Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
20/05/2023, 11:10
Static task
static1
Behavioral task
behavioral1
Sample
service.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
service.exe
Resource
win10v2004-20230220-en
General
-
Target
service.exe
-
Size
1.0MB
-
MD5
b147ea5273354dfe145510830eba7781
-
SHA1
0e87b97ee2d1da3a3b72238428bc990665a07df7
-
SHA256
eb75a0b6dcedca927195b507970f3bc289f0afec42b6c1f1779f538159e4aa80
-
SHA512
b7090a08f054ed2d12b7742a071214ad5e952d3dd62e4a3a6d1855d2f57d54df22121a4719624f49149319a3a401c3fbcaf972402bf21bb232e62ce06e4f5e80
-
SSDEEP
24576:UyJTwjxtNKhEKYm/Z06CIORLZF51it26BBE5Kx3:jtGNKn/nCImzAt2Z5a
Malware Config
Extracted
redline
deren
77.91.68.253:19065
-
auth_value
04a169f1fb198bfbeca74d0e06ea2d54
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection k2930609.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k2930609.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k2930609.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k2930609.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k2930609.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k2930609.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 1996 y7695420.exe 1816 y8077328.exe 320 k2930609.exe 988 l6616862.exe -
Loads dropped DLL 8 IoCs
pid Process 1728 service.exe 1996 y7695420.exe 1996 y7695420.exe 1816 y8077328.exe 1816 y8077328.exe 320 k2930609.exe 1816 y8077328.exe 988 l6616862.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features k2930609.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k2930609.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y7695420.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce y8077328.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y8077328.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce service.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" service.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce y7695420.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 320 k2930609.exe 320 k2930609.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 320 k2930609.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1728 wrote to memory of 1996 1728 service.exe 28 PID 1728 wrote to memory of 1996 1728 service.exe 28 PID 1728 wrote to memory of 1996 1728 service.exe 28 PID 1728 wrote to memory of 1996 1728 service.exe 28 PID 1728 wrote to memory of 1996 1728 service.exe 28 PID 1728 wrote to memory of 1996 1728 service.exe 28 PID 1728 wrote to memory of 1996 1728 service.exe 28 PID 1996 wrote to memory of 1816 1996 y7695420.exe 29 PID 1996 wrote to memory of 1816 1996 y7695420.exe 29 PID 1996 wrote to memory of 1816 1996 y7695420.exe 29 PID 1996 wrote to memory of 1816 1996 y7695420.exe 29 PID 1996 wrote to memory of 1816 1996 y7695420.exe 29 PID 1996 wrote to memory of 1816 1996 y7695420.exe 29 PID 1996 wrote to memory of 1816 1996 y7695420.exe 29 PID 1816 wrote to memory of 320 1816 y8077328.exe 30 PID 1816 wrote to memory of 320 1816 y8077328.exe 30 PID 1816 wrote to memory of 320 1816 y8077328.exe 30 PID 1816 wrote to memory of 320 