Analysis
-
max time kernel
145s -
max time network
185s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 22:03
Static task
static1
Behavioral task
behavioral1
Sample
597ad14101937d820933b6161f6fa027f80c556958d88d08782dc9bc10478b55.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
597ad14101937d820933b6161f6fa027f80c556958d88d08782dc9bc10478b55.exe
Resource
win10v2004-20230220-en
General
-
Target
597ad14101937d820933b6161f6fa027f80c556958d88d08782dc9bc10478b55.exe
-
Size
924KB
-
MD5
cd00bd99e5cdffbcabb6b929378e937e
-
SHA1
6a341567793c2354821b1572af152d4c73bcaa28
-
SHA256
597ad14101937d820933b6161f6fa027f80c556958d88d08782dc9bc10478b55
-
SHA512
e0f9183c2c509f972bde8ffcd0f328f3972b1339caad9a2f8cf250548c28e8ffd1f941d831876abc0a50b5f439febb7d900f16ca55a6826e48a5d26b24c9813b
-
SSDEEP
24576:2yo/JQt86cO5dhHVZXDRpXgFpaVtVkiJDexh2fHiOUt4F:F0JQt8uDVbgFetZKhMCB
Malware Config
Extracted
redline
lupa
217.196.96.56:4138
-
auth_value
fcb02fce9bc10c56a9841d56974bd7b8
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" n4742381.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" n4742381.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" n4742381.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" n4742381.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection n4742381.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" n4742381.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 1352 z3308507.exe 1164 z1968800.exe 1720 z1729814.exe 744 n4742381.exe 1808 o9359259.exe -
Loads dropped DLL 11 IoCs
pid Process 1764 597ad14101937d820933b6161f6fa027f80c556958d88d08782dc9bc10478b55.exe 1352 z3308507.exe 1352 z3308507.exe 1164 z1968800.exe 1164 z1968800.exe 1720 z1729814.exe 1720 z1729814.exe 1720 z1729814.exe 744 n4742381.exe 1720 z1729814.exe 1808 o9359259.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features n4742381.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" n4742381.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z1729814.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z1729814.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 597ad14101937d820933b6161f6fa027f80c556958d88d08782dc9bc10478b55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 597ad14101937d820933b6161f6fa027f80c556958d88d08782dc9bc10478b55.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z3308507.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z3308507.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z1968800.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z1968800.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 744 n4742381.exe 744 n4742381.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 744 n4742381.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 1764 wrote to memory of 1352 1764 597ad14101937d820933b6161f6fa027f80c556958d88d08782dc9bc10478b55.exe 28 PID 1764 wrote to memory of 1352 1764 597ad14101937d820933b6161f6fa027f80c556958d88d08782dc9bc10478b55.exe 28 PID 1764 wrote to memory of 1352 1764 597ad14101937d820933b6161f6fa027f80c556958d88d08782dc9bc10478b55.exe 28 PID 1764 wrote to memory of 1352 1764 597ad14101937d820933b6161f6fa027f80c556958d88d08782dc9bc10478b55.exe 28 PID 1764 wrote to memory of 1352 1764 