Analysis
-
max time kernel
254s -
max time network
359s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 20:38
Static task
static1
Behavioral task
behavioral1
Sample
154962abe08848cc48cbad311ef38d9e71c57fa4fece8d2dd98171a18b1d2203.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
154962abe08848cc48cbad311ef38d9e71c57fa4fece8d2dd98171a18b1d2203.exe
Resource
win10v2004-20230220-en
General
-
Target
154962abe08848cc48cbad311ef38d9e71c57fa4fece8d2dd98171a18b1d2203.exe
-
Size
913KB
-
MD5
25daf43e2336c7198fdc12e06b9ad188
-
SHA1
58655b18a18aa6649c30544961a493bb91db610c
-
SHA256
154962abe08848cc48cbad311ef38d9e71c57fa4fece8d2dd98171a18b1d2203
-
SHA512
06ba028df9698cc42a87c1fac58e686f7c8fd58da7bde98bec48463d8f56a81547668a7eefe677be15300b299ce3c93d3d779a3ed4533e1c0aa7d2dffe7187a0
-
SSDEEP
12288:vy90vqM2eTow2Z/428KHtNKoAFcjEQ2dj5FVBK1RvPXAQvOQixmCPDGocgRG228n:vyoqM2a2aQtQKEQIFK1RroQkGoc0aoH
Malware Config
Extracted
redline
dark
185.161.248.73:4164
-
auth_value
ae85b01f66afe8770afeed560513fc2d
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 652 st344482.exe 1900 80754707.exe 864 1.exe 1796 kp848729.exe 1840 lr830211.exe -
Loads dropped DLL 10 IoCs
pid Process 1580 154962abe08848cc48cbad311ef38d9e71c57fa4fece8d2dd98171a18b1d2203.exe 652 st344482.exe 652 st344482.exe 1900 80754707.exe 1900 80754707.exe 652 st344482.exe 652 st344482.exe 1796 kp848729.exe 1580 154962abe08848cc48cbad311ef38d9e71c57fa4fece8d2dd98171a18b1d2203.exe 1840 lr830211.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features 1.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 154962abe08848cc48cbad311ef38d9e71c57fa4fece8d2dd98171a18b1d2203.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 154962abe08848cc48cbad311ef38d9e71c57fa4fece8d2dd98171a18b1d2203.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce st344482.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st344482.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 864 1.exe 864 1.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1900 80754707.exe Token: SeDebugPrivilege 1796 kp848729.exe Token: SeDebugPrivilege 864 1.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 1580 wrote to memory of 652 1580 154962abe08848cc48cbad311ef38d9e71c57fa4fece8d2dd98171a18b1d2203.exe 28 PID 1580 wrote to memory of 652 1580 154962abe08848cc48cbad311ef38d9e71c57fa4fece8d2dd98171a18b1d2203.exe 28 PID 1580 wrote to memory of 652 1580 154962abe08848cc48cbad311ef38d9e71c57fa4fece8d2dd98171a18b1d2203.exe 28 PID 1580 wrote to memory of 652 1580 154962abe08848cc48cbad311ef38d9e71c57fa4fece8d2dd98171a18b1d2203.exe 28 PID 1580 wrote to memory of 652 1580 154962abe08848cc48cbad311ef38d9e71c57fa4fece8d2dd98171a18b1d2203.exe 28 PID 1580 wrote to memory of 652 1580 154962abe08848cc48cbad311ef38d9e71c57fa4fece8d2dd98171a18b1d2203.exe 28 PID 1580 