Analysis
-
max time kernel
43s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
14-05-2023 18:40
Static task
static1
Behavioral task
behavioral1
Sample
fe2b1b0feaa71d353720ba9872a3f74979194d47214457ae430d6e5a4104b8ad.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
fe2b1b0feaa71d353720ba9872a3f74979194d47214457ae430d6e5a4104b8ad.exe
Resource
win10v2004-20230220-en
General
-
Target
fe2b1b0feaa71d353720ba9872a3f74979194d47214457ae430d6e5a4104b8ad.exe
-
Size
1.1MB
-
MD5
3073d7e1648638cde059a05b8398614b
-
SHA1
9195fe589883bf0b85fdf5f7e18e5d44d2ef3eb5
-
SHA256
fe2b1b0feaa71d353720ba9872a3f74979194d47214457ae430d6e5a4104b8ad
-
SHA512
0e21fa43f8a426ef2c0e08952cf953cec7115c3932b0e2aa416a139678b1cc90095705edf28ba415214895b7296df3fcf553693157f440dca967d9164e3cd014
-
SSDEEP
24576:7ygknd76PmRLbL3DUnS30zSl/hODfaw4Ub6dfMDwsKwdU4LY:ugOd7rR3zYnSE+lpOGI6ZMDw6dUK
Malware Config
Extracted
redline
luka
185.161.248.75:4132
-
auth_value
44560bcd37d6bf076da309730fdb519a
Signatures
-
Processes:
o5728447.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection o5728447.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o5728447.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o5728447.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o5728447.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o5728447.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o5728447.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
Processes:
z9685193.exez1662503.exeo5728447.exep7625472.exepid process 2044 z9685193.exe 844 z1662503.exe 580 o5728447.exe 1784 p7625472.exe -
Loads dropped DLL 13 IoCs
Processes:
fe2b1b0feaa71d353720ba9872a3f74979194d47214457ae430d6e5a4104b8ad.exez9685193.exez1662503.exeo5728447.exep7625472.exeWerFault.exepid process 1280 fe2b1b0feaa71d353720ba9872a3f74979194d47214457ae430d6e5a4104b8ad.exe 2044 z9685193.exe 2044 z9685193.exe 844 z1662503.exe 844 z1662503.exe 580 o5728447.exe 844 z1662503.exe 1784 p7625472.exe 456 WerFault.exe 456 WerFault.exe 456 WerFault.exe 456 WerFault.exe 456 WerFault.exe -
Processes:
o5728447.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features o5728447.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o5728447.exe -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
z1662503.exefe2b1b0feaa71d353720ba9872a3f74979194d47214457ae430d6e5a4104b8ad.exez9685193.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z1662503.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z1662503.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce fe2b1b0feaa71d353720ba9872a3f74979194d47214457ae430d6e5a4104b8ad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fe2b1b0feaa71d353720ba9872a3f74979194d47214457ae430d6e5a4104b8ad.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z9685193.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z9685193.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 456 1784 WerFault.exe p7625472.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
o5728447.exepid process 580 o5728447.exe 580 o5728447.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
o5728447.exedescription pid process Token: SeDebugPrivilege 580 o5728447.exe -
Suspicious use of WriteProcessMemory 35 IoCs
Processes:
