Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
20/05/2023, 21:19
Static task
static1
Behavioral task
behavioral1
Sample
35647.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
35647.exe
Resource
win10v2004-20230221-en
General
-
Target
35647.exe
-
Size
1.0MB
-
MD5
e0c13213521584d4efd1d4962dc6cc23
-
SHA1
006b36797290c0bd82a2530d873e01ae2a8f9ab0
-
SHA256
bbfbc8baa1749a48c885d26b409fa77c0132abb3d5da335609987a3e75ad8f14
-
SHA512
dc8b73a90b807f6c44f9eedc8b25283e15828630e79dbd7313f4695eca6fe7b6d4c94e09b8e84c89b894a926d4afe199a6ccaa8614a8709e1c140a8a81d8af28
-
SSDEEP
24576:KyWnQHpbVqg3eqWNFgKl4VeRPLj3QU+kI6Czz:RnHpQtqWNKVuPLc5
Malware Config
Extracted
redline
daza
77.91.124.251:19065
-
auth_value
0bd5963efefdd6409185423d5ca3439c
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k6879481.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k6879481.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k6879481.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k6879481.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection k6879481.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k6879481.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 1440 y6683336.exe 364 y9284857.exe 764 k6879481.exe 1792 l8180968.exe -
Loads dropped DLL 8 IoCs
pid Process 1604 35647.exe 1440 y6683336.exe 1440 y6683336.exe 364 y9284857.exe 364 y9284857.exe 764 k6879481.exe 364 y9284857.exe 1792 l8180968.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features k6879481.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k6879481.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 35647.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 35647.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce y6683336.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y6683336.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce y9284857.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y9284857.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 764 k6879481.exe 764 k6879481.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 764 k6879481.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1604 wrote to memory of 1440 1604 35647.exe 28 PID 1604 wrote to memory of 1440 1604 35647.exe 28 PID 1604 wrote to memory of 1440 1604 35647.exe 28 PID 1604 wrote to memory of 1440 1604 35647.exe 28 PID 1604 wrote to memory of 1440 1604 35647.exe 28 PID 1604 wrote to memory of 1440 1604 35647.exe 28 PID 1604 wrote to memory of 1440 1604 35647.exe 28 PID 1440 wrote to memory of 364 1440 y6683336.exe 29 PID 1440 wrote to memory of 364 1440 y6683336.exe 29 PID 1440 wrote to memory of 364 1440 y6683336.exe 29 PID 1440 wrote to memory of 364 1440 y6683336.exe 29 PID 1440 wrote to memory of 364 1440 y6683336.exe 29 PID 1440 wrote to memory of 364 1440 y6683336.exe 29 PID 1440 wrote to memory of 364 1440 y6683336.exe 29 PID 364 wrote to memory of 764 364 y9284857.exe 30 PID 364 wrote to memory of 764 364 y9284857.exe 30 PID 364 wrote to memory of 764 364 y9284857.exe 30 PID 364 wrote to memory of 764 364 y9284857.exe 30 PID 