Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
20-05-2023 01:26
Static task
static1
Behavioral task
behavioral1
Sample
7a19fd275109a98ace8fb30d84180a7a497fd6d0a4b7e3151039bb342cc4b9e9.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
7a19fd275109a98ace8fb30d84180a7a497fd6d0a4b7e3151039bb342cc4b9e9.exe
Resource
win10v2004-20230220-en
General
-
Target
7a19fd275109a98ace8fb30d84180a7a497fd6d0a4b7e3151039bb342cc4b9e9.exe
-
Size
1.0MB
-
MD5
83e69d2f1054c26576de28402d6dd912
-
SHA1
891d6439771606dd94b294ff98e66835e2c9faa7
-
SHA256
7a19fd275109a98ace8fb30d84180a7a497fd6d0a4b7e3151039bb342cc4b9e9
-
SHA512
4792d02bafa9ab480d2194d2bc4b749e72edd70b3ecb13c76a77dc040961741b683819a7bfffcc2d04127d09d265b119a5b598020b85ff70cb7f109ae02105fa
-
SSDEEP
24576:JyczWJC8P9AwgjR4i4lyMT/Gjw78ZI6Kzk:8c6CmCwgjCi49/G6
Malware Config
Extracted
redline
dako
77.91.68.253:41783
-
auth_value
c6bc6a7edb74e0eff37800710e07bee1
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection k0024048.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k0024048.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k0024048.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k0024048.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k0024048.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k0024048.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 1100 y9142316.exe 980 y9479436.exe 676 k0024048.exe 1236 l6539524.exe -
Loads dropped DLL 8 IoCs
pid Process 1060 7a19fd275109a98ace8fb30d84180a7a497fd6d0a4b7e3151039bb342cc4b9e9.exe 1100 y9142316.exe 1100 y9142316.exe 980 y9479436.exe 980 y9479436.exe 676 k0024048.exe 980 y9479436.exe 1236 l6539524.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features k0024048.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k0024048.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7a19fd275109a98ace8fb30d84180a7a497fd6d0a4b7e3151039bb342cc4b9e9.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce y9142316.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y9142316.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce y9479436.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y9479436.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 7a19fd275109a98ace8fb30d84180a7a497fd6d0a4b7e3151039bb342cc4b9e9.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 676 k0024048.exe 676 k0024048.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 676 k0024048.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1060 wrote to memory of 1100 1060 7a19fd275109a98ace8fb30d84180a7a497fd6d0a4b7e3151039bb342cc4b9e9.exe 28 PID 1060 wrote to memory of 1100 1060 7a19fd275109a98ace8fb30d84180a7a497fd6d0a4b7e3151039bb342cc4b9e9.exe 28 PID 1060 wrote to memory of 1100 1060 7a19fd275109a98ace8fb30d84180a7a497fd6d0a4b7e3151039bb342cc4b9e9.exe 28 PID 1060 wrote to memory of 1100 1060 7a19fd275109a98ace8fb30d84180a7a497fd6d0a4b7e3151039bb342cc4b9e9.exe 28 PID 1060 wrote to memory of 1100 1060 7a19fd275109a98ace8fb30d84180a7a497fd6d0a4b7e3151039bb342cc4b9e9.exe 28 PID 1060 wrote to memory of 1100 1060 7a19fd275109a98ace8fb30d84180a7a497fd6d0a4b7e3151039bb342cc4b9e9.exe 28 PID 1060 wrote to memory of 1100 1060 7a19fd275109a98ace8fb30d84180a7a497fd6d0a4b7e3151039bb342cc4b9e9.exe 28 PID 1100 wrote to memory of 980 1100 y9142316.exe 29 PID 1100 wrote to memory of 980 1100 y9142316.exe 29 PID 