1816 y8077328.exe 30 PID 1816 wrote to memory of 320 1816 y8077328.exe 30 PID 1816 wrote to memory of 320 1816 y8077328.exe 30 PID 1816 wrote to memory of 320 1816 y8077328.exe 30 PID 1816 wrote to memory of 988 1816 y8077328.exe 31 PID 1816 wrote to memory of 988 1816 y8077328.exe 31 PID 1816 wrote to memory of 988 1816 y8077328.exe 31 PID 1816 wrote to memory of 988 1816 y8077328.exe 31 PID 1816 wrote to memory of 988 1816 y8077328.exe 31 PID 1816 wrote to memory of 988 1816 y8077328.exe 31 PID 1816 wrote to memory of 988 1816 y8077328.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\service.exe"C:\Users\Admin\AppData\Local\Temp\service.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7695420.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7695420.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y8077328.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y8077328.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k2930609.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k2930609.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:320
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l6616862.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l6616862.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:988
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
750KB
MD5aa86c92bfc4e8f108f5ace8f69082785
SHA1bdec99f42d130f9de90f43a17adfd07748aa169f
SHA25678aff98e297b72e6710693e5d328ee6e804066df47d421ec47ff152ddc764604
SHA5126fd3b6761e47eea41d94dfa99fba6fe257f2105ffb33ac7f6c5f5f3058844b2c1cc8f1e5db184bc564c259bd3dc5e87fdcab4bd7eae637f9df41eaf408aa9b66
-
Filesize
750KB
MD5aa86c92bfc4e8f108f5ace8f69082785
SHA1bdec99f42d130f9de90f43a17adfd07748aa169f
SHA25678aff98e297b72e6710693e5d328ee6e804066df47d421ec47ff152ddc764604
SHA5126fd3b6761e47eea41d94dfa99fba6fe257f2105ffb33ac7f6c5f5f3058844b2c1cc8f1e5db184bc564c259bd3dc5e87fdcab4bd7eae637f9df41eaf408aa9b66
-
Filesize
305KB
MD54ddfaf4a3a7b9681ffd630a8c5c0aac9
SHA10e7d541fea149833ee9990dffafb89951adf40e4
SHA25688e647000dd2c98511b05c52dd93dbfaf47db286eb9db99b8164abefa416eae9
SHA51249a1e3e5ce4440b0cd2d30249aaf9ef55e89ce80fab4523b8bde35b5591a92109bfa509e740334e78388d8d88ecb6b854b50c31470b6282204447f3f2a82c6e5
-
Filesize
305KB
MD54ddfaf4a3a7b9681ffd630a8c5c0aac9
SHA10e7d541fea149833ee9990dffafb89951adf40e4
SHA25688e647000dd2c98511b05c52dd93dbfaf47db286eb9db99b8164abefa416eae9
SHA51249a1e3e5ce4440b0cd2d30249aaf9ef55e89ce80fab4523b8bde35b5591a92109bfa509e740334e78388d8d88ecb6b854b50c31470b6282204447f3f2a82c6e5
-
Filesize
184KB
MD56c1801b306bd9c503277b5add4bda423
SHA17cef0c460f767d020705ff0923a96907ebd3fb09
SHA2568d46cc1470b329d45ad2d833a7e6bc0d77ef7e04e8e2fd2b3875465dc0e2ef1b
SHA512e121a2faefa3c76ce9cedfe8b6d167c0aaddee27396ed0dbbdbbed44b98fcaad932260217ed3d4b1d68c8a5255dbb4d608b3419b5ec85e7727a0df33077bae1c
-
Filesize
184KB
MD56c1801b306bd9c503277b5add4bda423
SHA17cef0c460f767d020705ff0923a96907ebd3fb09
SHA2568d46cc1470b329d45ad2d833a7e6bc0d77ef7e04e8e2fd2b3875465dc0e2ef1b
SHA512e121a2faefa3c76ce9cedfe8b6d167c0aaddee27396ed0dbbdbbed44b98fcaad932260217ed3d4b1d68c8a5255dbb4d608b3419b5ec85e7727a0df33077bae1c
