Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 22:42
Static task
static1
Behavioral task
behavioral1
Sample
06686d082ee968ec1eb61a35e4ea6bd0a1677649afc4896bb05c35d44c28a828.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
06686d082ee968ec1eb61a35e4ea6bd0a1677649afc4896bb05c35d44c28a828.exe
Resource
win10v2004-20230220-en
General
-
Target
06686d082ee968ec1eb61a35e4ea6bd0a1677649afc4896bb05c35d44c28a828.exe
-
Size
923KB
-
MD5
e1bbf84bca043cfb5f635688d3510e6e
-
SHA1
df8343e15187721cc6e30289243a4f3ca957ce2b
-
SHA256
06686d082ee968ec1eb61a35e4ea6bd0a1677649afc4896bb05c35d44c28a828
-
SHA512
88adb2205dce95202fcdfb4f6c40abd8c909c2e6363a7205b6862270da356e06aac01a7cdd1fe6f471aec5dbf4ccd606102b10a40b38e7d38d45628d1b20200d
-
SSDEEP
24576:AyS/I+ln8IbgUfrgJD2V11rkC188T4l3TYainP1SS:HPUnhLIujrTRT4ljenP
Malware Config
Extracted
redline
lupa
217.196.96.56:4138
-
auth_value
fcb02fce9bc10c56a9841d56974bd7b8
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" n3155638.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" n3155638.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" n3155638.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection n3155638.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" n3155638.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" n3155638.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 1964 z3345017.exe 1056 z9394679.exe 1096 z6475234.exe 936 n3155638.exe 1052 o1891181.exe -
Loads dropped DLL 11 IoCs
pid Process 1980 06686d082ee968ec1eb61a35e4ea6bd0a1677649afc4896bb05c35d44c28a828.exe 1964 z3345017.exe 1964 z3345017.exe 1056 z9394679.exe 1056 z9394679.exe 1096 z6475234.exe 1096 z6475234.exe 1096 z6475234.exe 936 n3155638.exe 1096 z6475234.exe 1052 o1891181.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" n3155638.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features n3155638.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z9394679.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z9394679.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z6475234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z6475234.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 06686d082ee968ec1eb61a35e4ea6bd0a1677649afc4896bb05c35d44c28a828.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 06686d082ee968ec1eb61a35e4ea6bd0a1677649afc4896bb05c35d44c28a828.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z3345017.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z3345017.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 936 n3155638.exe 936 n3155638.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 936 n3155638.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 1980 wrote to memory of 1964 1980 06686d082ee968ec1eb61a35e4ea6bd0a1677649afc4896bb05c35d44c28a828.exe 27 PID 1980 wrote to memory of 1964 1980 06686d082ee968ec1eb61a35e4ea6bd0a1677649afc4896bb05c35d44c28a828.exe 27 PID 1980 wrote to memory of 1964 1980 06686d082ee968ec1eb61a35e4ea6bd0a1677649afc4896bb05c35d44c28a828.exe 27 PID 1980 wrote to memory of 1964 1980 06686d082ee968ec1eb61a35e4ea6bd0a1677649afc4896bb05c35d44c28a828.exe 27 PID 1980 wrote to memory of 1964 1980 06686d082ee968ec1eb61a35e4ea6bd0a1677649afc4896bb05c35d44c28a828.exe 27 PID 