Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2023 05:00
Static task
static1
Behavioral task
behavioral1
Sample
fd56e39158e012bce51649320586bd4b0546692b81653eb6d0d24b66b592f9c5.exe
Resource
win10v2004-20230220-en
General
-
Target
fd56e39158e012bce51649320586bd4b0546692b81653eb6d0d24b66b592f9c5.exe
-
Size
1.0MB
-
MD5
47c3b7bf2b773fcbeca5381006a17916
-
SHA1
3cad7a83776e1f23cb7da92e97fc2fb63a5b8dda
-
SHA256
fd56e39158e012bce51649320586bd4b0546692b81653eb6d0d24b66b592f9c5
-
SHA512
27f319fc76cc6c3e9e7bc764ebfa31a456b9e73f32f36337bcc125d0fe0ce5505212318294cd5d266d2bba94c376f52b89d4b00dba38498bba34b9ff1d99215d
-
SSDEEP
24576:lyBxoXux/WzwLqdNLY2LvtAzWsu5gDTYQBOCdRdjUuZ3vjwzLYOmm:AjoX+/W0LqdNLYMvtVsw8BOC1UM/UzL
Malware Config
Extracted
redline
mixa
185.161.248.37:4138
-
auth_value
9d14534b25ac495ab25b59800acf3bb2
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a4972393.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a4972393.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a4972393.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a4972393.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a4972393.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a4972393.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 2656 v2131064.exe 1704 v9457071.exe 1344 a4972393.exe 4616 b3720924.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a4972393.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a4972393.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v2131064.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v9457071.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v9457071.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fd56e39158e012bce51649320586bd4b0546692b81653eb6d0d24b66b592f9c5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fd56e39158e012bce51649320586bd4b0546692b81653eb6d0d24b66b592f9c5.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v2131064.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1344 a4972393.exe 1344 a4972393.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1344 a4972393.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 384 wrote to memory of 2656 384 fd56e39158e012bce51649320586bd4b0546692b81653eb6d0d24b66b592f9c5.exe 84 PID 384 wrote to memory of 2656 384 fd56e39158e012bce51649320586bd4b0546692b81653eb6d0d24b66b592f9c5.exe 84 PID 384 wrote to memory of 2656 384 fd56e39158e012bce51649320586bd4b0546692b81653eb6d0d24b66b592f9c5.exe 84 PID 2656 wrote to memory of 1704 2656 v2131064.exe 85 PID 2656 wrote to memory of 1704 2656 v2131064.exe 85 PID 2656 wrote to memory of 1704 2656 v2131064.exe 85 PID 1704 wrote to memory of 1344 1704 v9457071.exe 86 PID 1704 wrote to memory of 1344 1704 v9457071.exe 86 PID 1704 wrote to memory of 1344 1704 v9457071.exe 86 PID 1704 wrote to memory of 4616 1704 v9457071.exe 89 PID 1704 wrote to memory of 4616 1704 v9457071.exe 89 PID 1704 wrote to memory of 4616 1704 v9457071.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd56e39158e012bce51649320586bd4b0546692b81653eb6d0d24b66b592f9c5.exe"C:\Users\Admin\AppData\Local\Temp\fd56e39158e012bce51649320586bd4b0546692b81653eb6d0d24b66b592f9c5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2131064.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2131064.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9457071.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9457071.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4972393.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4972393.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1344
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3720924.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3720924.exe4⤵
- Executes dropped EXE
PID:4616
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
751KB
MD5a63becbd675cf7c8095549ac27e3ec9c
SHA1bc1221bcdbc96c7f20bd89a81e0c7a311b7c629a
SHA2567fb871f2547bffc0c1b2bf5dd7e88f2ecd1b853334acc2829ea043ac2826b53d
SHA512b9c78bd69f6c0448f6c83127937998f8d6f69d33deef4d7311e94cad4edfbb1ef01400d9e6c8415ec86b711dcb5c51c86fa0aa900002abf3d9e53cc0c025d61c
-
Filesize
751KB
MD5a63becbd675cf7c8095549ac27e3ec9c
SHA1bc1221bcdbc96c7f20bd89a81e0c7a311b7c629a
SHA2567fb871f2547bffc0c1b2bf5dd7e88f2ecd1b853334acc2829ea043ac2826b53d
SHA512b9c78bd69f6c0448f6c83127937998f8d6f69d33deef4d7311e94cad4edfbb1ef01400d9e6c8415ec86b711dcb5c51c86fa0aa900002abf3d9e53cc0c025d61c
-
Filesize
306KB
MD51f4672bd322e351b78ab98d0cf7ef80d
SHA1d815b4e2040ea8e29d37e45a2a25dcaec3a3b497
SHA256c3c3cb1d078b4f7206b9ff0a277ce11e3dea1ed3349aeaa369c0f142aaa9bc87
SHA5125d757fee3bab54aaecb5be3cc10d00cf552ad677fa191781c56bcd6af4c5b6b2d7a164134a7c55fbb7dcb3f2721c6d714c993de82db45797befa4b6085c7da8f
-
Filesize
306KB
MD51f4672bd322e351b78ab98d0cf7ef80d
SHA1d815b4e2040ea8e29d37e45a2a25dcaec3a3b497
SHA256c3c3cb1d078b4f7206b9ff0a277ce11e3dea1ed3349aeaa369c0f142aaa9bc87
SHA5125d757fee3bab54aaecb5be3cc10d00cf552ad677fa191781c56bcd6af4c5b6b2d7a164134a7c55fbb7dcb3f2721c6d714c993de82db45797befa4b6085c7da8f
-
Filesize
185KB
MD52a625d8ebba2ce1a588c785b880f2449
SHA1e2d27bfd827892c91a3ebbc7fdb645211b45131f
SHA25692c5ef93cea70260772c3b916fb43c0639c624277adac3b0b9f3faed153f3054
SHA51238a0f8ff7c10598ed40bb22935e06329f3567dea82fc4bdd3c69bcd3752ad07afc014ce95a69ea93fce1f896e155c9ef0ac448ab48ac74245f32bdad5d91154d
-
Filesize
185KB
MD52a625d8ebba2ce1a588c785b880f2449
SHA1e2d27bfd827892c91a3ebbc7fdb645211b45131f
SHA25692c5ef93cea70260772c3b916fb43c0639c624277adac3b0b9f3faed153f3054
SHA51238a0f8ff7c10598ed40bb22935e06329f3567dea82fc4bdd3c69bcd3752ad07afc014ce95a69ea93fce1f896e155c9ef0ac448ab48ac74245f32bdad5d91154d
-
Filesize
145KB
MD518d9add5cd5aab51e14dc29362628783
SHA1ea497adc831551a4fda2d32b9eb61551c9e50413
SHA256d5ba31159a00fac8b88c722017b5a12f8975dfffe0c723a49182c7b244af8151
SHA5128797b52058666645f03c2ed763f9681a790cb269786e1d658845a32bf5bab6af5c5e0d7037481d491ff688e870675e0360200c401da2f849c450b84577677d3f
-
Filesize
145KB
MD518d9add5cd5aab51e14dc29362628783
SHA1ea497adc831551a4fda2d32b9eb61551c9e50413
SHA256d5ba31159a00fac8b88c722017b5a12f8975dfffe0c723a49182c7b244af8151
SHA5128797b52058666645f03c2ed763f9681a790cb269786e1d658845a32bf5bab6af5c5e0d7037481d491ff688e870675e0360200c401da2f849c450b84577677d3f