Analysis
-
max time kernel
54s -
max time network
77s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
14-05-2023 07:52
Static task
static1
Behavioral task
behavioral1
Sample
0865a79156e8aba94b0cdf71d1591fb77440978e6d5f25d081295cf73f289c3b.exe
Resource
win10-20230220-en
General
-
Target
0865a79156e8aba94b0cdf71d1591fb77440978e6d5f25d081295cf73f289c3b.exe
-
Size
1.1MB
-
MD5
52e2ba600f2f79ba0195280b8b3affc0
-
SHA1
325c33cf51f02929b057cea2ed5b46226dbc094a
-
SHA256
0865a79156e8aba94b0cdf71d1591fb77440978e6d5f25d081295cf73f289c3b
-
SHA512
023d77cc9abf0c8556afe31bd82c7bc1e8a763ed3de890e40ca848b97f5368268617a4c48e4fb5ee1494522d1f83d8e7848a8748e3888f8df3c97d3da95f7bba
-
SSDEEP
24576:AySRg6AY6JdkaBWIK7SPqRiK0iMHxMwFLLa39GwnRfazVQNQSF:HSpNceaAFWAiK0Ta6L1wMcQ
Malware Config
Extracted
redline
luka
185.161.248.75:4132
-
auth_value
44560bcd37d6bf076da309730fdb519a
Signatures
-
Processes:
o6907283.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o6907283.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o6907283.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o6907283.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o6907283.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o6907283.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
Processes:
z8725304.exez4362033.exeo6907283.exep0001990.exepid process 3932 z8725304.exe 3748 z4362033.exe 4148 o6907283.exe 2104 p0001990.exe -
Processes:
o6907283.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features o6907283.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o6907283.exe -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
z8725304.exez4362033.exe0865a79156e8aba94b0cdf71d1591fb77440978e6d5f25d081295cf73f289c3b.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z8725304.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z4362033.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z4362033.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0865a79156e8aba94b0cdf71d1591fb77440978e6d5f25d081295cf73f289c3b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0865a79156e8aba94b0cdf71d1591fb77440978e6d5f25d081295cf73f289c3b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z8725304.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4608 2104 WerFault.exe p0001990.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
o6907283.exepid process 4148 o6907283.exe 4148 o6907283.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
o6907283.exedescription pid process Token: SeDebugPrivilege 4148 o6907283.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
0865a79156e8aba94b0cdf71d1591fb77440978e6d5f25d081295cf73f289c3b.exez8725304.exez4362033.exedescription pid process target process PID 3076 wrote to memory of 3932 3076 0865a79156e8aba94b0cdf71d1591fb77440978e6d5f25d081295cf73f289c3b.exe z8725304.exe PID 3076 wrote to memory of 3932 3076 0865a79156e8aba94b0cdf71d1591fb77440978e6d5f25d081295cf73f289c3b.exe z8725304.exe PID 3076 wrote to memory of 3932 3076 0865a79156e8aba94b0cdf71d1591fb77440978e6d5f25d081295cf73f289c3b.exe z8725304.exe PID 3932 wrote to memory of 3748 3932 z8725304.exe z4362033.exe PID 3932 wrote to memory of 3748 3932 z8725304.exe z4362033.exe PID 3932 wrote to memory of 3748 3932 z8725304.exe z4362033.exe PID 3748 wrote to memory of 4148 3748 z4362033.exe o6907283.exe PID 3748 wrote to memory of 4148 3748 z4362033.exe o6907283.exe PID 3748 wrote to memory of 4148 3748 z4362033.exe o6907283.exe PID 3748 wrote to memory of 2104 3748 z4362033.exe p0001990.exe PID 3748 wrote to memory of 2104 3748 z4362033.exe p0001990.exe PID 3748 wrote to memory of 2104 3748 z4362033.exe p0001990.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0865a79156e8aba94b0cdf71d1591fb77440978e6d5f25d081295cf73f289c3b.exe"C:\Users\Admin\AppData\Local\Temp\0865a79156e8aba94b0cdf71d1591fb77440978e6d5f25d081295cf73f289c3b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8725304.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8725304.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4362033.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4362033.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o6907283.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o6907283.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p0001990.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p0001990.exe4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2104 -s 9485⤵
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8725304.exeFilesize
702KB
MD58f9a118ff02d5702d31fab604b5d1984
SHA10b318dab85a289c8de70704e4a02aff8b220d722
SHA2564a656a50f31400dc53366e5e22ba047fbe620de8636ee9ef54a073f6fb005aea
