Analysis
-
max time kernel
29s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
14-05-2023 18:31
Static task
static1
Behavioral task
behavioral1
Sample
bf6596759ea62723d53032294de97c753fa51b46db9b49ff16cf14bdbef671f4.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
bf6596759ea62723d53032294de97c753fa51b46db9b49ff16cf14bdbef671f4.exe
Resource
win10v2004-20230220-en
General
-
Target
bf6596759ea62723d53032294de97c753fa51b46db9b49ff16cf14bdbef671f4.exe
-
Size
1.1MB
-
MD5
13455b536e0d30787ecc4c2f0c12cc4d
-
SHA1
d8084d2292a71a5b77c348de699157d815de4bd3
-
SHA256
bf6596759ea62723d53032294de97c753fa51b46db9b49ff16cf14bdbef671f4
-
SHA512
93d2705329cd3183480aa6248a4736fee3e7057ee6319a404f416aa6d85142f8865911fe78c5c37c6f030ee08962f78540c12732d21cea7fee65c0a75a1480a5
-
SSDEEP
24576:gy1W2hpikc9STOo5jn3m+mS/v/7YGimVDMStCWl7go+7uMEEzh:nJhO9S6SjbEGim5n71+7uME
Malware Config
Extracted
redline
luka
185.161.248.75:4132
-
auth_value
44560bcd37d6bf076da309730fdb519a
Signatures
-
Processes:
o6623968.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o6623968.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o6623968.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o6623968.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o6623968.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o6623968.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection o6623968.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
Processes:
z1195782.exez3995943.exeo6623968.exep0361123.exepid process 928 z1195782.exe 1536 z3995943.exe 768 o6623968.exe 1836 p0361123.exe -
Loads dropped DLL 13 IoCs
Processes:
bf6596759ea62723d53032294de97c753fa51b46db9b49ff16cf14bdbef671f4.exez1195782.exez3995943.exeo6623968.exep0361123.exeWerFault.exepid process 2040 bf6596759ea62723d53032294de97c753fa51b46db9b49ff16cf14bdbef671f4.exe 928 z1195782.exe 928 z1195782.exe 1536 z3995943.exe 1536 z3995943.exe 768 o6623968.exe 1536 z3995943.exe 1836 p0361123.exe 1788 WerFault.exe 1788 WerFault.exe 1788 WerFault.exe 1788 WerFault.exe 1788 WerFault.exe -
Processes:
o6623968.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features o6623968.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o6623968.exe -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
bf6596759ea62723d53032294de97c753fa51b46db9b49ff16cf14bdbef671f4.exez1195782.exez3995943.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bf6596759ea62723d53032294de97c753fa51b46db9b49ff16cf14bdbef671f4.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z1195782.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z1195782.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z3995943.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z3995943.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce bf6596759ea62723d53032294de97c753fa51b46db9b49ff16cf14bdbef671f4.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1788 1836 WerFault.exe p0361123.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
o6623968.exepid process 768 o6623968.exe 768 o6623968.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
o6623968.exedescription pid process Token: SeDebugPrivilege 768 o6623968.exe -
Suspicious use of WriteProcessMemory 35 IoCs
Processes:
bf6596759ea62723d53032294de97c753fa51b46db9b49ff16cf14bdbef671f4.exez1195782.exez3995943.exep0361123.exedescription pid process target process PID 2040 wrote to memory of 928 2040 bf6596759ea62723d53032294de97c753fa51b46db9b49ff16cf14bdbef671f4.exe z1195782.exe PID 2040 wrote to memory of 928 2040 bf6596759ea62723d53032294de97c753fa51b46db9b49ff16cf14bdbef671f4.exe z1195782.exe PID 2040 wrote to memory of 928 2040 bf6596759ea62723d53032294de97c753fa51b46db9b49ff16cf14bdbef671f4.exe z1195782.exe PID 2040 wrote to memory of 928 2040 bf6596759ea62723d53032294de97c753fa51b46db9b49ff16cf14bdbef671f4.exe z1195782.exe PID 2040 wrote to memory of 928 2040 bf6596759ea62723d53032294de97c753fa51b46db9b49ff16cf14bdbef671f4.exe z1195782.exe PID 2040 wrote to memory of 928 2040 bf6596759ea62723d53032294de97c753fa51b46db9b49ff16cf14bdbef671f4.exe z1195782.exe PID 2040 wrote to memory of 928 2040 bf6596759ea62723d53032294de97c753fa51b46db9b49ff16cf14bdbef671f4.exe z1195782.exe PID 928 wrote to memory of 1536 928 z1195782.exe z3995943.exe PID 928 wrote to memory of 1536 928 z1195782.exe z3995943.exe PID 928 wrote to memory of 1536 928 z1195782.exe z3995943.exe PID 928 wrote to memory of 1536 928 z1195782.exe z3995943.exe PID 928 wrote to memory of 1536 928 z1195782.exe z3995943.exe PID 928 wrote to memory of 1536 928 z1195782.exe z3995943.exe PID 928 wrote to memory of 1536 928 z1195782.exe z3995943.exe PID 1536 wrote to memory of 768 1536 z3995943.exe o6623968.exe PID 1536 wrote to memory of 768 1536 z3995943.exe o6623968.exe PID 1536 wrote to memory of 768 1536 z3995943.exe o6623968.exe PID 1536 wrote to memory of 768 1536 z3995943.exe o6623968.exe PID 1536 wrote to memory of 768 1536 z3995943.exe o6623968.exe PID 1536 wrote to memory of 768 1536 z3995943.exe o6623968.exe PID 1536 wrote to memory of 768 1536 z3995943.exe o6623968.exe PID 1536 wrote to memory of 1836 1536 z3995943.exe p0361123.exe PID 1536 wrote to memory of 1836 1536 z3995943.exe p0361123.exe PID 1536 wrote to memory of 1836 1536 z3995943.exe p0361123.exe PID 1536 wrote to memory of 1836 1536 z3995943.exe p0361123.exe PID 1536 wrote to memory of 1836 1536 z3995943.exe p0361123.exe PID 1536 wrote to memory of 1836 1536 z3995943.exe p0361123.exe PID 1536 wrote to memory of 1836 1536 z3995943.exe p0361123.exe PID 1836 wrote to memory of 1788 1836 p0361123.exe WerFault.exe PID 1836 wrote to memory of 1788 1836 p0361123.exe WerFault.exe PID 1836 wrote to memory of 1788 1836 p0361123.exe WerFault.exe PID 1836 wrote to memory of 1788 1836 p0361123.exe WerFault.exe PID 1836 wrote to memory of 1788 1836 p0361123.exe WerFault.exe PID 1836 wrote to memory of 1788 1836 p0361123.exe WerFault.exe PID 1836 wrote to memory of 1788 1836 p0361123.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf6596759ea62723d53032294de97c753fa51b46db9b49ff16cf14bdbef671f4.exe"C:\Users\Admin\AppData\Local\Temp\bf6596759ea62723d53032294de97c753fa51b46db9b49ff16cf14bdbef671f4.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1195782.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1195782.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3995943.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3995943.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o6623968.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o6623968.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:768