wrote to memory of 652 1580 154962abe08848cc48cbad311ef38d9e71c57fa4fece8d2dd98171a18b1d2203.exe 28 PID 652 wrote to memory of 1900 652 st344482.exe 29 PID 652 wrote to memory of 1900 652 st344482.exe 29 PID 652 wrote to memory of 1900 652 st344482.exe 29 PID 652 wrote to memory of 1900 652 st344482.exe 29 PID 652 wrote to memory of 1900 652 st344482.exe 29 PID 652 wrote to memory of 1900 652 st344482.exe 29 PID 652 wrote to memory of 1900 652 st344482.exe 29 PID 1900 wrote to memory of 864 1900 80754707.exe 30 PID 1900 wrote to memory of 864 1900 80754707.exe 30 PID 1900 wrote to memory of 864 1900 80754707.exe 30 PID 1900 wrote to memory of 864 1900 80754707.exe 30 PID 1900 wrote to memory of 864 1900 80754707.exe 30 PID 1900 wrote to memory of 864 1900 80754707.exe 30 PID 1900 wrote to memory of 864 1900 80754707.exe 30 PID 652 wrote to memory of 1796 652 st344482.exe 31 PID 652 wrote to memory of 1796 652 st344482.exe 31 PID 652 wrote to memory of 1796 652 st344482.exe 31 PID 652 wrote to memory of 1796 652 st344482.exe 31 PID 652 wrote to memory of 1796 652 st344482.exe 31 PID 652 wrote to memory of 1796 652 st344482.exe 31 PID 652 wrote to memory of 1796 652 st344482.exe 31 PID 1580 wrote to memory of 1840 1580 154962abe08848cc48cbad311ef38d9e71c57fa4fece8d2dd98171a18b1d2203.exe 32 PID 1580 wrote to memory of 1840 1580 154962abe08848cc48cbad311ef38d9e71c57fa4fece8d2dd98171a18b1d2203.exe 32 PID 1580 wrote to memory of 1840 1580 154962abe08848cc48cbad311ef38d9e71c57fa4fece8d2dd98171a18b1d2203.exe 32 PID 1580 wrote to memory of 1840 1580 154962abe08848cc48cbad311ef38d9e71c57fa4fece8d2dd98171a18b1d2203.exe 32 PID 1580 wrote to memory of 1840 1580 154962abe08848cc48cbad311ef38d9e71c57fa4fece8d2dd98171a18b1d2203.exe 32 PID 1580 wrote to memory of 1840 1580 154962abe08848cc48cbad311ef38d9e71c57fa4fece8d2dd98171a18b1d2203.exe 32 PID 1580 wrote to memory of 1840 1580 154962abe08848cc48cbad311ef38d9e71c57fa4fece8d2dd98171a18b1d2203.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\154962abe08848cc48cbad311ef38d9e71c57fa4fece8d2dd98171a18b1d2203.exe"C:\Users\Admin\AppData\Local\Temp\154962abe08848cc48cbad311ef38d9e71c57fa4fece8d2dd98171a18b1d2203.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st344482.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st344482.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\80754707.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\80754707.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:864
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp848729.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp848729.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1796
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr830211.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr830211.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1840
