Analysis
-
max time kernel
147s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
22-05-2023 06:37
Static task
static1
Behavioral task
behavioral1
Sample
driver847.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
driver847.exe
Resource
win10v2004-20230221-en
General
-
Target
driver847.exe
-
Size
1.0MB
-
MD5
1015190834ed2ef9582e54232a336d57
-
SHA1
aa8dbb795c4665eed4b2e41b356fe9d6292ef294
-
SHA256
1e244d9a5e260ced196b3e6d4c85b281d3fc7db5fc16c8bb9ddfec770985c50b
-
SHA512
2b1a9964cba79fe88ad368641fe476b214902ed003bfd4499c82e1e122f0b5fb1035798a400d38e8ecb270fd1e0bfc64308ee82028d462916e206a64d84bf1f5
-
SSDEEP
24576:Uyi9eeYnEdsDtq5A4iQFld5ZUlDZdDweH+cTKHSa:jS1AHQh5KlDZqevTK
Malware Config
Extracted
redline
diza
185.161.248.37:4138
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g8974138.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g8974138.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g8974138.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g8974138.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection g8974138.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g8974138.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
pid Process 656 x5691725.exe 1920 x6101680.exe 1664 f5532774.exe 1428 g8974138.exe 1160 h6374936.exe 1312 h6374936.exe -
Loads dropped DLL 13 IoCs
pid Process 2044 driver847.exe 656 x5691725.exe 656 x5691725.exe 1920 x6101680.exe 1920 x6101680.exe 1664 f5532774.exe 1920 x6101680.exe 1428 g8974138.exe 656 x5691725.exe 656 x5691725.exe 1160 h6374936.exe 1160 h6374936.exe 1160 h6374936.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features g8974138.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" g8974138.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" driver847.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce x5691725.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x5691725.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce x6101680.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x6101680.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce driver847.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1664 f5532774.exe 1664 f5532774.exe 1428 g8974138.exe 1428 g8974138.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1664 f5532774.exe Token: SeDebugPrivilege 1428 g8974138.exe Token: SeDebugPrivilege 1160 h6374936.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 2044 wrote to memory of 656 2044 driver847.exe 27 PID 2044 wrote to memory of 656 2044 driver847.exe 27 PID 2044 wrote to memory of 656 2044 driver847.exe 27 PID 2044 wrote to memory of 656 2044 driver847.exe 27 PID 2044 wrote to memory of 656 2044 driver847.exe 27 PID 2044 wrote to memory of 656 2044 driver847.exe 27 PID 2044 wrote to memory of 656 2044 driver847.exe 27 PID 656 wrote to memory of 1920 656 x5691725.exe 28 PID 656 wrote to memory of 1920 656 x5691725.exe 28 PID 656 wrote to memory of 1920 656 x5691725.exe 28 PID 656 wrote to memory of 1920 656 x5691725.exe 28 PID 656 wrote to memory of 1920 656 x5691725.exe 28 PID 656 wrote to memory of 1920 656 x5691725.exe 28 PID 656 wrote to memory of 1920 656 x5691725.exe 28 PID 1920 wrote to memory of 1664 1920 x6101680.exe 29 PID 1920 wrote to memory of 1664 1920 x6101680.exe 29 PID 1920 wrote to memory of 1664 1920 x6101680.exe 29 PID 1920 wrote to memory of 1664 1920 x6101680.exe 29 PID 1920 wrote to memory of 1664 1920 x6101680.exe 29 PID 1920 wrote to memory of 1664 1920 x6101680.exe 29 PID 1920 wrote to memory of 1664 1920 x6101680.exe 29 PID 1920 wrote to memory of 1428 1920 x6101680.exe 31 PID 1920 wrote to memory of 1428 1920 x6101680.exe 31 PID 1920 wrote to memory of 1428 1920 x6101680.exe 31 PID 1920 wrote to memory of 1428 1920 x6101680.exe 31 