Analysis
-
max time kernel
144s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2023 04:48
Static task
static1
Behavioral task
behavioral1
Sample
741016cc122506710d11ca226ab36257a02481e36193c75775b1985b9d01e84b.exe
Resource
win10v2004-20230220-en
General
-
Target
741016cc122506710d11ca226ab36257a02481e36193c75775b1985b9d01e84b.exe
-
Size
1.0MB
-
MD5
7a8faffed123ebc592314c0de1a688ea
-
SHA1
1ecc8c183781e85da1bd4c0d11073c8bba62544d
-
SHA256
741016cc122506710d11ca226ab36257a02481e36193c75775b1985b9d01e84b
-
SHA512
b5dafaa69c9943d7c00fa96f86f98e8c54a812c0ff8148d548e8531f82997ae41b01951d1342dcbf213a17bcc8204424d1f8a5b4a320805ba83d22e9e508c304
-
SSDEEP
24576:xyfKEYSJYVhTcK7eqASdh7qa2mTz9KdEj81JLEV9EbRLxp8:kcxz77eqXdh7b2AKGjeJYVkp
Malware Config
Extracted
redline
mixa
185.161.248.37:4138
-
auth_value
9d14534b25ac495ab25b59800acf3bb2
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a0660276.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a0660276.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a0660276.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a0660276.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a0660276.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a0660276.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 844 v2083983.exe 4844 v5268650.exe 4476 a0660276.exe 4524 b4817465.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a0660276.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a0660276.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v2083983.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v5268650.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v5268650.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 741016cc122506710d11ca226ab36257a02481e36193c75775b1985b9d01e84b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 741016cc122506710d11ca226ab36257a02481e36193c75775b1985b9d01e84b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v2083983.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4476 a0660276.exe 4476 a0660276.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4476 a0660276.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4900 wrote to memory of 844 4900 741016cc122506710d11ca226ab36257a02481e36193c75775b1985b9d01e84b.exe 83 PID 4900 wrote to memory of 844 4900 741016cc122506710d11ca226ab36257a02481e36193c75775b1985b9d01e84b.exe 83 PID 4900 wrote to memory of 844 4900 741016cc122506710d11ca226ab36257a02481e36193c75775b1985b9d01e84b.exe 83 PID 844 wrote to memory of 4844 844 v2083983.exe 84 PID 844 wrote to memory of 4844 844 v2083983.exe 84 PID 844 wrote to memory of 4844 844 v2083983.exe 84 PID 4844 wrote to memory of 4476 4844 v5268650.exe 85 PID 4844 wrote to memory of 4476 4844 v5268650.exe 85 PID 4844 wrote to memory of 4476 4844 v5268650.exe 85 PID 4844 wrote to memory of 4524 4844 v5268650.exe 88 PID 4844 wrote to memory of 4524 4844 v5268650.exe 88 PID 4844 wrote to memory of 4524 4844 v5268650.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\741016cc122506710d11ca226ab36257a02481e36193c75775b1985b9d01e84b.exe"C:\Users\Admin\AppData\Local\Temp\741016cc122506710d11ca226ab36257a02481e36193c75775b1985b9d01e84b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2083983.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2083983.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5268650.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5268650.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a0660276.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a0660276.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4476
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4817465.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4817465.exe4⤵
- Executes dropped EXE
PID:4524
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
750KB
MD5933f623efedf9ae49e35adf25fdef24b
SHA15c51a4ac9b727d05c9fe0d9c102c9536ae6b9acd
SHA256a84be76d504e85334c256792fdc5ca7fdde96275b566caeef5752150ab5b4892
SHA512aeb3c7d7181536e0b8daf9ea7cee47aff6aa2dda6f86aed4724a1f7733a55b27eb1b7ba4462f02f8b78da7d8cc7cfcb04cb639aedb24b91dcfad80358579ca9d
-
Filesize
750KB
MD5933f623efedf9ae49e35adf25fdef24b
SHA15c51a4ac9b727d05c9fe0d9c102c9536ae6b9acd
SHA256a84be76d504e85334c256792fdc5ca7fdde96275b566caeef5752150ab5b4892
SHA512aeb3c7d7181536e0b8daf9ea7cee47aff6aa2dda6f86aed4724a1f7733a55b27eb1b7ba4462f02f8b78da7d8cc7cfcb04cb639aedb24b91dcfad80358579ca9d
-
Filesize
306KB
MD5ba7a42b09ebf494f9dd6864aa6763a96
SHA1603cca0df1718995bd4a9f984687ce86b6adf071
SHA25608fb1cb6bf5d2777b0b93e220d57b8acb508d2a68a722a95294ea84f918defac
SHA51272ca0b08be122bc727b9c24d254e4997b50caff9cfadb75d80454bbfba1e3f44d442a3e43efb98944396ec408adb581ec40f117f8a724ce4e198ed003e3db4a3
-
Filesize
306KB
MD5ba7a42b09ebf494f9dd6864aa6763a96
SHA1603cca0df1718995bd4a9f984687ce86b6adf071
SHA25608fb1cb6bf5d2777b0b93e220d57b8acb508d2a68a722a95294ea84f918defac
SHA51272ca0b08be122bc727b9c24d254e4997b50caff9cfadb75d80454bbfba1e3f44d442a3e43efb98944396ec408adb581ec40f117f8a724ce4e198ed003e3db4a3
-
Filesize
186KB
MD54ed2e0b8948b281ee4e9c40517302230
SHA1759444867e775604fdfce535a1550fd0afdb2e19
SHA256aaf51ac47fdabc810353eca10d4ff3bc58f81dd390989e758161e1c757c82b14
SHA512b0db2f46f4284490c3ff68fb0da25a791730fca944258df8512dd95de46ba845411ebd9d40fbc2e8b82aeea28e85379bb361231253fc4290bf2878ffc7686b72
-
Filesize
186KB
MD54ed2e0b8948b281ee4e9c40517302230
SHA1759444867e775604fdfce535a1550fd0afdb2e19
SHA256aaf51ac47fdabc810353eca10d4ff3bc58f81dd390989e758161e1c757c82b14
SHA512b0db2f46f4284490c3ff68fb0da25a791730fca944258df8512dd95de46ba845411ebd9d40fbc2e8b82aeea28e85379bb361231253fc4290bf2878ffc7686b72
-
Filesize
145KB
MD5b7900f29e9f9e421920ba0b40f73a6df
SHA18089b2ac5d4e6e711255c673397e3dd0c0af0e17
SHA25604e241ba2a2dc96ebff4d416937cb12eac3225631d2861691548ed971352f395
SHA512eeef0f64e9145e3201b47d2880acc845f8af5d2c26d3925dafc6abbc0661ac22a2b72384b00ef3b168e29f9a2a92c311be18554901e2f2d4b4ad73a36182efa2
-
Filesize
145KB
MD5b7900f29e9f9e421920ba0b40f73a6df
SHA18089b2ac5d4e6e711255c673397e3dd0c0af0e17
SHA25604e241ba2a2dc96ebff4d416937cb12eac3225631d2861691548ed971352f395
SHA512eeef0f64e9145e3201b47d2880acc845f8af5d2c26d3925dafc6abbc0661ac22a2b72384b00ef3b168e29f9a2a92c311be18554901e2f2d4b4ad73a36182efa2