Analysis
-
max time kernel
182s -
max time network
189s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 22:27
Static task
static1
Behavioral task
behavioral1
Sample
6f461b2a6c0a5543de355d2fe6cf7e4648274f50cdfc3638c4605eab4220981a.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
6f461b2a6c0a5543de355d2fe6cf7e4648274f50cdfc3638c4605eab4220981a.exe
Resource
win10v2004-20230220-en
General
-
Target
6f461b2a6c0a5543de355d2fe6cf7e4648274f50cdfc3638c4605eab4220981a.exe
-
Size
976KB
-
MD5
d664f278fdd4c7eb14f6e7dbc91aeab4
-
SHA1
5a8c246893490b823ba22f36abe116cfea988e1d
-
SHA256
6f461b2a6c0a5543de355d2fe6cf7e4648274f50cdfc3638c4605eab4220981a
-
SHA512
11e9881bb061552d6344b35f68dbef734593bfc2dfea12062e48a9259f749c381f14cba87548627d52803d09f6c7e8b20e6bc5d53cabb6a86fe8ce3fd5bafa3d
-
SSDEEP
24576:4yHqztUyYJZQkqlW8QzJJq/mm3Q+r9YDQJHtC:/CCyqqJQmum3Q+ruc
Malware Config
Extracted
redline
dark
185.161.248.73:4164
-
auth_value
ae85b01f66afe8770afeed560513fc2d
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 844 un341486.exe 320 10001243.exe 624 1.exe 1504 rk942907.exe 896 si896318.exe -
Loads dropped DLL 11 IoCs
pid Process 880 6f461b2a6c0a5543de355d2fe6cf7e4648274f50cdfc3638c4605eab4220981a.exe 844 un341486.exe 844 un341486.exe 844 un341486.exe 320 10001243.exe 320 10001243.exe 844 un341486.exe 844 un341486.exe 1504 rk942907.exe 880 6f461b2a6c0a5543de355d2fe6cf7e4648274f50cdfc3638c4605eab4220981a.exe 896 si896318.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 1.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6f461b2a6c0a5543de355d2fe6cf7e4648274f50cdfc3638c4605eab4220981a.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce un341486.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un341486.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6f461b2a6c0a5543de355d2fe6cf7e4648274f50cdfc3638c4605eab4220981a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 624 1.exe 624 1.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 320 10001243.exe Token: SeDebugPrivilege 1504 rk942907.exe Token: SeDebugPrivilege 624 1.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 880 wrote to memory of 844 880 6f461b2a6c0a5543de355d2fe6cf7e4648274f50cdfc3638c4605eab4220981a.exe 28 PID 880 wrote to memory of 844 880 6f461b2a6c0a5543de355d2fe6cf7e4648274f50cdfc3638c4605eab4220981a.exe 28 PID 880 wrote to memory of 844 880 6f461b2a6c0a5543de355d2fe6cf7e4648274f50cdfc3638c4605eab4220981a.exe 28 PID 880 wrote to memory of 844 880 6f461b2a6c0a5543de355d2fe6cf7e4648274f50cdfc3638c4605eab4220981a.exe 28 PID 880 wrote to memory of 844 880 6f461b2a6c0a5543de355d2fe6cf7e4648274f50cdfc3638c4605eab4220981a.exe 28 PID 880 wrote to memory of 844 880 6f461b2a6c0a5543de355d2fe6cf7e4648274f50cdfc3638c4605eab4220981a.exe 28 PID 880 wrote to memory of 844 880 6f461b2a6c0a5543de355d2fe6cf7e4648274f50cdfc3638c4605eab4220981a.exe 28 PID 844 wrote to memory of 320 844 un341486.exe 29 PID 844 wrote to memory of 320 844 