Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
18/05/2023, 13:51
Static task
static1
Behavioral task
behavioral1
Sample
259c471444aefbfb49e6d2b84872fbde7e96d983478f0f6807840a2c2dc00358.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
259c471444aefbfb49e6d2b84872fbde7e96d983478f0f6807840a2c2dc00358.exe
Resource
win10v2004-20230220-en
General
-
Target
259c471444aefbfb49e6d2b84872fbde7e96d983478f0f6807840a2c2dc00358.exe
-
Size
1.0MB
-
MD5
acc0494c47036396c97aaf4a27cd5f0c
-
SHA1
3aa03956c981d32a3e826678d41fdb0a265955ee
-
SHA256
259c471444aefbfb49e6d2b84872fbde7e96d983478f0f6807840a2c2dc00358
-
SHA512
538b282e0b002f59280418e8ac6fb5271530742c063f388067c29217c55c3bb91ecc893a22da8004e7f42062846cf4a75e268c1b746b338b704fdf8030db0b12
-
SSDEEP
24576:Oy4RJy3H4O0mgiszZ7O6gBHmd7u077TGDOQVkTo3E5q:d4Je90jEBHOu0GD3VkTb5
Malware Config
Extracted
redline
dusor
185.161.248.25:4132
-
auth_value
b81217cf5a516122d407aeaf79d22948
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k4749057.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k4749057.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k4749057.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k4749057.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k4749057.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k4749057.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 1428 y8077980.exe 3720 y1918597.exe 3924 k4749057.exe 4968 l0443020.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k4749057.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k4749057.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y8077980.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y1918597.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y1918597.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 259c471444aefbfb49e6d2b84872fbde7e96d983478f0f6807840a2c2dc00358.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 259c471444aefbfb49e6d2b84872fbde7e96d983478f0f6807840a2c2dc00358.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y8077980.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3924 k4749057.exe 3924 k4749057.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3924 k4749057.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1304 wrote to memory of 1428 1304 259c471444aefbfb49e6d2b84872fbde7e96d983478f0f6807840a2c2dc00358.exe 71 PID 1304 wrote to memory of 1428 1304 259c471444aefbfb49e6d2b84872fbde7e96d983478f0f6807840a2c2dc00358.exe 71 PID 1304 wrote to memory of 1428 1304 259c471444aefbfb49e6d2b84872fbde7e96d983478f0f6807840a2c2dc00358.exe 71 PID 1428 wrote to memory of 3720 1428 y8077980.exe 83 PID 1428 wrote to memory of 3720 1428 y8077980.exe 83 PID 1428 wrote to memory of 3720 1428 y8077980.exe 83 PID 3720 wrote to memory of 3924 3720 y1918597.exe 85 PID 3720 wrote to memory of 3924 3720 y1918597.exe 85 PID 3720 wrote to memory of 3924 3720 y1918597.exe 85 PID 3720 wrote to memory of 4968 3720 y1918597.exe 86 PID 3720 wrote to memory of 4968 3720 y1918597.exe 86 PID 3720 wrote to memory of 4968 3720 y1918597.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\259c471444aefbfb49e6d2b84872fbde7e96d983478f0f6807840a2c2dc00358.exe"C:\Users\Admin\AppData\Local\Temp\259c471444aefbfb49e6d2b84872fbde7e96d983478f0f6807840a2c2dc00358.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8077980.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8077980.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y1918597.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y1918597.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k4749057.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k4749057.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3924
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l0443020.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l0443020.exe4⤵
- Executes dropped EXE
PID:4968
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
748KB
MD597c1af0cb4bc6f7332c5786eaeb77bd1
SHA12d65fdf4889f0886d7f30311888409c7f1960de1
SHA2564b4d9fd7b93823292e5b6a3683b3b9b6bb5a925547a66f1e04f692287a126e79
SHA51266f9bda98899f0b25f6b55bf4e2b88e564ce13176f3aa26fc13cbc30ed42f54d54c01bd43ff096fd7ac5d943cf789481a8bc8eaad6048d8922e2ee59e424bf76
-
Filesize
748KB
MD597c1af0cb4bc6f7332c5786eaeb77bd1
SHA12d65fdf4889f0886d7f30311888409c7f1960de1
SHA2564b4d9fd7b93823292e5b6a3683b3b9b6bb5a925547a66f1e04f692287a126e79
SHA51266f9bda98899f0b25f6b55bf4e2b88e564ce13176f3aa26fc13cbc30ed42f54d54c01bd43ff096fd7ac5d943cf789481a8bc8eaad6048d8922e2ee59e424bf76
-
Filesize
304KB
MD5b01b515b2fbb8cfd8164cf3cdd145a8c
SHA1730e8b3faef4d229dd046c0d331a585e3dab4b3d
SHA25624b5da971ae128846c9c7dca617bc66527ca88031783ba5083377ce1a86fb521
SHA512c0a708fe637453faddf1d0a0d36a0f12b95656d863eecd7cd9bacf1a69335cd90c0d90bf36e66f269b7858cb606a52ebdf730d2ef04dea4b035601d93973f639
-
Filesize
304KB
MD5b01b515b2fbb8cfd8164cf3cdd145a8c
SHA1730e8b3faef4d229dd046c0d331a585e3dab4b3d
SHA25624b5da971ae128846c9c7dca617bc66527ca88031783ba5083377ce1a86fb521
SHA512c0a708fe637453faddf1d0a0d36a0f12b95656d863eecd7cd9bacf1a69335cd90c0d90bf36e66f269b7858cb606a52ebdf730d2ef04dea4b035601d93973f639
-
Filesize
184KB
MD5bcca8bbba2840c1a00b0ba406d49939a
SHA1a1fdb03609bc1d8aeb2eef4ec12eb6bdc14365a1
SHA256178541b2de42cdffd48c8ce529588f7100474c2fc99c757fe463882cbc598dd6
SHA5124f279f7ca54b32d70bdc91016a29ca4016092ea90cc3d8d175836d8dc7b27b28177a2f1ebdacc95f29d88c210d76a5dfbac15c0e314694650a974cf983d5173d
-
Filesize
184KB
MD5bcca8bbba2840c1a00b0ba406d49939a
SHA1a1fdb03609bc1d8aeb2eef4ec12eb6bdc14365a1
SHA256178541b2de42cdffd48c8ce529588f7100474c2fc99c757fe463882cbc598dd6
SHA5124f279f7ca54b32d70bdc91016a29ca4016092ea90cc3d8d175836d8dc7b27b28177a2f1ebdacc95f29d88c210d76a5dfbac15c0e314694650a974cf983d5173d
-
Filesize
145KB
MD596830ff79b642eab47803d79ddf89c2b
SHA14afd7aaa893f7be8386cfa268b3a9aecde0dc602
SHA2567bdf0cf09e23051b265e838f8b612157c92b20b811f21dd79d2e0f1929f17ff6
SHA5126e8ea2370b83ab59098cefb7e1530d8e0398366dd8653906fdb89fdfce08074530f5afa53f2f113ea1f562d21264375a199bfa79a7e8fbf45ccc95886180d763
-
Filesize
145KB
MD596830ff79b642eab47803d79ddf89c2b
SHA14afd7aaa893f7be8386cfa268b3a9aecde0dc602
SHA2567bdf0cf09e23051b265e838f8b612157c92b20b811f21dd79d2e0f1929f17ff6
SHA5126e8ea2370b83ab59098cefb7e1530d8e0398366dd8653906fdb89fdfce08074530f5afa53f2f113ea1f562d21264375a199bfa79a7e8fbf45ccc95886180d763