Analysis
-
max time kernel
53s -
max time network
77s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
14-05-2023 07:45
Static task
static1
Behavioral task
behavioral1
Sample
48e8b0f87078121912097ca78e486a124e9c2d26804236f0056976db41117556.exe
Resource
win10-20230220-en
General
-
Target
48e8b0f87078121912097ca78e486a124e9c2d26804236f0056976db41117556.exe
-
Size
1.1MB
-
MD5
f76d177f5e3bb193bb125847cc01b666
-
SHA1
9b5976c773c732291078b1517875df71350622b7
-
SHA256
48e8b0f87078121912097ca78e486a124e9c2d26804236f0056976db41117556
-
SHA512
353b22432186f1e4bb849167c1745be4383f2588551262387da0b1a4a8c4d7b580bd8d12d2c94ab53861762496b4de67b68caf57b9623b14ef5f8df182f9f648
-
SSDEEP
24576:0yhieNYM9l23siBhN3Yqv5qwHzwLkpqTOmV+MK9YX8fxWuoqUcg1:DhiezO35BzII00zppLmUM6eaxWuGJ
Malware Config
Extracted
redline
luka
185.161.248.75:4132
-
auth_value
44560bcd37d6bf076da309730fdb519a
Signatures
-
Processes:
o6743327.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o6743327.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o6743327.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o6743327.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o6743327.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o6743327.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
Processes:
z0141642.exez8647142.exeo6743327.exep2614124.exepid process 3620 z0141642.exe 3940 z8647142.exe 4184 o6743327.exe 1564 p2614124.exe -
Processes:
o6743327.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features o6743327.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o6743327.exe -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
48e8b0f87078121912097ca78e486a124e9c2d26804236f0056976db41117556.exez0141642.exez8647142.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 48e8b0f87078121912097ca78e486a124e9c2d26804236f0056976db41117556.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z0141642.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z0141642.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z8647142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z8647142.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 48e8b0f87078121912097ca78e486a124e9c2d26804236f0056976db41117556.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1976 1564 WerFault.exe p2614124.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
o6743327.exepid process 4184 o6743327.exe 4184 o6743327.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
o6743327.exedescription pid process Token: SeDebugPrivilege 4184 o6743327.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
48e8b0f87078121912097ca78e486a124e9c2d26804236f0056976db41117556.exez0141642.exez8647142.exedescription pid process target process PID 3644 wrote to memory of 3620 3644 48e8b0f87078121912097ca78e486a124e9c2d26804236f0056976db41117556.exe z0141642.exe PID 3644 wrote to memory of 3620 3644 48e8b0f87078121912097ca78e486a124e9c2d26804236f0056976db41117556.exe z0141642.exe PID 3644 wrote to memory of 3620 3644 48e8b0f87078121912097ca78e486a124e9c2d26804236f0056976db41117556.exe z0141642.exe PID 3620 wrote to memory of 3940 3620 z0141642.exe z8647142.exe PID 3620 wrote to memory of 3940 3620 z0141642.exe z8647142.exe PID 3620 wrote to memory of 3940 3620 z0141642.exe z8647142.exe PID 3940 wrote to memory of 4184 3940 z8647142.exe o6743327.exe PID 3940 wrote to memory of 4184 3940 z8647142.exe o6743327.exe PID 3940 wrote to memory of 4184 3940 z8647142.exe o6743327.exe PID 3940 wrote to memory of 1564 3940 z8647142.exe p2614124.exe PID 3940 wrote to memory of 1564 3940 z8647142.exe p2614124.exe PID 3940 wrote to memory of 1564 3940 z8647142.exe p2614124.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\48e8b0f87078121912097ca78e486a124e9c2d26804236f0056976db41117556.exe"C:\Users\Admin\AppData\Local\Temp\48e8b0f87078121912097ca78e486a124e9c2d26804236f0056976db41117556.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0141642.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0141642.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8647142.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8647142.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o6743327.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o6743327.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p2614124.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p2614124.exe4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1564 -s 9485⤵
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0141642.exeFilesize
703KB
MD5b869bc1161b8a736bc5e5e7db1f3033b
SHA1ed7acea69f8ce3a8ef6d17bbb8de0c194c3eb1b6
SHA25650e3ee4977cd206e57bed9b0cb02ea7a9cf83c09713f678641087b0a76ec53df
