Analysis
-
max time kernel
52s -
max time network
77s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
14-05-2023 08:26
Static task
static1
Behavioral task
behavioral1
Sample
d2588dacdad3a98e0860815d179a3b1a3db3f0eb2f6d8c96a1bbb72ad6746c52.exe
Resource
win10-20230220-en
General
-
Target
d2588dacdad3a98e0860815d179a3b1a3db3f0eb2f6d8c96a1bbb72ad6746c52.exe
-
Size
1.1MB
-
MD5
5c51a19c54196bb266d70735afe651c0
-
SHA1
a2a4a327d1380aeba4cfe7926eec06d05d448881
-
SHA256
d2588dacdad3a98e0860815d179a3b1a3db3f0eb2f6d8c96a1bbb72ad6746c52
-
SHA512
141c0ceca4fc549030acfeccdd3f4961a3467ad4321410383d26508e89ec34a28f41a422405c0b0a5d663ebdd083976387581beb624aa043e3124fb709b8864c
-
SSDEEP
24576:oyjZs64DIXxjM9/2zlSRYmkErDTcRmjZMcX1j05:vj2RGYlsIRY08PcF
Malware Config
Extracted
redline
luka
185.161.248.75:4132
-
auth_value
44560bcd37d6bf076da309730fdb519a
Signatures
-
Processes:
o0032900.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o0032900.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o0032900.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o0032900.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o0032900.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o0032900.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
Processes:
z7174647.exez3556973.exeo0032900.exep7410412.exepid process 1448 z7174647.exe 1776 z3556973.exe 976 o0032900.exe 4476 p7410412.exe -
Processes:
o0032900.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features o0032900.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o0032900.exe -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
d2588dacdad3a98e0860815d179a3b1a3db3f0eb2f6d8c96a1bbb72ad6746c52.exez7174647.exez3556973.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d2588dacdad3a98e0860815d179a3b1a3db3f0eb2f6d8c96a1bbb72ad6746c52.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z7174647.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z7174647.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z3556973.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z3556973.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d2588dacdad3a98e0860815d179a3b1a3db3f0eb2f6d8c96a1bbb72ad6746c52.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1956 4476 WerFault.exe p7410412.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
o0032900.exepid process 976 o0032900.exe 976 o0032900.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
o0032900.exedescription pid process Token: SeDebugPrivilege 976 o0032900.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
d2588dacdad3a98e0860815d179a3b1a3db3f0eb2f6d8c96a1bbb72ad6746c52.exez7174647.exez3556973.exedescription pid process target process PID 1220 wrote to memory of 1448 1220 d2588dacdad3a98e0860815d179a3b1a3db3f0eb2f6d8c96a1bbb72ad6746c52.exe z7174647.exe PID 1220 wrote to memory of 1448 1220 d2588dacdad3a98e0860815d179a3b1a3db3f0eb2f6d8c96a1bbb72ad6746c52.exe z7174647.exe PID 1220 wrote to memory of 1448 1220 d2588dacdad3a98e0860815d179a3b1a3db3f0eb2f6d8c96a1bbb72ad6746c52.exe z7174647.exe PID 1448 wrote to memory of 1776 1448 z7174647.exe z3556973.exe PID 1448 wrote to memory of 1776 1448 z7174647.exe z3556973.exe PID 1448 wrote to memory of 1776 1448 z7174647.exe z3556973.exe PID 1776 wrote to memory of 976 1776 z3556973.exe o0032900.exe PID 1776 wrote to memory of 976 1776 z3556973.exe o0032900.exe PID 1776 wrote to memory of 976 1776 z3556973.exe o0032900.exe PID 1776 wrote to memory of 4476 1776 z3556973.exe p7410412.exe PID 1776 wrote to memory of 4476 1776 z3556973.exe p7410412.exe PID 1776 wrote to memory of 4476 1776 z3556973.exe p7410412.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2588dacdad3a98e0860815d179a3b1a3db3f0eb2f6d8c96a1bbb72ad6746c52.exe"C:\Users\Admin\AppData\Local\Temp\d2588dacdad3a98e0860815d179a3b1a3db3f0eb2f6d8c96a1bbb72ad6746c52.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7174647.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7174647.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3556973.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3556973.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o0032900.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o0032900.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p7410412.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p7410412.exe4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4476 -s 9485⤵
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7174647.exeFilesize
702KB
MD5001c355006c9a9157d88c7dd4c85b9c4
SHA1ab8251aa051c30192732e47d94a6d5f5910dfa62
SHA25601517f7559ceb8f95fccb128b8acf953b729b528aacf70af3871ea928a90d6f5