SHA5123f0b08a2f1f92f7d9ff29f9a65688f16c27fbf785b829da6ffd09eafcf90b8f43d14d59b44525dbd43d3c881edb2c741eb0da01b26b8f3949335da3301872546
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8725304.exeFilesize
702KB
MD58f9a118ff02d5702d31fab604b5d1984
SHA10b318dab85a289c8de70704e4a02aff8b220d722
SHA2564a656a50f31400dc53366e5e22ba047fbe620de8636ee9ef54a073f6fb005aea
SHA5123f0b08a2f1f92f7d9ff29f9a65688f16c27fbf785b829da6ffd09eafcf90b8f43d14d59b44525dbd43d3c881edb2c741eb0da01b26b8f3949335da3301872546
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4362033.exeFilesize
306KB
MD5c0d18c1f020d4083d35ca5872fbd4066
SHA1de132bf2609156b5601b3997a871f8609a473cb7
SHA256b506a1dec26a715e44f2b59a126694d6c7b9e90a19bc2fa7db691327920f1cd5
SHA51223680b8a888ee0217f1df48527a7b83ffc3661a4da575431226b772984eb53c3fcb1166a4f6c23dcd47d8842d963c7a21fa3a46cf282ac3c3a46d5773eba03ba
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4362033.exeFilesize
306KB
MD5c0d18c1f020d4083d35ca5872fbd4066
SHA1de132bf2609156b5601b3997a871f8609a473cb7
SHA256b506a1dec26a715e44f2b59a126694d6c7b9e90a19bc2fa7db691327920f1cd5
SHA51223680b8a888ee0217f1df48527a7b83ffc3661a4da575431226b772984eb53c3fcb1166a4f6c23dcd47d8842d963c7a21fa3a46cf282ac3c3a46d5773eba03ba
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o6907283.exeFilesize
185KB
MD5cad8923643394ac3bb67b7bcf8e60ec6
SHA1291572445c20b8419407f0fed52411dc4fb75f96
SHA256989bdf6f6fcf1c4cfb1f091ad05508041bc2488ded4a97501a29356c948426da
SHA5126b288bbe32afa2a654336012b1c0217cf0230ef20db332911e6f893c26455cffd85b5526809b8e9c40e099b1498d8c49b008bd6da008790575c8a436d4e0ec96
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o6907283.exeFilesize
185KB
MD5cad8923643394ac3bb67b7bcf8e60ec6
SHA1291572445c20b8419407f0fed52411dc4fb75f96
SHA256989bdf6f6fcf1c4cfb1f091ad05508041bc2488ded4a97501a29356c948426da
SHA5126b288bbe32afa2a654336012b1c0217cf0230ef20db332911e6f893c26455cffd85b5526809b8e9c40e099b1498d8c49b008bd6da008790575c8a436d4e0ec96
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p0001990.exeFilesize
145KB
MD511b605c935f1568b81c5b1a7685a1f3a
SHA16b866df87a7d52868f9b14b087ef0823787261e6
SHA2568bb284b8ede4eb656f818119d38783a6fcde00e3df28e3b53763ce552730e860
SHA512b4f67f58d78111039bc5fa9832d2e3c6bc9a3bf050ba621ed18664dd33084b454a152ec6dc4fd334476dc96c529cfa8247307c864208cd2abb30bfa10069fbbd
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p0001990.exeFilesize
145KB
MD511b605c935f1568b81c5b1a7685a1f3a
SHA16b866df87a7d52868f9b14b087ef0823787261e6
SHA2568bb284b8ede4eb656f818119d38783a6fcde00e3df28e3b53763ce552730e860
SHA512b4f67f58d78111039bc5fa9832d2e3c6bc9a3bf050ba621ed18664dd33084b454a152ec6dc4fd334476dc96c529cfa8247307c864208cd2abb30bfa10069fbbd
-
memory/2104-182-0x00000000008F0000-0x000000000091A000-memory.dmpFilesize
168KB
-
memory/4148-154-0x0000000004C50000-0x0000000004C60000-memory.dmpFilesize
64KB
-
memory/4148-162-0x0000000002610000-0x0000000002626000-memory.dmpFilesize
88KB
-
memory/4148-147-0x0000000002610000-0x0000000002626000-memory.dmpFilesize
88KB
-
memory/4148-149-0x0000000002610000-0x0000000002626000-memory.dmpFilesize
88KB
-
memory/4148-151-0x0000000002610000-0x0000000002626000-memory.dmpFilesize
88KB
-
memory/4148-153-0x0000000002610000-0x0000000002626000-memory.dmpFilesize
88KB
-
memory/4148-157-0x0000000002610000-0x0000000002626000-memory.dmpFilesize
88KB
-
memory/4148-144-0x0000000002610000-0x0000000002626000-memory.dmpFilesize
88KB
-
memory/4148-156-0x0000000004C50000-0x0000000004C60000-memory.dmpFilesize
64KB
-
memory/4148-160-0x0000000002610000-0x0000000002626000-memory.dmpFilesize
88KB
-
memory/4148-158-0x0000000004C50000-0x0000000004C60000-memory.dmpFilesize
64KB
-
memory/4148-145-0x0000000002610000-0x0000000002626000-memory.dmpFilesize
88KB
-
memory/4148-164-0x0000000002610000-0x0000000002626000-memory.dmpFilesize
88KB
-
memory/4148-166-0x0000000002610000-0x0000000002626000-memory.dmpFilesize
88KB
-
memory/4148-168-0x0000000002610000-0x0000000002626000-memory.dmpFilesize
88KB
-
memory/4148-170-0x0000000002610000-0x0000000002626000-memory.dmpFilesize
88KB
-
memory/4148-172-0x0000000002610000-0x0000000002626000-memory.dmpFilesize
88KB
-
memory/4148-174-0x0000000002610000-0x0000000002626000-memory.dmpFilesize
88KB
-
memory/4148-175-0x0000000004C50000-0x0000000004C60000-memory.dmpFilesize
64KB
-
memory/4148-176-0x0000000004C50000-0x0000000004C60000-memory.dmpFilesize
64KB
-
memory/4148-177-0x0000000004C50000-0x0000000004C60000-memory.dmpFilesize
64KB
-
memory/4148-143-0x0000000002610000-0x000000000262C000-memory.dmpFilesize
112KB
-
memory/4148-142-0x0000000004C60000-0x000000000515E000-memory.dmpFilesize
5.0MB
-
memory/4148-141-0x0000000002160000-0x000000000217E000-memory.dmpFilesize
120KB