900f1bf
-
SSDEEP
49152:FWex3AvAjg1A7cDyM/n6JnPXMRJnz6QnmybWfny:3RAvKiA4NPjzz1Ay
Malware Config
Extracted
redline
maza
185.161.248.73:4164
-
auth_value
474d54c1c2f5291290c53f8378acd684
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a80973751.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a80973751.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a80973751.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a80973751.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a80973751.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a80973751.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
pid Process 988 i97964920.exe 516 i44767899.exe 1664 i28787017.exe 1108 i89694794.exe 1808 a80973751.exe 1884 b70465955.exe -
Loads dropped DLL 12 IoCs
pid Process 1460 54bda633f7806608e383aca26f5c0679637392b44878cfb106d3ffad50f70b21.exe 988 i97964920.exe 988 i97964920.exe 516 i44767899.exe 516 i44767899.exe 1664 i28787017.exe 1664 i28787017.exe 1108 i89694794.exe 1108 i89694794.exe 1808 a80973751.exe 1108 i89694794.exe 1884 b70465955.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features a80973751.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a80973751.exe -
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" i28787017.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce i89694794.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 54bda633f7806608e383aca26f5c0679637392b44878cfb106d3ffad50f70b21.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce i44767899.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce i28787017.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" i44767899.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" i89694794.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 54bda633f7806608e383aca26f5c0679637392b44878cfb106d3ffad50f70b21.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce i97964920.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" i97964920.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1808 a80973751.exe 1808 a80973751.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1808 a80973751.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 1460 wrote to memory of 988 1460 54bda633f7806608e383aca26f5c0679637392b44878cfb106d3ffad50f70b21.exe 27 PID 1460 wrote to memory of 988 1460 54bda633f7806608e383aca26f5c0679637392b44878cfb106d3ffad50f70b21.exe 27 PID 1460 wrote to memory of 988 1460 54bda633f7806608e383aca26f5c0679637392b44878cfb106d3ffad50f70b21.exe 27 PID 1460 wrote to memory of 988 1460 54bda633f7806608e383aca26f5c0679637392b44878cfb106d3ffad50f70b21.exe 27 PID 1460 wrote to memory of 988 1460 54bda633f7806608e383aca26f5c0679637392b44878cfb106d3ffad50f70b21.exe 27 PID 1460 wrote to memory of 988 1460 54bda633f7806608e383aca26f5c0679637392b44878cfb106d3ffad50f70b21.exe 27 PID 1460 wrote to memory of 988 1460 54bda633f7806608e383aca26f5c0679637392b44878cfb106d3ffad50f70b21.exe 27 PID 988 wrote to memory of 516 988 i97964920.exe 28 PID 988 wrote to memory of 516 988 i97964920.exe 28 PID 988 wrote to memory of 516 988 i97964920.exe 28 PID 988 wrote to memory of 516 988 i97964920.exe 28 PID 988 wrote to memory of 516 988 i97964920.exe 28 PID 988 wrote to memory of 516 988 i97964920.exe 28 PID 988 wrote to memory of 516 988 i97964920.exe 28 PID 516 wrote to