-
Filesize
145KB
MD5074175253f55fcd9de48d502cce71f27
SHA109847a8a204dcfd74c8cc5b755e573974f4c79ad
SHA256e77e7622677681179ca6b902eb406a27a9eb5fd33296ae1f23e7fb56e9688fc7
SHA5120553dec20abe6f5629678de9d38cb328a44f77dd204c3006f977581fa1db8d1bc8bfb8e7b93fd1e63df409fd821bebda80e16b2e1c232b90f821f6edac728be1
-
Filesize
145KB
MD5074175253f55fcd9de48d502cce71f27
SHA109847a8a204dcfd74c8cc5b755e573974f4c79ad
SHA256e77e7622677681179ca6b902eb406a27a9eb5fd33296ae1f23e7fb56e9688fc7
SHA5120553dec20abe6f5629678de9d38cb328a44f77dd204c3006f977581fa1db8d1bc8bfb8e7b93fd1e63df409fd821bebda80e16b2e1c232b90f821f6edac728be1
-
Filesize
750KB
MD5aa86c92bfc4e8f108f5ace8f69082785
SHA1bdec99f42d130f9de90f43a17adfd07748aa169f
SHA25678aff98e297b72e6710693e5d328ee6e804066df47d421ec47ff152ddc764604
SHA5126fd3b6761e47eea41d94dfa99fba6fe257f2105ffb33ac7f6c5f5f3058844b2c1cc8f1e5db184bc564c259bd3dc5e87fdcab4bd7eae637f9df41eaf408aa9b66
-
Filesize
750KB
MD5aa86c92bfc4e8f108f5ace8f69082785
SHA1bdec99f42d130f9de90f43a17adfd07748aa169f
SHA25678aff98e297b72e6710693e5d328ee6e804066df47d421ec47ff152ddc764604
SHA5126fd3b6761e47eea41d94dfa99fba6fe257f2105ffb33ac7f6c5f5f3058844b2c1cc8f1e5db184bc564c259bd3dc5e87fdcab4bd7eae637f9df41eaf408aa9b66
-
Filesize
305KB
MD54ddfaf4a3a7b9681ffd630a8c5c0aac9
SHA10e7d541fea149833ee9990dffafb89951adf40e4
SHA25688e647000dd2c98511b05c52dd93dbfaf47db286eb9db99b8164abefa416eae9
SHA51249a1e3e5ce4440b0cd2d30249aaf9ef55e89ce80fab4523b8bde35b5591a92109bfa509e740334e78388d8d88ecb6b854b50c31470b6282204447f3f2a82c6e5
-
Filesize
305KB
MD54ddfaf4a3a7b9681ffd630a8c5c0aac9
SHA10e7d541fea149833ee9990dffafb89951adf40e4
SHA25688e647000dd2c98511b05c52dd93dbfaf47db286eb9db99b8164abefa416eae9
SHA51249a1e3e5ce4440b0cd2d30249aaf9ef55e89ce80fab4523b8bde35b5591a92109bfa509e740334e78388d8d88ecb6b854b50c31470b6282204447f3f2a82c6e5
-
Filesize
184KB
MD56c1801b306bd9c503277b5add4bda423
SHA17cef0c460f767d020705ff0923a96907ebd3fb09
SHA2568d46cc1470b329d45ad2d833a7e6bc0d77ef7e04e8e2fd2b3875465dc0e2ef1b
SHA512e121a2faefa3c76ce9cedfe8b6d167c0aaddee27396ed0dbbdbbed44b98fcaad932260217ed3d4b1d68c8a5255dbb4d608b3419b5ec85e7727a0df33077bae1c
-
Filesize
184KB
MD56c1801b306bd9c503277b5add4bda423
SHA17cef0c460f767d020705ff0923a96907ebd3fb09
SHA2568d46cc1470b329d45ad2d833a7e6bc0d77ef7e04e8e2fd2b3875465dc0e2ef1b
SHA512e121a2faefa3c76ce9cedfe8b6d167c0aaddee27396ed0dbbdbbed44b98fcaad932260217ed3d4b1d68c8a5255dbb4d608b3419b5ec85e7727a0df33077bae1c
-
Filesize
145KB
MD5074175253f55fcd9de48d502cce71f27
SHA109847a8a204dcfd74c8cc5b755e573974f4c79ad
SHA256e77e7622677681179ca6b902eb406a27a9eb5fd33296ae1f23e7fb56e9688fc7
SHA5120553dec20abe6f5629678de9d38cb328a44f77dd204c3006f977581fa1db8d1bc8bfb8e7b93fd1e63df409fd821bebda80e16b2e1c232b90f821f6edac728be1
-
Filesize
145KB
MD5074175253f55fcd9de48d502cce71f27
SHA109847a8a204dcfd74c8cc5b755e573974f4c79ad
SHA256e77e7622677681179ca6b902eb406a27a9eb5fd33296ae1f23e7fb56e9688fc7
SHA5120553dec20abe6f5629678de9d38cb328a44f77dd204c3006f977581fa1db8d1bc8bfb8e7b93fd1e63df409fd821bebda80e16b2e1c232b90f821f6edac728be1