Analysis
-
max time kernel
15s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
14-05-2023 18:39
Static task
static1
Behavioral task
behavioral1
Sample
f2ce5991176a97cc5689dfb920c255b77de2e221d0f25ccecae5254a40a6d1fc.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
f2ce5991176a97cc5689dfb920c255b77de2e221d0f25ccecae5254a40a6d1fc.exe
Resource
win10v2004-20230221-en
General
-
Target
f2ce5991176a97cc5689dfb920c255b77de2e221d0f25ccecae5254a40a6d1fc.exe
-
Size
1.1MB
-
MD5
501ea9669676ed72ed19f9fa79738e0e
-
SHA1
5aea5bddb0fc0880a62d243e3d715b60fbe4e737
-
SHA256
f2ce5991176a97cc5689dfb920c255b77de2e221d0f25ccecae5254a40a6d1fc
-
SHA512
558d7d8d843379ad99c9691ad063fdfafd837ada2a0368ffa0c6a140eb6eebfec7441da51c4ebb9aa295a582c9b013fe831b2434c126590b0fe8cbdce6da3d8b
-
SSDEEP
24576:4yeivpfUpu0mqCS6JREqDYVVN4saG+F7G/F3Rn/vDAFZ:/ZpfUDvXy18VVTa7wLsF
Malware Config
Extracted
redline
luka
185.161.248.75:4132
-
auth_value
44560bcd37d6bf076da309730fdb519a
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o6558570.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o6558570.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o6558570.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection o6558570.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o6558570.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o6558570.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 1200 z5870881.exe 1748 z6474909.exe 1772 o6558570.exe 868 p3472451.exe -
Loads dropped DLL 13 IoCs
pid Process 824 f2ce5991176a97cc5689dfb920c255b77de2e221d0f25ccecae5254a40a6d1fc.exe 1200 z5870881.exe 1200 z5870881.exe 1748 z6474909.exe 1748 z6474909.exe 1772 o6558570.exe 1748 z6474909.exe 868 p3472451.exe 1056 WerFault.exe 1056 WerFault.exe 1056 WerFault.exe 1056 WerFault.exe 1056 WerFault.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o6558570.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features o6558570.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z5870881.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z5870881.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z6474909.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z6474909.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce f2ce5991176a97cc5689dfb920c255b77de2e221d0f25ccecae5254a40a6d1fc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f2ce5991176a97cc5689dfb920c255b77de2e221d0f25ccecae5254a40a6d1fc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1056 868 WerFault.exe 31 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1772 o6558570.exe 1772 o6558570.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1772 o6558570.