Analysis
-
max time kernel
53s -
max time network
150s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
14-05-2023 08:33
Static task
static1
Behavioral task
behavioral1
Sample
b788d2df71b8c09104ab54df9662745fe688034a2c0255131280dae7256ce5c8.exe
Resource
win10-20230220-en
General
-
Target
b788d2df71b8c09104ab54df9662745fe688034a2c0255131280dae7256ce5c8.exe
-
Size
1.1MB
-
MD5
8064456e7e67b4d92d285c27ae6fa3c6
-
SHA1
ff268f2c11e7a6bf66420cc4721ce3514bf0d9ce
-
SHA256
b788d2df71b8c09104ab54df9662745fe688034a2c0255131280dae7256ce5c8
-
SHA512
cc69c76962007fc43f73f9edaa074150ed2a58966685c7e672f26f16ae639089d98f96f2333cdd0c75f2d62a63ae8bf6a7c424e0fa79d862babb078e794195da
-
SSDEEP
24576:ZyMW8QayiBd56TQrzYQmzntrJWGQQePZKOhTIP:M+QodgUrUnntdWbQKZKC
Malware Config
Extracted
redline
luka
185.161.248.75:4132
-
auth_value
44560bcd37d6bf076da309730fdb519a
Signatures
-
Processes:
o1035381.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o1035381.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o1035381.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o1035381.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o1035381.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o1035381.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
Processes:
z4090940.exez4751546.exeo1035381.exep1349633.exepid process 1720 z4090940.exe 1488 z4751546.exe 4372 o1035381.exe 4640 p1349633.exe -
Processes:
o1035381.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features o1035381.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o1035381.exe -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
z4090940.exez4751546.exeb788d2df71b8c09104ab54df9662745fe688034a2c0255131280dae7256ce5c8.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z4090940.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z4090940.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z4751546.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z4751546.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b788d2df71b8c09104ab54df9662745fe688034a2c0255131280dae7256ce5c8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b788d2df71b8c09104ab54df9662745fe688034a2c0255131280dae7256ce5c8.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4108 4640 WerFault.exe p1349633.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
o1035381.exepid process 4372 o1035381.exe 4372 o1035381.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
o1035381.exedescription pid process Token: SeDebugPrivilege 4372 o1035381.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
b788d2df71b8c09104ab54df9662745fe688034a2c0255131280dae7256ce5c8.exez4090940.exez4751546.exedescription pid process target process PID 4228 wrote to memory of 1720 4228 b788d2df71b8c09104ab54df9662745fe688034a2c0255131280dae7256ce5c8.exe z4090940.exe PID 4228 wrote to memory of 1720 4228 b788d2df71b8c09104ab54df9662745fe688034a2c0255131280dae7256ce5c8.exe z4090940.exe PID 4228 wrote to memory of 1720 4228 b788d2df71b8c09104ab54df9662745fe688034a2c0255131280dae7256ce5c8.exe z4090940.exe PID 1720 wrote to memory of 1488 1720 z4090940.exe z4751546.exe PID 1720 wrote to memory of 1488 1720 z4090940.exe z4751546.exe PID 1720 wrote to memory of 1488 1720 z4090940.exe z4751546.exe PID 1488 wrote to memory of 4372 1488 z4751546.exe o1035381.exe PID 1488 wrote to memory of 4372 1488 z4751546.exe o1035381.exe PID 1488 wrote to memory of 4372 1488 z4751546.exe o1035381.exe PID 1488 wrote to memory of 4640 1488 z4751546.exe p1349633.exe PID 1488 wrote to memory of 4640 1488 z4751546.exe p1349633.exe PID 1488 wrote to memory of 4640 1488 z4751546.exe p1349633.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b788d2df71b8c09104ab54df9662745fe688034a2c0255131280dae7256ce5c8.exe"C:\Users\Admin\AppData\Local\Temp\b788d2df71b8c09104ab54df9662745fe688034a2c0255131280dae7256ce5c8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4090940.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4090940.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4751546.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4751546.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o1035381.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o1035381.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1349633.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1349633.exe4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4640 -s 9485⤵
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4090940.exeFilesize
702KB
MD56aac45d874764be19b98c99de2607cc5
SHA1ec48346dba3f4b045109445cd28873befb4f2375
SHA256bd79ead930cd969c19edcb9a39a9bf8d000271b059c2e189db19fdbd90add63a