1100 wrote to memory of 980 1100 y9142316.exe 29 PID 1100 wrote to memory of 980 1100 y9142316.exe 29 PID 1100 wrote to memory of 980 1100 y9142316.exe 29 PID 1100 wrote to memory of 980 1100 y9142316.exe 29 PID 1100 wrote to memory of 980 1100 y9142316.exe 29 PID 980 wrote to memory of 676 980 y9479436.exe 30 PID 980 wrote to memory of 676 980 y9479436.exe 30 PID 980 wrote to memory of 676 980 y9479436.exe 30 PID 980 wrote to memory of 676 980 y9479436.exe 30 PID 980 wrote to memory of 676 980 y9479436.exe 30 PID 980 wrote to memory of 676 980 y9479436.exe 30 PID 980 wrote to memory of 676 980 y9479436.exe 30 PID 980 wrote to memory of 1236 980 y9479436.exe 31 PID 980 wrote to memory of 1236 980 y9479436.exe 31 PID 980 wrote to memory of 1236 980 y9479436.exe 31 PID 980 wrote to memory of 1236 980 y9479436.exe 31 PID 980 wrote to memory of 1236 980 y9479436.exe 31 PID 980 wrote to memory of 1236 980 y9479436.exe 31 PID 980 wrote to memory of 1236 980 y9479436.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a19fd275109a98ace8fb30d84180a7a497fd6d0a4b7e3151039bb342cc4b9e9.exe"C:\Users\Admin\AppData\Local\Temp\7a19fd275109a98ace8fb30d84180a7a497fd6d0a4b7e3151039bb342cc4b9e9.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9142316.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9142316.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y9479436.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y9479436.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k0024048.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k0024048.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:676
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l6539524.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l6539524.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1236
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
750KB
MD57fe29742955e3b84e9495a93ad42953e
SHA1f00c8be4ab5c37abf20bb406fdcc62be765c49ff
SHA2567ad4053177b519ea097ad128d0c2ecf53e701ef67bf29d3b7297001d12d8fffe
SHA512f0c76e862ae45d5fe88e44693dfe686de2365ee9d2d6c61d0a6ac71033bb9b5a9e91b90862d4bb3a356ab14ec40718a06bf9cebb5edf445c0543c99fb8de5d7f
-
Filesize
750KB
MD57fe29742955e3b84e9495a93ad42953e
SHA1f00c8be4ab5c37abf20bb406fdcc62be765c49ff
SHA2567ad4053177b519ea097ad128d0c2ecf53e701ef67bf29d3b7297001d12d8fffe
SHA512f0c76e862ae45d5fe88e44693dfe686de2365ee9d2d6c61d0a6ac71033bb9b5a9e91b90862d4bb3a356ab14ec40718a06bf9cebb5edf445c0543c99fb8de5d7f
-
Filesize
306KB
MD541baa213bece16cdc3831c06adcbb130
SHA1e01f25850b72af9eb7aa9ab74b6d6a1fd0a2d29b
SHA25686d13abece21336f75c8d3c19381863aedb736398567475583cf7c92eda6ad0a
SHA512373f6402459e66b0056117500665faca691e703ae35c92f5d383d287e30391327a2331e82603fea8f6d5d8fbff1aa98decb03691bd60ae5a4c8d79ffd3a90844
-
Filesize
306KB
MD541baa213bece16cdc3831c06adcbb130
SHA1e01f25850b72af9eb7aa9ab74b6d6a1fd0a2d29b
SHA25686d13abece21336f75c8d3c19381863aedb736398567475583cf7c92eda6ad0a
SHA512373f6402459e66b0056117500665faca691e703ae35c92f5d383d287e30391327a2331e82603fea8f6d5d8fbff1aa98decb03691bd60ae5a4c8d79ffd3a90844
-
Filesize
184KB
MD5f8d1d1049f03f2a02caf76e3063e09f4
SHA145dffca2e783f7429aad2e6ce40ec7521bc1c140
SHA256c090bc4d59f261ede9d650f202093311cf620cbc69a363e8cd2f70e729de5dd9
SHA512ad09c89856be03c7e06050ce9c9412c65a33b61ee16f18a47d3a153311ef70ee84314e9b31ae8c5e96820e9ac3479ef0ce5741ea7ad6102b936617f8e5f06d5e