memory of 1664 516 i44767899.exe 29 PID 516 wrote to memory of 1664 516 i44767899.exe 29 PID 516 wrote to memory of 1664 516 i44767899.exe 29 PID 516 wrote to memory of 1664 516 i44767899.exe 29 PID 516 wrote to memory of 1664 516 i44767899.exe 29 PID 516 wrote to memory of 1664 516 i44767899.exe 29 PID 516 wrote to memory of 1664 516 i44767899.exe 29 PID 1664 wrote to memory of 1108 1664 i28787017.exe 30 PID 1664 wrote to memory of 1108 1664 i28787017.exe 30 PID 1664 wrote to memory of 1108 1664 i28787017.exe 30 PID 1664 wrote to memory of 1108 1664 i28787017.exe 30 PID 1664 wrote to memory of 1108 1664 i28787017.exe 30 PID 1664 wrote to memory of 1108 1664 i28787017.exe 30 PID 1664 wrote to memory of 1108 1664 i28787017.exe 30 PID 1108 wrote to memory of 1808 1108 i89694794.exe 31 PID 1108 wrote to memory of 1808 1108 i89694794.exe 31 PID 1108 wrote to memory of 1808 1108 i89694794.exe 31 PID 1108 wrote to memory of 1808 1108 i89694794.exe 31 PID 1108 wrote to memory of 1808 1108 i89694794.exe 31 PID 1108 wrote to memory of 1808 1108 i89694794.exe 31 PID 1108 wrote to memory of 1808 1108 i89694794.exe 31 PID 1108 wrote to memory of 1884 1108 i89694794.exe 32 PID 1108 wrote to memory of 1884 1108 i89694794.exe 32 PID 1108 wrote to memory of 1884 1108 i89694794.exe 32 PID 1108 wrote to memory of 1884 1108 i89694794.exe 32 PID 1108 wrote to memory of 1884 1108 i89694794.exe 32 PID 1108 wrote to memory of 1884 1108 i89694794.exe 32 PID 1108 wrote to memory of 1884 1108 i89694794.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\54bda633f7806608e383aca26f5c0679637392b44878cfb106d3ffad50f70b21.exe"C:\Users\Admin\AppData\Local\Temp\54bda633f7806608e383aca26f5c0679637392b44878cfb106d3ffad50f70b21.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i97964920.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i97964920.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i44767899.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i44767899.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i28787017.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i28787017.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i89694794.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i89694794.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a80973751.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a80973751.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1808
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b70465955.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b70465955.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1884
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD578a04ab09ddfcc3b678e21b3702e72e7
SHA1880212079bed648524142c44fa2bbd1ad8143751
SHA25666e4465e768b8a42e413c4747bbf61387f90ab9c9f0230f9ea854321c9634232
SHA5129d983fd0ae6599d25196e6d546625e8920f8627141040fb0576549c23959affe8e58ce493565285b9b742bac242e892dcc803ce8857fcb5c3d311f1aa98056a5
-
Filesize
1.2MB
MD578a04ab09ddfcc3b678e21b3702e72e7
SHA1880212079bed648524142c44fa2bbd1ad8143751
SHA25666e4465e768b8a42e413c4747bbf61387f90ab9c9f0230f9ea854321c9634232
SHA5129d983fd0ae6599d25196e6d546625e8920f8627141040fb0576549c23959affe8e58ce493565285b9b742bac242e892dcc803ce8857fcb5c3d311f1aa98056a5
-
Filesize
1.1MB
MD5acf00710f6e9e83abc916e39badefdfd
