Analysis
-
max time kernel
138s -
max time network
196s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 20:17
Static task
static1
Behavioral task
behavioral1
Sample
060ab8886c368c3f36070b042eaa2a625f8d3206ad931b7922bb2d919a83c277.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
060ab8886c368c3f36070b042eaa2a625f8d3206ad931b7922bb2d919a83c277.exe
Resource
win10v2004-20230220-en
General
-
Target
060ab8886c368c3f36070b042eaa2a625f8d3206ad931b7922bb2d919a83c277.exe
-
Size
1.2MB
-
MD5
65801f4ca5f825e3535c9b15eebfc061
-
SHA1
fb02567098428daae54edaa035ffe8c2814e4c17
-
SHA256
060ab8886c368c3f36070b042eaa2a625f8d3206ad931b7922bb2d919a83c277
-
SHA512
4579cfdc4d81677690a9356fb3af8cd5d0f9dc2d5dea31680ab72117526d74713b8d3f196ce9c47bbb63aabd20b878620e04df289f2510f8a1d543dcb85c300d
-
SSDEEP
24576:2ynnoqpSzGXvuxaWwGkLLDwip+mEBv7K/LKATeT3Ys/Nv0oQpT62hx+MYlgo+6:FnoWAUaaWDkLLB34v7K/LKr3Xxp2hx+1
Malware Config
Extracted
redline
luser
185.161.248.73:4164
-
auth_value
cf14a84de9a3b6b7b8981202f3b616fb
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" s21247620.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" s21247620.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" s21247620.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection s21247620.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" s21247620.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" s21247620.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 1124 z20699477.exe 1212 z85031656.exe 472 z68875718.exe 1880 s21247620.exe 1584 t67257630.exe -
Loads dropped DLL 11 IoCs
pid Process 1168 060ab8886c368c3f36070b042eaa2a625f8d3206ad931b7922bb2d919a83c277.exe 1124 z20699477.exe 1124 z20699477.exe 1212 z85031656.exe 1212 z85031656.exe 472 z68875718.exe 472 z68875718.exe 472 z68875718.exe 1880 s21247620.exe 472 z68875718.exe 1584 t67257630.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features s21247620.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" s21247620.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z85031656.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z85031656.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z68875718.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z68875718.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 060ab8886c368c3f36070b042eaa2a625f8d3206ad931b7922bb2d919a83c277.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 060ab8886c368c3f36070b042eaa2a625f8d3206ad931b7922bb2d919a83c277.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z20699477.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z20699477.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1880 s21247620.exe 1880 s21247620.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1880 s21247620.