Analysis
-
max time kernel
130s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
18-05-2023 13:39
Static task
static1
Behavioral task
behavioral1
Sample
0c797cd9fe6719a8503ba2bd241a6278e056c10b14caa06a5d2dcfbd1fdbd3ad.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0c797cd9fe6719a8503ba2bd241a6278e056c10b14caa06a5d2dcfbd1fdbd3ad.exe
Resource
win10v2004-20230220-en
General
-
Target
0c797cd9fe6719a8503ba2bd241a6278e056c10b14caa06a5d2dcfbd1fdbd3ad.exe
-
Size
1.0MB
-
MD5
e8eb299aab88f4a9f0e810741bb16b34
-
SHA1
5eef9d9aecfceb363ad2c01d7b3b09582c84e394
-
SHA256
0c797cd9fe6719a8503ba2bd241a6278e056c10b14caa06a5d2dcfbd1fdbd3ad
-
SHA512
fd0fae772e86c2542b9a2137f97ef06bd689fa263638b025b263ff5c1fcd382abd9596e2a9df449aa8818e5247d93fd9be38b7f7621f42676e18cc46264d04fe
-
SSDEEP
24576:Sy9C28aBd3KBmNnScreojy9VA+GvH2splenZbSu4TBO3UnBW:5A23Bd33Nn5nyVA+IH2ZOTBOM
Malware Config
Extracted
redline
musor
185.161.248.25:4132
-
auth_value
b044e31277d21cb0a56d9461e5e741d5
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a6676004.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a6676004.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a6676004.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a6676004.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a6676004.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a6676004.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 1668 v2892900.exe 1736 v3003153.exe 320 a6676004.exe 1936 b2502552.exe -
Loads dropped DLL 8 IoCs
pid Process 1696 0c797cd9fe6719a8503ba2bd241a6278e056c10b14caa06a5d2dcfbd1fdbd3ad.exe 1668 v2892900.exe 1668 v2892900.exe 1736 v3003153.exe 1736 v3003153.exe 320 a6676004.exe 1736 v3003153.exe 1936 b2502552.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a6676004.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features a6676004.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce v2892900.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v2892900.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce v3003153.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v3003153.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0c797cd9fe6719a8503ba2bd241a6278e056c10b14caa06a5d2dcfbd1fdbd3ad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0c797cd9fe6719a8503ba2bd241a6278e056c10b14caa06a5d2dcfbd1fdbd3ad.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 320 a6676004.exe 320 a6676004.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 320 a6676004.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1696 wrote to memory of 1668 1696 0c797cd9fe6719a8503ba2bd241a6278e056c10b14caa06a5d2dcfbd1fdbd3ad.exe 27 PID 1696 wrote to memory of 1668 1696 0c797cd9fe6719a8503ba2bd241a6278e056c10b14caa06a5d2dcfbd1fdbd3ad.exe 27 PID 1696 wrote to memory of 1668 1696 0c797cd9fe6719a8503ba2bd241a6278e056c10b14caa06a5d2dcfbd1fdbd3ad.exe 27 PID 1696 wrote to memory of 1668 1696 0c797cd9fe6719a8503ba2bd241a6278e056c10b14caa06a5d2dcfbd1fdbd3ad.exe 27 PID 1696 wrote to memory of 1668 1696 0c797cd9fe6719a8503ba2bd241a6278e056c10b14caa06a5d2dcfbd1fdbd3ad.exe 27 PID 1696 wrote to memory of 1668 1696 0c797cd9fe6719a8503ba2bd241a6278e056c10b14caa06a5d2dcfbd1fdbd3ad.exe 27 PID 1696 wrote to memory of 1668 1696 0c797cd9fe6719a8503ba2bd241a6278e056c10b14caa06a5d2dcfbd1fdbd3ad.exe 27 PID 1668 wrote to memory of 1736 1668 v2892900.exe 28 PID 1668 wrote to memory of 1736 