Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2023 04:58
Static task
static1
Behavioral task
behavioral1
Sample
08e8013d59b7a088c895eb01bc33161652ca4af4727ac81749175391bce98bcf.exe
Resource
win10v2004-20230220-en
General
-
Target
08e8013d59b7a088c895eb01bc33161652ca4af4727ac81749175391bce98bcf.exe
-
Size
1.0MB
-
MD5
218e01b8394ec1c7811db1ad4632639d
-
SHA1
dc1b5e2efad19dcbe96174a66079b0e0d65cad07
-
SHA256
08e8013d59b7a088c895eb01bc33161652ca4af4727ac81749175391bce98bcf
-
SHA512
9b46b40788be52aa88a05770868ba9a3715229f4eeff757e8181e89ae8ceb515593c9fb631e308c37643b3cbf4a7643fc852ea3f4e5e5d5eef56c08863727abb
-
SSDEEP
24576:+yAHYc0flqxDY9OzeuZptw95TQ1s423jO/H:NAHDyqxDYgvw95cK42i/
Malware Config
Extracted
redline
diza
185.161.248.37:4138
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k0814642.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k0814642.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k0814642.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k0814642.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k0814642.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k0814642.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 4608 y2512388.exe 4644 y3572853.exe 4000 k0814642.exe 732 l8881537.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k0814642.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k0814642.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y2512388.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y2512388.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y3572853.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y3572853.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 08e8013d59b7a088c895eb01bc33161652ca4af4727ac81749175391bce98bcf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 08e8013d59b7a088c895eb01bc33161652ca4af4727ac81749175391bce98bcf.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4000 k0814642.exe 4000 k0814642.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4000 k0814642.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4120 wrote to memory of 4608 4120 08e8013d59b7a088c895eb01bc33161652ca4af4727ac81749175391bce98bcf.exe 84 PID 4120 wrote to memory of 4608 4120 08e8013d59b7a088c895eb01bc33161652ca4af4727ac81749175391bce98bcf.exe 84 PID 4120 wrote to memory of 4608 4120 08e8013d59b7a088c895eb01bc33161652ca4af4727ac81749175391bce98bcf.exe 84 PID 4608 wrote to memory of 4644 4608 y2512388.exe 85 PID 4608 wrote to memory of 4644 4608 y2512388.exe 85 PID 4608 wrote to memory of 4644 4608 y2512388.exe 85 PID 4644 wrote to memory of 4000 4644 y3572853.exe 86 PID 4644 wrote to memory of 4000 4644 y3572853.exe 86 PID 4644 wrote to memory of 4000 4644 y3572853.exe 86 PID 4644 wrote to memory of 732 4644 y3572853.exe 89 PID 4644 wrote to memory of 732 4644 y3572853.exe 89 PID 4644 wrote to memory of 732 4644 y3572853.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\08e8013d59b7a088c895eb01bc33161652ca4af4727ac81749175391bce98bcf.exe"C:\Users\Admin\AppData\Local\Temp\08e8013d59b7a088c895eb01bc33161652ca4af4727ac81749175391bce98bcf.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2512388.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2512388.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y3572853.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y3572853.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k0814642.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k0814642.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4000
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l8881537.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l8881537.exe4⤵
- Executes dropped EXE
PID:732
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
750KB
MD5d4fe9d8af984337b45ac193497c6d954
SHA1f6d15ce8705b6966bcc6a454ebd181eb48781ae7
SHA256b437fe5e599bd88a20f3e13d89195d5ccf04388c2b0f9e179d6bdaf4f6c299e1
SHA512578cbb68b7751a8162a42652d46a3405512e9c8d310aa22107bb4da24cf08adfa018f06843b33e61bf6e212ec65c26b8c4f2b25c0ced26a2b3c0b67cc83e4e84
-
Filesize
750KB
MD5d4fe9d8af984337b45ac193497c6d954
SHA1f6d15ce8705b6966bcc6a454ebd181eb48781ae7
SHA256b437fe5e599bd88a20f3e13d89195d5ccf04388c2b0f9e179d6bdaf4f6c299e1
SHA512578cbb68b7751a8162a42652d46a3405512e9c8d310aa22107bb4da24cf08adfa018f06843b33e61bf6e212ec65c26b8c4f2b25c0ced26a2b3c0b67cc83e4e84
-
Filesize
305KB
MD59a004fa18dfb0c75f95dcdbf83136cf9
SHA12f3385dd62e47462f9a9b774bb54117b3f3e0271
SHA25651491b11e647192e95c84131f97a0e055d9ee132bb6bd7e1afaa53279106f7d7
SHA512a08a7f9b5d83265527f814d6ada9b8a66d786a6888b60b87a6dd78b5728a780960be39341a7eafa83e6fb8327179923c1ac387d18c3caa13e24bf9173c5800b8
-
Filesize
305KB
MD59a004fa18dfb0c75f95dcdbf83136cf9
SHA12f3385dd62e47462f9a9b774bb54117b3f3e0271
SHA25651491b11e647192e95c84131f97a0e055d9ee132bb6bd7e1afaa53279106f7d7
SHA512a08a7f9b5d83265527f814d6ada9b8a66d786a6888b60b87a6dd78b5728a780960be39341a7eafa83e6fb8327179923c1ac387d18c3caa13e24bf9173c5800b8
-
Filesize
185KB
MD5792f50722eb1c9750ef76ef06fdc1166
SHA19d27bad7af145a57771e069443b0c53b6dd62b39
SHA25636d16c05832231063806b4213865227c9d024bd49b3c787331c16d0df5236119
SHA512e39b175e8128514e27257355ee41878bd5b1e1ea577ff66f7eea6d1515fdfea81f07d2b96398c2acb3629838b55f276cabf93b8433639487959606e2a22ae960
-
Filesize
185KB
MD5792f50722eb1c9750ef76ef06fdc1166
SHA19d27bad7af145a57771e069443b0c53b6dd62b39
SHA25636d16c05832231063806b4213865227c9d024bd49b3c787331c16d0df5236119
SHA512e39b175e8128514e27257355ee41878bd5b1e1ea577ff66f7eea6d1515fdfea81f07d2b96398c2acb3629838b55f276cabf93b8433639487959606e2a22ae960
-
Filesize
145KB
MD53a5fee7ac85b821e30141f2b5fbe0397
SHA1716154356cb1700e2288396429a46d87aaa146c1
SHA256d8ccc986afbd16be64038d5f3e54fad50378f93546f3bce69fa86e274c179e17
SHA512e8250599345d917f7144d435cc36b2db1dee3f310eab682a98a5b3298b9d60040549dc3c3f75ed636a22c7fab6589b31e89d17f269951d879d1466c448eb60a9
-
Filesize
145KB
MD53a5fee7ac85b821e30141f2b5fbe0397
SHA1716154356cb1700e2288396429a46d87aaa146c1
SHA256d8ccc986afbd16be64038d5f3e54fad50378f93546f3bce69fa86e274c179e17
SHA512e8250599345d917f7144d435cc36b2db1dee3f310eab682a98a5b3298b9d60040549dc3c3f75ed636a22c7fab6589b31e89d17f269951d879d1466c448eb60a9