SHA512e00e9264a4d66034ef4f1a7d58933e31393e4921b78c57d8e7a07b9bc84a8787a9d43466a72e676d506d38cc18c73a7b4952453be8a013677b654a2d072e968c
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4090940.exeFilesize
702KB
MD56aac45d874764be19b98c99de2607cc5
SHA1ec48346dba3f4b045109445cd28873befb4f2375
SHA256bd79ead930cd969c19edcb9a39a9bf8d000271b059c2e189db19fdbd90add63a
SHA512e00e9264a4d66034ef4f1a7d58933e31393e4921b78c57d8e7a07b9bc84a8787a9d43466a72e676d506d38cc18c73a7b4952453be8a013677b654a2d072e968c
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4751546.exeFilesize
306KB
MD5a61d9545c2a80311d50b94d75b934ccf
SHA1863c0727015c0c70e3fe8b98857b1089ee25685f
SHA256993fc8da79d22c606ec3b1db01fb4d68b335282f2ff6425e8d2dc58a68de0942
SHA512a723affbb98582ac90ea680be49d671a63d9f87d39a3977fb32732eb7b1e98bcddeb48e30b4d286ae4c933570857a3ff79e941108255f3aae31c3eea5245f73a
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4751546.exeFilesize
306KB
MD5a61d9545c2a80311d50b94d75b934ccf
SHA1863c0727015c0c70e3fe8b98857b1089ee25685f
SHA256993fc8da79d22c606ec3b1db01fb4d68b335282f2ff6425e8d2dc58a68de0942
SHA512a723affbb98582ac90ea680be49d671a63d9f87d39a3977fb32732eb7b1e98bcddeb48e30b4d286ae4c933570857a3ff79e941108255f3aae31c3eea5245f73a
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o1035381.exeFilesize
185KB
MD576da10c0598437f1a221a57a4a76df5e
SHA1e5162fc7cc22804c50e472405f2951e24591de33
SHA2565ce1a2ea2dc1b54938fb2dd28e45bff8132c34b85bf18517d2410dbc88f80514
SHA51210d346b3286b253f05c65b44c107a08fec7f22eceb4ed8f89d91f1be9f61f2f032993dbf33e4ff31487b851e41e73b5216528c99427723f638b143cdf18262fb
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o1035381.exeFilesize
185KB
MD576da10c0598437f1a221a57a4a76df5e
SHA1e5162fc7cc22804c50e472405f2951e24591de33
SHA2565ce1a2ea2dc1b54938fb2dd28e45bff8132c34b85bf18517d2410dbc88f80514
SHA51210d346b3286b253f05c65b44c107a08fec7f22eceb4ed8f89d91f1be9f61f2f032993dbf33e4ff31487b851e41e73b5216528c99427723f638b143cdf18262fb
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1349633.exeFilesize
145KB
MD5eb9ddad0a545ea65e8f4439e9e7e3033
SHA12c47474fc7891bb8383a7762cda7e606513a99c4
SHA2562b79e345af40c7142002b372c3ffe4c9f36c5b58e98ca50e575255d2a27c59ab
SHA51295ca0d4ecb94d2649331d772650cb375d9ecca862d1252d13b5fca249102e664a321f11ec44703b91937d81d9a1ac9813d9d849ddab58935a265b259924bfde0
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1349633.exeFilesize
145KB
MD5eb9ddad0a545ea65e8f4439e9e7e3033
SHA12c47474fc7891bb8383a7762cda7e606513a99c4
SHA2562b79e345af40c7142002b372c3ffe4c9f36c5b58e98ca50e575255d2a27c59ab
SHA51295ca0d4ecb94d2649331d772650cb375d9ecca862d1252d13b5fca249102e664a321f11ec44703b91937d81d9a1ac9813d9d849ddab58935a265b259924bfde0
-
memory/4372-150-0x0000000004A60000-0x0000000004A76000-memory.dmpFilesize
88KB
-
memory/4372-160-0x0000000004A60000-0x0000000004A76000-memory.dmpFilesize
88KB
-
memory/4372-142-0x0000000004A60000-0x0000000004A7C000-memory.dmpFilesize
112KB
-
memory/4372-141-0x0000000004BC0000-0x0000000004BD0000-memory.dmpFilesize
64KB
-
memory/4372-143-0x0000000004A60000-0x0000000004A76000-memory.dmpFilesize
88KB
-
memory/4372-144-0x0000000004A60000-0x0000000004A76000-memory.dmpFilesize
88KB
-
memory/4372-146-0x0000000004A60000-0x0000000004A76000-memory.dmpFilesize
88KB
-
memory/4372-148-0x0000000004A60000-0x0000000004A76000-memory.dmpFilesize
88KB
-
memory/4372-139-0x0000000004BC0000-0x0000000004BD0000-memory.dmpFilesize
64KB
-
memory/4372-152-0x0000000004A60000-0x0000000004A76000-memory.dmpFilesize
88KB
-
memory/4372-154-0x0000000004A60000-0x0000000004A76000-memory.dmpFilesize
88KB
-
memory/4372-156-0x0000000004A60000-0x0000000004A76000-memory.dmpFilesize
88KB
-
memory/4372-158-0x0000000004A60000-0x0000000004A76000-memory.dmpFilesize
88KB
-
memory/4372-140-0x0000000004BC0000-0x0000000004BD0000-memory.dmpFilesize
64KB
-
memory/4372-162-0x0000000004A60000-0x0000000004A76000-memory.dmpFilesize
88KB
-
memory/4372-164-0x0000000004A60000-0x0000000004A76000-memory.dmpFilesize
88KB
-
memory/4372-166-0x0000000004A60000-0x0000000004A76000-memory.dmpFilesize
88KB
-
memory/4372-168-0x0000000004A60000-0x0000000004A76000-memory.dmpFilesize
88KB
-
memory/4372-170-0x0000000004A60000-0x0000000004A76000-memory.dmpFilesize
88KB
-
memory/4372-171-0x0000000004BC0000-0x0000000004BD0000-memory.dmpFilesize
64KB
-
memory/4372-172-0x0000000004BC0000-0x0000000004BD0000-memory.dmpFilesize
64KB
-
memory/4372-173-0x0000000004BC0000-0x0000000004BD0000-memory.dmpFilesize
64KB
-
memory/4372-138-0x0000000004BD0000-0x00000000050CE000-memory.dmpFilesize
5.0MB
-
memory/4372-137-0x0000000002470000-0x000000000248E000-memory.dmpFilesize
120KB
-
memory/4640-178-0x00000000003F0000-0x000000000041A000-memory.dmpFilesize
168KB