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 824 wrote to memory of 1200 824 f2ce5991176a97cc5689dfb920c255b77de2e221d0f25ccecae5254a40a6d1fc.exe 28 PID 824 wrote to memory of 1200 824 f2ce5991176a97cc5689dfb920c255b77de2e221d0f25ccecae5254a40a6d1fc.exe 28 PID 824 wrote to memory of 1200 824 f2ce5991176a97cc5689dfb920c255b77de2e221d0f25ccecae5254a40a6d1fc.exe 28 PID 824 wrote to memory of 1200 824 f2ce5991176a97cc5689dfb920c255b77de2e221d0f25ccecae5254a40a6d1fc.exe 28 PID 824 wrote to memory of 1200 824 f2ce5991176a97cc5689dfb920c255b77de2e221d0f25ccecae5254a40a6d1fc.exe 28 PID 824 wrote to memory of 1200 824 f2ce5991176a97cc5689dfb920c255b77de2e221d0f25ccecae5254a40a6d1fc.exe 28 PID 824 wrote to memory of 1200 824 f2ce5991176a97cc5689dfb920c255b77de2e221d0f25ccecae5254a40a6d1fc.exe 28 PID 1200 wrote to memory of 1748 1200 z5870881.exe 29 PID 1200 wrote to memory of 1748 1200 z5870881.exe 29 PID 1200 wrote to memory of 1748 1200 z5870881.exe 29 PID 1200 wrote to memory of 1748 1200 z5870881.exe 29 PID 1200 wrote to memory of 1748 1200 z5870881.exe 29 PID 1200 wrote to memory of 1748 1200 z5870881.exe 29 PID 1200 wrote to memory of 1748 1200 z5870881.exe 29 PID 1748 wrote to memory of 1772 1748 z6474909.exe 30 PID 1748 wrote to memory of 1772 1748 z6474909.exe 30 PID 1748 wrote to memory of 1772 1748 z6474909.exe 30 PID 1748 wrote to memory of 1772 1748 z6474909.exe 30 PID 1748 wrote to memory of 1772 1748 z6474909.exe 30 PID 1748 wrote to memory of 1772 1748 z6474909.exe 30 PID 1748 wrote to memory of 1772 1748 z6474909.exe 30 PID 1748 wrote to memory of 868 1748 z6474909.exe 31 PID 1748 wrote to memory of 868 1748 z6474909.exe 31 PID 1748 wrote to memory of 868 1748 z6474909.exe 31 PID 1748 wrote to memory of 868 1748 z6474909.exe 31 PID 1748 wrote to memory of 868 1748 z6474909.exe 31 PID 1748 wrote to memory of 868 1748 z6474909.exe 31 PID 1748 wrote to memory of 868 1748 z6474909.exe 31 PID 868 wrote to memory of 1056 868 p3472451.exe 32 PID 868 wrote to memory of 1056 868 p3472451.exe 32 PID 868 wrote to memory of 1056 868 p3472451.exe 32 PID 868 wrote to memory of 1056 868 p3472451.exe 32 PID 868 wrote to memory of 1056 868 p3472451.exe 32 PID 868 wrote to memory of 1056 868 p3472451.exe 32 PID 868 wrote to memory of 1056 868 p3472451.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2ce5991176a97cc5689dfb920c255b77de2e221d0f25ccecae5254a40a6d1fc.exe"C:\Users\Admin\AppData\Local\Temp\f2ce5991176a97cc5689dfb920c255b77de2e221d0f25ccecae5254a40a6d1fc.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5870881.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5870881.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6474909.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6474909.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o6558570.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o6558570.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1772
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p3472451.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p3472451.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 868 -s 6445⤵
- Loads dropped DLL
- Program crash
PID:1056
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
702KB
MD55378764133b66f45fb434bedee1a53a0
SHA106d76f15884bf5c4136c366780384188d91dfdb8
SHA2565beccf4fe809beed67380f839aecb43d87edd24e72c4ae2bd338de789e09f0f2
SHA5129aef7a372ef4ae511006d7d815d8a619904d3eb5fa26d8cd4e16d3a9ecdecc7bad2411aaca0d2902cae99ed8157a1eaacc9edc51858cd3378062977319c72a1f