fe2b1b0feaa71d353720ba9872a3f74979194d47214457ae430d6e5a4104b8ad.exez9685193.exez1662503.exep7625472.exedescription pid process target process PID 1280 wrote to memory of 2044 1280 fe2b1b0feaa71d353720ba9872a3f74979194d47214457ae430d6e5a4104b8ad.exe z9685193.exe PID 1280 wrote to memory of 2044 1280 fe2b1b0feaa71d353720ba9872a3f74979194d47214457ae430d6e5a4104b8ad.exe z9685193.exe PID 1280 wrote to memory of 2044 1280 fe2b1b0feaa71d353720ba9872a3f74979194d47214457ae430d6e5a4104b8ad.exe z9685193.exe PID 1280 wrote to memory of 2044 1280 fe2b1b0feaa71d353720ba9872a3f74979194d47214457ae430d6e5a4104b8ad.exe z9685193.exe PID 1280 wrote to memory of 2044 1280 fe2b1b0feaa71d353720ba9872a3f74979194d47214457ae430d6e5a4104b8ad.exe z9685193.exe PID 1280 wrote to memory of 2044 1280 fe2b1b0feaa71d353720ba9872a3f74979194d47214457ae430d6e5a4104b8ad.exe z9685193.exe PID 1280 wrote to memory of 2044 1280 fe2b1b0feaa71d353720ba9872a3f74979194d47214457ae430d6e5a4104b8ad.exe z9685193.exe PID 2044 wrote to memory of 844 2044 z9685193.exe z1662503.exe PID 2044 wrote to memory of 844 2044 z9685193.exe z1662503.exe PID 2044 wrote to memory of 844 2044 z9685193.exe z1662503.exe PID 2044 wrote to memory of 844 2044 z9685193.exe z1662503.exe PID 2044 wrote to memory of 844 2044 z9685193.exe z1662503.exe PID 2044 wrote to memory of 844 2044 z9685193.exe z1662503.exe PID 2044 wrote to memory of 844 2044 z9685193.exe z1662503.exe PID 844 wrote to memory of 580 844 z1662503.exe o5728447.exe PID 844 wrote to memory of 580 844 z1662503.exe o5728447.exe PID 844 wrote to memory of 580 844 z1662503.exe o5728447.exe PID 844 wrote to memory of 580 844 z1662503.exe o5728447.exe PID 844 wrote to memory of 580 844 z1662503.exe o5728447.exe PID 844 wrote to memory of 580 844 z1662503.exe o5728447.exe PID 844 wrote to memory of 580 844 z1662503.exe o5728447.exe PID 844 wrote to memory of 1784 844 z1662503.exe p7625472.exe PID 844 wrote to memory of 1784 844 z1662503.exe p7625472.exe PID 844 wrote to memory of 1784 844 z1662503.exe p7625472.exe PID 844 wrote to memory of 1784 844 z1662503.exe p7625472.exe PID 844 wrote to memory of 1784 844 z1662503.exe p7625472.exe PID 844 wrote to memory of 1784 844 z1662503.exe p7625472.exe PID 844 wrote to memory of 1784 844 z1662503.exe p7625472.exe PID 1784 wrote to memory of 456 1784 p7625472.exe WerFault.exe PID 1784 wrote to memory of 456 1784 p7625472.exe WerFault.exe PID 1784 wrote to memory of 456 1784 p7625472.exe WerFault.exe PID 1784 wrote to memory of 456 1784 p7625472.exe WerFault.exe PID 1784 wrote to memory of 456 1784 p7625472.exe WerFault.exe PID 1784 wrote to memory of 456 1784 p7625472.exe WerFault.exe PID 1784 wrote to memory of 456 1784 p7625472.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe2b1b0feaa71d353720ba9872a3f74979194d47214457ae430d6e5a4104b8ad.exe"C:\Users\Admin\AppData\Local\Temp\fe2b1b0feaa71d353720ba9872a3f74979194d47214457ae430d6e5a4104b8ad.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9685193.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9685193.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1662503.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1662503.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o5728447.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o5728447.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:580
