Analysis
-
max time kernel
169s -
max time network
169s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
14/05/2023, 18:32
Static task
static1
Behavioral task
behavioral1
Sample
c6dba2c0456235db30427c458b548ce3bea9a7b31f3b9d7bdf63d33b5e322bea.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
c6dba2c0456235db30427c458b548ce3bea9a7b31f3b9d7bdf63d33b5e322bea.exe
Resource
win10v2004-20230220-en
General
-
Target
c6dba2c0456235db30427c458b548ce3bea9a7b31f3b9d7bdf63d33b5e322bea.exe
-
Size
1.1MB
-
MD5
ded432a644ec2446c36f2e494714d7c8
-
SHA1
93b9833ff6637f8feebc027ff8c14077f070401a
-
SHA256
c6dba2c0456235db30427c458b548ce3bea9a7b31f3b9d7bdf63d33b5e322bea
-
SHA512
c3c7967dd7ba442cbee65a23b45fc2aa7d1e4951d5dfaaf37babd999d5a5530a7763bf63f87198c0e2c3409bb6f204b28b99a3d5a1cdf5695a91875f1a39a464
-
SSDEEP
24576:0yTq3eNZQKrmfysYrhXtOxMi+7TOcCoBDIzazAO/p6vrYVyLkAH:DTqunQKZsA1tvi+3OMIzZ8pQsVU3
Malware Config
Extracted
redline
motor
185.161.248.75:4132
-
auth_value
ec19ab9989a783983c5cbbc0e5ac4a5f
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a4851141.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a4851141.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a4851141.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a4851141.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a4851141.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a4851141.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
pid Process 1520 v9810661.exe 672 v5333260.exe 584 a4851141.exe 556 b2985140.exe 2016 c1666181.exe 664 c1666181.exe -
Loads dropped DLL 13 IoCs
pid Process 1468 c6dba2c0456235db30427c458b548ce3bea9a7b31f3b9d7bdf63d33b5e322bea.exe 1520 v9810661.exe 1520 v9810661.exe 672 v5333260.exe 672 v5333260.exe 584 a4851141.exe 672 v5333260.exe 556 b2985140.exe 1520 v9810661.exe 1520 v9810661.exe 2016 c1666181.exe 2016 c1666181.exe 2016 c1666181.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features a4851141.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a4851141.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v9810661.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce v5333260.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v5333260.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce c6dba2c0456235db30427c458b548ce3bea9a7b31f3b9d7bdf63d33b5e322bea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c6dba2c0456235db30427c458b548ce3bea9a7b31f3b9d7bdf63d33b5e322bea.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce v9810661.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 584 a4851141.exe 584 a4851141.exe 556 b2985140.exe 556 b2985140.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 584 a4851141.exe Token: SeDebugPrivilege 556 b2985140.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 1468 wrote to memory of 1520 1468 c6dba2c0456235db30427c458b548ce3bea9a7b31f3b9d7bdf63d33b5e322bea.exe 27 PID 1468 wrote to memory of 1520 1468 c6dba2c0456235db30427c458b548ce3bea9a7b31f3b9d7bdf63d33b5e322bea.exe 27 PID 1468 wrote to memory of 1520 1468 c6dba2c0456235db30427c458b548ce3bea9a7b31f3b9d7bdf63d33b5e322bea.exe 27 PID 1468 wrote to memory of 1520 1468 c6dba2c0456235db30427c458b548ce3bea9a7b31f3b9d7bdf63d33b5e322bea.exe 27 PID 1468 wrote to memory of 1520 1468 c6dba2c0456235db30427c458b548ce3bea9a7b31f3b9d7bdf63d33b5e322bea.exe 27 PID 1468 wrote to memory of 1520 1468 c6dba2c0456235db30427c458b548ce3bea9a7b31f3b9d7bdf63d33b5e322bea.exe 