Analysis
-
max time kernel
48s -
max time network
80s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
19-05-2023 04:50
Static task
static1
Behavioral task
behavioral1
Sample
bae351dd7dbdef72c256b17fd91ef2e1b5f578ed128b07fee1480f6618f79852.exe
Resource
win10-20230220-en
General
-
Target
bae351dd7dbdef72c256b17fd91ef2e1b5f578ed128b07fee1480f6618f79852.exe
-
Size
1021KB
-
MD5
8c88e40112a76c238d9ba1a931b57aa3
-
SHA1
167fdfe7eae2084cf3a1feba2ecb8fa6e5783408
-
SHA256
bae351dd7dbdef72c256b17fd91ef2e1b5f578ed128b07fee1480f6618f79852
-
SHA512
7f6756bc5a447b6eed9d9adbd3bfe257696df8f6975a436f0c8693302a966a5cca8adb2a30054d6cb8217589f60e2fa8a81a090e3904ec38e428e1e44edfbce1
-
SSDEEP
24576:RyF3lQqaExqrKiFxSqSR2tTfUS8D0x7A:EOK8sxrD0J
Malware Config
Extracted
redline
lols
77.91.68.253:41783
-
auth_value
07dccfc2986896754e6cde616a0a7868
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o1402593.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o1402593.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o1402593.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o1402593.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o1402593.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 4144 z3218397.exe 4140 z0525532.exe 5036 o1402593.exe 1408 p5412455.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features o1402593.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o1402593.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce bae351dd7dbdef72c256b17fd91ef2e1b5f578ed128b07fee1480f6618f79852.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bae351dd7dbdef72c256b17fd91ef2e1b5f578ed128b07fee1480f6618f79852.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z3218397.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z3218397.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z0525532.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z0525532.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4064 1408 WerFault.exe 69 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5036 o1402593.exe 5036 o1402593.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5036 o1402593.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3508 wrote to memory of 4144 3508 bae351dd7dbdef72c256b17fd91ef2e1b5f578ed128b07fee1480f6618f79852.exe 66 PID 3508 wrote to memory of 4144 3508 bae351dd7dbdef72c256b17fd91ef2e1b5f578ed128b07fee1480f6618f79852.exe 66 PID 3508 wrote to memory of 4144 3508 bae351dd7dbdef72c256b17fd91ef2e1b5f578ed128b07fee1480f6618f79852.exe 66 PID 4144 wrote to memory of 4140 4144 z3218397.exe 67 PID 4144 wrote to memory of 4140 4144 z3218397.exe 67 PID 4144 wrote to memory of 4140 4144 z3218397.exe 67 PID 4140 wrote to memory of 5036 4140 z0525532.exe 68 PID 4140 wrote to memory of 5036 4140 z0525532.exe 68 PID 4140 wrote to memory of 5036 4140 z0525532.exe 68 PID 4140 wrote to memory of 1408 4140 z0525532.exe 69 PID 4140 wrote to memory of 1408 4140 z0525532.exe 69 PID 4140 wrote to memory of 1408 4140 z0525532.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\bae351dd7dbdef72c256b17fd91ef2e1b5f578ed128b07fee1480f6618f79852.exe"C:\Users\Admin\AppData\Local\Temp\bae351dd7dbdef72c256b17fd91ef2e1b5f578ed128b07fee1480f6618f79852.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3218397.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3218397.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0525532.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0525532.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o1402593.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o1402593.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5036
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p5412455.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p5412455.exe4⤵
- Executes dropped EXE
PID:1408 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1408 -s 9485⤵
- Program crash
PID:4064
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
577KB
MD524f816aa19fc69d2ff82f977a04439b8
SHA145875befee3c65b7a5ee32e098a942903b3c87e9
SHA256fd90491dc3817490eb613486d5a2dec11198577ef26b920c5cdc435e73e49c98
SHA512ce22c75ec1fa14ea3aa3b9fd89bb7a22bac177efb6e91b39bba9959916bf869aa5d2272ab7cd13e27f99e0b1f0769d0a5ac440c28b0d50db59e702fee1d99cfe
-
Filesize
577KB
MD524f816aa19fc69d2ff82f977a04439b8
SHA145875befee3c65b7a5ee32e098a942903b3c87e9
SHA256fd90491dc3817490eb613486d5a2dec11198577ef26b920c5cdc435e73e49c98
SHA512ce22c75ec1fa14ea3aa3b9fd89bb7a22bac177efb6e91b39bba9959916bf869aa5d2272ab7cd13e27f99e0b1f0769d0a5ac440c28b0d50db59e702fee1d99cfe
-
Filesize
305KB
MD570a0140d515f057b788d14558b775f19
SHA177497bc42592786c8a1f6be937c5c413ff7577dc
SHA256263d4e793d1c61a9b6602263b8c233e5563963df4aa379ef61de503689bd2d38
SHA512798db50306260a9c7ba1485184f2237a2912bf006f6ea752c519783e1e3984fc5adeed39163a6271fbc034e6c428e1d3d9e7240ab5d5a05663d760274d03a87a
-
Filesize
305KB
MD570a0140d515f057b788d14558b775f19
SHA177497bc42592786c8a1f6be937c5c413ff7577dc
SHA256263d4e793d1c61a9b6602263b8c233e5563963df4aa379ef61de503689bd2d38
SHA512798db50306260a9c7ba1485184f2237a2912bf006f6ea752c519783e1e3984fc5adeed39163a6271fbc034e6c428e1d3d9e7240ab5d5a05663d760274d03a87a
-
Filesize
184KB
MD54c94e0df16c58143287479c74f3e54e7
SHA1f93129b20ac587e95b91f611d4c58b3005b140a9
SHA256c55f04038db70d84fe431937ecf878573a31f0777ea612ad482f76c9a9968a2f
SHA51272d63fafde9940b14b6ffcad664c287adadee194d8bd3cd685916814ab2b6be4fee82cd6af2035433a1ec39609d2a4ca74cffa414a92182c06ccd4d86b085f09
-
Filesize
184KB
MD54c94e0df16c58143287479c74f3e54e7
SHA1f93129b20ac587e95b91f611d4c58b3005b140a9
SHA256c55f04038db70d84fe431937ecf878573a31f0777ea612ad482f76c9a9968a2f
SHA51272d63fafde9940b14b6ffcad664c287adadee194d8bd3cd685916814ab2b6be4fee82cd6af2035433a1ec39609d2a4ca74cffa414a92182c06ccd4d86b085f09
-
Filesize
145KB
MD56633962990a012aad8ac3cc9d3b7ed8e
SHA1f110187812482b500120d4c7be03c5d377f3532d
SHA256d78edbeb1d5a18a5570de6e461b7400a748dd7dd6f7889387f688d564f5d0049
SHA512c757735ec6b3ea5956dc011c8774e9caec1337aeab5010e49e7a100b40612c335857d963137fa0a5084a321586ef3b6d130af37dda9da8737b47faad02d7230c
-
Filesize
145KB
MD56633962990a012aad8ac3cc9d3b7ed8e
SHA1f110187812482b500120d4c7be03c5d377f3532d
SHA256d78edbeb1d5a18a5570de6e461b7400a748dd7dd6f7889387f688d564f5d0049
SHA512c757735ec6b3ea5956dc011c8774e9caec1337aeab5010e49e7a100b40612c335857d963137fa0a5084a321586ef3b6d130af37dda9da8737b47faad02d7230c