SHA1ad2ca411346143f7b4468954114d2aaffe1e05d9
SHA256781245471671bf239e1fc1586f5ba8fe3c4aaa713f4b83176a9e804bde21fdf8
SHA51241e63b8497aa0427cce01cde1a1960bea8e52cabcf1ed79967063522a855c7652c687cf17a37c3c34a3faa35d2334b4f1ff193e8033e761d48bd371c0cf49679
-
Filesize
1.1MB
MD5acf00710f6e9e83abc916e39badefdfd
SHA1ad2ca411346143f7b4468954114d2aaffe1e05d9
SHA256781245471671bf239e1fc1586f5ba8fe3c4aaa713f4b83176a9e804bde21fdf8
SHA51241e63b8497aa0427cce01cde1a1960bea8e52cabcf1ed79967063522a855c7652c687cf17a37c3c34a3faa35d2334b4f1ff193e8033e761d48bd371c0cf49679
-
Filesize
594KB
MD5b8cdfbccd2b13259116e14652dbbee21
SHA1d1ff83ac572a45900cdf8bef482cd035c70c8598
SHA25626d005871c33e7d81051a36ef8557466a197591fbcacd22775206a3c8a2c8813
SHA5123c30014bc961ecc7d3f6a8f943921a87f48eab5be0419afdf35563760faa2419007cb485b6b6dbb76df00b8c20f7c51862ba17525fa0d64560e848b7a2435bb9
-
Filesize
594KB
MD5b8cdfbccd2b13259116e14652dbbee21
SHA1d1ff83ac572a45900cdf8bef482cd035c70c8598
SHA25626d005871c33e7d81051a36ef8557466a197591fbcacd22775206a3c8a2c8813
SHA5123c30014bc961ecc7d3f6a8f943921a87f48eab5be0419afdf35563760faa2419007cb485b6b6dbb76df00b8c20f7c51862ba17525fa0d64560e848b7a2435bb9
-
Filesize
310KB
MD5319fdbace0c350a51eff748bed70e28e
SHA1a49ad7bd6a7bc72730eaff095214f88d919d958c
SHA25634cac2e19ae7d1814e2e06d8e71e888ead2e9e7d156e57e05e7c9161b4d15308
SHA512e8e6939eea46b2c87b48a438ceafcdf8bcac3c06db927fb3dacb4e0ceb4b801c7c79797cdc721ab8536c19cf967cb37449f623141aaa875bfed177146c8d46bd
-
Filesize
310KB
MD5319fdbace0c350a51eff748bed70e28e
SHA1a49ad7bd6a7bc72730eaff095214f88d919d958c
SHA25634cac2e19ae7d1814e2e06d8e71e888ead2e9e7d156e57e05e7c9161b4d15308
SHA512e8e6939eea46b2c87b48a438ceafcdf8bcac3c06db927fb3dacb4e0ceb4b801c7c79797cdc721ab8536c19cf967cb37449f623141aaa875bfed177146c8d46bd
-
Filesize
175KB
MD53f2a1937d270cab8f72f0f80d082c49f
SHA1467d2b0bd40ab4c805254c766a4b2e4210e4fda5
SHA256c83d0bddcc5a137e0d710a11da52f2e6a7dac943668c9091d6852098f8315fe3
SHA512b062a1c05f3c7d33453cfcf21036ebf15b22ab9e2de87efdc729e1b60edd6fa8b931d29eb58e7e525c4199f043030c713b71b000667e6d5f1c58bb2e347356f7
-
Filesize
175KB
MD53f2a1937d270cab8f72f0f80d082c49f
SHA1467d2b0bd40ab4c805254c766a4b2e4210e4fda5
SHA256c83d0bddcc5a137e0d710a11da52f2e6a7dac943668c9091d6852098f8315fe3
SHA512b062a1c05f3c7d33453cfcf21036ebf15b22ab9e2de87efdc729e1b60edd6fa8b931d29eb58e7e525c4199f043030c713b71b000667e6d5f1c58bb2e347356f7
-
Filesize
168KB
MD50f33c07d3f689c177f3fb01814526d89
SHA18014922a1d85ec47121de9aea81e4eed9a192cd7
SHA25633e32a3480829320465e646af7de8e02e7a766cf999ddfa13b8e2c4671fca679
SHA512ec85f561d6c6646908f9580a55b3c39c4d6c816ad46d882a56ae358d41cdc3e1d3faaa818bd5a7df2ce55445d3476ed2360017bef814ad99f823ce27723ee9fc
-
Filesize
168KB
MD50f33c07d3f689c177f3fb01814526d89
SHA18014922a1d85ec47121de9aea81e4eed9a192cd7
SHA25633e32a3480829320465e646af7de8e02e7a766cf999ddfa13b8e2c4671fca679
SHA512ec85f561d6c6646908f9580a55b3c39c4d6c816ad46d882a56ae358d41cdc3e1d3faaa818bd5a7df2ce55445d3476ed2360017bef814ad99f823ce27723ee9fc
-
Filesize
1.2MB
MD578a04ab09ddfcc3b678e21b3702e72e7
SHA1880212079bed648524142c44fa2bbd1ad8143751
SHA25666e4465e768b8a42e413c4747bbf61387f90ab9c9f0230f9ea854321c9634232
SHA5129d983fd0ae6599d25196e6d546625e8920f8627141040fb0576549c23959affe8e58ce493565285b9b742bac242e892dcc803ce8857fcb5c3d311f1aa98056a5
-
Filesize
1.2MB