27 PID 1468 wrote to memory of 1520 1468 c6dba2c0456235db30427c458b548ce3bea9a7b31f3b9d7bdf63d33b5e322bea.exe 27 PID 1520 wrote to memory of 672 1520 v9810661.exe 28 PID 1520 wrote to memory of 672 1520 v9810661.exe 28 PID 1520 wrote to memory of 672 1520 v9810661.exe 28 PID 1520 wrote to memory of 672 1520 v9810661.exe 28 PID 1520 wrote to memory of 672 1520 v9810661.exe 28 PID 1520 wrote to memory of 672 1520 v9810661.exe 28 PID 1520 wrote to memory of 672 1520 v9810661.exe 28 PID 672 wrote to memory of 584 672 v5333260.exe 29 PID 672 wrote to memory of 584 672 v5333260.exe 29 PID 672 wrote to memory of 584 672 v5333260.exe 29 PID 672 wrote to memory of 584 672 v5333260.exe 29 PID 672 wrote to memory of 584 672 v5333260.exe 29 PID 672 wrote to memory of 584 672 v5333260.exe 29 PID 672 wrote to memory of 584 672 v5333260.exe 29 PID 672 wrote to memory of 556 672 v5333260.exe 30 PID 672 wrote to memory of 556 672 v5333260.exe 30 PID 672 wrote to memory of 556 672 v5333260.exe 30 PID 672 wrote to memory of 556 672 v5333260.exe 30 PID 672 wrote to memory of 556 672 v5333260.exe 30 PID 672 wrote to memory of 556 672 v5333260.exe 30 PID 672 wrote to memory of 556 672 v5333260.exe 30 PID 1520 wrote to memory of 2016 1520 v9810661.exe 32 PID 1520 wrote to memory of 2016 1520 v9810661.exe 32 PID 1520 wrote to memory of 2016 1520 v9810661.exe 32 PID 1520 wrote to memory of 2016 1520 v9810661.exe 32 PID 1520 wrote to memory of 2016 1520 v9810661.exe 32 PID 1520 wrote to memory of 2016 1520 v9810661.exe 32 PID 1520 wrote to memory of 2016 1520 v9810661.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6dba2c0456235db30427c458b548ce3bea9a7b31f3b9d7bdf63d33b5e322bea.exe"C:\Users\Admin\AppData\Local\Temp\c6dba2c0456235db30427c458b548ce3bea9a7b31f3b9d7bdf63d33b5e322bea.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9810661.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9810661.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5333260.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5333260.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4851141.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4851141.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:584
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2985140.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2985140.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:556
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c1666181.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c1666181.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c1666181.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c1666181.exe4⤵
- Executes dropped EXE
PID:664
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c1666181.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c1666181.exe4⤵PID:692
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
752KB
MD5b84e71858493e4a2e9f0af4bf67eae83
SHA14366020b09819c106ab4484e594dd50bbc0ea9c5
SHA256ed8f85ef999a87ed9ad07017d13607a50b80b0c267b4ce09768fc53a780416d8
SHA512b416c317ee571d8b4791cd3da438d09474490b70319a65fe079c153de3bb8e9f8b6dee341c11fa044bc9dfc81a3036ae4b37d7a41cd43ebf31cd006d08062bf8
-
Filesize
752KB
MD5b84e71858493e4a2e9f0af4bf67eae83
SHA14366020b09819c106ab4484e594dd50bbc0ea9c5
SHA256ed8f85ef999a87ed9ad07017d13607a50b80b0c267b4ce09768fc53a780416d8