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD516cf18c8ef1d4be89b36e27c8fb88e9d
SHA17811ba84f75a1adc6d995c2c1121ec996d1cc003
SHA256116156cc3af0bf4d81d9b2fba83c569cf9f4c9055b9c9cd5731538de036417e8
SHA5124cb9e29db63d28c802c7c1799fd53e00b5facdc0b63d08b76d619c7a9be6cc06f11c0d435ad035bf3f9c3c96687e03e5157ae2ce7494a621c0762bc8083d9fbd
-
Filesize
168KB
MD516cf18c8ef1d4be89b36e27c8fb88e9d
SHA17811ba84f75a1adc6d995c2c1121ec996d1cc003
SHA256116156cc3af0bf4d81d9b2fba83c569cf9f4c9055b9c9cd5731538de036417e8
SHA5124cb9e29db63d28c802c7c1799fd53e00b5facdc0b63d08b76d619c7a9be6cc06f11c0d435ad035bf3f9c3c96687e03e5157ae2ce7494a621c0762bc8083d9fbd
-
Filesize
759KB
MD558fc918d3ad3aa09b803e023814a67df
SHA172ec9b0946e8a3b571ff3393c47ad748beb8a59a
SHA256f8060841e80fc96c0f164cacb84781a1a7b5df43f8b4c7949441a00c84a98aef
SHA512c9524defa506a9194b723bc6f0caec9a6bd1afb93d91bf709c462a136a3cf42687daecd4f33ed027ba7946cdf0f54d726e5a6a0a64cae8e96ae0109ebc4e8092
-
Filesize
759KB
MD558fc918d3ad3aa09b803e023814a67df
SHA172ec9b0946e8a3b571ff3393c47ad748beb8a59a
SHA256f8060841e80fc96c0f164cacb84781a1a7b5df43f8b4c7949441a00c84a98aef
SHA512c9524defa506a9194b723bc6f0caec9a6bd1afb93d91bf709c462a136a3cf42687daecd4f33ed027ba7946cdf0f54d726e5a6a0a64cae8e96ae0109ebc4e8092
-
Filesize
300KB
MD57b4a3bf86d2ecb08db739b835de75fc3
SHA1f13d48c006a0f3c6b7bc560e48564efce3dbad8c
SHA256c248c228ce266449a91206682e57af853f63fb14ad79c5901690c8a595b6a9fc
SHA512cc0f978b9eef5167d2939845105a6a079b515c6ec605302f72ebfa723af8c7c34cc597e0eec213809bfa024e70762d149675d25fd4419eacda030453ce95625f
-
Filesize
300KB
MD57b4a3bf86d2ecb08db739b835de75fc3
SHA1f13d48c006a0f3c6b7bc560e48564efce3dbad8c
SHA256c248c228ce266449a91206682e57af853f63fb14ad79c5901690c8a595b6a9fc
SHA512cc0f978b9eef5167d2939845105a6a079b515c6ec605302f72ebfa723af8c7c34cc597e0eec213809bfa024e70762d149675d25fd4419eacda030453ce95625f
-
Filesize
538KB
MD59259ba9f582f5e6e9f731ad87550351b
SHA12a9bda03fa3115f2b0208177ee9eb6af0af79c78
SHA256cf7b82cb5c02d068a3b6c6023bed6e5ccc7b8aecf48d785f3901c70d0c062a7f
SHA5129bfc0c811a202983db72c3d8406c3ca1447331100a38b6f58b3eec292a67321821b6552b8858b6f5ea765910d85cb4b7a0d7883cb483aff8edabb8f4ba870107
-
Filesize
538KB
MD59259ba9f582f5e6e9f731ad87550351b
SHA12a9bda03fa3115f2b0208177ee9eb6af0af79c78
SHA256cf7b82cb5c02d068a3b6c6023bed6e5ccc7b8aecf48d785f3901c70d0c062a7f
SHA5129bfc0c811a202983db72c3d8406c3ca1447331100a38b6f58b3eec292a67321821b6552b8858b6f5ea765910d85cb4b7a0d7883cb483aff8edabb8f4ba870107
-
Filesize
538KB
MD59259ba9f582f5e6e9f731ad87550351b
SHA12a9bda03fa3115f2b0208177ee9eb6af0af79c78
SHA256cf7b82cb5c02d068a3b6c6023bed6e5ccc7b8aecf48d785f3901c70d0c062a7f
SHA5129bfc0c811a202983db72c3d8406c3ca1447331100a38b6f58b3eec292a67321821b6552b8858b6f5ea765910d85cb4b7a0d7883cb483aff8edabb8f4ba870107