597ad14101937d820933b6161f6fa027f80c556958d88d08782dc9bc10478b55.exe 28 PID 1764 wrote to memory of 1352 1764 597ad14101937d820933b6161f6fa027f80c556958d88d08782dc9bc10478b55.exe 28 PID 1764 wrote to memory of 1352 1764 597ad14101937d820933b6161f6fa027f80c556958d88d08782dc9bc10478b55.exe 28 PID 1352 wrote to memory of 1164 1352 z3308507.exe 29 PID 1352 wrote to memory of 1164 1352 z3308507.exe 29 PID 1352 wrote to memory of 1164 1352 z3308507.exe 29 PID 1352 wrote to memory of 1164 1352 z3308507.exe 29 PID 1352 wrote to memory of 1164 1352 z3308507.exe 29 PID 1352 wrote to memory of 1164 1352 z3308507.exe 29 PID 1352 wrote to memory of 1164 1352 z3308507.exe 29 PID 1164 wrote to memory of 1720 1164 z1968800.exe 30 PID 1164 wrote to memory of 1720 1164 z1968800.exe 30 PID 1164 wrote to memory of 1720 1164 z1968800.exe 30 PID 1164 wrote to memory of 1720 1164 z1968800.exe 30 PID 1164 wrote to memory of 1720 1164 z1968800.exe 30 PID 1164 wrote to memory of 1720 1164 z1968800.exe 30 PID 1164 wrote to memory of 1720 1164 z1968800.exe 30 PID 1720 wrote to memory of 744 1720 z1729814.exe 31 PID 1720 wrote to memory of 744 1720 z1729814.exe 31 PID 1720 wrote to memory of 744 1720 z1729814.exe 31 PID 1720 wrote to memory of 744 1720 z1729814.exe 31 PID 1720 wrote to memory of 744 1720 z1729814.exe 31 PID 1720 wrote to memory of 744 1720 z1729814.exe 31 PID 1720 wrote to memory of 744 1720 z1729814.exe 31 PID 1720 wrote to memory of 1808 1720 z1729814.exe 32 PID 1720 wrote to memory of 1808 1720 z1729814.exe 32 PID 1720 wrote to memory of 1808 1720 z1729814.exe 32 PID 1720 wrote to memory of 1808 1720 z1729814.exe 32 PID 1720 wrote to memory of 1808 1720 z1729814.exe 32 PID 1720 wrote to memory of 1808 1720 z1729814.exe 32 PID 1720 wrote to memory of 1808 1720 z1729814.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\597ad14101937d820933b6161f6fa027f80c556958d88d08782dc9bc10478b55.exe"C:\Users\Admin\AppData\Local\Temp\597ad14101937d820933b6161f6fa027f80c556958d88d08782dc9bc10478b55.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3308507.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3308507.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1968800.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1968800.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1729814.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1729814.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n4742381.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n4742381.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:744
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o9359259.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o9359259.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1808
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
770KB
MD5818b951c2c8d0a1101ba5bd655dbf034
SHA16b455f44bcd0c090107c606ea4727063db777452
SHA25656b504bbb65d6c36ddbda8aeda8ee249b14995c057492d77619f91429ed17bd3
SHA5124969fd3fe5aac0966c148f2c62ed125e633fcd6b8e87fee949a11965a5fec835602e17700c132e6e551fb2a652b2a7f5ea80bb0cdac8d272176fa4337165dfa2
-
Filesize
770KB
MD5818b951c2c8d0a1101ba5bd655dbf034
SHA16b455f44bcd0c090107c606ea4727063db777452
SHA25656b504bbb65d6c36ddbda8aeda8ee249b14995c057492d77619f91429ed17bd3