-
Filesize
702KB
MD55378764133b66f45fb434bedee1a53a0
SHA106d76f15884bf5c4136c366780384188d91dfdb8
SHA2565beccf4fe809beed67380f839aecb43d87edd24e72c4ae2bd338de789e09f0f2
SHA5129aef7a372ef4ae511006d7d815d8a619904d3eb5fa26d8cd4e16d3a9ecdecc7bad2411aaca0d2902cae99ed8157a1eaacc9edc51858cd3378062977319c72a1f
-
Filesize
306KB
MD58577097a3971b5468955bdbcc3eba0d3
SHA168073ce1091a8f35fb5246081031f97a02b27f38
SHA2564a4ba8405e6ceefbba9f5e865af0c3b2d7e39f8bba9c2a18364ab2635a9a2dff
SHA512f1f133eb66707c91153baff9c583e7969ffaf1e2330636e7c2151292296e84042ad17ac36b164fafdbcb330635af458d7308e6a6da7e99c1f76c1ad27df44685
-
Filesize
306KB
MD58577097a3971b5468955bdbcc3eba0d3
SHA168073ce1091a8f35fb5246081031f97a02b27f38
SHA2564a4ba8405e6ceefbba9f5e865af0c3b2d7e39f8bba9c2a18364ab2635a9a2dff
SHA512f1f133eb66707c91153baff9c583e7969ffaf1e2330636e7c2151292296e84042ad17ac36b164fafdbcb330635af458d7308e6a6da7e99c1f76c1ad27df44685
-
Filesize
185KB
MD5b536f7a6995726c9cebb3c3a079b54f7
SHA1c31b723d2116a517ebc47f6edbaedef0218f687d
SHA2560d7e9871bcdba06b4f921a260136fb7805950515d585f8443f798e0a711d0d89
SHA51270218a43f5120fa048ce42480c2a859642d7e86fefc1a8e9c15a3c75af0b3d1b57f9ad868f2e3e853ccb6bc40921b83c75339c9a5e5253295777bbced32bc660
-
Filesize
185KB
MD5b536f7a6995726c9cebb3c3a079b54f7
SHA1c31b723d2116a517ebc47f6edbaedef0218f687d
SHA2560d7e9871bcdba06b4f921a260136fb7805950515d585f8443f798e0a711d0d89
SHA51270218a43f5120fa048ce42480c2a859642d7e86fefc1a8e9c15a3c75af0b3d1b57f9ad868f2e3e853ccb6bc40921b83c75339c9a5e5253295777bbced32bc660
-
Filesize
145KB
MD59fd4e53d8a023e9d99440f16d5da3736
SHA19c94d682d6156c534cbfd694e68f610ac7e46271
SHA2566d2dc3b0b15a0081d37074b4e5f3ec45ee5e0c80b19331b513a290da23f0df08
SHA512d8ecc8b7a0911b9afe09366e3f64ea22da6e8a0b475f70a37c9d91c5d8017700f65a2482146f5e101562331c550d77bd247fe141ce634e3f3842fc1c8decbb0d
-
Filesize
145KB
MD59fd4e53d8a023e9d99440f16d5da3736
SHA19c94d682d6156c534cbfd694e68f610ac7e46271
SHA2566d2dc3b0b15a0081d37074b4e5f3ec45ee5e0c80b19331b513a290da23f0df08
SHA512d8ecc8b7a0911b9afe09366e3f64ea22da6e8a0b475f70a37c9d91c5d8017700f65a2482146f5e101562331c550d77bd247fe141ce634e3f3842fc1c8decbb0d
-
Filesize
702KB
MD55378764133b66f45fb434bedee1a53a0
SHA106d76f15884bf5c4136c366780384188d91dfdb8
SHA2565beccf4fe809beed67380f839aecb43d87edd24e72c4ae2bd338de789e09f0f2
SHA5129aef7a372ef4ae511006d7d815d8a619904d3eb5fa26d8cd4e16d3a9ecdecc7bad2411aaca0d2902cae99ed8157a1eaacc9edc51858cd3378062977319c72a1f
-
Filesize
702KB
MD55378764133b66f45fb434bedee1a53a0
SHA106d76f15884bf5c4136c366780384188d91dfdb8
SHA2565beccf4fe809beed67380f839aecb43d87edd24e72c4ae2bd338de789e09f0f2
SHA5129aef7a372ef4ae511006d7d815d8a619904d3eb5fa26d8cd4e16d3a9ecdecc7bad2411aaca0d2902cae99ed8157a1eaacc9edc51858cd3378062977319c72a1f
-
Filesize
306KB
MD58577097a3971b5468955bdbcc3eba0d3
SHA168073ce1091a8f35fb5246081031f97a02b27f38
SHA2564a4ba8405e6ceefbba9f5e865af0c3b2d7e39f8bba9c2a18364ab2635a9a2dff
SHA512f1f133eb66707c91153baff9c583e7969ffaf1e2330636e7c2151292296e84042ad17ac36b164fafdbcb330635af458d7308e6a6da7e99c1f76c1ad27df44685