1668 v2892900.exe 28 PID 1668 wrote to memory of 1736 1668 v2892900.exe 28 PID 1668 wrote to memory of 1736 1668 v2892900.exe 28 PID 1668 wrote to memory of 1736 1668 v2892900.exe 28 PID 1668 wrote to memory of 1736 1668 v2892900.exe 28 PID 1668 wrote to memory of 1736 1668 v2892900.exe 28 PID 1736 wrote to memory of 320 1736 v3003153.exe 29 PID 1736 wrote to memory of 320 1736 v3003153.exe 29 PID 1736 wrote to memory of 320 1736 v3003153.exe 29 PID 1736 wrote to memory of 320 1736 v3003153.exe 29 PID 1736 wrote to memory of 320 1736 v3003153.exe 29 PID 1736 wrote to memory of 320 1736 v3003153.exe 29 PID 1736 wrote to memory of 320 1736 v3003153.exe 29 PID 1736 wrote to memory of 1936 1736 v3003153.exe 30 PID 1736 wrote to memory of 1936 1736 v3003153.exe 30 PID 1736 wrote to memory of 1936 1736 v3003153.exe 30 PID 1736 wrote to memory of 1936 1736 v3003153.exe 30 PID 1736 wrote to memory of 1936 1736 v3003153.exe 30 PID 1736 wrote to memory of 1936 1736 v3003153.exe 30 PID 1736 wrote to memory of 1936 1736 v3003153.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c797cd9fe6719a8503ba2bd241a6278e056c10b14caa06a5d2dcfbd1fdbd3ad.exe"C:\Users\Admin\AppData\Local\Temp\0c797cd9fe6719a8503ba2bd241a6278e056c10b14caa06a5d2dcfbd1fdbd3ad.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2892900.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2892900.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3003153.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3003153.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a6676004.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a6676004.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:320
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2502552.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2502552.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1936
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
749KB
MD56c9a8f494c48b6e625987633ea5b6306
SHA165be67aff4f194e9426e1c18ace510e50ea62e39
SHA2562aa18f8e62c90e794fd1553d537359d552ac7d35f6f5582485516a31a92cfc13
SHA512aaf717fc3ab3ed8a9976a755636165e90ac94c2ea76ee1eaf8f38b5759003879e26b23c8170fccc0336c8aed07b474492910c283cd639b8413ec6efb80cce0d9
-
Filesize
749KB
MD56c9a8f494c48b6e625987633ea5b6306
SHA165be67aff4f194e9426e1c18ace510e50ea62e39
SHA2562aa18f8e62c90e794fd1553d537359d552ac7d35f6f5582485516a31a92cfc13
SHA512aaf717fc3ab3ed8a9976a755636165e90ac94c2ea76ee1eaf8f38b5759003879e26b23c8170fccc0336c8aed07b474492910c283cd639b8413ec6efb80cce0d9
-
Filesize
305KB
MD5bc080dd4c547fd19d35f89cd4024f0be
SHA1e7e54446a2bfd1273d37d273ffc4424dd6db28ca
SHA25631d75834b41827987b9bce707dc02810f73880ff7f7888f00a8bc07c8c1a81aa
SHA5120523f73505bad7852cc25320be99729983201afad9989a5d26e3c9dfb50e0476d694901007c36bf2768914f2bd4760801e3a4e6d6aebe6f1b8813e0f11599471
-
Filesize
305KB
MD5bc080dd4c547fd19d35f89cd4024f0be
SHA1e7e54446a2bfd1273d37d273ffc4424dd6db28ca
SHA25631d75834b41827987b9bce707dc02810f73880ff7f7888f00a8bc07c8c1a81aa
SHA5120523f73505bad7852cc25320be99729983201afad9989a5d26e3c9dfb50e0476d694901007c36bf2768914f2bd4760801e3a4e6d6aebe6f1b8813e0f11599471
-
Filesize
183KB
MD5ce58e10273d08479be30eea081b640ab
SHA16bdd3164025b479e8810b9ac39b32ecdbdabc299
SHA256d04bdda05ffbdea140fdf0475bbad5e536d0a04e56584f355d88ce54680a526b
SHA512d3995aa53567d9e7ddf6e4b82309977b6b662d238fe1391528ba1c50db1f46e699513a48fab0dbe7126f42b750e53457477198e833de062fc2d0eaccb0cda899