1980 wrote to memory of 1964 1980 06686d082ee968ec1eb61a35e4ea6bd0a1677649afc4896bb05c35d44c28a828.exe 27 PID 1980 wrote to memory of 1964 1980 06686d082ee968ec1eb61a35e4ea6bd0a1677649afc4896bb05c35d44c28a828.exe 27 PID 1964 wrote to memory of 1056 1964 z3345017.exe 28 PID 1964 wrote to memory of 1056 1964 z3345017.exe 28 PID 1964 wrote to memory of 1056 1964 z3345017.exe 28 PID 1964 wrote to memory of 1056 1964 z3345017.exe 28 PID 1964 wrote to memory of 1056 1964 z3345017.exe 28 PID 1964 wrote to memory of 1056 1964 z3345017.exe 28 PID 1964 wrote to memory of 1056 1964 z3345017.exe 28 PID 1056 wrote to memory of 1096 1056 z9394679.exe 29 PID 1056 wrote to memory of 1096 1056 z9394679.exe 29 PID 1056 wrote to memory of 1096 1056 z9394679.exe 29 PID 1056 wrote to memory of 1096 1056 z9394679.exe 29 PID 1056 wrote to memory of 1096 1056 z9394679.exe 29 PID 1056 wrote to memory of 1096 1056 z9394679.exe 29 PID 1056 wrote to memory of 1096 1056 z9394679.exe 29 PID 1096 wrote to memory of 936 1096 z6475234.exe 30 PID 1096 wrote to memory of 936 1096 z6475234.exe 30 PID 1096 wrote to memory of 936 1096 z6475234.exe 30 PID 1096 wrote to memory of 936 1096 z6475234.exe 30 PID 1096 wrote to memory of 936 1096 z6475234.exe 30 PID 1096 wrote to memory of 936 1096 z6475234.exe 30 PID 1096 wrote to memory of 936 1096 z6475234.exe 30 PID 1096 wrote to memory of 1052 1096 z6475234.exe 31 PID 1096 wrote to memory of 1052 1096 z6475234.exe 31 PID 1096 wrote to memory of 1052 1096 z6475234.exe 31 PID 1096 wrote to memory of 1052 1096 z6475234.exe 31 PID 1096 wrote to memory of 1052 1096 z6475234.exe 31 PID 1096 wrote to memory of 1052 1096 z6475234.exe 31 PID 1096 wrote to memory of 1052 1096 z6475234.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\06686d082ee968ec1eb61a35e4ea6bd0a1677649afc4896bb05c35d44c28a828.exe"C:\Users\Admin\AppData\Local\Temp\06686d082ee968ec1eb61a35e4ea6bd0a1677649afc4896bb05c35d44c28a828.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3345017.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3345017.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9394679.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9394679.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6475234.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6475234.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n3155638.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n3155638.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:936
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o1891181.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o1891181.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1052
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
769KB
MD5fe8c4be477cf82cb0546cbbced4cdb6a
SHA100b32d7d2a6a4adc46b546d279b1bba799f7950e
SHA256ddbd2a5a7fe40cd3368858f51b207c159ad5a84286d8e3ac9f8232154bea427d
SHA512e8f0ec157ed117b3a313b9c46491a4c6899cdaf02b7cbf77d3086824644ed496842de5e0c4de2ff3a43b2f7c01a19d0e2c6fa9ba6952f3d9551e159324ef7847
-
Filesize
769KB
MD5fe8c4be477cf82cb0546cbbced4cdb6a
SHA100b32d7d2a6a4adc46b546d279b1bba799f7950e
SHA256ddbd2a5a7fe40cd3368858f51b207c159ad5a84286d8e3ac9f8232154bea427d