SHA512b416c317ee571d8b4791cd3da438d09474490b70319a65fe079c153de3bb8e9f8b6dee341c11fa044bc9dfc81a3036ae4b37d7a41cd43ebf31cd006d08062bf8
-
Filesize
962KB
MD52bcefda79d7f0b560aba081cb798c663
SHA1156445ab1ec2d35533f46180ec9d442c465db867
SHA256507b303c5cd976ec0c0b14571d3c59e8351ed1b6a59b474a0bcfd334aa96472a
SHA512774834add1434a6eef804b6eba4cc19fd5466511f24116b2f513b6661d7cf36a2586652be28f17c02292410c69a9852a3f5a645d30fd6b45995d72fb1cdb407c
-
Filesize
962KB
MD52bcefda79d7f0b560aba081cb798c663
SHA1156445ab1ec2d35533f46180ec9d442c465db867
SHA256507b303c5cd976ec0c0b14571d3c59e8351ed1b6a59b474a0bcfd334aa96472a
SHA512774834add1434a6eef804b6eba4cc19fd5466511f24116b2f513b6661d7cf36a2586652be28f17c02292410c69a9852a3f5a645d30fd6b45995d72fb1cdb407c
-
Filesize
962KB
MD52bcefda79d7f0b560aba081cb798c663
SHA1156445ab1ec2d35533f46180ec9d442c465db867
SHA256507b303c5cd976ec0c0b14571d3c59e8351ed1b6a59b474a0bcfd334aa96472a
SHA512774834add1434a6eef804b6eba4cc19fd5466511f24116b2f513b6661d7cf36a2586652be28f17c02292410c69a9852a3f5a645d30fd6b45995d72fb1cdb407c
-
Filesize
306KB
MD509cf44ee03cc82aeefa4d3de07641102
SHA170ac58c0bd58a9e2c16308f0b73af862a42219fa
SHA256d9223a174ec3874aab6fe2c94e88d3d6e5409e4beb8cd602b15eb2ad9bde17a4
SHA5125e3d09f38545b1d28622daa7e522fcf83f339fcff39ea5eeedbd6977d1af072596f461449d89fba7f94485c27b0f8a288185e7577286f191c6d306f136c10ac2
-
Filesize
306KB
MD509cf44ee03cc82aeefa4d3de07641102
SHA170ac58c0bd58a9e2c16308f0b73af862a42219fa
SHA256d9223a174ec3874aab6fe2c94e88d3d6e5409e4beb8cd602b15eb2ad9bde17a4
SHA5125e3d09f38545b1d28622daa7e522fcf83f339fcff39ea5eeedbd6977d1af072596f461449d89fba7f94485c27b0f8a288185e7577286f191c6d306f136c10ac2
-
Filesize
184KB
MD5576b1aa6120223eeaecc71c6e854c805
SHA1051024124830a3988dcdaf3b25eb9eede6f68715
SHA256fa8ef7831f1ed3429e33e24587d715d74f5b901ee9fcd86b7a7b52ed5d86bfd3
SHA512194458b2aacc51396d310d15a1c70330012f13f37768a6536e78d03be69dbaa9bc9016d7020c247a9bb5e1213afaba2d4cbd3751d96eaf390710c04aa207ca6a
-
Filesize
184KB
MD5576b1aa6120223eeaecc71c6e854c805
SHA1051024124830a3988dcdaf3b25eb9eede6f68715
SHA256fa8ef7831f1ed3429e33e24587d715d74f5b901ee9fcd86b7a7b52ed5d86bfd3
SHA512194458b2aacc51396d310d15a1c70330012f13f37768a6536e78d03be69dbaa9bc9016d7020c247a9bb5e1213afaba2d4cbd3751d96eaf390710c04aa207ca6a
-
Filesize
145KB
MD5d2b6d127c8290299d3dfd86944d22f0d
SHA129a45f515e6762941f3d3614d41fcf63720ca5e9
SHA256e20b33e0cd5930d242ff8b1040ed98785c345617d8651ae9c889261e4e352dfd
SHA512ece576c450f2362aa17e648d2a694cfa699e3a4547e222b239064c7afa30ad6043766381b7044a4b85358bdad19c2e31836a76e0b87778cc69f05cfaaf85796c
-
Filesize
145KB
MD5d2b6d127c8290299d3dfd86944d22f0d
SHA129a45f515e6762941f3d3614d41fcf63720ca5e9
SHA256e20b33e0cd5930d242ff8b1040ed98785c345617d8651ae9c889261e4e352dfd
SHA512ece576c450f2362aa17e648d2a694cfa699e3a4547e222b239064c7afa30ad6043766381b7044a4b85358bdad19c2e31836a76e0b87778cc69f05cfaaf85796c
-
Filesize
752KB
MD5b84e71858493e4a2e9f0af4bf67eae83
SHA14366020b09819c106ab4484e594dd50bbc0ea9c5
SHA256ed8f85ef999a87ed9ad07017d13607a50b80b0c267b4ce09768fc53a780416d8
SHA512b416c317ee571d8b4791cd3da438d09474490b70319a65fe079c153de3bb8e9f8b6dee341c11fa044bc9dfc81a3036ae4b37d7a41cd43ebf31cd006d08062bf8
-
Filesize
752KB
MD5b84e71858493e4a2e9f0af4bf67eae83
SHA14366020b09819c106ab4484e594dd50bbc0ea9c5
SHA256ed8f85ef999a87ed9ad07017d13607a50b80b0c267b4ce09768fc53a780416d8
SHA512b416c317ee571d8b4791cd3da438d09474490b70319a65fe079c153de3bb8e9f8b6dee341c11fa044bc9dfc81a3036ae4b37d7a41cd43ebf31cd006d08062bf8