SHA512bbc038fdfe0c783baac07c1944c45c02dac6b441804da48a6e16c9413b34570bd04cd3ea44d2bdb1e3f393e9b7d0dbd949f7a8599aa76a6245eb72fcaa6cb2c2
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7174647.exeFilesize
702KB
MD5001c355006c9a9157d88c7dd4c85b9c4
SHA1ab8251aa051c30192732e47d94a6d5f5910dfa62
SHA25601517f7559ceb8f95fccb128b8acf953b729b528aacf70af3871ea928a90d6f5
SHA512bbc038fdfe0c783baac07c1944c45c02dac6b441804da48a6e16c9413b34570bd04cd3ea44d2bdb1e3f393e9b7d0dbd949f7a8599aa76a6245eb72fcaa6cb2c2
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3556973.exeFilesize
306KB
MD53530f6b8cb560507fc713f2a40dbcd18
SHA139b501ca0a8b7027c11acfbc985e42ffd3182b03
SHA256e453155f0a6be80262b2b024b8dbb8b817e091b1176cfb5f85fb6cf1a8dd2231
SHA5129e6f650b2958fc1adb04176437eec2452024855e88ebc44798349305192905f3167cb294f1d5e810757d464479d44ea497a7b083e686ad431a92e78a5f933e5b
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3556973.exeFilesize
306KB
MD53530f6b8cb560507fc713f2a40dbcd18
SHA139b501ca0a8b7027c11acfbc985e42ffd3182b03
SHA256e453155f0a6be80262b2b024b8dbb8b817e091b1176cfb5f85fb6cf1a8dd2231
SHA5129e6f650b2958fc1adb04176437eec2452024855e88ebc44798349305192905f3167cb294f1d5e810757d464479d44ea497a7b083e686ad431a92e78a5f933e5b
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o0032900.exeFilesize
185KB
MD53bda43df96826c796e5c54d96d7c812f
SHA11d5668cc4f8ae4f22425a266401ec1e2ac6627c2
SHA2564cc8902e5d3d0383f9e37ad0e46c68601b8c3caf82f8f320bca1dbc49b603225
SHA512ea5811d11b49ce033d220f388606169e2483fb605e202ee82f0d6b8e810a8ebf101ac0e0a75a5bdf0f7c101187de326a03537114f8a0efcaf65bb7eebeecbda6
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o0032900.exeFilesize
185KB
MD53bda43df96826c796e5c54d96d7c812f
SHA11d5668cc4f8ae4f22425a266401ec1e2ac6627c2
SHA2564cc8902e5d3d0383f9e37ad0e46c68601b8c3caf82f8f320bca1dbc49b603225
SHA512ea5811d11b49ce033d220f388606169e2483fb605e202ee82f0d6b8e810a8ebf101ac0e0a75a5bdf0f7c101187de326a03537114f8a0efcaf65bb7eebeecbda6
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p7410412.exeFilesize
145KB
MD5e56bfcd348129c65142c9336e3822e12
SHA1e599d143a6918bf902aebe8e69de1722c9bead7c
SHA25669be87b037b69db1b97c2bef2beba4316efd85dcd64e1b4545db5cf1abe41a66
SHA512bdba6e4e5f42ac8d4a09d2e40141b781f30a20050b90c62e701338205964a0f4d19e54ae3350d7bc40d384a6862827e97d7f30bc2c38fc315ee46d3a77d995e7
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p7410412.exeFilesize
145KB
MD5e56bfcd348129c65142c9336e3822e12
SHA1e599d143a6918bf902aebe8e69de1722c9bead7c
SHA25669be87b037b69db1b97c2bef2beba4316efd85dcd64e1b4545db5cf1abe41a66
SHA512bdba6e4e5f42ac8d4a09d2e40141b781f30a20050b90c62e701338205964a0f4d19e54ae3350d7bc40d384a6862827e97d7f30bc2c38fc315ee46d3a77d995e7
-
memory/976-155-0x0000000004930000-0x0000000004946000-memory.dmpFilesize
88KB
-
memory/976-165-0x0000000004930000-0x0000000004946000-memory.dmpFilesize
88KB
-
memory/976-146-0x0000000004AE0000-0x0000000004AF0000-memory.dmpFilesize
64KB
-
memory/976-147-0x0000000004AE0000-0x0000000004AF0000-memory.dmpFilesize
64KB
-
memory/976-149-0x0000000004930000-0x0000000004946000-memory.dmpFilesize
88KB
-
memory/976-148-0x0000000004930000-0x0000000004946000-memory.dmpFilesize
88KB
-
memory/976-151-0x0000000004930000-0x0000000004946000-memory.dmpFilesize
88KB
-
memory/976-153-0x0000000004930000-0x0000000004946000-memory.dmpFilesize
88KB
-
memory/976-144-0x0000000004930000-0x000000000494C000-memory.dmpFilesize
112KB
-
memory/976-157-0x0000000004930000-0x0000000004946000-memory.dmpFilesize
88KB
-
memory/976-159-0x0000000004930000-0x0000000004946000-memory.dmpFilesize
88KB
-
memory/976-161-0x0000000004930000-0x0000000004946000-memory.dmpFilesize
88KB
-
memory/976-163-0x0000000004930000-0x0000000004946000-memory.dmpFilesize
88KB
-
memory/976-145-0x0000000004AE0000-0x0000000004AF0000-memory.dmpFilesize
64KB
-
memory/976-167-0x0000000004930000-0x0000000004946000-memory.dmpFilesize
88KB
-
memory/976-169-0x0000000004930000-0x0000000004946000-memory.dmpFilesize
88KB
-
memory/976-171-0x0000000004930000-0x0000000004946000-memory.dmpFilesize
88KB
-
memory/976-173-0x0000000004930000-0x0000000004946000-memory.dmpFilesize
88KB
-
memory/976-175-0x0000000004930000-0x0000000004946000-memory.dmpFilesize
88KB
-
memory/976-176-0x0000000004AE0000-0x0000000004AF0000-memory.dmpFilesize
64KB
-
memory/976-177-0x0000000004AE0000-0x0000000004AF0000-memory.dmpFilesize
64KB
-
memory/976-178-0x0000000004AE0000-0x0000000004AF0000-memory.dmpFilesize
64KB
-
memory/976-143-0x0000000004AF0000-0x0000000004FEE000-memory.dmpFilesize
5.0MB
-
memory/976-142-0x0000000002220000-0x000000000223E000-memory.dmpFilesize
120KB
-
memory/4476-183-0x0000000000BE0000-0x0000000000C0A000-memory.dmpFilesize
168KB