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p7625472.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p7625472.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1784 -s 6485⤵
- Loads dropped DLL
- Program crash
PID:456
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
701KB
MD5a851a253b99be154c69ee464684bb357
SHA19628a2cdc23b64248e5862698253dfe99dcc66e8
SHA256f4d222ed4e994ad9f52382876d6810010c56e3facbcc20e085fd58ee18f22d6d
SHA5121ecdbb6a3e82bf0b917c0c29549eaa253d7b790a199ee6ab78b59d292afae63430b57da2d86503849b038209e974ed34d65137eb3b53ecff36f1a29aeede2225
-
Filesize
701KB
MD5a851a253b99be154c69ee464684bb357
SHA19628a2cdc23b64248e5862698253dfe99dcc66e8
SHA256f4d222ed4e994ad9f52382876d6810010c56e3facbcc20e085fd58ee18f22d6d
SHA5121ecdbb6a3e82bf0b917c0c29549eaa253d7b790a199ee6ab78b59d292afae63430b57da2d86503849b038209e974ed34d65137eb3b53ecff36f1a29aeede2225
-
Filesize
306KB
MD57752e0a2d8b1efeefc1a0765103ab2c2
SHA1481a3cb9ac7deecaba77146d242fa10065cdb0a4
SHA2568379ee27d400b7abd2285ec5109daf1ae0d2a21dc874ee7ab4cafebd56c2396a
SHA5123c4ba7432e98b3fb980a044a4434ef21e4c666fc126f543d57856fa081ba2bfb53410eeef5244a9bfc6876d1eaa5e54327a6969b7eb3464eeb0878365fc38858
-
Filesize
306KB
MD57752e0a2d8b1efeefc1a0765103ab2c2
SHA1481a3cb9ac7deecaba77146d242fa10065cdb0a4
SHA2568379ee27d400b7abd2285ec5109daf1ae0d2a21dc874ee7ab4cafebd56c2396a
SHA5123c4ba7432e98b3fb980a044a4434ef21e4c666fc126f543d57856fa081ba2bfb53410eeef5244a9bfc6876d1eaa5e54327a6969b7eb3464eeb0878365fc38858
-
Filesize
185KB
MD5bb632e67ad7724017a10d422fc7bdec1
SHA107eeb4cce6e2e02c8558a4a482846bd84e3fdf5b
SHA2569f4895e78bbd851c7382216de5ae79b3b7ab05429e9804ec3c4de3251a1310c8
SHA512fa3475effb88ad3704f06c7e44ad61196cf1ab581adc5f2104f67d1a4e95dc1334fe1c9d24e88c33f0be27ee466db86ca3a236f2240608a9c7fbb3e83ffa2cf9
-
Filesize
185KB
MD5bb632e67ad7724017a10d422fc7bdec1
SHA107eeb4cce6e2e02c8558a4a482846bd84e3fdf5b
SHA2569f4895e78bbd851c7382216de5ae79b3b7ab05429e9804ec3c4de3251a1310c8
SHA512fa3475effb88ad3704f06c7e44ad61196cf1ab581adc5f2104f67d1a4e95dc1334fe1c9d24e88c33f0be27ee466db86ca3a236f2240608a9c7fbb3e83ffa2cf9
-
Filesize
145KB
MD5c3e8eab7424cba5e88a06c9409817e34
SHA133057b2320a69a86e05054d0af965b1532347d26
SHA2567625cd41ccf7bc98d2ad9b1bcb4b73050725302e3c2085c99c6cb98aafec6456
SHA51240237f8b2b6e979b2cb291996abe8b8e81eaa1e8f1cf568319481b2dcf11a70bddb5940c33fbe1f0eb15b20138eee057907c4ea32148b43d7ea2c86b5fc8f36f
-
Filesize
145KB
MD5c3e8eab7424cba5e88a06c9409817e34
SHA133057b2320a69a86e05054d0af965b1532347d26
SHA2567625cd41ccf7bc98d2ad9b1bcb4b73050725302e3c2085c99c6cb98aafec6456
SHA51240237f8b2b6e979b2cb291996abe8b8e81eaa1e8f1cf568319481b2dcf11a70bddb5940c33fbe1f0eb15b20138eee057907c4ea32148b43d7ea2c86b5fc8f36f
-
Filesize
701KB
MD5a851a253b99be154c69ee464684bb357
SHA19628a2cdc23b64248e5862698253dfe99dcc66e8
SHA256f4d222ed4e994ad9f52382876d6810010c56e3facbcc20e085fd58ee18f22d6d
SHA5121ecdbb6a3e82bf0b917c0c29549eaa253d7b790a199ee6ab78b59d292afae63430b57da2d86503849b038209e974ed34d65137eb3b53ecff36f1a29aeede2225
-
Filesize
701KB
MD5a851a253b99be154c69ee464684bb357
SHA19628a2cdc23b64248e5862698253dfe99dcc66e8
SHA256f4d222ed4e994ad9f52382876d6810010c56e3facbcc20e085fd58ee18f22d6d
SHA5121ecdbb6a3e82bf0b917c0c29549eaa253d7b790a199ee6ab78b59d292afae63430b57da2d86503849b038209e974ed34d65137eb3b53ecff36f1a29aeede2225
-
Filesize
306KB
MD57752e0a2d8b1efeefc1a0765103ab2c2
