Analysis
-
max time kernel
50s -
max time network
80s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
14-05-2023 22:27
Static task
static1
Behavioral task
behavioral1
Sample
12455cae9af9c264db3f442cea9cd2d98fbd4dbfc848cf057c2d1887b096a4ad.exe
Resource
win10-20230220-en
General
-
Target
12455cae9af9c264db3f442cea9cd2d98fbd4dbfc848cf057c2d1887b096a4ad.exe
-
Size
1.1MB
-
MD5
ee4858b7695196b59c69b07af1dfe581
-
SHA1
2441ca84794e25c5bc1abcef519f127290960ed4
-
SHA256
12455cae9af9c264db3f442cea9cd2d98fbd4dbfc848cf057c2d1887b096a4ad
-
SHA512
1f42e2445e3ffb7ae8a31f06d10c79097d7336d1e502ce627fe106ee0f0d66ad63fa61e0c1b7d332c62e63d31fecd2d5671899d5635af390c28edefee27c3c4e
-
SSDEEP
24576:jyaXcn0DJrSo6+5oNdY6Fypw9LRHxNP0JvPJ2RYT:2aXXDJ36fNlGwHHnmP
Malware Config
Extracted
redline
linda
185.161.248.75:4132
-
auth_value
21cdc21d041667b9c1679f88a1146770
Signatures
-
Processes:
o1719170.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o1719170.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o1719170.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o1719170.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o1719170.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o1719170.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
Processes:
z9104309.exez6978076.exeo1719170.exep3331935.exepid process 3320 z9104309.exe 3572 z6978076.exe 304 o1719170.exe 4180 p3331935.exe -
Processes:
o1719170.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features o1719170.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o1719170.exe -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
z6978076.exe12455cae9af9c264db3f442cea9cd2d98fbd4dbfc848cf057c2d1887b096a4ad.exez9104309.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z6978076.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 12455cae9af9c264db3f442cea9cd2d98fbd4dbfc848cf057c2d1887b096a4ad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 12455cae9af9c264db3f442cea9cd2d98fbd4dbfc848cf057c2d1887b096a4ad.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z9104309.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z9104309.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z6978076.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4720 4180 WerFault.exe p3331935.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
o1719170.exepid process 304 o1719170.exe 304 o1719170.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
o1719170.exedescription pid process Token: SeDebugPrivilege 304 o1719170.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
12455cae9af9c264db3f442cea9cd2d98fbd4dbfc848cf057c2d1887b096a4ad.exez9104309.exez6978076.exedescription pid process target process PID 3228 wrote to memory of 3320 3228 12455cae9af9c264db3f442cea9cd2d98fbd4dbfc848cf057c2d1887b096a4ad.exe z9104309.exe PID 3228 wrote to memory of 3320 3228 12455cae9af9c264db3f442cea9cd2d98fbd4dbfc848cf057c2d1887b096a4ad.exe z9104309.exe PID 3228 wrote to memory of 3320 3228 12455cae9af9c264db3f442cea9cd2d98fbd4dbfc848cf057c2d1887b096a4ad.exe z9104309.exe PID 3320 wrote to memory of 3572 3320 z9104309.exe z6978076.exe PID 3320 wrote to memory of 3572 3320 z9104309.exe z6978076.exe PID 3320 wrote to memory of 3572 3320 z9104309.exe z6978076.exe PID 3572 wrote to memory of 304 3572 z6978076.exe o1719170.exe PID 3572 wrote to memory of 304 3572 z6978076.exe o1719170.exe PID 3572 wrote to memory of 304 3572 z6978076.exe o1719170.exe PID 3572 wrote to memory of 4180 3572 z6978076.exe p3331935.exe PID 3572 wrote to memory of 4180 3572 z6978076.exe p3331935.exe PID 3572 wrote to memory of 4180 3572 z6978076.exe p3331935.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\12455cae9af9c264db3f442cea9cd2d98fbd4dbfc848cf057c2d1887b096a4ad.exe"C:\Users\Admin\AppData\Local\Temp\12455cae9af9c264db3f442cea9cd2d98fbd4dbfc848cf057c2d1887b096a4ad.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9104309.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9104309.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6978076.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6978076.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o1719170.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o1719170.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p3331935.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p3331935.exe4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4180 -s 9485⤵
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9104309.exeFilesize
702KB
MD5d05236908d1e391ce78261c051611e8a
SHA132aba3b80a390916116134f25c060171064b3407
SHA256468f4b35f751709a6a9cdf65137eb68ac2548136223be524cabf37efdadbc454