SHA512e8f0ec157ed117b3a313b9c46491a4c6899cdaf02b7cbf77d3086824644ed496842de5e0c4de2ff3a43b2f7c01a19d0e2c6fa9ba6952f3d9551e159324ef7847
-
Filesize
587KB
MD5b4dc0f3a670043f76f75f7c5fb936080
SHA1cae4082e15915d70e3fcc7f4db768c746753531d
SHA256d4c5df6d558b217b3858edc1964944a28fa8e066b089bab3397b71596022b104
SHA512969f30f8707dff518a5cd722e975021e4139e21615ef36c2d1abc536d0be0a0be5c960789d99397c0b8d45c2dff62c8b38b5a38485dc13590b13dc5a9946156b
-
Filesize
587KB
MD5b4dc0f3a670043f76f75f7c5fb936080
SHA1cae4082e15915d70e3fcc7f4db768c746753531d
SHA256d4c5df6d558b217b3858edc1964944a28fa8e066b089bab3397b71596022b104
SHA512969f30f8707dff518a5cd722e975021e4139e21615ef36c2d1abc536d0be0a0be5c960789d99397c0b8d45c2dff62c8b38b5a38485dc13590b13dc5a9946156b
-
Filesize
383KB
MD53e96672d42377b33e8f6c194b525044b
SHA129a3a64cf2f8c21074f27018a8dc59ed02d70702
SHA256fa2e8a6463dfd90cffbe6bd75615cb92e1e2a29b7245d856c9482b42f2a90a5b
SHA51267c2d24e09e6a7a5d1882f6dabdea28b12b5d2be1c19b8d02f7794cde426cb59bc053505b0376771613fbce6cf431cd90c781204c7eacc77eebe5a598c93a213
-
Filesize
383KB
MD53e96672d42377b33e8f6c194b525044b
SHA129a3a64cf2f8c21074f27018a8dc59ed02d70702
SHA256fa2e8a6463dfd90cffbe6bd75615cb92e1e2a29b7245d856c9482b42f2a90a5b
SHA51267c2d24e09e6a7a5d1882f6dabdea28b12b5d2be1c19b8d02f7794cde426cb59bc053505b0376771613fbce6cf431cd90c781204c7eacc77eebe5a598c93a213
-
Filesize
283KB
MD565d19ea339911c94b1549c8bb4aca41a
SHA121eacbdc813a6da558dfa501931870896496bdf5
SHA256ac9599ad806bb46046c8deb66b86fa54f3d3e494bfc21ca84c2f120930076b64
SHA51267642c6d99168de6053cb818154adb01f6a8786ec7bca987ac6c51936a80832d46e8bea1fc9dbe7d794c270850ead6a58d4b3d901043c9c0f45346095cafc157
-
Filesize
283KB
MD565d19ea339911c94b1549c8bb4aca41a
SHA121eacbdc813a6da558dfa501931870896496bdf5
SHA256ac9599ad806bb46046c8deb66b86fa54f3d3e494bfc21ca84c2f120930076b64
SHA51267642c6d99168de6053cb818154adb01f6a8786ec7bca987ac6c51936a80832d46e8bea1fc9dbe7d794c270850ead6a58d4b3d901043c9c0f45346095cafc157
-
Filesize
283KB
MD565d19ea339911c94b1549c8bb4aca41a
SHA121eacbdc813a6da558dfa501931870896496bdf5
SHA256ac9599ad806bb46046c8deb66b86fa54f3d3e494bfc21ca84c2f120930076b64
SHA51267642c6d99168de6053cb818154adb01f6a8786ec7bca987ac6c51936a80832d46e8bea1fc9dbe7d794c270850ead6a58d4b3d901043c9c0f45346095cafc157
-
Filesize
168KB
MD555e148536b96cf7b87bf573b5f3da1d1
SHA1e7ad5cef0bce14aba3d38bfefcc189f3da87ff3d
SHA256c0de614d94efc776ec414f71288103b1f1a3cbca88a43e789cd201edf070ed77
SHA512b2a201297fb65fdb77480315b4553c7be43e9d273dd04951a36c3bbd9ad6f29bfc738d74cfdafd96301c043f2b7243b5e4fc6ccab1f44edad8b98ad8ae26a9b4
-
Filesize
168KB
MD555e148536b96cf7b87bf573b5f3da1d1
SHA1e7ad5cef0bce14aba3d38bfefcc189f3da87ff3d
SHA256c0de614d94efc776ec414f71288103b1f1a3cbca88a43e789cd201edf070ed77
SHA512b2a201297fb65fdb77480315b4553c7be43e9d273dd04951a36c3bbd9ad6f29bfc738d74cfdafd96301c043f2b7243b5e4fc6ccab1f44edad8b98ad8ae26a9b4
-
Filesize
168KB
MD555e148536b96cf7b87bf573b5f3da1d1
SHA1e7ad5cef0bce14aba3d38bfefcc189f3da87ff3d
SHA256c0de614d94efc776ec414f71288103b1f1a3cbca88a43e789cd201edf070ed77
SHA512b2a201297fb65fdb77480315b4553c7be43e9d273dd04951a36c3bbd9ad6f29bfc738d74cfdafd96301c043f2b7243b5e4fc6ccab1f44edad8b98ad8ae26a9b4
-
Filesize
769KB
MD5fe8c4be477cf82cb0546cbbced4cdb6a
SHA100b32d7d2a6a4adc46b546d279b1bba799f7950e
