Analysis
-
max time kernel
223s -
max time network
300s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2023, 21:26
Static task
static1
Behavioral task
behavioral1
Sample
660cabd6fa9a1e9b46fbd6bf6606b38502aa583ac0636b54feb6c129d7c926bf.exe
Resource
win10v2004-20230221-en
General
-
Target
660cabd6fa9a1e9b46fbd6bf6606b38502aa583ac0636b54feb6c129d7c926bf.exe
-
Size
481KB
-
MD5
c03c1ae1cc25ac10f55bc2959980b22e
-
SHA1
804ae310cd0a1c51e9d84bf58bdc2cc9c38d18f1
-
SHA256
660cabd6fa9a1e9b46fbd6bf6606b38502aa583ac0636b54feb6c129d7c926bf
-
SHA512
21ddd40110ebf9d16a3395e5c056b56bc5e12816b8a68e41be97d37a9376a2691133c32a5e6bdead4559aba2638fbc8d2e29db538678ca3a6e8db6e5d1d9b71f
-
SSDEEP
12288:kMr1y90G1MLZ6hGZZH7mNg3/nSkeFAt3el90:pyBML/fTxeJ90
Malware Config
Extracted
redline
misar
217.196.96.101:4132
-
auth_value
069dd9eeee8cff502b661416888f692a
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a3641118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a3641118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a3641118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a3641118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a3641118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a3641118.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 4432 v1844168.exe 4212 a3641118.exe 1628 b5944876.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a3641118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a3641118.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 660cabd6fa9a1e9b46fbd6bf6606b38502aa583ac0636b54feb6c129d7c926bf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 660cabd6fa9a1e9b46fbd6bf6606b38502aa583ac0636b54feb6c129d7c926bf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v1844168.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v1844168.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4212 a3641118.exe 4212 a3641118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4212 a3641118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1416 wrote to memory of 4432 1416 660cabd6fa9a1e9b46fbd6bf6606b38502aa583ac0636b54feb6c129d7c926bf.exe 77 PID 1416 wrote to memory of 4432 1416 660cabd6fa9a1e9b46fbd6bf6606b38502aa583ac0636b54feb6c129d7c926bf.exe 77 PID 1416 wrote to memory of 4432 1416 660cabd6fa9a1e9b46fbd6bf6606b38502aa583ac0636b54feb6c129d7c926bf.exe 77 PID 4432 wrote to memory of 4212 4432 v1844168.exe 79 PID 4432 wrote to memory of 4212 4432 v1844168.exe 79 PID 4432 wrote to memory of 4212 4432 v1844168.exe 79 PID 4432 wrote to memory of 1628 4432 v1844168.exe 81 PID 4432 wrote to memory of 1628 4432 v1844168.exe 81 PID 4432 wrote to memory of 1628 4432 v1844168.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\660cabd6fa9a1e9b46fbd6bf6606b38502aa583ac0636b54feb6c129d7c926bf.exe"C:\Users\Admin\AppData\Local\Temp\660cabd6fa9a1e9b46fbd6bf6606b38502aa583ac0636b54feb6c129d7c926bf.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1844168.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1844168.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a3641118.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a3641118.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4212
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b5944876.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b5944876.exe3⤵
- Executes dropped EXE
PID:1628
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
309KB
MD54330034c2d699a9967ef44886c637e50
SHA1de63ce0cf98f48f69d850d87a72622dc10ce165e
SHA256e1e746265aac55df9d305b8a5632aa1007de38a70cd84245b3874cb843ba2725
SHA512167228c3f4bcc55492c8fdd5598dee338cf2f10e6ab08b11993263e67405cd85b4a95dddaf949e1762e78ef4d4e3f33bd068d4f910ebe128fd7b7a8edbb4d68e
-
Filesize
309KB
MD54330034c2d699a9967ef44886c637e50
SHA1de63ce0cf98f48f69d850d87a72622dc10ce165e
SHA256e1e746265aac55df9d305b8a5632aa1007de38a70cd84245b3874cb843ba2725
SHA512167228c3f4bcc55492c8fdd5598dee338cf2f10e6ab08b11993263e67405cd85b4a95dddaf949e1762e78ef4d4e3f33bd068d4f910ebe128fd7b7a8edbb4d68e
-
Filesize
178KB
MD5cabeea9f04fbea3e7f4a90911f6a25c0
SHA1a30799ab8afb89851bdd07590d2dfdad1ee83834
SHA256d2873c7912042c701c049c59142290dcabbb42d62a066cc45adf71825d961033
SHA512c3df173250819ddf8c7b9163789b0739d3dd781c622c208724db0dcfa7c85c7306b0da7055ea64441ce3af27d77b1946dfd0aac9e9ac1a38026764319e02c7d5
-
Filesize
178KB
MD5cabeea9f04fbea3e7f4a90911f6a25c0
SHA1a30799ab8afb89851bdd07590d2dfdad1ee83834
SHA256d2873c7912042c701c049c59142290dcabbb42d62a066cc45adf71825d961033
SHA512c3df173250819ddf8c7b9163789b0739d3dd781c622c208724db0dcfa7c85c7306b0da7055ea64441ce3af27d77b1946dfd0aac9e9ac1a38026764319e02c7d5
-
Filesize
168KB
MD5ede7f3e5073724236fceb603804f7c6c
SHA1413c8bb5c373534125f20b566e20ac24099796a6
SHA256a7732155a708dd56b71d14e78c6db0329ecaf4e59f6ee36e32c6b049cdac7ce7
SHA5124870d1c5404c6dfd9b1ca6edabf5f0ecc66ab95940201be83d3341dd88a6c3d16b69c7752292b184b7e0d697085970ec5ced3fcb2d54636bc08e8a8b4045e13c
-
Filesize
168KB
MD5ede7f3e5073724236fceb603804f7c6c
SHA1413c8bb5c373534125f20b566e20ac24099796a6
SHA256a7732155a708dd56b71d14e78c6db0329ecaf4e59f6ee36e32c6b049cdac7ce7
SHA5124870d1c5404c6dfd9b1ca6edabf5f0ecc66ab95940201be83d3341dd88a6c3d16b69c7752292b184b7e0d697085970ec5ced3fcb2d54636bc08e8a8b4045e13c