SHA51263df616e43f93676872088500f1097557767130b576b0a42d0f629392a441c4dc711ad86356c9b0334860d64b198b6d0d0770c680b05a47a0f6d1922ed267cb5
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9104309.exeFilesize
702KB
MD5d05236908d1e391ce78261c051611e8a
SHA132aba3b80a390916116134f25c060171064b3407
SHA256468f4b35f751709a6a9cdf65137eb68ac2548136223be524cabf37efdadbc454
SHA51263df616e43f93676872088500f1097557767130b576b0a42d0f629392a441c4dc711ad86356c9b0334860d64b198b6d0d0770c680b05a47a0f6d1922ed267cb5
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6978076.exeFilesize
305KB
MD53324aa3c05a95797854dd6ff8e422988
SHA1904943a9dd27889ab93e4054a2cbf444dfd4c195
SHA256344eb883378f5fd9a40dc0cd44a0867509b749c87af41032262799083c806710
SHA512d9d468186bc927f6438aadd646c58c3154f199bd48d2146cfaa12850dc3ac5c1f7305d8f9c554f1ee6e2307c1884afc50eeea61ff6e3cec8c24ba93d9f65601d
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6978076.exeFilesize
305KB
MD53324aa3c05a95797854dd6ff8e422988
SHA1904943a9dd27889ab93e4054a2cbf444dfd4c195
SHA256344eb883378f5fd9a40dc0cd44a0867509b749c87af41032262799083c806710
SHA512d9d468186bc927f6438aadd646c58c3154f199bd48d2146cfaa12850dc3ac5c1f7305d8f9c554f1ee6e2307c1884afc50eeea61ff6e3cec8c24ba93d9f65601d
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o1719170.exeFilesize
184KB
MD5e5bc81908e3a074591141dbcac50e7be
SHA189adb97da8bede6e399db14403ee5c6c0301c02e
SHA256ce1a31f50fd5d35c239fd74c3af27e9f598b9f11494841a183dce06019525bcf
SHA5126aaeb5023132de18677441593613df9e2e387ea3081b92a56d4a89fef369a6c2e8fe9a9ec93baf1ecc80a97db0c395855f5b98755811a5a018579c5fe0741326
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o1719170.exeFilesize
184KB
MD5e5bc81908e3a074591141dbcac50e7be
SHA189adb97da8bede6e399db14403ee5c6c0301c02e
SHA256ce1a31f50fd5d35c239fd74c3af27e9f598b9f11494841a183dce06019525bcf
SHA5126aaeb5023132de18677441593613df9e2e387ea3081b92a56d4a89fef369a6c2e8fe9a9ec93baf1ecc80a97db0c395855f5b98755811a5a018579c5fe0741326
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p3331935.exeFilesize
145KB
MD514c285308b87ebac4aee954e2de4515f
SHA117dec2f13a9cd490e04c91c227034ac45759a70d
SHA256e885e41eec2c23af3fb579789ea431a87cec523e4dddf106168f7c37435c7c8a
SHA51254aebd04a372763afa6f9754756df86bb8b8c101e9928b0998278dbd0bafaf18eae5b696eb6c4a26b7c5997be158952dcd79b0be865393128e28f22e5792f757
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p3331935.exeFilesize
145KB
MD514c285308b87ebac4aee954e2de4515f
SHA117dec2f13a9cd490e04c91c227034ac45759a70d
SHA256e885e41eec2c23af3fb579789ea431a87cec523e4dddf106168f7c37435c7c8a
SHA51254aebd04a372763afa6f9754756df86bb8b8c101e9928b0998278dbd0bafaf18eae5b696eb6c4a26b7c5997be158952dcd79b0be865393128e28f22e5792f757
-
memory/304-155-0x0000000004930000-0x0000000004946000-memory.dmpFilesize
88KB
-
memory/304-161-0x0000000004930000-0x0000000004946000-memory.dmpFilesize
88KB
-
memory/304-146-0x0000000004AE0000-0x0000000004AF0000-memory.dmpFilesize
64KB
-
memory/304-147-0x0000000004930000-0x000000000494C000-memory.dmpFilesize
112KB
-
memory/304-148-0x0000000004930000-0x0000000004946000-memory.dmpFilesize
88KB
-
memory/304-149-0x0000000004930000-0x0000000004946000-memory.dmpFilesize
88KB
-
memory/304-151-0x0000000004930000-0x0000000004946000-memory.dmpFilesize
88KB
-
memory/304-153-0x0000000004930000-0x0000000004946000-memory.dmpFilesize
88KB
-
memory/304-144-0x0000000004AE0000-0x0000000004AF0000-memory.dmpFilesize
64KB
-
memory/304-157-0x0000000004930000-0x0000000004946000-memory.dmpFilesize
88KB
-
memory/304-159-0x0000000004930000-0x0000000004946000-memory.dmpFilesize
88KB
-
memory/304-145-0x0000000004AE0000-0x0000000004AF0000-memory.dmpFilesize
64KB
-
memory/304-163-0x0000000004930000-0x0000000004946000-memory.dmpFilesize
88KB
-
memory/304-165-0x0000000004930000-0x0000000004946000-memory.dmpFilesize
88KB
-
memory/304-167-0x0000000004930000-0x0000000004946000-memory.dmpFilesize
88KB
-
memory/304-169-0x0000000004930000-0x0000000004946000-memory.dmpFilesize
88KB
-
memory/304-171-0x0000000004930000-0x0000000004946000-memory.dmpFilesize
88KB
-
memory/304-173-0x0000000004930000-0x0000000004946000-memory.dmpFilesize
88KB
-
memory/304-175-0x0000000004930000-0x0000000004946000-memory.dmpFilesize
88KB
-
memory/304-176-0x0000000004AE0000-0x0000000004AF0000-memory.dmpFilesize
64KB
-
memory/304-177-0x0000000004AE0000-0x0000000004AF0000-memory.dmpFilesize
64KB
-
memory/304-143-0x0000000004AF0000-0x0000000004FEE000-memory.dmpFilesize
5.0MB
-
memory/304-142-0x00000000020F0000-0x000000000210E000-memory.dmpFilesize
120KB
-
memory/4180-182-0x0000000000630000-0x000000000065A000-memory.dmpFilesize
168KB