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p0361123.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p0361123.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1836 -s 6405⤵
- Loads dropped DLL
- Program crash
PID:1788
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
701KB
MD53fa886dc448406622575cc56d87a704b
SHA176ad77693f0fc3ba353a832d90f39cfc3e61d116
SHA256a1839dc707bcbaf7ae65fc53efee2d6f17cdcec3381fd4203db1910225499b64
SHA5120d24c07188d4435228b92e4defd6fc6db3204e1198ff96e746d8432354bdcf824a3cdd239974397edea53b6a89e3025ba99690e2728972ff0a1df4ee371dabe4
-
Filesize
701KB
MD53fa886dc448406622575cc56d87a704b
SHA176ad77693f0fc3ba353a832d90f39cfc3e61d116
SHA256a1839dc707bcbaf7ae65fc53efee2d6f17cdcec3381fd4203db1910225499b64
SHA5120d24c07188d4435228b92e4defd6fc6db3204e1198ff96e746d8432354bdcf824a3cdd239974397edea53b6a89e3025ba99690e2728972ff0a1df4ee371dabe4
-
Filesize
306KB
MD520755967950e839e593ca1c40f2cd353
SHA1b5db6a929f45c1d8804030f22561703323792935
SHA256f26beca1e40f7e21bb99b07289ff68a2b81d58378b0695054034806d5cbc0193
SHA512534e7f8f3c07380d77f1593045ddb644d38de6ac1fe3b27fd6d937be9a75c69afe8920fd7ad71b9010a0ddd596cff465fb66eb9129ecf2f19b681d7fffb9605d
-
Filesize
306KB
MD520755967950e839e593ca1c40f2cd353
SHA1b5db6a929f45c1d8804030f22561703323792935
SHA256f26beca1e40f7e21bb99b07289ff68a2b81d58378b0695054034806d5cbc0193
SHA512534e7f8f3c07380d77f1593045ddb644d38de6ac1fe3b27fd6d937be9a75c69afe8920fd7ad71b9010a0ddd596cff465fb66eb9129ecf2f19b681d7fffb9605d
-
Filesize
184KB
MD55aa150eea168db3e2ec96528f805810d
SHA16f5e303c20878755450869b97e9c7084457bbf1f
SHA2568ba4164d806c1873e45bfd7a22703000023f40d7e3cd91e0f0bd69d10e961070
SHA51269048bddbdb8c75dfa6f41f9b3b1e63e5ad7508a3a6b8a051a05eefee5de1d51f4f3cea9bb2d39c3018e6ca704a708630bbd3ed0f5a727e05bbaa09a8cac79aa
-
Filesize
184KB
MD55aa150eea168db3e2ec96528f805810d
SHA16f5e303c20878755450869b97e9c7084457bbf1f
SHA2568ba4164d806c1873e45bfd7a22703000023f40d7e3cd91e0f0bd69d10e961070
SHA51269048bddbdb8c75dfa6f41f9b3b1e63e5ad7508a3a6b8a051a05eefee5de1d51f4f3cea9bb2d39c3018e6ca704a708630bbd3ed0f5a727e05bbaa09a8cac79aa
-
Filesize
145KB
MD5b00e0730fb2eca46c7b8875edc258f3c
SHA1a07fecf913d7de999094c5c997f795d0558e529e
SHA25628cd226169a243cf34f0afffee86af222afdfc893aa5da226b6539240117a477
SHA512d536d305337930c0613c0e13f7d90ef06f9ff3a8a0db512152d9a9ad851d213029564a3ffd6c36f0d3a493fd0c48def3d70df8f8f53d1636056fa810ef764a2a
-
Filesize
145KB
MD5b00e0730fb2eca46c7b8875edc258f3c
SHA1a07fecf913d7de999094c5c997f795d0558e529e
SHA25628cd226169a243cf34f0afffee86af222afdfc893aa5da226b6539240117a477
SHA512d536d305337930c0613c0e13f7d90ef06f9ff3a8a0db512152d9a9ad851d213029564a3ffd6c36f0d3a493fd0c48def3d70df8f8f53d1636056fa810ef764a2a
-
Filesize
701KB
MD53fa886dc448406622575cc56d87a704b
SHA176ad77693f0fc3ba353a832d90f39cfc3e61d116
SHA256a1839dc707bcbaf7ae65fc53efee2d6f17cdcec3381fd4203db1910225499b64
SHA5120d24c07188d4435228b92e4defd6fc6db3204e1198ff96e746d8432354bdcf824a3cdd239974397edea53b6a89e3025ba99690e2728972ff0a1df4ee371dabe4
-
Filesize
701KB
MD53fa886dc448406622575cc56d87a704b
SHA176ad77693f0fc3ba353a832d90f39cfc3e61d116
SHA256a1839dc707bcbaf7ae65fc53efee2d6f17cdcec3381fd4203db1910225499b64
SHA5120d24c07188d4435228b92e4defd6fc6db3204e1198ff96e746d8432354bdcf824a3cdd239974397edea53b6a89e3025ba99690e2728972ff0a1df4ee371dabe4
-
Filesize
306KB
