Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2023, 09:04
Static task
static1
Behavioral task
behavioral1
Sample
ac87768a533f3811348106024f4dc4b96d370d069ccf3e2c7b8b0d9114ed2364.exe
Resource
win10v2004-20230220-en
General
-
Target
ac87768a533f3811348106024f4dc4b96d370d069ccf3e2c7b8b0d9114ed2364.exe
-
Size
1.1MB
-
MD5
baf8af00b76a7ed5543419563aac93fc
-
SHA1
179121e33701e2b5a000e1565517489bb4a3c103
-
SHA256
ac87768a533f3811348106024f4dc4b96d370d069ccf3e2c7b8b0d9114ed2364
-
SHA512
d5f0344612c4ed9ce82e99d701de959ebedc0c27fab3725098e6412019b79ebc5f5ad07c93c2c475ee78abda453ab5cae0a42fd4d92437fd1dc5ba0e81b50730
-
SSDEEP
24576:Kyfjmc4gxefex+1plnUiHN6yhSnPOmDJAFF72fO39vtoT8:Ryc4gzGnUiHN6ySnWGsFifONvWT
Malware Config
Extracted
redline
lays
185.161.248.75:4132
-
auth_value
239cb507c4bb32e630b1bee63365fe29
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o7033701.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o7033701.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o7033701.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o7033701.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection o7033701.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o7033701.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 1404 z3411729.exe 2100 z1431615.exe 4276 o7033701.exe 3984 p5249893.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features o7033701.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o7033701.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z1431615.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ac87768a533f3811348106024f4dc4b96d370d069ccf3e2c7b8b0d9114ed2364.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ac87768a533f3811348106024f4dc4b96d370d069ccf3e2c7b8b0d9114ed2364.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z3411729.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z3411729.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z1431615.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2152 sc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4276 o7033701.exe 4276 o7033701.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4276 o7033701.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 384 wrote to memory of 1404 384 ac87768a533f3811348106024f4dc4b96d370d069ccf3e2c7b8b0d9114ed2364.exe 83 PID 384 wrote to memory of 1404 384 ac87768a533f3811348106024f4dc4b96d370d069ccf3e2c7b8b0d9114ed2364.exe 83 PID 384 wrote to memory of 1404 384 ac87768a533f3811348106024f4dc4b96d370d069ccf3e2c7b8b0d9114ed2364.exe 83 PID 1404 wrote to memory of 2100 1404 z3411729.exe 84 PID 1404 wrote to memory of 2100 1404 z3411729.exe 84 PID 1404 wrote to memory of 2100 1404 z3411729.exe 84 PID 2100 wrote to memory of 4276 2100 z1431615.exe 85 PID 2100 wrote to memory of 4276 2100 z1431615.exe 85 PID 2100 wrote to memory of 4276 2100 z1431615.exe 85 PID 2100 wrote to memory of 3984 2100 z1431615.exe 89 PID 2100 wrote to memory of 3984 2100 z1431615.exe 89 PID 2100 wrote to memory of 3984 2100 z1431615.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac87768a533f3811348106024f4dc4b96d370d069ccf3e2c7b8b0d9114ed2364.exe"C:\Users\Admin\AppData\Local\Temp\ac87768a533f3811348106024f4dc4b96d370d069ccf3e2c7b8b0d9114ed2364.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3411729.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3411729.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1431615.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1431615.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o7033701.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o7033701.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4276
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p5249893.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p5249893.exe4⤵
- Executes dropped EXE
PID:3984
-
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2152
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
703KB
MD55eebc8709d9399ed635f87b03b065e1d
SHA1b2f82012808837aa11271f39852cf832775b457d
SHA256e3c3b85aaeff22b1e53bd1cb76b5f2da5ac90f8fd4822a64df9d94542101d32f
SHA5120c12e865b88ca08efeea562cda4efd20663f655ce66f30ec8ce8d0d1e7229725610c92407dacb3aa1504c072cd4a892fbde65d7641b2ce15fc9b5be3800649f7
-
Filesize
703KB
MD55eebc8709d9399ed635f87b03b065e1d
SHA1b2f82012808837aa11271f39852cf832775b457d
SHA256e3c3b85aaeff22b1e53bd1cb76b5f2da5ac90f8fd4822a64df9d94542101d32f
SHA5120c12e865b88ca08efeea562cda4efd20663f655ce66f30ec8ce8d0d1e7229725610c92407dacb3aa1504c072cd4a892fbde65d7641b2ce15fc9b5be3800649f7
-
Filesize
306KB
MD51777f2fd9567b5cd392fa39eebce80d8
SHA154d48111599785cbc6de48a6694d6a1042f0783c
SHA2565c2f78fe91d1210df5e8bd100b3b4b90eb39365697bb3172561ef348cdb83361
SHA512104055840c6c21fc1c77b8e7417fee52d387bc0bbbaab698be6031ebc7ad190d7dd1ff94d0e614be4f0590d79e1090707fc15e6e82eb2385a1c0ed7d1a83ed32
-
Filesize
306KB
MD51777f2fd9567b5cd392fa39eebce80d8
SHA154d48111599785cbc6de48a6694d6a1042f0783c
SHA2565c2f78fe91d1210df5e8bd100b3b4b90eb39365697bb3172561ef348cdb83361
SHA512104055840c6c21fc1c77b8e7417fee52d387bc0bbbaab698be6031ebc7ad190d7dd1ff94d0e614be4f0590d79e1090707fc15e6e82eb2385a1c0ed7d1a83ed32
-
Filesize
185KB
MD5077599959f67f793fb698e62d06816ea
SHA1641ecbe73ee35dcf6d8863b2298642a51114f041
SHA25625dcc3d8f7aa6cda23b5adc4fd419b258daf8e1402e5e3c26bdc7a9d9b8a8e47
SHA51293f8a3c1fd6335e6bf812108e190263f93c9a0e77477ad03275e5e4a8fd42b26d6af42de200fab2bd4a11f39b0556da2b297277327ed2191162fc9da1dce5216
-
Filesize
185KB
MD5077599959f67f793fb698e62d06816ea
SHA1641ecbe73ee35dcf6d8863b2298642a51114f041
SHA25625dcc3d8f7aa6cda23b5adc4fd419b258daf8e1402e5e3c26bdc7a9d9b8a8e47
SHA51293f8a3c1fd6335e6bf812108e190263f93c9a0e77477ad03275e5e4a8fd42b26d6af42de200fab2bd4a11f39b0556da2b297277327ed2191162fc9da1dce5216
-
Filesize
145KB
MD5740df2727ab09ed7da8bdbbc44348728
SHA10d006a01d890b011d27e748f7243d0e75a085336
SHA25629233a15a8c716db5f74fb8a144754c549e35486704500ae882042dea714b533
SHA512341889737a73dd641d4234aebca89223d259f4059a2270d195f0354f94d0120f0cd278de8a0670c3ca317cfffb59e103d32c8149ce450f845a69553527d8349a
-
Filesize
145KB
MD5740df2727ab09ed7da8bdbbc44348728
SHA10d006a01d890b011d27e748f7243d0e75a085336
SHA25629233a15a8c716db5f74fb8a144754c549e35486704500ae882042dea714b533
SHA512341889737a73dd641d4234aebca89223d259f4059a2270d195f0354f94d0120f0cd278de8a0670c3ca317cfffb59e103d32c8149ce450f845a69553527d8349a