un341486.exe 29 PID 844 wrote to memory of 320 844 un341486.exe 29 PID 844 wrote to memory of 320 844 un341486.exe 29 PID 844 wrote to memory of 320 844 un341486.exe 29 PID 844 wrote to memory of 320 844 un341486.exe 29 PID 844 wrote to memory of 320 844 un341486.exe 29 PID 320 wrote to memory of 624 320 10001243.exe 30 PID 320 wrote to memory of 624 320 10001243.exe 30 PID 320 wrote to memory of 624 320 10001243.exe 30 PID 320 wrote to memory of 624 320 10001243.exe 30 PID 320 wrote to memory of 624 320 10001243.exe 30 PID 320 wrote to memory of 624 320 10001243.exe 30 PID 320 wrote to memory of 624 320 10001243.exe 30 PID 844 wrote to memory of 1504 844 un341486.exe 31 PID 844 wrote to memory of 1504 844 un341486.exe 31 PID 844 wrote to memory of 1504 844 un341486.exe 31 PID 844 wrote to memory of 1504 844 un341486.exe 31 PID 844 wrote to memory of 1504 844 un341486.exe 31 PID 844 wrote to memory of 1504 844 un341486.exe 31 PID 844 wrote to memory of 1504 844 un341486.exe 31 PID 880 wrote to memory of 896 880 6f461b2a6c0a5543de355d2fe6cf7e4648274f50cdfc3638c4605eab4220981a.exe 32 PID 880 wrote to memory of 896 880 6f461b2a6c0a5543de355d2fe6cf7e4648274f50cdfc3638c4605eab4220981a.exe 32 PID 880 wrote to memory of 896 880 6f461b2a6c0a5543de355d2fe6cf7e4648274f50cdfc3638c4605eab4220981a.exe 32 PID 880 wrote to memory of 896 880 6f461b2a6c0a5543de355d2fe6cf7e4648274f50cdfc3638c4605eab4220981a.exe 32 PID 880 wrote to memory of 896 880 6f461b2a6c0a5543de355d2fe6cf7e4648274f50cdfc3638c4605eab4220981a.exe 32 PID 880 wrote to memory of 896 880 6f461b2a6c0a5543de355d2fe6cf7e4648274f50cdfc3638c4605eab4220981a.exe 32 PID 880 wrote to memory of 896 880 6f461b2a6c0a5543de355d2fe6cf7e4648274f50cdfc3638c4605eab4220981a.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f461b2a6c0a5543de355d2fe6cf7e4648274f50cdfc3638c4605eab4220981a.exe"C:\Users\Admin\AppData\Local\Temp\6f461b2a6c0a5543de355d2fe6cf7e4648274f50cdfc3638c4605eab4220981a.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un341486.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un341486.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\10001243.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\10001243.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:624
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk942907.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk942907.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1504
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si896318.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si896318.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:896
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD516cf18c8ef1d4be89b36e27c8fb88e9d
SHA17811ba84f75a1adc6d995c2c1121ec996d1cc003
SHA256116156cc3af0bf4d81d9b2fba83c569cf9f4c9055b9c9cd5731538de036417e8
SHA5124cb9e29db63d28c802c7c1799fd53e00b5facdc0b63d08b76d619c7a9be6cc06f11c0d435ad035bf3f9c3c96687e03e5157ae2ce7494a621c0762bc8083d9fbd