364 wrote to memory of 764 364 y9284857.exe 30 PID 364 wrote to memory of 764 364 y9284857.exe 30 PID 364 wrote to memory of 764 364 y9284857.exe 30 PID 364 wrote to memory of 1792 364 y9284857.exe 31 PID 364 wrote to memory of 1792 364 y9284857.exe 31 PID 364 wrote to memory of 1792 364 y9284857.exe 31 PID 364 wrote to memory of 1792 364 y9284857.exe 31 PID 364 wrote to memory of 1792 364 y9284857.exe 31 PID 364 wrote to memory of 1792 364 y9284857.exe 31 PID 364 wrote to memory of 1792 364 y9284857.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\35647.exe"C:\Users\Admin\AppData\Local\Temp\35647.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6683336.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6683336.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y9284857.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y9284857.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k6879481.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k6879481.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:764
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l8180968.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l8180968.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1792
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
750KB
MD5c8f9ddf8406a18a3805c4a6001823212
SHA14f5dddc7a6e941be0a3e3a90b664fd3d77ab6faa
SHA256186c47df688e78f4ef8ce4521631aad082fc0e76d4138cb07936828987d2520d
SHA512fac1bb8f3904ee1390fb08c33a4e66abb5fb045a1e0f820dfe07ba4ba21fc881ade17bd1f558e96ef562e7fbfa991431fd289db53ee025728ea1a5556b40e20a
-
Filesize
750KB
MD5c8f9ddf8406a18a3805c4a6001823212
SHA14f5dddc7a6e941be0a3e3a90b664fd3d77ab6faa
SHA256186c47df688e78f4ef8ce4521631aad082fc0e76d4138cb07936828987d2520d
SHA512fac1bb8f3904ee1390fb08c33a4e66abb5fb045a1e0f820dfe07ba4ba21fc881ade17bd1f558e96ef562e7fbfa991431fd289db53ee025728ea1a5556b40e20a
-
Filesize
305KB
MD5dcd5c05b304c4d6920bf842eb806f563
SHA1f674c040bcb97205cc29b381d56a31e0cbf78b87
SHA256a8a04d2c0d71138b688c9f2973d1e2f4978fda67038693e738748a689ee3ad5a
SHA5123ffb6060c7ba883a6b968fefc232b995378a22b03dd2a2379767663aac42383fea1c8399b30b84a2e6ca24b46ff6aa2fc832a545fdd860b11e90aee79ef67989
-
Filesize
305KB
MD5dcd5c05b304c4d6920bf842eb806f563
SHA1f674c040bcb97205cc29b381d56a31e0cbf78b87
SHA256a8a04d2c0d71138b688c9f2973d1e2f4978fda67038693e738748a689ee3ad5a
SHA5123ffb6060c7ba883a6b968fefc232b995378a22b03dd2a2379767663aac42383fea1c8399b30b84a2e6ca24b46ff6aa2fc832a545fdd860b11e90aee79ef67989
-
Filesize
184KB
MD53693328b10f9c5d662f32efe4797103f
SHA16dca212bfa7f4387bd103e5b42185111b11acf27
SHA256ea01bab1cefe35fbedd4439ff6cb4c308d9050b384262faac11b9c726e7aaba6
SHA51213911849dc9cc8228a31dce46bfca651324b6d8a7f89999029c3482abd6c7af40f16fa6b6dfbb84a7764c705339bb747bcc0debafbe597f9b526d01739d63170
-
Filesize
184KB
MD53693328b10f9c5d662f32efe4797103f
SHA16dca212bfa7f4387bd103e5b42185111b11acf27
SHA256ea01bab1cefe35fbedd4439ff6cb4c308d9050b384262faac11b9c726e7aaba6
SHA51213911849dc9cc8228a31dce46bfca651324b6d8a7f89999029c3482abd6c7af40f16fa6b6dfbb84a7764c705339bb747bcc0debafbe597f9b526d01739d63170