SHA1481a3cb9ac7deecaba77146d242fa10065cdb0a4
SHA2568379ee27d400b7abd2285ec5109daf1ae0d2a21dc874ee7ab4cafebd56c2396a
SHA5123c4ba7432e98b3fb980a044a4434ef21e4c666fc126f543d57856fa081ba2bfb53410eeef5244a9bfc6876d1eaa5e54327a6969b7eb3464eeb0878365fc38858
-
Filesize
306KB
MD57752e0a2d8b1efeefc1a0765103ab2c2
SHA1481a3cb9ac7deecaba77146d242fa10065cdb0a4
SHA2568379ee27d400b7abd2285ec5109daf1ae0d2a21dc874ee7ab4cafebd56c2396a
SHA5123c4ba7432e98b3fb980a044a4434ef21e4c666fc126f543d57856fa081ba2bfb53410eeef5244a9bfc6876d1eaa5e54327a6969b7eb3464eeb0878365fc38858
-
Filesize
185KB
MD5bb632e67ad7724017a10d422fc7bdec1
SHA107eeb4cce6e2e02c8558a4a482846bd84e3fdf5b
SHA2569f4895e78bbd851c7382216de5ae79b3b7ab05429e9804ec3c4de3251a1310c8
SHA512fa3475effb88ad3704f06c7e44ad61196cf1ab581adc5f2104f67d1a4e95dc1334fe1c9d24e88c33f0be27ee466db86ca3a236f2240608a9c7fbb3e83ffa2cf9
-
Filesize
185KB
MD5bb632e67ad7724017a10d422fc7bdec1
SHA107eeb4cce6e2e02c8558a4a482846bd84e3fdf5b
SHA2569f4895e78bbd851c7382216de5ae79b3b7ab05429e9804ec3c4de3251a1310c8
SHA512fa3475effb88ad3704f06c7e44ad61196cf1ab581adc5f2104f67d1a4e95dc1334fe1c9d24e88c33f0be27ee466db86ca3a236f2240608a9c7fbb3e83ffa2cf9
-
Filesize
145KB
MD5c3e8eab7424cba5e88a06c9409817e34
SHA133057b2320a69a86e05054d0af965b1532347d26
SHA2567625cd41ccf7bc98d2ad9b1bcb4b73050725302e3c2085c99c6cb98aafec6456
SHA51240237f8b2b6e979b2cb291996abe8b8e81eaa1e8f1cf568319481b2dcf11a70bddb5940c33fbe1f0eb15b20138eee057907c4ea32148b43d7ea2c86b5fc8f36f
-
Filesize
145KB
MD5c3e8eab7424cba5e88a06c9409817e34
SHA133057b2320a69a86e05054d0af965b1532347d26
SHA2567625cd41ccf7bc98d2ad9b1bcb4b73050725302e3c2085c99c6cb98aafec6456
SHA51240237f8b2b6e979b2cb291996abe8b8e81eaa1e8f1cf568319481b2dcf11a70bddb5940c33fbe1f0eb15b20138eee057907c4ea32148b43d7ea2c86b5fc8f36f
-
Filesize
145KB
MD5c3e8eab7424cba5e88a06c9409817e34
SHA133057b2320a69a86e05054d0af965b1532347d26
SHA2567625cd41ccf7bc98d2ad9b1bcb4b73050725302e3c2085c99c6cb98aafec6456
SHA51240237f8b2b6e979b2cb291996abe8b8e81eaa1e8f1cf568319481b2dcf11a70bddb5940c33fbe1f0eb15b20138eee057907c4ea32148b43d7ea2c86b5fc8f36f
-
Filesize
145KB
MD5c3e8eab7424cba5e88a06c9409817e34
SHA133057b2320a69a86e05054d0af965b1532347d26
SHA2567625cd41ccf7bc98d2ad9b1bcb4b73050725302e3c2085c99c6cb98aafec6456
SHA51240237f8b2b6e979b2cb291996abe8b8e81eaa1e8f1cf568319481b2dcf11a70bddb5940c33fbe1f0eb15b20138eee057907c4ea32148b43d7ea2c86b5fc8f36f
-
Filesize
145KB
MD5c3e8eab7424cba5e88a06c9409817e34
SHA133057b2320a69a86e05054d0af965b1532347d26
SHA2567625cd41ccf7bc98d2ad9b1bcb4b73050725302e3c2085c99c6cb98aafec6456
SHA51240237f8b2b6e979b2cb291996abe8b8e81eaa1e8f1cf568319481b2dcf11a70bddb5940c33fbe1f0eb15b20138eee057907c4ea32148b43d7ea2c86b5fc8f36f
-
Filesize
145KB
MD5c3e8eab7424cba5e88a06c9409817e34
SHA133057b2320a69a86e05054d0af965b1532347d26
SHA2567625cd41ccf7bc98d2ad9b1bcb4b73050725302e3c2085c99c6cb98aafec6456
SHA51240237f8b2b6e979b2cb291996abe8b8e81eaa1e8f1cf568319481b2dcf11a70bddb5940c33fbe1f0eb15b20138eee057907c4ea32148b43d7ea2c86b5fc8f36f
-
Filesize
145KB
MD5c3e8eab7424cba5e88a06c9409817e34
SHA133057b2320a69a86e05054d0af965b1532347d26
SHA2567625cd41ccf7bc98d2ad9b1bcb4b73050725302e3c2085c99c6cb98aafec6456
SHA51240237f8b2b6e979b2cb291996abe8b8e81eaa1e8f1cf568319481b2dcf11a70bddb5940c33fbe1f0eb15b20138eee057907c4ea32148b43d7ea2c86b5fc8f36f