MD520755967950e839e593ca1c40f2cd353
SHA1b5db6a929f45c1d8804030f22561703323792935
SHA256f26beca1e40f7e21bb99b07289ff68a2b81d58378b0695054034806d5cbc0193
SHA512534e7f8f3c07380d77f1593045ddb644d38de6ac1fe3b27fd6d937be9a75c69afe8920fd7ad71b9010a0ddd596cff465fb66eb9129ecf2f19b681d7fffb9605d
-
Filesize
306KB
MD520755967950e839e593ca1c40f2cd353
SHA1b5db6a929f45c1d8804030f22561703323792935
SHA256f26beca1e40f7e21bb99b07289ff68a2b81d58378b0695054034806d5cbc0193
SHA512534e7f8f3c07380d77f1593045ddb644d38de6ac1fe3b27fd6d937be9a75c69afe8920fd7ad71b9010a0ddd596cff465fb66eb9129ecf2f19b681d7fffb9605d
-
Filesize
184KB
MD55aa150eea168db3e2ec96528f805810d
SHA16f5e303c20878755450869b97e9c7084457bbf1f
SHA2568ba4164d806c1873e45bfd7a22703000023f40d7e3cd91e0f0bd69d10e961070
SHA51269048bddbdb8c75dfa6f41f9b3b1e63e5ad7508a3a6b8a051a05eefee5de1d51f4f3cea9bb2d39c3018e6ca704a708630bbd3ed0f5a727e05bbaa09a8cac79aa
-
Filesize
184KB
MD55aa150eea168db3e2ec96528f805810d
SHA16f5e303c20878755450869b97e9c7084457bbf1f
SHA2568ba4164d806c1873e45bfd7a22703000023f40d7e3cd91e0f0bd69d10e961070
SHA51269048bddbdb8c75dfa6f41f9b3b1e63e5ad7508a3a6b8a051a05eefee5de1d51f4f3cea9bb2d39c3018e6ca704a708630bbd3ed0f5a727e05bbaa09a8cac79aa
-
Filesize
145KB
MD5b00e0730fb2eca46c7b8875edc258f3c
SHA1a07fecf913d7de999094c5c997f795d0558e529e
SHA25628cd226169a243cf34f0afffee86af222afdfc893aa5da226b6539240117a477
SHA512d536d305337930c0613c0e13f7d90ef06f9ff3a8a0db512152d9a9ad851d213029564a3ffd6c36f0d3a493fd0c48def3d70df8f8f53d1636056fa810ef764a2a
-
Filesize
145KB
MD5b00e0730fb2eca46c7b8875edc258f3c
SHA1a07fecf913d7de999094c5c997f795d0558e529e
SHA25628cd226169a243cf34f0afffee86af222afdfc893aa5da226b6539240117a477
SHA512d536d305337930c0613c0e13f7d90ef06f9ff3a8a0db512152d9a9ad851d213029564a3ffd6c36f0d3a493fd0c48def3d70df8f8f53d1636056fa810ef764a2a
-
Filesize
145KB
MD5b00e0730fb2eca46c7b8875edc258f3c
SHA1a07fecf913d7de999094c5c997f795d0558e529e
SHA25628cd226169a243cf34f0afffee86af222afdfc893aa5da226b6539240117a477
SHA512d536d305337930c0613c0e13f7d90ef06f9ff3a8a0db512152d9a9ad851d213029564a3ffd6c36f0d3a493fd0c48def3d70df8f8f53d1636056fa810ef764a2a
-
Filesize
145KB
MD5b00e0730fb2eca46c7b8875edc258f3c
SHA1a07fecf913d7de999094c5c997f795d0558e529e
SHA25628cd226169a243cf34f0afffee86af222afdfc893aa5da226b6539240117a477
SHA512d536d305337930c0613c0e13f7d90ef06f9ff3a8a0db512152d9a9ad851d213029564a3ffd6c36f0d3a493fd0c48def3d70df8f8f53d1636056fa810ef764a2a
-
Filesize
145KB
MD5b00e0730fb2eca46c7b8875edc258f3c
SHA1a07fecf913d7de999094c5c997f795d0558e529e
SHA25628cd226169a243cf34f0afffee86af222afdfc893aa5da226b6539240117a477
SHA512d536d305337930c0613c0e13f7d90ef06f9ff3a8a0db512152d9a9ad851d213029564a3ffd6c36f0d3a493fd0c48def3d70df8f8f53d1636056fa810ef764a2a
-
Filesize
145KB
MD5b00e0730fb2eca46c7b8875edc258f3c
SHA1a07fecf913d7de999094c5c997f795d0558e529e
SHA25628cd226169a243cf34f0afffee86af222afdfc893aa5da226b6539240117a477
SHA512d536d305337930c0613c0e13f7d90ef06f9ff3a8a0db512152d9a9ad851d213029564a3ffd6c36f0d3a493fd0c48def3d70df8f8f53d1636056fa810ef764a2a
-
Filesize
145KB
MD5b00e0730fb2eca46c7b8875edc258f3c
SHA1a07fecf913d7de999094c5c997f795d0558e529e
SHA25628cd226169a243cf34f0afffee86af222afdfc893aa5da226b6539240117a477
SHA512d536d305337930c0613c0e13f7d90ef06f9ff3a8a0db512152d9a9ad851d213029564a3ffd6c36f0d3a493fd0c48def3d70df8f8f53d1636056fa810ef764a2a