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 1168 wrote to memory of 1124 1168 060ab8886c368c3f36070b042eaa2a625f8d3206ad931b7922bb2d919a83c277.exe 28 PID 1168 wrote to memory of 1124 1168 060ab8886c368c3f36070b042eaa2a625f8d3206ad931b7922bb2d919a83c277.exe 28 PID 1168 wrote to memory of 1124 1168 060ab8886c368c3f36070b042eaa2a625f8d3206ad931b7922bb2d919a83c277.exe 28 PID 1168 wrote to memory of 1124 1168 060ab8886c368c3f36070b042eaa2a625f8d3206ad931b7922bb2d919a83c277.exe 28 PID 1168 wrote to memory of 1124 1168 060ab8886c368c3f36070b042eaa2a625f8d3206ad931b7922bb2d919a83c277.exe 28 PID 1168 wrote to memory of 1124 1168 060ab8886c368c3f36070b042eaa2a625f8d3206ad931b7922bb2d919a83c277.exe 28 PID 1168 wrote to memory of 1124 1168 060ab8886c368c3f36070b042eaa2a625f8d3206ad931b7922bb2d919a83c277.exe 28 PID 1124 wrote to memory of 1212 1124 z20699477.exe 29 PID 1124 wrote to memory of 1212 1124 z20699477.exe 29 PID 1124 wrote to memory of 1212 1124 z20699477.exe 29 PID 1124 wrote to memory of 1212 1124 z20699477.exe 29 PID 1124 wrote to memory of 1212 1124 z20699477.exe 29 PID 1124 wrote to memory of 1212 1124 z20699477.exe 29 PID 1124 wrote to memory of 1212 1124 z20699477.exe 29 PID 1212 wrote to memory of 472 1212 z85031656.exe 30 PID 1212 wrote to memory of 472 1212 z85031656.exe 30 PID 1212 wrote to memory of 472 1212 z85031656.exe 30 PID 1212 wrote to memory of 472 1212 z85031656.exe 30 PID 1212 wrote to memory of 472 1212 z85031656.exe 30 PID 1212 wrote to memory of 472 1212 z85031656.exe 30 PID 1212 wrote to memory of 472 1212 z85031656.exe 30 PID 472 wrote to memory of 1880 472 z68875718.exe 31 PID 472 wrote to memory of 1880 472 z68875718.exe 31 PID 472 wrote to memory of 1880 472 z68875718.exe 31 PID 472 wrote to memory of 1880 472 z68875718.exe 31 PID 472 wrote to memory of 1880 472 z68875718.exe 31 PID 472 wrote to memory of 1880 472 z68875718.exe 31 PID 472 wrote to memory of 1880 472 z68875718.exe 31 PID 472 wrote to memory of 1584 472 z68875718.exe 32 PID 472 wrote to memory of 1584 472 z68875718.exe 32 PID 472 wrote to memory of 1584 472 z68875718.exe 32 PID 472 wrote to memory of 1584 472 z68875718.exe 32 PID 472 wrote to memory of 1584 472 z68875718.exe 32 PID 472 wrote to memory of 1584 472 z68875718.exe 32 PID 472 wrote to memory of 1584 472 z68875718.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\060ab8886c368c3f36070b042eaa2a625f8d3206ad931b7922bb2d919a83c277.exe"C:\Users\Admin\AppData\Local\Temp\060ab8886c368c3f36070b042eaa2a625f8d3206ad931b7922bb2d919a83c277.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z20699477.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z20699477.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z85031656.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z85031656.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z68875718.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z68875718.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:472 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s21247620.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s21247620.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1880
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t67257630.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t67257630.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1584
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD54b9208f0b84d3de928881709b9e336fc
SHA17023ee6dfc6f4bbc63bbd52b8856edf01e1a1e11
SHA256c3d0daab63c272d669b2351bae97199fa785062e64756a1b60236a804310add7
SHA5129d3d47c6cce3f3c3270e708ac17e87e178cfab4f021740ea1b0a7a57d55bb6a8caa7bfe388e789c28f22450ea2e0a224a112be0ed75abc46e7c456ff42d4c856