SHA5124969fd3fe5aac0966c148f2c62ed125e633fcd6b8e87fee949a11965a5fec835602e17700c132e6e551fb2a652b2a7f5ea80bb0cdac8d272176fa4337165dfa2
-
Filesize
587KB
MD564a634539946139366eefe0b27fc2cae
SHA1e32eaa329bcfa7d0131c798e509c49da293ab631
SHA2569ff2ab738dbc95233a68ae84d12b3b52ec0e2a3ce650f09081111b91a905ff3c
SHA512be0307fb8d2fdf6a942fee0f86828c42a21bdd67d28a41ea9f2e6e6b06255a7ace0865a912f32dd2c61c39abedde77dc726a5b2eb746b7139154689e56385de7
-
Filesize
587KB
MD564a634539946139366eefe0b27fc2cae
SHA1e32eaa329bcfa7d0131c798e509c49da293ab631
SHA2569ff2ab738dbc95233a68ae84d12b3b52ec0e2a3ce650f09081111b91a905ff3c
SHA512be0307fb8d2fdf6a942fee0f86828c42a21bdd67d28a41ea9f2e6e6b06255a7ace0865a912f32dd2c61c39abedde77dc726a5b2eb746b7139154689e56385de7
-
Filesize
383KB
MD5b1853755fa96436605fe10167c693c46
SHA1308541d46a8e5ad61a6e4fdb22de0a9f3d0deb60
SHA25672b4b6e8d420a8ab0f595233937363a19e90f4454e94e06fec075e48a9e19fe3
SHA512f159203becba02aa5d3eb1418f65efe5d2b1f1eb4b3018cb0af99e022f06fbf80a7da28f8fefb502a2619f73a46c2136341744ed68e38ecdcc08fe16d72bee40
-
Filesize
383KB
MD5b1853755fa96436605fe10167c693c46
SHA1308541d46a8e5ad61a6e4fdb22de0a9f3d0deb60
SHA25672b4b6e8d420a8ab0f595233937363a19e90f4454e94e06fec075e48a9e19fe3
SHA512f159203becba02aa5d3eb1418f65efe5d2b1f1eb4b3018cb0af99e022f06fbf80a7da28f8fefb502a2619f73a46c2136341744ed68e38ecdcc08fe16d72bee40
-
Filesize
283KB
MD50a40d30912286951b184698aead7a116
SHA16ed8eaa7393a6a0711b9378384b060a0787769de
SHA25693fe586c264fac97bdf1d4fcb6779f0c02c4390a11dd462a71d6d5b3062fb0c1
SHA512b6c85628ad9f7cfdbd822a6376615f7242786a2810b585156cd85d8a2ab5b6856128e9152553f6b6763c4e4e1df3118cdca9d14fe8d7908e7bece4f6b7f40c87
-
Filesize
283KB
MD50a40d30912286951b184698aead7a116
SHA16ed8eaa7393a6a0711b9378384b060a0787769de
SHA25693fe586c264fac97bdf1d4fcb6779f0c02c4390a11dd462a71d6d5b3062fb0c1
SHA512b6c85628ad9f7cfdbd822a6376615f7242786a2810b585156cd85d8a2ab5b6856128e9152553f6b6763c4e4e1df3118cdca9d14fe8d7908e7bece4f6b7f40c87
-
Filesize
283KB
MD50a40d30912286951b184698aead7a116
SHA16ed8eaa7393a6a0711b9378384b060a0787769de
SHA25693fe586c264fac97bdf1d4fcb6779f0c02c4390a11dd462a71d6d5b3062fb0c1
SHA512b6c85628ad9f7cfdbd822a6376615f7242786a2810b585156cd85d8a2ab5b6856128e9152553f6b6763c4e4e1df3118cdca9d14fe8d7908e7bece4f6b7f40c87
-
Filesize
168KB
MD505634d7cc649fa6730cea53c210ea2b0
SHA152963e0f23a5e817a6f7e41c421963c5c8742ac1
SHA256463c0c93b56779ff33d330ea6a9919c79cbf11a9a68d76340f474cf595830e65
SHA512e943be47d18b72a8262c1e68fa47814eb7d8feeed3e241ca23a079f69a9a8944314432201495df97381fbeddf139134bf93aadbe917cbb191bd5294b4fea00cc
-
Filesize
168KB
MD505634d7cc649fa6730cea53c210ea2b0
SHA152963e0f23a5e817a6f7e41c421963c5c8742ac1
SHA256463c0c93b56779ff33d330ea6a9919c79cbf11a9a68d76340f474cf595830e65
SHA512e943be47d18b72a8262c1e68fa47814eb7d8feeed3e241ca23a079f69a9a8944314432201495df97381fbeddf139134bf93aadbe917cbb191bd5294b4fea00cc
-
Filesize
168KB
MD505634d7cc649fa6730cea53c210ea2b0
SHA152963e0f23a5e817a6f7e41c421963c5c8742ac1
SHA256463c0c93b56779ff33d330ea6a9919c79cbf11a9a68d76340f474cf595830e65
SHA512e943be47d18b72a8262c1e68fa47814eb7d8feeed3e241ca23a079f69a9a8944314432201495df97381fbeddf139134bf93aadbe917cbb191bd5294b4fea00cc
-
Filesize
770KB
MD5818b951c2c8d0a1101ba5bd655dbf034
SHA16b455f44bcd0c090107c606ea4727063db777452