-
Filesize
168KB
MD516cf18c8ef1d4be89b36e27c8fb88e9d
SHA17811ba84f75a1adc6d995c2c1121ec996d1cc003
SHA256116156cc3af0bf4d81d9b2fba83c569cf9f4c9055b9c9cd5731538de036417e8
SHA5124cb9e29db63d28c802c7c1799fd53e00b5facdc0b63d08b76d619c7a9be6cc06f11c0d435ad035bf3f9c3c96687e03e5157ae2ce7494a621c0762bc8083d9fbd
-
Filesize
822KB
MD555d5546c2b39235f0dec7c5f8525b61c
SHA17ce22a322d9554fc92458a41fd0872d91ad30d4f
SHA25695dd9be7600873bce8bc1d0da0e4faeabd4805551f30584115457fcf302eed23
SHA512bd26741263c9aa8020dddfd001f0408d5a0e63162a13be211f5a21a812637926a073e233d2d5aa1c7552e2857617f6c687c868e05ca15a1c97a72af5ee561c6a
-
Filesize
822KB
MD555d5546c2b39235f0dec7c5f8525b61c
SHA17ce22a322d9554fc92458a41fd0872d91ad30d4f
SHA25695dd9be7600873bce8bc1d0da0e4faeabd4805551f30584115457fcf302eed23
SHA512bd26741263c9aa8020dddfd001f0408d5a0e63162a13be211f5a21a812637926a073e233d2d5aa1c7552e2857617f6c687c868e05ca15a1c97a72af5ee561c6a
-
Filesize
528KB
MD54eb3338daef35283405d9311ac96c60e
SHA183a6704c65f894cf58c613da948eadfa55c0860b
SHA2569fa176d96745949f59269ecf0972673a7c577ea92015bed42b4c7a05808ada71
SHA5124688c1e8e36e54238bd68611bab009ef8430c1b59344a94861400179ac8694755411aede57bcbc22520edefb1eb0b54de1fcc25baf1bc64ff1dc4d20e8ff8179
-
Filesize
528KB
MD54eb3338daef35283405d9311ac96c60e
SHA183a6704c65f894cf58c613da948eadfa55c0860b
SHA2569fa176d96745949f59269ecf0972673a7c577ea92015bed42b4c7a05808ada71
SHA5124688c1e8e36e54238bd68611bab009ef8430c1b59344a94861400179ac8694755411aede57bcbc22520edefb1eb0b54de1fcc25baf1bc64ff1dc4d20e8ff8179
-
Filesize
528KB
MD54eb3338daef35283405d9311ac96c60e
SHA183a6704c65f894cf58c613da948eadfa55c0860b
SHA2569fa176d96745949f59269ecf0972673a7c577ea92015bed42b4c7a05808ada71
SHA5124688c1e8e36e54238bd68611bab009ef8430c1b59344a94861400179ac8694755411aede57bcbc22520edefb1eb0b54de1fcc25baf1bc64ff1dc4d20e8ff8179
-
Filesize
589KB
MD58c57c2cca4838933e611405874f1e06b
SHA1baee3cf653d4ad4c4f570551a93d1b73e77e6e61
SHA256f6252b2fb2e5dc5838881bb5264674a0420a474fe75c966a89189ab6c4a0367e
SHA5120c9a26f8aae3aa5dd91228fdb12fefe42d211ba78ee050c9a08d3eece591c867e9fd9797813fbaae3152dafe5705c3374bf6a6c8ba65d9a7a245d4edbbc0b9f6
-
Filesize
589KB
MD58c57c2cca4838933e611405874f1e06b
SHA1baee3cf653d4ad4c4f570551a93d1b73e77e6e61
SHA256f6252b2fb2e5dc5838881bb5264674a0420a474fe75c966a89189ab6c4a0367e
SHA5120c9a26f8aae3aa5dd91228fdb12fefe42d211ba78ee050c9a08d3eece591c867e9fd9797813fbaae3152dafe5705c3374bf6a6c8ba65d9a7a245d4edbbc0b9f6
-
Filesize
589KB
MD58c57c2cca4838933e611405874f1e06b
SHA1baee3cf653d4ad4c4f570551a93d1b73e77e6e61
SHA256f6252b2fb2e5dc5838881bb5264674a0420a474fe75c966a89189ab6c4a0367e
SHA5120c9a26f8aae3aa5dd91228fdb12fefe42d211ba78ee050c9a08d3eece591c867e9fd9797813fbaae3152dafe5705c3374bf6a6c8ba65d9a7a245d4edbbc0b9f6
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
168KB
MD516cf18c8ef1d4be89b36e27c8fb88e9d
SHA17811ba84f75a1adc6d995c2c1121ec996d1cc003
SHA256116156cc3af0bf4d81d9b2fba83c569cf9f4c9055b9c9cd5731538de036417e8
