Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2023 18:45
Static task
static1
Behavioral task
behavioral1
Sample
2482860.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2482860.exe
Resource
win10v2004-20230220-en
General
-
Target
2482860.exe
-
Size
1.0MB
-
MD5
639a462f401e756dc2d4932e5817d182
-
SHA1
d7fb8aa1369504607400eba1fd67fd739e0a3bde
-
SHA256
4d7f1d8e58a68eeaa131397babf259322e62f3e336bde692e155f700081e1047
-
SHA512
ece964807697840927487f49f7a39fa410de853a3b6f48d563234e1c0ee2a4cdf6027930b383bee0eccc73cba250d4afab8b6390f2d44dbec269d3d9f8be41c3
-
SSDEEP
24576:7yBqg57br2UzveFs7q1hvdDg+fT6S+7dzjqabs6RL:u8g9br2UKi7q1hdbN+7tqb6
Malware Config
Extracted
redline
mixa
185.161.248.37:4138
-
auth_value
9d14534b25ac495ab25b59800acf3bb2
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a4418575.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a4418575.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a4418575.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a4418575.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a4418575.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a4418575.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 3572 v7202973.exe 3676 v4656528.exe 1276 a4418575.exe 2180 b2433476.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a4418575.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a4418575.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v7202973.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v4656528.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v4656528.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2482860.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2482860.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v7202973.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1276 a4418575.exe 1276 a4418575.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1276 a4418575.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3408 wrote to memory of 3572 3408 2482860.exe 84 PID 3408 wrote to memory of 3572 3408 2482860.exe 84 PID 3408 wrote to memory of 3572 3408 2482860.exe 84 PID 3572 wrote to memory of 3676 3572 v7202973.exe 85 PID 3572 wrote to memory of 3676 3572 v7202973.exe 85 PID 3572 wrote to memory of 3676 3572 v7202973.exe 85 PID 3676 wrote to memory of 1276 3676 v4656528.exe 86 PID 3676 wrote to memory of 1276 3676 v4656528.exe 86 PID 3676 wrote to memory of 1276 3676 v4656528.exe 86 PID 3676 wrote to memory of 2180 3676 v4656528.exe 87 PID 3676 wrote to memory of 2180 3676 v4656528.exe 87 PID 3676 wrote to memory of 2180 3676 v4656528.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2482860.exe"C:\Users\Admin\AppData\Local\Temp\2482860.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7202973.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7202973.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4656528.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4656528.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4418575.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4418575.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1276
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2433476.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2433476.exe4⤵
- Executes dropped EXE
PID:2180
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
751KB
MD583c35fe65df6f19f36d8af3dff94e0b9
SHA1c3dc5c5b7ed590f62b24270212df135d33771a85
SHA256734c15bfa820118af735192bfdf41cb3fb8792d554cb53a51c43b1e8027d7ae8
SHA51226a1c9893ec0588502b4aa4a79b21c6fa96fcf986dba67a7399f881ca21d699d0ca6d2e0ef3761b489a62090298c3d168b178444da03aeb40f9a2534902f456b
-
Filesize
751KB
MD583c35fe65df6f19f36d8af3dff94e0b9
SHA1c3dc5c5b7ed590f62b24270212df135d33771a85
SHA256734c15bfa820118af735192bfdf41cb3fb8792d554cb53a51c43b1e8027d7ae8
SHA51226a1c9893ec0588502b4aa4a79b21c6fa96fcf986dba67a7399f881ca21d699d0ca6d2e0ef3761b489a62090298c3d168b178444da03aeb40f9a2534902f456b
-
Filesize
305KB
MD5e68292726b922f9cceeead9b6fb4c36f
SHA15a76abc6b132070517a4c66a16a89b8426d0c851
SHA256e4f6109a7be4575d50af232a4c66d75519744b2c115919c1bcdb2b48a4c6e687
SHA5122997b63eaa367069837db0459bb6933a0c7b3cbf7c66d6ae448da9f6d67c5453ed1752664a7c21b82e0db08c06768fbfa808895968340b5a3693d6df5720edde
-
Filesize
305KB
MD5e68292726b922f9cceeead9b6fb4c36f
SHA15a76abc6b132070517a4c66a16a89b8426d0c851
SHA256e4f6109a7be4575d50af232a4c66d75519744b2c115919c1bcdb2b48a4c6e687
SHA5122997b63eaa367069837db0459bb6933a0c7b3cbf7c66d6ae448da9f6d67c5453ed1752664a7c21b82e0db08c06768fbfa808895968340b5a3693d6df5720edde
-
Filesize
185KB
MD5367cfb38598b41ad698f878cd217c943
SHA1e3b6025c50330b1a75ec920d22dd6f0d79212f6b
SHA256f477a250b81baa3147602f798291d4b603470f5eff99afdaf9ab264cbc300551
SHA5121ae82e49cf3e845991c950165cee0da91513e7d9932e6935c642be9ab090780a3fcafdfb26cea7b57a1aff603777e22d5d495957756e0aacbd5347741b761a0c
-
Filesize
185KB
MD5367cfb38598b41ad698f878cd217c943
SHA1e3b6025c50330b1a75ec920d22dd6f0d79212f6b
SHA256f477a250b81baa3147602f798291d4b603470f5eff99afdaf9ab264cbc300551
SHA5121ae82e49cf3e845991c950165cee0da91513e7d9932e6935c642be9ab090780a3fcafdfb26cea7b57a1aff603777e22d5d495957756e0aacbd5347741b761a0c
-
Filesize
145KB
MD597c145a0988d07a111d293e4183c4944
SHA1f0711ed2b3a9c84c1eaa61f472e637dabcf0d7cd
SHA25682990dc10a2b1adfadb5d6a9c431df420f4e14e36d00fbdc9ede042125705f31
SHA512f8fcc3a91ce572511e2e2e27c75ac041e53e8feb1873dc0dde79b96a7a6d32ffb3e7272ab948966edf4c0838a2d889aa0cf47487a05cac4ea160575bb2322e0b
-
Filesize
145KB
MD597c145a0988d07a111d293e4183c4944
SHA1f0711ed2b3a9c84c1eaa61f472e637dabcf0d7cd
SHA25682990dc10a2b1adfadb5d6a9c431df420f4e14e36d00fbdc9ede042125705f31
SHA512f8fcc3a91ce572511e2e2e27c75ac041e53e8feb1873dc0dde79b96a7a6d32ffb3e7272ab948966edf4c0838a2d889aa0cf47487a05cac4ea160575bb2322e0b