SHA25656b504bbb65d6c36ddbda8aeda8ee249b14995c057492d77619f91429ed17bd3
SHA5124969fd3fe5aac0966c148f2c62ed125e633fcd6b8e87fee949a11965a5fec835602e17700c132e6e551fb2a652b2a7f5ea80bb0cdac8d272176fa4337165dfa2
-
Filesize
770KB
MD5818b951c2c8d0a1101ba5bd655dbf034
SHA16b455f44bcd0c090107c606ea4727063db777452
SHA25656b504bbb65d6c36ddbda8aeda8ee249b14995c057492d77619f91429ed17bd3
SHA5124969fd3fe5aac0966c148f2c62ed125e633fcd6b8e87fee949a11965a5fec835602e17700c132e6e551fb2a652b2a7f5ea80bb0cdac8d272176fa4337165dfa2
-
Filesize
587KB
MD564a634539946139366eefe0b27fc2cae
SHA1e32eaa329bcfa7d0131c798e509c49da293ab631
SHA2569ff2ab738dbc95233a68ae84d12b3b52ec0e2a3ce650f09081111b91a905ff3c
SHA512be0307fb8d2fdf6a942fee0f86828c42a21bdd67d28a41ea9f2e6e6b06255a7ace0865a912f32dd2c61c39abedde77dc726a5b2eb746b7139154689e56385de7
-
Filesize
587KB
MD564a634539946139366eefe0b27fc2cae
SHA1e32eaa329bcfa7d0131c798e509c49da293ab631
SHA2569ff2ab738dbc95233a68ae84d12b3b52ec0e2a3ce650f09081111b91a905ff3c
SHA512be0307fb8d2fdf6a942fee0f86828c42a21bdd67d28a41ea9f2e6e6b06255a7ace0865a912f32dd2c61c39abedde77dc726a5b2eb746b7139154689e56385de7
-
Filesize
383KB
MD5b1853755fa96436605fe10167c693c46
SHA1308541d46a8e5ad61a6e4fdb22de0a9f3d0deb60
SHA25672b4b6e8d420a8ab0f595233937363a19e90f4454e94e06fec075e48a9e19fe3
SHA512f159203becba02aa5d3eb1418f65efe5d2b1f1eb4b3018cb0af99e022f06fbf80a7da28f8fefb502a2619f73a46c2136341744ed68e38ecdcc08fe16d72bee40
-
Filesize
383KB
MD5b1853755fa96436605fe10167c693c46
SHA1308541d46a8e5ad61a6e4fdb22de0a9f3d0deb60
SHA25672b4b6e8d420a8ab0f595233937363a19e90f4454e94e06fec075e48a9e19fe3
SHA512f159203becba02aa5d3eb1418f65efe5d2b1f1eb4b3018cb0af99e022f06fbf80a7da28f8fefb502a2619f73a46c2136341744ed68e38ecdcc08fe16d72bee40
-
Filesize
283KB
MD50a40d30912286951b184698aead7a116
SHA16ed8eaa7393a6a0711b9378384b060a0787769de
SHA25693fe586c264fac97bdf1d4fcb6779f0c02c4390a11dd462a71d6d5b3062fb0c1
SHA512b6c85628ad9f7cfdbd822a6376615f7242786a2810b585156cd85d8a2ab5b6856128e9152553f6b6763c4e4e1df3118cdca9d14fe8d7908e7bece4f6b7f40c87
-
Filesize
283KB
MD50a40d30912286951b184698aead7a116
SHA16ed8eaa7393a6a0711b9378384b060a0787769de
SHA25693fe586c264fac97bdf1d4fcb6779f0c02c4390a11dd462a71d6d5b3062fb0c1
SHA512b6c85628ad9f7cfdbd822a6376615f7242786a2810b585156cd85d8a2ab5b6856128e9152553f6b6763c4e4e1df3118cdca9d14fe8d7908e7bece4f6b7f40c87
-
Filesize
283KB
MD50a40d30912286951b184698aead7a116
SHA16ed8eaa7393a6a0711b9378384b060a0787769de
SHA25693fe586c264fac97bdf1d4fcb6779f0c02c4390a11dd462a71d6d5b3062fb0c1
SHA512b6c85628ad9f7cfdbd822a6376615f7242786a2810b585156cd85d8a2ab5b6856128e9152553f6b6763c4e4e1df3118cdca9d14fe8d7908e7bece4f6b7f40c87
-
Filesize
168KB
MD505634d7cc649fa6730cea53c210ea2b0
SHA152963e0f23a5e817a6f7e41c421963c5c8742ac1
SHA256463c0c93b56779ff33d330ea6a9919c79cbf11a9a68d76340f474cf595830e65
SHA512e943be47d18b72a8262c1e68fa47814eb7d8feeed3e241ca23a079f69a9a8944314432201495df97381fbeddf139134bf93aadbe917cbb191bd5294b4fea00cc
-
Filesize
168KB
MD505634d7cc649fa6730cea53c210ea2b0
SHA152963e0f23a5e817a6f7e41c421963c5c8742ac1
SHA256463c0c93b56779ff33d330ea6a9919c79cbf11a9a68d76340f474cf595830e65
SHA512e943be47d18b72a8262c1e68fa47814eb7d8feeed3e241ca23a079f69a9a8944314432201495df97381fbeddf139134bf93aadbe917cbb191bd5294b4fea00cc