SHA5124cb9e29db63d28c802c7c1799fd53e00b5facdc0b63d08b76d619c7a9be6cc06f11c0d435ad035bf3f9c3c96687e03e5157ae2ce7494a621c0762bc8083d9fbd
-
Filesize
168KB
MD516cf18c8ef1d4be89b36e27c8fb88e9d
SHA17811ba84f75a1adc6d995c2c1121ec996d1cc003
SHA256116156cc3af0bf4d81d9b2fba83c569cf9f4c9055b9c9cd5731538de036417e8
SHA5124cb9e29db63d28c802c7c1799fd53e00b5facdc0b63d08b76d619c7a9be6cc06f11c0d435ad035bf3f9c3c96687e03e5157ae2ce7494a621c0762bc8083d9fbd
-
Filesize
822KB
MD555d5546c2b39235f0dec7c5f8525b61c
SHA17ce22a322d9554fc92458a41fd0872d91ad30d4f
SHA25695dd9be7600873bce8bc1d0da0e4faeabd4805551f30584115457fcf302eed23
SHA512bd26741263c9aa8020dddfd001f0408d5a0e63162a13be211f5a21a812637926a073e233d2d5aa1c7552e2857617f6c687c868e05ca15a1c97a72af5ee561c6a
-
Filesize
822KB
MD555d5546c2b39235f0dec7c5f8525b61c
SHA17ce22a322d9554fc92458a41fd0872d91ad30d4f
SHA25695dd9be7600873bce8bc1d0da0e4faeabd4805551f30584115457fcf302eed23
SHA512bd26741263c9aa8020dddfd001f0408d5a0e63162a13be211f5a21a812637926a073e233d2d5aa1c7552e2857617f6c687c868e05ca15a1c97a72af5ee561c6a
-
Filesize
528KB
MD54eb3338daef35283405d9311ac96c60e
SHA183a6704c65f894cf58c613da948eadfa55c0860b
SHA2569fa176d96745949f59269ecf0972673a7c577ea92015bed42b4c7a05808ada71
SHA5124688c1e8e36e54238bd68611bab009ef8430c1b59344a94861400179ac8694755411aede57bcbc22520edefb1eb0b54de1fcc25baf1bc64ff1dc4d20e8ff8179
-
Filesize
528KB
MD54eb3338daef35283405d9311ac96c60e
SHA183a6704c65f894cf58c613da948eadfa55c0860b
SHA2569fa176d96745949f59269ecf0972673a7c577ea92015bed42b4c7a05808ada71
SHA5124688c1e8e36e54238bd68611bab009ef8430c1b59344a94861400179ac8694755411aede57bcbc22520edefb1eb0b54de1fcc25baf1bc64ff1dc4d20e8ff8179
-
Filesize
528KB
MD54eb3338daef35283405d9311ac96c60e
SHA183a6704c65f894cf58c613da948eadfa55c0860b
SHA2569fa176d96745949f59269ecf0972673a7c577ea92015bed42b4c7a05808ada71
SHA5124688c1e8e36e54238bd68611bab009ef8430c1b59344a94861400179ac8694755411aede57bcbc22520edefb1eb0b54de1fcc25baf1bc64ff1dc4d20e8ff8179
-
Filesize
589KB
MD58c57c2cca4838933e611405874f1e06b
SHA1baee3cf653d4ad4c4f570551a93d1b73e77e6e61
SHA256f6252b2fb2e5dc5838881bb5264674a0420a474fe75c966a89189ab6c4a0367e
SHA5120c9a26f8aae3aa5dd91228fdb12fefe42d211ba78ee050c9a08d3eece591c867e9fd9797813fbaae3152dafe5705c3374bf6a6c8ba65d9a7a245d4edbbc0b9f6
-
Filesize
589KB
MD58c57c2cca4838933e611405874f1e06b
SHA1baee3cf653d4ad4c4f570551a93d1b73e77e6e61
SHA256f6252b2fb2e5dc5838881bb5264674a0420a474fe75c966a89189ab6c4a0367e
SHA5120c9a26f8aae3aa5dd91228fdb12fefe42d211ba78ee050c9a08d3eece591c867e9fd9797813fbaae3152dafe5705c3374bf6a6c8ba65d9a7a245d4edbbc0b9f6
-
Filesize
589KB
MD58c57c2cca4838933e611405874f1e06b
SHA1baee3cf653d4ad4c4f570551a93d1b73e77e6e61
SHA256f6252b2fb2e5dc5838881bb5264674a0420a474fe75c966a89189ab6c4a0367e
SHA5120c9a26f8aae3aa5dd91228fdb12fefe42d211ba78ee050c9a08d3eece591c867e9fd9797813fbaae3152dafe5705c3374bf6a6c8ba65d9a7a245d4edbbc0b9f6
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91