SHA5127c8ea7d0583a9346e83b79c703c055d3edae46fac98dfb900da8e2e97d956e075f426c572e8aee78c8b8c94ca3140e6cdf868812a31c9da84a06b48a69e0d483
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0141642.exeFilesize
703KB
MD5b869bc1161b8a736bc5e5e7db1f3033b
SHA1ed7acea69f8ce3a8ef6d17bbb8de0c194c3eb1b6
SHA25650e3ee4977cd206e57bed9b0cb02ea7a9cf83c09713f678641087b0a76ec53df
SHA5127c8ea7d0583a9346e83b79c703c055d3edae46fac98dfb900da8e2e97d956e075f426c572e8aee78c8b8c94ca3140e6cdf868812a31c9da84a06b48a69e0d483
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8647142.exeFilesize
306KB
MD5a4f53bf0a001c19840cb010c5db5659a
SHA1c6ccbaa8fd1ee6e0b021278bc2ea3358c74ce4ac
SHA256355542b6f2394d4e95d2bb59bb8e0c73e732f9a54c2649255da7c433eac694b2
SHA5125c57797822f75785a7d5e7b837520b557216e35adb1ec9730d0213c1ecaead1e3294a718f6e62757c88b0f943cddab4c4c525fd69ac5e4a434cb3a642f57a81b
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8647142.exeFilesize
306KB
MD5a4f53bf0a001c19840cb010c5db5659a
SHA1c6ccbaa8fd1ee6e0b021278bc2ea3358c74ce4ac
SHA256355542b6f2394d4e95d2bb59bb8e0c73e732f9a54c2649255da7c433eac694b2
SHA5125c57797822f75785a7d5e7b837520b557216e35adb1ec9730d0213c1ecaead1e3294a718f6e62757c88b0f943cddab4c4c525fd69ac5e4a434cb3a642f57a81b
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o6743327.exeFilesize
185KB
MD590447743d656682dfaef9e78c4e1a20a
SHA15c4fff1896062de496f3af03b79833b6f5b18de4
SHA2561c629f4d91e21debf2821b23f6dab175e6759101368c7d8b479c930d89775f66
SHA5122f65de40b3b7b14878fed705191d17d91b6ce0bc18c84d62829a687b1151e6dd12ccb50bbe57893acd6710fcb1c122c37fa388e47170027870582857fef909df
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o6743327.exeFilesize
185KB
MD590447743d656682dfaef9e78c4e1a20a
SHA15c4fff1896062de496f3af03b79833b6f5b18de4
SHA2561c629f4d91e21debf2821b23f6dab175e6759101368c7d8b479c930d89775f66
SHA5122f65de40b3b7b14878fed705191d17d91b6ce0bc18c84d62829a687b1151e6dd12ccb50bbe57893acd6710fcb1c122c37fa388e47170027870582857fef909df
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p2614124.exeFilesize
145KB
MD5ea30b7e08f47c102df1c205e813d2fe3
SHA1a7f6e54dea48bcb41c29330bd5fa3eff60612c6e
SHA256221858cc24d61d6e0f10f7e2e7a2e290c0807cbe2ea6122208b87b546a26662b
SHA5129c7f6a7e96b888db91cbc7648c072fefa78c6c6b45ff244b77b656f9a9ae846e45933c7cd74e453210fdf65897d3deb2180c89770cf0bccf86a350d8776fc857
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p2614124.exeFilesize
145KB
MD5ea30b7e08f47c102df1c205e813d2fe3
SHA1a7f6e54dea48bcb41c29330bd5fa3eff60612c6e
SHA256221858cc24d61d6e0f10f7e2e7a2e290c0807cbe2ea6122208b87b546a26662b
SHA5129c7f6a7e96b888db91cbc7648c072fefa78c6c6b45ff244b77b656f9a9ae846e45933c7cd74e453210fdf65897d3deb2180c89770cf0bccf86a350d8776fc857
-
memory/1564-179-0x0000000000060000-0x000000000008A000-memory.dmpFilesize
168KB
-
memory/4184-154-0x0000000004A80000-0x0000000004A96000-memory.dmpFilesize
88KB
-
memory/4184-162-0x0000000004A80000-0x0000000004A96000-memory.dmpFilesize
88KB
-
memory/4184-144-0x0000000004A80000-0x0000000004A96000-memory.dmpFilesize
88KB
-
memory/4184-146-0x0000000004A80000-0x0000000004A96000-memory.dmpFilesize
88KB
-
memory/4184-148-0x0000000004A80000-0x0000000004A96000-memory.dmpFilesize
88KB
-
memory/4184-150-0x0000000004A80000-0x0000000004A96000-memory.dmpFilesize
88KB
-
memory/4184-152-0x0000000004A80000-0x0000000004A96000-memory.dmpFilesize
88KB
-
memory/4184-141-0x0000000004A80000-0x0000000004A96000-memory.dmpFilesize
88KB
-
memory/4184-156-0x0000000004A80000-0x0000000004A96000-memory.dmpFilesize
88KB
-
memory/4184-158-0x0000000004A80000-0x0000000004A96000-memory.dmpFilesize
88KB
-
memory/4184-160-0x0000000004A80000-0x0000000004A96000-memory.dmpFilesize
88KB
-
memory/4184-142-0x0000000004A80000-0x0000000004A96000-memory.dmpFilesize
88KB
-
memory/4184-164-0x0000000004A80000-0x0000000004A96000-memory.dmpFilesize
88KB
-
memory/4184-165-0x0000000004BB0000-0x0000000004BC0000-memory.dmpFilesize
64KB
-
memory/4184-169-0x0000000004BB0000-0x0000000004BC0000-memory.dmpFilesize
64KB
-
memory/4184-168-0x0000000004A80000-0x0000000004A96000-memory.dmpFilesize
88KB
-
memory/4184-166-0x0000000004BB0000-0x0000000004BC0000-memory.dmpFilesize
64KB
-
memory/4184-171-0x0000000004A80000-0x0000000004A96000-memory.dmpFilesize
88KB
-
memory/4184-172-0x0000000004BB0000-0x0000000004BC0000-memory.dmpFilesize
64KB
-
memory/4184-173-0x0000000004BB0000-0x0000000004BC0000-memory.dmpFilesize
64KB
-
memory/4184-175-0x0000000004BB0000-0x0000000004BC0000-memory.dmpFilesize
64KB
-
memory/4184-140-0x0000000004A80000-0x0000000004A9C000-memory.dmpFilesize
112KB
-
memory/4184-139-0x0000000004BC0000-0x00000000050BE000-memory.dmpFilesize
5.0MB
-
memory/4184-138-0x00000000023C0000-0x00000000023DE000-memory.dmpFilesize
120KB