-
Filesize
184KB
MD5f8d1d1049f03f2a02caf76e3063e09f4
SHA145dffca2e783f7429aad2e6ce40ec7521bc1c140
SHA256c090bc4d59f261ede9d650f202093311cf620cbc69a363e8cd2f70e729de5dd9
SHA512ad09c89856be03c7e06050ce9c9412c65a33b61ee16f18a47d3a153311ef70ee84314e9b31ae8c5e96820e9ac3479ef0ce5741ea7ad6102b936617f8e5f06d5e
-
Filesize
145KB
MD57e944f5789a8a226490d2ae03b65148d
SHA12e233ca174ef5549b91974cd9b2a5d42c7ec98d9
SHA256fa6f65c685c3ae56982dafb088bd00c64395456ea10b80e1d0b887be453df6ec
SHA512b99536151fbf353d09f0eac22ab25af5aad1b3ff8eae0f6bb3c281d17497645c8dd6b0d22c5132a5e39986fd274c122a796279cd0667404e2d99c359ac9ae29e
-
Filesize
145KB
MD57e944f5789a8a226490d2ae03b65148d
SHA12e233ca174ef5549b91974cd9b2a5d42c7ec98d9
SHA256fa6f65c685c3ae56982dafb088bd00c64395456ea10b80e1d0b887be453df6ec
SHA512b99536151fbf353d09f0eac22ab25af5aad1b3ff8eae0f6bb3c281d17497645c8dd6b0d22c5132a5e39986fd274c122a796279cd0667404e2d99c359ac9ae29e
-
Filesize
750KB
MD57fe29742955e3b84e9495a93ad42953e
SHA1f00c8be4ab5c37abf20bb406fdcc62be765c49ff
SHA2567ad4053177b519ea097ad128d0c2ecf53e701ef67bf29d3b7297001d12d8fffe
SHA512f0c76e862ae45d5fe88e44693dfe686de2365ee9d2d6c61d0a6ac71033bb9b5a9e91b90862d4bb3a356ab14ec40718a06bf9cebb5edf445c0543c99fb8de5d7f
-
Filesize
750KB
MD57fe29742955e3b84e9495a93ad42953e
SHA1f00c8be4ab5c37abf20bb406fdcc62be765c49ff
SHA2567ad4053177b519ea097ad128d0c2ecf53e701ef67bf29d3b7297001d12d8fffe
SHA512f0c76e862ae45d5fe88e44693dfe686de2365ee9d2d6c61d0a6ac71033bb9b5a9e91b90862d4bb3a356ab14ec40718a06bf9cebb5edf445c0543c99fb8de5d7f
-
Filesize
306KB
MD541baa213bece16cdc3831c06adcbb130
SHA1e01f25850b72af9eb7aa9ab74b6d6a1fd0a2d29b
SHA25686d13abece21336f75c8d3c19381863aedb736398567475583cf7c92eda6ad0a
SHA512373f6402459e66b0056117500665faca691e703ae35c92f5d383d287e30391327a2331e82603fea8f6d5d8fbff1aa98decb03691bd60ae5a4c8d79ffd3a90844
-
Filesize
306KB
MD541baa213bece16cdc3831c06adcbb130
SHA1e01f25850b72af9eb7aa9ab74b6d6a1fd0a2d29b
SHA25686d13abece21336f75c8d3c19381863aedb736398567475583cf7c92eda6ad0a
SHA512373f6402459e66b0056117500665faca691e703ae35c92f5d383d287e30391327a2331e82603fea8f6d5d8fbff1aa98decb03691bd60ae5a4c8d79ffd3a90844
-
Filesize
184KB
MD5f8d1d1049f03f2a02caf76e3063e09f4
SHA145dffca2e783f7429aad2e6ce40ec7521bc1c140
SHA256c090bc4d59f261ede9d650f202093311cf620cbc69a363e8cd2f70e729de5dd9
SHA512ad09c89856be03c7e06050ce9c9412c65a33b61ee16f18a47d3a153311ef70ee84314e9b31ae8c5e96820e9ac3479ef0ce5741ea7ad6102b936617f8e5f06d5e
-
Filesize
184KB
MD5f8d1d1049f03f2a02caf76e3063e09f4
SHA145dffca2e783f7429aad2e6ce40ec7521bc1c140
SHA256c090bc4d59f261ede9d650f202093311cf620cbc69a363e8cd2f70e729de5dd9
SHA512ad09c89856be03c7e06050ce9c9412c65a33b61ee16f18a47d3a153311ef70ee84314e9b31ae8c5e96820e9ac3479ef0ce5741ea7ad6102b936617f8e5f06d5e
-
Filesize
145KB
MD57e944f5789a8a226490d2ae03b65148d
SHA12e233ca174ef5549b91974cd9b2a5d42c7ec98d9
SHA256fa6f65c685c3ae56982dafb088bd00c64395456ea10b80e1d0b887be453df6ec
SHA512b99536151fbf353d09f0eac22ab25af5aad1b3ff8eae0f6bb3c281d17497645c8dd6b0d22c5132a5e39986fd274c122a796279cd0667404e2d99c359ac9ae29e
-
Filesize
145KB
MD57e944f5789a8a226490d2ae03b65148d
SHA12e233ca174ef5549b91974cd9b2a5d42c7ec98d9
SHA256fa6f65c685c3ae56982dafb088bd00c64395456ea10b80e1d0b887be453df6ec
SHA512b99536151fbf353d09f0eac22ab25af5aad1b3ff8eae0f6bb3c281d17497645c8dd6b0d22c5132a5e39986fd274c122a796279cd0667404e2d99c359ac9ae29e