-
Filesize
183KB
MD5ce58e10273d08479be30eea081b640ab
SHA16bdd3164025b479e8810b9ac39b32ecdbdabc299
SHA256d04bdda05ffbdea140fdf0475bbad5e536d0a04e56584f355d88ce54680a526b
SHA512d3995aa53567d9e7ddf6e4b82309977b6b662d238fe1391528ba1c50db1f46e699513a48fab0dbe7126f42b750e53457477198e833de062fc2d0eaccb0cda899
-
Filesize
145KB
MD5686e6efed0ac2e9ac27d4722971bcca9
SHA1ce989ccc962d6999537d4d4f0fe77b839df6bc8e
SHA256f2b9e5ce317bce2bf647080533c2b3cc24551dcf64444eb6f7bd38186222daac
SHA512523158e80eb89efcc3acb0153917e53a400031c9baec0661611a426cf8b2e32472d02316be35026e0b1c27e828d79d44192bcf0c4e6cb009dedca7325d0d72be
-
Filesize
145KB
MD5686e6efed0ac2e9ac27d4722971bcca9
SHA1ce989ccc962d6999537d4d4f0fe77b839df6bc8e
SHA256f2b9e5ce317bce2bf647080533c2b3cc24551dcf64444eb6f7bd38186222daac
SHA512523158e80eb89efcc3acb0153917e53a400031c9baec0661611a426cf8b2e32472d02316be35026e0b1c27e828d79d44192bcf0c4e6cb009dedca7325d0d72be
-
Filesize
749KB
MD56c9a8f494c48b6e625987633ea5b6306
SHA165be67aff4f194e9426e1c18ace510e50ea62e39
SHA2562aa18f8e62c90e794fd1553d537359d552ac7d35f6f5582485516a31a92cfc13
SHA512aaf717fc3ab3ed8a9976a755636165e90ac94c2ea76ee1eaf8f38b5759003879e26b23c8170fccc0336c8aed07b474492910c283cd639b8413ec6efb80cce0d9
-
Filesize
749KB
MD56c9a8f494c48b6e625987633ea5b6306
SHA165be67aff4f194e9426e1c18ace510e50ea62e39
SHA2562aa18f8e62c90e794fd1553d537359d552ac7d35f6f5582485516a31a92cfc13
SHA512aaf717fc3ab3ed8a9976a755636165e90ac94c2ea76ee1eaf8f38b5759003879e26b23c8170fccc0336c8aed07b474492910c283cd639b8413ec6efb80cce0d9
-
Filesize
305KB
MD5bc080dd4c547fd19d35f89cd4024f0be
SHA1e7e54446a2bfd1273d37d273ffc4424dd6db28ca
SHA25631d75834b41827987b9bce707dc02810f73880ff7f7888f00a8bc07c8c1a81aa
SHA5120523f73505bad7852cc25320be99729983201afad9989a5d26e3c9dfb50e0476d694901007c36bf2768914f2bd4760801e3a4e6d6aebe6f1b8813e0f11599471
-
Filesize
305KB
MD5bc080dd4c547fd19d35f89cd4024f0be
SHA1e7e54446a2bfd1273d37d273ffc4424dd6db28ca
SHA25631d75834b41827987b9bce707dc02810f73880ff7f7888f00a8bc07c8c1a81aa
SHA5120523f73505bad7852cc25320be99729983201afad9989a5d26e3c9dfb50e0476d694901007c36bf2768914f2bd4760801e3a4e6d6aebe6f1b8813e0f11599471
-
Filesize
183KB
MD5ce58e10273d08479be30eea081b640ab
SHA16bdd3164025b479e8810b9ac39b32ecdbdabc299
SHA256d04bdda05ffbdea140fdf0475bbad5e536d0a04e56584f355d88ce54680a526b
SHA512d3995aa53567d9e7ddf6e4b82309977b6b662d238fe1391528ba1c50db1f46e699513a48fab0dbe7126f42b750e53457477198e833de062fc2d0eaccb0cda899
-
Filesize
183KB
MD5ce58e10273d08479be30eea081b640ab
SHA16bdd3164025b479e8810b9ac39b32ecdbdabc299
SHA256d04bdda05ffbdea140fdf0475bbad5e536d0a04e56584f355d88ce54680a526b
SHA512d3995aa53567d9e7ddf6e4b82309977b6b662d238fe1391528ba1c50db1f46e699513a48fab0dbe7126f42b750e53457477198e833de062fc2d0eaccb0cda899
-
Filesize
145KB
MD5686e6efed0ac2e9ac27d4722971bcca9
SHA1ce989ccc962d6999537d4d4f0fe77b839df6bc8e
SHA256f2b9e5ce317bce2bf647080533c2b3cc24551dcf64444eb6f7bd38186222daac
SHA512523158e80eb89efcc3acb0153917e53a400031c9baec0661611a426cf8b2e32472d02316be35026e0b1c27e828d79d44192bcf0c4e6cb009dedca7325d0d72be
-
Filesize
145KB
MD5686e6efed0ac2e9ac27d4722971bcca9
SHA1ce989ccc962d6999537d4d4f0fe77b839df6bc8e
SHA256f2b9e5ce317bce2bf647080533c2b3cc24551dcf64444eb6f7bd38186222daac
SHA512523158e80eb89efcc3acb0153917e53a400031c9baec0661611a426cf8b2e32472d02316be35026e0b1c27e828d79d44192bcf0c4e6cb009dedca7325d0d72be