-
Filesize
306KB
MD58577097a3971b5468955bdbcc3eba0d3
SHA168073ce1091a8f35fb5246081031f97a02b27f38
SHA2564a4ba8405e6ceefbba9f5e865af0c3b2d7e39f8bba9c2a18364ab2635a9a2dff
SHA512f1f133eb66707c91153baff9c583e7969ffaf1e2330636e7c2151292296e84042ad17ac36b164fafdbcb330635af458d7308e6a6da7e99c1f76c1ad27df44685
-
Filesize
185KB
MD5b536f7a6995726c9cebb3c3a079b54f7
SHA1c31b723d2116a517ebc47f6edbaedef0218f687d
SHA2560d7e9871bcdba06b4f921a260136fb7805950515d585f8443f798e0a711d0d89
SHA51270218a43f5120fa048ce42480c2a859642d7e86fefc1a8e9c15a3c75af0b3d1b57f9ad868f2e3e853ccb6bc40921b83c75339c9a5e5253295777bbced32bc660
-
Filesize
185KB
MD5b536f7a6995726c9cebb3c3a079b54f7
SHA1c31b723d2116a517ebc47f6edbaedef0218f687d
SHA2560d7e9871bcdba06b4f921a260136fb7805950515d585f8443f798e0a711d0d89
SHA51270218a43f5120fa048ce42480c2a859642d7e86fefc1a8e9c15a3c75af0b3d1b57f9ad868f2e3e853ccb6bc40921b83c75339c9a5e5253295777bbced32bc660
-
Filesize
145KB
MD59fd4e53d8a023e9d99440f16d5da3736
SHA19c94d682d6156c534cbfd694e68f610ac7e46271
SHA2566d2dc3b0b15a0081d37074b4e5f3ec45ee5e0c80b19331b513a290da23f0df08
SHA512d8ecc8b7a0911b9afe09366e3f64ea22da6e8a0b475f70a37c9d91c5d8017700f65a2482146f5e101562331c550d77bd247fe141ce634e3f3842fc1c8decbb0d
-
Filesize
145KB
MD59fd4e53d8a023e9d99440f16d5da3736
SHA19c94d682d6156c534cbfd694e68f610ac7e46271
SHA2566d2dc3b0b15a0081d37074b4e5f3ec45ee5e0c80b19331b513a290da23f0df08
SHA512d8ecc8b7a0911b9afe09366e3f64ea22da6e8a0b475f70a37c9d91c5d8017700f65a2482146f5e101562331c550d77bd247fe141ce634e3f3842fc1c8decbb0d
-
Filesize
145KB
MD59fd4e53d8a023e9d99440f16d5da3736
SHA19c94d682d6156c534cbfd694e68f610ac7e46271
SHA2566d2dc3b0b15a0081d37074b4e5f3ec45ee5e0c80b19331b513a290da23f0df08
SHA512d8ecc8b7a0911b9afe09366e3f64ea22da6e8a0b475f70a37c9d91c5d8017700f65a2482146f5e101562331c550d77bd247fe141ce634e3f3842fc1c8decbb0d
-
Filesize
145KB
MD59fd4e53d8a023e9d99440f16d5da3736
SHA19c94d682d6156c534cbfd694e68f610ac7e46271
SHA2566d2dc3b0b15a0081d37074b4e5f3ec45ee5e0c80b19331b513a290da23f0df08
SHA512d8ecc8b7a0911b9afe09366e3f64ea22da6e8a0b475f70a37c9d91c5d8017700f65a2482146f5e101562331c550d77bd247fe141ce634e3f3842fc1c8decbb0d
-
Filesize
145KB
MD59fd4e53d8a023e9d99440f16d5da3736
SHA19c94d682d6156c534cbfd694e68f610ac7e46271
SHA2566d2dc3b0b15a0081d37074b4e5f3ec45ee5e0c80b19331b513a290da23f0df08
SHA512d8ecc8b7a0911b9afe09366e3f64ea22da6e8a0b475f70a37c9d91c5d8017700f65a2482146f5e101562331c550d77bd247fe141ce634e3f3842fc1c8decbb0d
-
Filesize
145KB
MD59fd4e53d8a023e9d99440f16d5da3736
SHA19c94d682d6156c534cbfd694e68f610ac7e46271
SHA2566d2dc3b0b15a0081d37074b4e5f3ec45ee5e0c80b19331b513a290da23f0df08
SHA512d8ecc8b7a0911b9afe09366e3f64ea22da6e8a0b475f70a37c9d91c5d8017700f65a2482146f5e101562331c550d77bd247fe141ce634e3f3842fc1c8decbb0d
-
Filesize
145KB
MD59fd4e53d8a023e9d99440f16d5da3736
SHA19c94d682d6156c534cbfd694e68f610ac7e46271
SHA2566d2dc3b0b15a0081d37074b4e5f3ec45ee5e0c80b19331b513a290da23f0df08
SHA512d8ecc8b7a0911b9afe09366e3f64ea22da6e8a0b475f70a37c9d91c5d8017700f65a2482146f5e101562331c550d77bd247fe141ce634e3f3842fc1c8decbb0d