-
Filesize
1.0MB
MD54b9208f0b84d3de928881709b9e336fc
SHA17023ee6dfc6f4bbc63bbd52b8856edf01e1a1e11
SHA256c3d0daab63c272d669b2351bae97199fa785062e64756a1b60236a804310add7
SHA5129d3d47c6cce3f3c3270e708ac17e87e178cfab4f021740ea1b0a7a57d55bb6a8caa7bfe388e789c28f22450ea2e0a224a112be0ed75abc46e7c456ff42d4c856
-
Filesize
890KB
MD54de377cfeba517cbcf0588dfc209f9da
SHA112274aea5a548c5f4ba36dd8a705fd370460dc13
SHA2569e7934a27c655ad6d4b27f3ef19ee59ede73c662942fdf2733c17dc4f6ac889f
SHA512f9d094b344009513e7613b7759377ffb2e3cd1d0a140fafb39b613ec6ae13317e0d1167c885138421589f28c41b8e376c6bc062b8537e80be4749aa3e72d4087
-
Filesize
890KB
MD54de377cfeba517cbcf0588dfc209f9da
SHA112274aea5a548c5f4ba36dd8a705fd370460dc13
SHA2569e7934a27c655ad6d4b27f3ef19ee59ede73c662942fdf2733c17dc4f6ac889f
SHA512f9d094b344009513e7613b7759377ffb2e3cd1d0a140fafb39b613ec6ae13317e0d1167c885138421589f28c41b8e376c6bc062b8537e80be4749aa3e72d4087
-
Filesize
405KB
MD526e2ffd027ccf7347941d4615a29681d
SHA12cf7d03be8cecd6723d6b417ee8a36502c58d59d
SHA256f81c4fc186ead2d3e70f97468b40e232a37aceb02d8083a8a2894f334dd7ff8b
SHA512b86ce561a3988bae9d9aaaa7acdaf82ef6d3158bdca53c0480e0d7e691f63960e983e475efce2b0e0c8f1ced17a2970ac9201ffe32c033e9d526ec5a452175ea
-
Filesize
405KB
MD526e2ffd027ccf7347941d4615a29681d
SHA12cf7d03be8cecd6723d6b417ee8a36502c58d59d
SHA256f81c4fc186ead2d3e70f97468b40e232a37aceb02d8083a8a2894f334dd7ff8b
SHA512b86ce561a3988bae9d9aaaa7acdaf82ef6d3158bdca53c0480e0d7e691f63960e983e475efce2b0e0c8f1ced17a2970ac9201ffe32c033e9d526ec5a452175ea
-
Filesize
345KB
MD59c0cd4c0f978ad7ee3ec664064908df0
SHA1e19cf0835d7adad40c5da4421ad018a7d6850681
SHA2565ddba1ad7c22a300fbe7cdc2876a3d3ddb71c8d42d6f2140463f64ae355043b8
SHA512d7474fdc174cf928e1ea12af44782f780ca8500405b15fb7b88c2e1aa798589df7bc385782ec3e075f62da3184e6871a1284c2cb992f94d756342a8206465562
-
Filesize
345KB
MD59c0cd4c0f978ad7ee3ec664064908df0
SHA1e19cf0835d7adad40c5da4421ad018a7d6850681
SHA2565ddba1ad7c22a300fbe7cdc2876a3d3ddb71c8d42d6f2140463f64ae355043b8
SHA512d7474fdc174cf928e1ea12af44782f780ca8500405b15fb7b88c2e1aa798589df7bc385782ec3e075f62da3184e6871a1284c2cb992f94d756342a8206465562
-
Filesize
345KB
MD59c0cd4c0f978ad7ee3ec664064908df0
SHA1e19cf0835d7adad40c5da4421ad018a7d6850681
SHA2565ddba1ad7c22a300fbe7cdc2876a3d3ddb71c8d42d6f2140463f64ae355043b8
SHA512d7474fdc174cf928e1ea12af44782f780ca8500405b15fb7b88c2e1aa798589df7bc385782ec3e075f62da3184e6871a1284c2cb992f94d756342a8206465562
-
Filesize
168KB
MD585e192104aab95515178075adb2f6f35
SHA19d51b91cdee6204bc9fdc766ae80174629586167
SHA25647507931855261b6b875eb15a40ab81e7108e287143bf07398336cc2947a820b
SHA512e068a9c49603409eb632f54c7b8a1fd84c541943a40cbdeed392043a9fd87ff14927f91b6b729512fdea5c5f7a0b798adfec7bb631481e5444593a3263c0417a
-
Filesize
168KB
MD585e192104aab95515178075adb2f6f35
SHA19d51b91cdee6204bc9fdc766ae80174629586167
SHA25647507931855261b6b875eb15a40ab81e7108e287143bf07398336cc2947a820b
SHA512e068a9c49603409eb632f54c7b8a1fd84c541943a40cbdeed392043a9fd87ff14927f91b6b729512fdea5c5f7a0b798adfec7bb631481e5444593a3263c0417a
-
Filesize
1.0MB
MD54b9208f0b84d3de928881709b9e336fc
SHA17023ee6dfc6f4bbc63bbd52b8856edf01e1a1e11
SHA256c3d0daab63c272d669b2351bae97199fa785062e64756a1b60236a804310add7