MD578a04ab09ddfcc3b678e21b3702e72e7
SHA1880212079bed648524142c44fa2bbd1ad8143751
SHA25666e4465e768b8a42e413c4747bbf61387f90ab9c9f0230f9ea854321c9634232
SHA5129d983fd0ae6599d25196e6d546625e8920f8627141040fb0576549c23959affe8e58ce493565285b9b742bac242e892dcc803ce8857fcb5c3d311f1aa98056a5
-
Filesize
1.1MB
MD5acf00710f6e9e83abc916e39badefdfd
SHA1ad2ca411346143f7b4468954114d2aaffe1e05d9
SHA256781245471671bf239e1fc1586f5ba8fe3c4aaa713f4b83176a9e804bde21fdf8
SHA51241e63b8497aa0427cce01cde1a1960bea8e52cabcf1ed79967063522a855c7652c687cf17a37c3c34a3faa35d2334b4f1ff193e8033e761d48bd371c0cf49679
-
Filesize
1.1MB
MD5acf00710f6e9e83abc916e39badefdfd
SHA1ad2ca411346143f7b4468954114d2aaffe1e05d9
SHA256781245471671bf239e1fc1586f5ba8fe3c4aaa713f4b83176a9e804bde21fdf8
SHA51241e63b8497aa0427cce01cde1a1960bea8e52cabcf1ed79967063522a855c7652c687cf17a37c3c34a3faa35d2334b4f1ff193e8033e761d48bd371c0cf49679
-
Filesize
594KB
MD5b8cdfbccd2b13259116e14652dbbee21
SHA1d1ff83ac572a45900cdf8bef482cd035c70c8598
SHA25626d005871c33e7d81051a36ef8557466a197591fbcacd22775206a3c8a2c8813
SHA5123c30014bc961ecc7d3f6a8f943921a87f48eab5be0419afdf35563760faa2419007cb485b6b6dbb76df00b8c20f7c51862ba17525fa0d64560e848b7a2435bb9
-
Filesize
594KB
MD5b8cdfbccd2b13259116e14652dbbee21
SHA1d1ff83ac572a45900cdf8bef482cd035c70c8598
SHA25626d005871c33e7d81051a36ef8557466a197591fbcacd22775206a3c8a2c8813
SHA5123c30014bc961ecc7d3f6a8f943921a87f48eab5be0419afdf35563760faa2419007cb485b6b6dbb76df00b8c20f7c51862ba17525fa0d64560e848b7a2435bb9
-
Filesize
310KB
MD5319fdbace0c350a51eff748bed70e28e
SHA1a49ad7bd6a7bc72730eaff095214f88d919d958c
SHA25634cac2e19ae7d1814e2e06d8e71e888ead2e9e7d156e57e05e7c9161b4d15308
SHA512e8e6939eea46b2c87b48a438ceafcdf8bcac3c06db927fb3dacb4e0ceb4b801c7c79797cdc721ab8536c19cf967cb37449f623141aaa875bfed177146c8d46bd
-
Filesize
310KB
MD5319fdbace0c350a51eff748bed70e28e
SHA1a49ad7bd6a7bc72730eaff095214f88d919d958c
SHA25634cac2e19ae7d1814e2e06d8e71e888ead2e9e7d156e57e05e7c9161b4d15308
SHA512e8e6939eea46b2c87b48a438ceafcdf8bcac3c06db927fb3dacb4e0ceb4b801c7c79797cdc721ab8536c19cf967cb37449f623141aaa875bfed177146c8d46bd
-
Filesize
175KB
MD53f2a1937d270cab8f72f0f80d082c49f
SHA1467d2b0bd40ab4c805254c766a4b2e4210e4fda5
SHA256c83d0bddcc5a137e0d710a11da52f2e6a7dac943668c9091d6852098f8315fe3
SHA512b062a1c05f3c7d33453cfcf21036ebf15b22ab9e2de87efdc729e1b60edd6fa8b931d29eb58e7e525c4199f043030c713b71b000667e6d5f1c58bb2e347356f7
-
Filesize
175KB
MD53f2a1937d270cab8f72f0f80d082c49f
SHA1467d2b0bd40ab4c805254c766a4b2e4210e4fda5
SHA256c83d0bddcc5a137e0d710a11da52f2e6a7dac943668c9091d6852098f8315fe3
SHA512b062a1c05f3c7d33453cfcf21036ebf15b22ab9e2de87efdc729e1b60edd6fa8b931d29eb58e7e525c4199f043030c713b71b000667e6d5f1c58bb2e347356f7
-
Filesize
168KB
MD50f33c07d3f689c177f3fb01814526d89
SHA18014922a1d85ec47121de9aea81e4eed9a192cd7
SHA25633e32a3480829320465e646af7de8e02e7a766cf999ddfa13b8e2c4671fca679
SHA512ec85f561d6c6646908f9580a55b3c39c4d6c816ad46d882a56ae358d41cdc3e1d3faaa818bd5a7df2ce55445d3476ed2360017bef814ad99f823ce27723ee9fc
-
Filesize
168KB
MD50f33c07d3f689c177f3fb01814526d89
SHA18014922a1d85ec47121de9aea81e4eed9a192cd7
SHA25633e32a3480829320465e646af7de8e02e7a766cf999ddfa13b8e2c4671fca679
SHA512ec85f561d6c6646908f9580a55b3c39c4d6c816ad46d882a56ae358d41cdc3e1d3faaa818bd5a7df2ce55445d3476ed2360017bef814ad99f823ce27723ee9fc