-
Filesize
962KB
MD52bcefda79d7f0b560aba081cb798c663
SHA1156445ab1ec2d35533f46180ec9d442c465db867
SHA256507b303c5cd976ec0c0b14571d3c59e8351ed1b6a59b474a0bcfd334aa96472a
SHA512774834add1434a6eef804b6eba4cc19fd5466511f24116b2f513b6661d7cf36a2586652be28f17c02292410c69a9852a3f5a645d30fd6b45995d72fb1cdb407c
-
Filesize
962KB
MD52bcefda79d7f0b560aba081cb798c663
SHA1156445ab1ec2d35533f46180ec9d442c465db867
SHA256507b303c5cd976ec0c0b14571d3c59e8351ed1b6a59b474a0bcfd334aa96472a
SHA512774834add1434a6eef804b6eba4cc19fd5466511f24116b2f513b6661d7cf36a2586652be28f17c02292410c69a9852a3f5a645d30fd6b45995d72fb1cdb407c
-
Filesize
962KB
MD52bcefda79d7f0b560aba081cb798c663
SHA1156445ab1ec2d35533f46180ec9d442c465db867
SHA256507b303c5cd976ec0c0b14571d3c59e8351ed1b6a59b474a0bcfd334aa96472a
SHA512774834add1434a6eef804b6eba4cc19fd5466511f24116b2f513b6661d7cf36a2586652be28f17c02292410c69a9852a3f5a645d30fd6b45995d72fb1cdb407c
-
Filesize
962KB
MD52bcefda79d7f0b560aba081cb798c663
SHA1156445ab1ec2d35533f46180ec9d442c465db867
SHA256507b303c5cd976ec0c0b14571d3c59e8351ed1b6a59b474a0bcfd334aa96472a
SHA512774834add1434a6eef804b6eba4cc19fd5466511f24116b2f513b6661d7cf36a2586652be28f17c02292410c69a9852a3f5a645d30fd6b45995d72fb1cdb407c
-
Filesize
962KB
MD52bcefda79d7f0b560aba081cb798c663
SHA1156445ab1ec2d35533f46180ec9d442c465db867
SHA256507b303c5cd976ec0c0b14571d3c59e8351ed1b6a59b474a0bcfd334aa96472a
SHA512774834add1434a6eef804b6eba4cc19fd5466511f24116b2f513b6661d7cf36a2586652be28f17c02292410c69a9852a3f5a645d30fd6b45995d72fb1cdb407c
-
Filesize
306KB
MD509cf44ee03cc82aeefa4d3de07641102
SHA170ac58c0bd58a9e2c16308f0b73af862a42219fa
SHA256d9223a174ec3874aab6fe2c94e88d3d6e5409e4beb8cd602b15eb2ad9bde17a4
SHA5125e3d09f38545b1d28622daa7e522fcf83f339fcff39ea5eeedbd6977d1af072596f461449d89fba7f94485c27b0f8a288185e7577286f191c6d306f136c10ac2
-
Filesize
306KB
MD509cf44ee03cc82aeefa4d3de07641102
SHA170ac58c0bd58a9e2c16308f0b73af862a42219fa
SHA256d9223a174ec3874aab6fe2c94e88d3d6e5409e4beb8cd602b15eb2ad9bde17a4
SHA5125e3d09f38545b1d28622daa7e522fcf83f339fcff39ea5eeedbd6977d1af072596f461449d89fba7f94485c27b0f8a288185e7577286f191c6d306f136c10ac2
-
Filesize
184KB
MD5576b1aa6120223eeaecc71c6e854c805
SHA1051024124830a3988dcdaf3b25eb9eede6f68715
SHA256fa8ef7831f1ed3429e33e24587d715d74f5b901ee9fcd86b7a7b52ed5d86bfd3
SHA512194458b2aacc51396d310d15a1c70330012f13f37768a6536e78d03be69dbaa9bc9016d7020c247a9bb5e1213afaba2d4cbd3751d96eaf390710c04aa207ca6a
-
Filesize
184KB
MD5576b1aa6120223eeaecc71c6e854c805
SHA1051024124830a3988dcdaf3b25eb9eede6f68715
SHA256fa8ef7831f1ed3429e33e24587d715d74f5b901ee9fcd86b7a7b52ed5d86bfd3
SHA512194458b2aacc51396d310d15a1c70330012f13f37768a6536e78d03be69dbaa9bc9016d7020c247a9bb5e1213afaba2d4cbd3751d96eaf390710c04aa207ca6a
-
Filesize
145KB
MD5d2b6d127c8290299d3dfd86944d22f0d
SHA129a45f515e6762941f3d3614d41fcf63720ca5e9
SHA256e20b33e0cd5930d242ff8b1040ed98785c345617d8651ae9c889261e4e352dfd
SHA512ece576c450f2362aa17e648d2a694cfa699e3a4547e222b239064c7afa30ad6043766381b7044a4b85358bdad19c2e31836a76e0b87778cc69f05cfaaf85796c
-
Filesize
145KB
MD5d2b6d127c8290299d3dfd86944d22f0d
SHA129a45f515e6762941f3d3614d41fcf63720ca5e9
SHA256e20b33e0cd5930d242ff8b1040ed98785c345617d8651ae9c889261e4e352dfd
SHA512ece576c450f2362aa17e648d2a694cfa699e3a4547e222b239064c7afa30ad6043766381b7044a4b85358bdad19c2e31836a76e0b87778cc69f05cfaaf85796c