SHA5129d3d47c6cce3f3c3270e708ac17e87e178cfab4f021740ea1b0a7a57d55bb6a8caa7bfe388e789c28f22450ea2e0a224a112be0ed75abc46e7c456ff42d4c856
-
Filesize
1.0MB
MD54b9208f0b84d3de928881709b9e336fc
SHA17023ee6dfc6f4bbc63bbd52b8856edf01e1a1e11
SHA256c3d0daab63c272d669b2351bae97199fa785062e64756a1b60236a804310add7
SHA5129d3d47c6cce3f3c3270e708ac17e87e178cfab4f021740ea1b0a7a57d55bb6a8caa7bfe388e789c28f22450ea2e0a224a112be0ed75abc46e7c456ff42d4c856
-
Filesize
890KB
MD54de377cfeba517cbcf0588dfc209f9da
SHA112274aea5a548c5f4ba36dd8a705fd370460dc13
SHA2569e7934a27c655ad6d4b27f3ef19ee59ede73c662942fdf2733c17dc4f6ac889f
SHA512f9d094b344009513e7613b7759377ffb2e3cd1d0a140fafb39b613ec6ae13317e0d1167c885138421589f28c41b8e376c6bc062b8537e80be4749aa3e72d4087
-
Filesize
890KB
MD54de377cfeba517cbcf0588dfc209f9da
SHA112274aea5a548c5f4ba36dd8a705fd370460dc13
SHA2569e7934a27c655ad6d4b27f3ef19ee59ede73c662942fdf2733c17dc4f6ac889f
SHA512f9d094b344009513e7613b7759377ffb2e3cd1d0a140fafb39b613ec6ae13317e0d1167c885138421589f28c41b8e376c6bc062b8537e80be4749aa3e72d4087
-
Filesize
405KB
MD526e2ffd027ccf7347941d4615a29681d
SHA12cf7d03be8cecd6723d6b417ee8a36502c58d59d
SHA256f81c4fc186ead2d3e70f97468b40e232a37aceb02d8083a8a2894f334dd7ff8b
SHA512b86ce561a3988bae9d9aaaa7acdaf82ef6d3158bdca53c0480e0d7e691f63960e983e475efce2b0e0c8f1ced17a2970ac9201ffe32c033e9d526ec5a452175ea
-
Filesize
405KB
MD526e2ffd027ccf7347941d4615a29681d
SHA12cf7d03be8cecd6723d6b417ee8a36502c58d59d
SHA256f81c4fc186ead2d3e70f97468b40e232a37aceb02d8083a8a2894f334dd7ff8b
SHA512b86ce561a3988bae9d9aaaa7acdaf82ef6d3158bdca53c0480e0d7e691f63960e983e475efce2b0e0c8f1ced17a2970ac9201ffe32c033e9d526ec5a452175ea
-
Filesize
345KB
MD59c0cd4c0f978ad7ee3ec664064908df0
SHA1e19cf0835d7adad40c5da4421ad018a7d6850681
SHA2565ddba1ad7c22a300fbe7cdc2876a3d3ddb71c8d42d6f2140463f64ae355043b8
SHA512d7474fdc174cf928e1ea12af44782f780ca8500405b15fb7b88c2e1aa798589df7bc385782ec3e075f62da3184e6871a1284c2cb992f94d756342a8206465562
-
Filesize
345KB
MD59c0cd4c0f978ad7ee3ec664064908df0
SHA1e19cf0835d7adad40c5da4421ad018a7d6850681
SHA2565ddba1ad7c22a300fbe7cdc2876a3d3ddb71c8d42d6f2140463f64ae355043b8
SHA512d7474fdc174cf928e1ea12af44782f780ca8500405b15fb7b88c2e1aa798589df7bc385782ec3e075f62da3184e6871a1284c2cb992f94d756342a8206465562
-
Filesize
345KB
MD59c0cd4c0f978ad7ee3ec664064908df0
SHA1e19cf0835d7adad40c5da4421ad018a7d6850681
SHA2565ddba1ad7c22a300fbe7cdc2876a3d3ddb71c8d42d6f2140463f64ae355043b8
SHA512d7474fdc174cf928e1ea12af44782f780ca8500405b15fb7b88c2e1aa798589df7bc385782ec3e075f62da3184e6871a1284c2cb992f94d756342a8206465562
-
Filesize
168KB
MD585e192104aab95515178075adb2f6f35
SHA19d51b91cdee6204bc9fdc766ae80174629586167
SHA25647507931855261b6b875eb15a40ab81e7108e287143bf07398336cc2947a820b
SHA512e068a9c49603409eb632f54c7b8a1fd84c541943a40cbdeed392043a9fd87ff14927f91b6b729512fdea5c5f7a0b798adfec7bb631481e5444593a3263c0417a
-
Filesize
168KB
MD585e192104aab95515178075adb2f6f35
SHA19d51b91cdee6204bc9fdc766ae80174629586167
SHA25647507931855261b6b875eb15a40ab81e7108e287143bf07398336cc2947a820b
SHA512e068a9c49603409eb632f54c7b8a1fd84c541943a40cbdeed392043a9fd87ff14927f91b6b729512fdea5c5f7a0b798adfec7bb631481e5444593a3263c0417a