-
Filesize
145KB
MD5924052d45d9705d06b6749c41bc055a0
SHA1e625dfe4040ad877f1515a281c8658e5effedec2
SHA25671601a39e85fcde2dd876a2435428505a1c0222c0a9127ca603f6e4f45f9da5c
SHA512517322bcee1a62c099e934a850a30968b4a39ecffce736ca24bb84dcd356fc0dff142a5bcaff187efe6251aae5ac1bc5cda20479c1847a11d24f20f956fd9c2d
-
Filesize
145KB
MD5924052d45d9705d06b6749c41bc055a0
SHA1e625dfe4040ad877f1515a281c8658e5effedec2
SHA25671601a39e85fcde2dd876a2435428505a1c0222c0a9127ca603f6e4f45f9da5c
SHA512517322bcee1a62c099e934a850a30968b4a39ecffce736ca24bb84dcd356fc0dff142a5bcaff187efe6251aae5ac1bc5cda20479c1847a11d24f20f956fd9c2d
-
Filesize
750KB
MD5c8f9ddf8406a18a3805c4a6001823212
SHA14f5dddc7a6e941be0a3e3a90b664fd3d77ab6faa
SHA256186c47df688e78f4ef8ce4521631aad082fc0e76d4138cb07936828987d2520d
SHA512fac1bb8f3904ee1390fb08c33a4e66abb5fb045a1e0f820dfe07ba4ba21fc881ade17bd1f558e96ef562e7fbfa991431fd289db53ee025728ea1a5556b40e20a
-
Filesize
750KB
MD5c8f9ddf8406a18a3805c4a6001823212
SHA14f5dddc7a6e941be0a3e3a90b664fd3d77ab6faa
SHA256186c47df688e78f4ef8ce4521631aad082fc0e76d4138cb07936828987d2520d
SHA512fac1bb8f3904ee1390fb08c33a4e66abb5fb045a1e0f820dfe07ba4ba21fc881ade17bd1f558e96ef562e7fbfa991431fd289db53ee025728ea1a5556b40e20a
-
Filesize
305KB
MD5dcd5c05b304c4d6920bf842eb806f563
SHA1f674c040bcb97205cc29b381d56a31e0cbf78b87
SHA256a8a04d2c0d71138b688c9f2973d1e2f4978fda67038693e738748a689ee3ad5a
SHA5123ffb6060c7ba883a6b968fefc232b995378a22b03dd2a2379767663aac42383fea1c8399b30b84a2e6ca24b46ff6aa2fc832a545fdd860b11e90aee79ef67989
-
Filesize
305KB
MD5dcd5c05b304c4d6920bf842eb806f563
SHA1f674c040bcb97205cc29b381d56a31e0cbf78b87
SHA256a8a04d2c0d71138b688c9f2973d1e2f4978fda67038693e738748a689ee3ad5a
SHA5123ffb6060c7ba883a6b968fefc232b995378a22b03dd2a2379767663aac42383fea1c8399b30b84a2e6ca24b46ff6aa2fc832a545fdd860b11e90aee79ef67989
-
Filesize
184KB
MD53693328b10f9c5d662f32efe4797103f
SHA16dca212bfa7f4387bd103e5b42185111b11acf27
SHA256ea01bab1cefe35fbedd4439ff6cb4c308d9050b384262faac11b9c726e7aaba6
SHA51213911849dc9cc8228a31dce46bfca651324b6d8a7f89999029c3482abd6c7af40f16fa6b6dfbb84a7764c705339bb747bcc0debafbe597f9b526d01739d63170
-
Filesize
184KB
MD53693328b10f9c5d662f32efe4797103f
SHA16dca212bfa7f4387bd103e5b42185111b11acf27
SHA256ea01bab1cefe35fbedd4439ff6cb4c308d9050b384262faac11b9c726e7aaba6
SHA51213911849dc9cc8228a31dce46bfca651324b6d8a7f89999029c3482abd6c7af40f16fa6b6dfbb84a7764c705339bb747bcc0debafbe597f9b526d01739d63170
-
Filesize
145KB
MD5924052d45d9705d06b6749c41bc055a0
SHA1e625dfe4040ad877f1515a281c8658e5effedec2
SHA25671601a39e85fcde2dd876a2435428505a1c0222c0a9127ca603f6e4f45f9da5c
SHA512517322bcee1a62c099e934a850a30968b4a39ecffce736ca24bb84dcd356fc0dff142a5bcaff187efe6251aae5ac1bc5cda20479c1847a11d24f20f956fd9c2d
-
Filesize
145KB
MD5924052d45d9705d06b6749c41bc055a0
SHA1e625dfe4040ad877f1515a281c8658e5effedec2
SHA25671601a39e85fcde2dd876a2435428505a1c0222c0a9127ca603f6e4f45f9da5c
SHA512517322bcee1a62c099e934a850a30968b4a39ecffce736ca24bb84dcd356fc0dff142a5bcaff187efe6251aae5ac1bc5cda20479c1847a11d24f20f956fd9c2d