Analysis
-
max time kernel
99s -
max time network
184s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2023 18:45
Static task
static1
Behavioral task
behavioral1
Sample
eef2772c37e31c9f1400ba3bb38e77922a3099771f5fcf4be669c65b9c38fdbf.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
eef2772c37e31c9f1400ba3bb38e77922a3099771f5fcf4be669c65b9c38fdbf.exe
Resource
win10v2004-20230220-en
General
-
Target
eef2772c37e31c9f1400ba3bb38e77922a3099771f5fcf4be669c65b9c38fdbf.exe
-
Size
560KB
-
MD5
be335d601e2c6e34197ce189533dabad
-
SHA1
0627bb8020d664229f3e20ed56bb996bd480ce08
-
SHA256
eef2772c37e31c9f1400ba3bb38e77922a3099771f5fcf4be669c65b9c38fdbf
-
SHA512
b2dfbba5d0578fa8d92e5496a11db6c2027c58b10a1b659683511320449ef3efe59cfa1dd7bab5521aad7d7be05150862504b60f7162071611cbeedf596fcb27
-
SSDEEP
12288:QMrLy90YmNbZ+o+kg/rfPt1ut0w5eVHNbHMH0Np:LyOVd+kgPut0w5IeHKp
Malware Config
Extracted
redline
gogen
185.161.248.75:4132
-
auth_value
dfb27ce11afd52277523c8e405853d53
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a2525353.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a2525353.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a2525353.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a2525353.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a2525353.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a2525353.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 2812 a2525353.exe 4616 d9397249.exe 4136 d9397249.exe 2004 d9397249.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a2525353.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a2525353.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce eef2772c37e31c9f1400ba3bb38e77922a3099771f5fcf4be669c65b9c38fdbf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" eef2772c37e31c9f1400ba3bb38e77922a3099771f5fcf4be669c65b9c38fdbf.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4616 set thread context of 2004 4616 d9397249.exe 86 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2812 a2525353.exe 2812 a2525353.exe 2004 d9397249.exe 2004 d9397249.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2812 a2525353.exe Token: SeDebugPrivilege 4616 d9397249.exe Token: SeDebugPrivilege 2004 d9397249.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2428 wrote to memory of 2812 2428 eef2772c37e31c9f1400ba3bb38e77922a3099771f5fcf4be669c65b9c38fdbf.exe 81 PID 2428 wrote to memory of 2812 2428 eef2772c37e31c9f1400ba3bb38e77922a3099771f5fcf4be669c65b9c38fdbf.exe 81 PID 2428 wrote to memory of 2812 2428 eef2772c37e31c9f1400ba3bb38e77922a3099771f5fcf4be669c65b9c38fdbf.exe 81 PID 2428 wrote to memory of 4616 2428 eef2772c37e31c9f1400ba3bb38e77922a3099771f5fcf4be669c65b9c38fdbf.exe 84 PID 2428 wrote to memory of 4616 2428 eef2772c37e31c9f1400ba3bb38e77922a3099771f5fcf4be669c65b9c38fdbf.exe 84 PID 2428 wrote to memory of 4616 2428 eef2772c37e31c9f1400ba3bb38e77922a3099771f5fcf4be669c65b9c38fdbf.exe 84 PID 4616 wrote to memory of 4136 4616 d9397249.exe 85 PID 4616 wrote to memory of 4136 4616 d9397249.exe 85 PID 4616 wrote to memory of 4136 4616 d9397249.exe 85 PID 4616 wrote to memory of 4136 4616 d9397249.exe 85 PID 4616 wrote to memory of 2004 4616 d9397249.exe 86 PID 4616 wrote to memory of 2004 4616 d9397249.exe 86 PID 4616 wrote to memory of 2004 4616 d9397249.exe 86 PID 4616 wrote to memory of 2004 4616 d9397249.exe 86 PID 4616 wrote to memory of 2004 4616 d9397249.exe 86 PID 4616 wrote to memory of 2004 4616 d9397249.exe 86 PID 4616 wrote to memory of 2004 4616 d9397249.exe 86 PID 4616 wrote to memory of 2004 4616 d9397249.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\eef2772c37e31c9f1400ba3bb38e77922a3099771f5fcf4be669c65b9c38fdbf.exe"C:\Users\Admin\AppData\Local\Temp\eef2772c37e31c9f1400ba3bb38e77922a3099771f5fcf4be669c65b9c38fdbf.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\a2525353.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\a2525353.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2812
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d9397249.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d9397249.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d9397249.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d9397249.exe3⤵
- Executes dropped EXE
PID:4136
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d9397249.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d9397249.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2004
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
184KB
MD5d4c640fb500618ad6c9fc5fe7d3e784d
SHA1850df0880e1685ce709b44afbbb365cab4f0fec4
SHA256a511ae2083565f7f66afa9902f2d6aaa5bdf56c8a148609bfe949880a74ff44b
SHA512a28a51e937a11c9d72f7450b86469609d972a1e65c176bf92a47922eaf9cf72d3a49f0d40702f6f22bfd3f2c9f9e36edfefecdd263e1d49f3546f44d4817cecd
-
Filesize
184KB
MD5d4c640fb500618ad6c9fc5fe7d3e784d
SHA1850df0880e1685ce709b44afbbb365cab4f0fec4
SHA256a511ae2083565f7f66afa9902f2d6aaa5bdf56c8a148609bfe949880a74ff44b
SHA512a28a51e937a11c9d72f7450b86469609d972a1e65c176bf92a47922eaf9cf72d3a49f0d40702f6f22bfd3f2c9f9e36edfefecdd263e1d49f3546f44d4817cecd
-
Filesize
904KB
MD5da1392ce8a745ff84066b4b89891c820
SHA1da95517cc9fd2904df61fbada3268ba8b074c5f1
SHA25652b27910ae22c29f0bd38aee2637554d48a65862315628dd6a27ed621a216207
SHA512bca02f85a25239e1171847ab71bf1bcbe8e1d6b54892d56c4259117db2dbf31305f9e11b8dd9f5aff1ece96830534f33e92b01e6d80f0b03022f1972b8b66570
-
Filesize
904KB
MD5da1392ce8a745ff84066b4b89891c820
SHA1da95517cc9fd2904df61fbada3268ba8b074c5f1
SHA25652b27910ae22c29f0bd38aee2637554d48a65862315628dd6a27ed621a216207
SHA512bca02f85a25239e1171847ab71bf1bcbe8e1d6b54892d56c4259117db2dbf31305f9e11b8dd9f5aff1ece96830534f33e92b01e6d80f0b03022f1972b8b66570
-
Filesize
904KB
MD5da1392ce8a745ff84066b4b89891c820
SHA1da95517cc9fd2904df61fbada3268ba8b074c5f1
SHA25652b27910ae22c29f0bd38aee2637554d48a65862315628dd6a27ed621a216207
SHA512bca02f85a25239e1171847ab71bf1bcbe8e1d6b54892d56c4259117db2dbf31305f9e11b8dd9f5aff1ece96830534f33e92b01e6d80f0b03022f1972b8b66570
-
Filesize
904KB
MD5da1392ce8a745ff84066b4b89891c820
SHA1da95517cc9fd2904df61fbada3268ba8b074c5f1
SHA25652b27910ae22c29f0bd38aee2637554d48a65862315628dd6a27ed621a216207
SHA512bca02f85a25239e1171847ab71bf1bcbe8e1d6b54892d56c4259117db2dbf31305f9e11b8dd9f5aff1ece96830534f33e92b01e6d80f0b03022f1972b8b66570