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
168KB
MD516cf18c8ef1d4be89b36e27c8fb88e9d
SHA17811ba84f75a1adc6d995c2c1121ec996d1cc003
SHA256116156cc3af0bf4d81d9b2fba83c569cf9f4c9055b9c9cd5731538de036417e8
SHA5124cb9e29db63d28c802c7c1799fd53e00b5facdc0b63d08b76d619c7a9be6cc06f11c0d435ad035bf3f9c3c96687e03e5157ae2ce7494a621c0762bc8083d9fbd
-
Filesize
168KB
MD516cf18c8ef1d4be89b36e27c8fb88e9d
SHA17811ba84f75a1adc6d995c2c1121ec996d1cc003
SHA256116156cc3af0bf4d81d9b2fba83c569cf9f4c9055b9c9cd5731538de036417e8
SHA5124cb9e29db63d28c802c7c1799fd53e00b5facdc0b63d08b76d619c7a9be6cc06f11c0d435ad035bf3f9c3c96687e03e5157ae2ce7494a621c0762bc8083d9fbd
-
Filesize
759KB
MD558fc918d3ad3aa09b803e023814a67df
SHA172ec9b0946e8a3b571ff3393c47ad748beb8a59a
SHA256f8060841e80fc96c0f164cacb84781a1a7b5df43f8b4c7949441a00c84a98aef
SHA512c9524defa506a9194b723bc6f0caec9a6bd1afb93d91bf709c462a136a3cf42687daecd4f33ed027ba7946cdf0f54d726e5a6a0a64cae8e96ae0109ebc4e8092
-
Filesize
759KB
MD558fc918d3ad3aa09b803e023814a67df
SHA172ec9b0946e8a3b571ff3393c47ad748beb8a59a
SHA256f8060841e80fc96c0f164cacb84781a1a7b5df43f8b4c7949441a00c84a98aef
SHA512c9524defa506a9194b723bc6f0caec9a6bd1afb93d91bf709c462a136a3cf42687daecd4f33ed027ba7946cdf0f54d726e5a6a0a64cae8e96ae0109ebc4e8092
-
Filesize
300KB
MD57b4a3bf86d2ecb08db739b835de75fc3
SHA1f13d48c006a0f3c6b7bc560e48564efce3dbad8c
SHA256c248c228ce266449a91206682e57af853f63fb14ad79c5901690c8a595b6a9fc
SHA512cc0f978b9eef5167d2939845105a6a079b515c6ec605302f72ebfa723af8c7c34cc597e0eec213809bfa024e70762d149675d25fd4419eacda030453ce95625f
-
Filesize
300KB
MD57b4a3bf86d2ecb08db739b835de75fc3
SHA1f13d48c006a0f3c6b7bc560e48564efce3dbad8c
SHA256c248c228ce266449a91206682e57af853f63fb14ad79c5901690c8a595b6a9fc
SHA512cc0f978b9eef5167d2939845105a6a079b515c6ec605302f72ebfa723af8c7c34cc597e0eec213809bfa024e70762d149675d25fd4419eacda030453ce95625f
-
Filesize
538KB
MD59259ba9f582f5e6e9f731ad87550351b
SHA12a9bda03fa3115f2b0208177ee9eb6af0af79c78
SHA256cf7b82cb5c02d068a3b6c6023bed6e5ccc7b8aecf48d785f3901c70d0c062a7f
SHA5129bfc0c811a202983db72c3d8406c3ca1447331100a38b6f58b3eec292a67321821b6552b8858b6f5ea765910d85cb4b7a0d7883cb483aff8edabb8f4ba870107
-
Filesize
538KB
MD59259ba9f582f5e6e9f731ad87550351b
SHA12a9bda03fa3115f2b0208177ee9eb6af0af79c78
SHA256cf7b82cb5c02d068a3b6c6023bed6e5ccc7b8aecf48d785f3901c70d0c062a7f
SHA5129bfc0c811a202983db72c3d8406c3ca1447331100a38b6f58b3eec292a67321821b6552b8858b6f5ea765910d85cb4b7a0d7883cb483aff8edabb8f4ba870107
-
Filesize
538KB
MD59259ba9f582f5e6e9f731ad87550351b
SHA12a9bda03fa3115f2b0208177ee9eb6af0af79c78
SHA256cf7b82cb5c02d068a3b6c6023bed6e5ccc7b8aecf48d785f3901c70d0c062a7f
SHA5129bfc0c811a202983db72c3d8406c3ca1447331100a38b6f58b3eec292a67321821b6552b8858b6f5ea765910d85cb4b7a0d7883cb483aff8edabb8f4ba870107
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91