SHA256ddbd2a5a7fe40cd3368858f51b207c159ad5a84286d8e3ac9f8232154bea427d
SHA512e8f0ec157ed117b3a313b9c46491a4c6899cdaf02b7cbf77d3086824644ed496842de5e0c4de2ff3a43b2f7c01a19d0e2c6fa9ba6952f3d9551e159324ef7847
-
Filesize
769KB
MD5fe8c4be477cf82cb0546cbbced4cdb6a
SHA100b32d7d2a6a4adc46b546d279b1bba799f7950e
SHA256ddbd2a5a7fe40cd3368858f51b207c159ad5a84286d8e3ac9f8232154bea427d
SHA512e8f0ec157ed117b3a313b9c46491a4c6899cdaf02b7cbf77d3086824644ed496842de5e0c4de2ff3a43b2f7c01a19d0e2c6fa9ba6952f3d9551e159324ef7847
-
Filesize
587KB
MD5b4dc0f3a670043f76f75f7c5fb936080
SHA1cae4082e15915d70e3fcc7f4db768c746753531d
SHA256d4c5df6d558b217b3858edc1964944a28fa8e066b089bab3397b71596022b104
SHA512969f30f8707dff518a5cd722e975021e4139e21615ef36c2d1abc536d0be0a0be5c960789d99397c0b8d45c2dff62c8b38b5a38485dc13590b13dc5a9946156b
-
Filesize
587KB
MD5b4dc0f3a670043f76f75f7c5fb936080
SHA1cae4082e15915d70e3fcc7f4db768c746753531d
SHA256d4c5df6d558b217b3858edc1964944a28fa8e066b089bab3397b71596022b104
SHA512969f30f8707dff518a5cd722e975021e4139e21615ef36c2d1abc536d0be0a0be5c960789d99397c0b8d45c2dff62c8b38b5a38485dc13590b13dc5a9946156b
-
Filesize
383KB
MD53e96672d42377b33e8f6c194b525044b
SHA129a3a64cf2f8c21074f27018a8dc59ed02d70702
SHA256fa2e8a6463dfd90cffbe6bd75615cb92e1e2a29b7245d856c9482b42f2a90a5b
SHA51267c2d24e09e6a7a5d1882f6dabdea28b12b5d2be1c19b8d02f7794cde426cb59bc053505b0376771613fbce6cf431cd90c781204c7eacc77eebe5a598c93a213
-
Filesize
383KB
MD53e96672d42377b33e8f6c194b525044b
SHA129a3a64cf2f8c21074f27018a8dc59ed02d70702
SHA256fa2e8a6463dfd90cffbe6bd75615cb92e1e2a29b7245d856c9482b42f2a90a5b
SHA51267c2d24e09e6a7a5d1882f6dabdea28b12b5d2be1c19b8d02f7794cde426cb59bc053505b0376771613fbce6cf431cd90c781204c7eacc77eebe5a598c93a213
-
Filesize
283KB
MD565d19ea339911c94b1549c8bb4aca41a
SHA121eacbdc813a6da558dfa501931870896496bdf5
SHA256ac9599ad806bb46046c8deb66b86fa54f3d3e494bfc21ca84c2f120930076b64
SHA51267642c6d99168de6053cb818154adb01f6a8786ec7bca987ac6c51936a80832d46e8bea1fc9dbe7d794c270850ead6a58d4b3d901043c9c0f45346095cafc157
-
Filesize
283KB
MD565d19ea339911c94b1549c8bb4aca41a
SHA121eacbdc813a6da558dfa501931870896496bdf5
SHA256ac9599ad806bb46046c8deb66b86fa54f3d3e494bfc21ca84c2f120930076b64
SHA51267642c6d99168de6053cb818154adb01f6a8786ec7bca987ac6c51936a80832d46e8bea1fc9dbe7d794c270850ead6a58d4b3d901043c9c0f45346095cafc157
-
Filesize
283KB
MD565d19ea339911c94b1549c8bb4aca41a
SHA121eacbdc813a6da558dfa501931870896496bdf5
SHA256ac9599ad806bb46046c8deb66b86fa54f3d3e494bfc21ca84c2f120930076b64
SHA51267642c6d99168de6053cb818154adb01f6a8786ec7bca987ac6c51936a80832d46e8bea1fc9dbe7d794c270850ead6a58d4b3d901043c9c0f45346095cafc157
-
Filesize
168KB
MD555e148536b96cf7b87bf573b5f3da1d1
SHA1e7ad5cef0bce14aba3d38bfefcc189f3da87ff3d
SHA256c0de614d94efc776ec414f71288103b1f1a3cbca88a43e789cd201edf070ed77
SHA512b2a201297fb65fdb77480315b4553c7be43e9d273dd04951a36c3bbd9ad6f29bfc738d74cfdafd96301c043f2b7243b5e4fc6ccab1f44edad8b98ad8ae26a9b4
-
Filesize
168KB
MD555e148536b96cf7b87bf573b5f3da1d1
SHA1e7ad5cef0bce14aba3d38bfefcc189f3da87ff3d
SHA256c0de614d94efc776ec414f71288103b1f1a3cbca88a43e789cd201edf070ed77
SHA512b2a201297fb65fdb77480315b4553c7be43e9d273dd04951a36c3bbd9ad6f29bfc738d74cfdafd96301c043f2b7243b5e4fc6ccab1f44edad8b98ad8ae26a9b4