PID 1920 wrote to memory of 1428 1920 x6101680.exe 31 PID 1920 wrote to memory of 1428 1920 x6101680.exe 31 PID 1920 wrote to memory of 1428 1920 x6101680.exe 31 PID 656 wrote to memory of 1160 656 x5691725.exe 32 PID 656 wrote to memory of 1160 656 x5691725.exe 32 PID 656 wrote to memory of 1160 656 x5691725.exe 32 PID 656 wrote to memory of 1160 656 x5691725.exe 32 PID 656 wrote to memory of 1160 656 x5691725.exe 32 PID 656 wrote to memory of 1160 656 x5691725.exe 32 PID 656 wrote to memory of 1160 656 x5691725.exe 32 PID 1160 wrote to memory of 1312 1160 h6374936.exe 33 PID 1160 wrote to memory of 1312 1160 h6374936.exe 33 PID 1160 wrote to memory of 1312 1160 h6374936.exe 33 PID 1160 wrote to memory of 1312 1160 h6374936.exe 33 PID 1160 wrote to memory of 1312 1160 h6374936.exe 33 PID 1160 wrote to memory of 1312 1160 h6374936.exe 33 PID 1160 wrote to memory of 1312 1160 h6374936.exe 33 PID 1160 wrote to memory of 1312 1160 h6374936.exe 33 PID 1160 wrote to memory of 1736 1160 h6374936.exe 34 PID 1160 wrote to memory of 1736 1160 h6374936.exe 34 PID 1160 wrote to memory of 1736 1160 h6374936.exe 34 PID 1160 wrote to memory of 1736 1160 h6374936.exe 34 PID 1160 wrote to memory of 1736 1160 h6374936.exe 34 PID 1160 wrote to memory of 1736 1160 h6374936.exe 34 PID 1160 wrote to memory of 1736 1160 h6374936.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\driver847.exe"C:\Users\Admin\AppData\Local\Temp\driver847.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5691725.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5691725.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6101680.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6101680.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f5532774.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f5532774.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1664
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g8974138.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g8974138.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1428
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h6374936.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h6374936.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h6374936.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h6374936.exe4⤵
- Executes dropped EXE
PID:1312
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h6374936.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h6374936.exe4⤵PID:1736
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
750KB
MD5a4dd0d61d98e711a7ac981d2a27617fa
SHA13333066257217735ba7d2261dc245c033dfd1216
SHA256755a3a9058227ab0a80ccaf1e52fdf024c4d6645ef63df90aa507cdfb0f9abca
SHA512193b734b21b23644954cb0f7368b0be19d8d05facc5c0e625c22a645585a6f07f22cf7cc1426cf522d51206a0681f3360df98f82007101a558ae2067acec3988
-
Filesize
750KB
MD5a4dd0d61d98e711a7ac981d2a27617fa
SHA13333066257217735ba7d2261dc245c033dfd1216
SHA256755a3a9058227ab0a80ccaf1e52fdf024c4d6645ef63df90aa507cdfb0f9abca
SHA512193b734b21b23644954cb0f7368b0be19d8d05facc5c0e625c22a645585a6f07f22cf7cc1426cf522d51206a0681f3360df98f82007101a558ae2067acec3988
-
Filesize
966KB
MD53d30499dede20f662a6ec3c1fdef2fc4
SHA1c7d29e8a2d1d07b65864bdee9e7495022cb87cd2
SHA256a90ca450da84fef8537202c55f734f1009075712c49067e0db498a5646779a33
SHA512022b2da7d273ab36819303e49411ff8d2c4a0aecd4229464706621b8a0ad1dd6701c053ada52ff4b0355fd513b29f8afe6d08da02f985bd9308fda7dac9183ae
-
Filesize
966KB
MD53d30499dede20f662a6ec3c1fdef2fc4
SHA1c7d29e8a2d1d07b65864bdee9e7495022cb87cd2
SHA256a90ca450da84fef8537202c55f734f1009075712c49067e0db498a5646779a33
SHA512022b2da7d273ab36819303e49411ff8d2c4a0aecd4229464706621b8a0ad1dd6701c053ada52ff4b0355fd513b29f8afe6d08da02f985bd9308fda7dac9183ae
-
Filesize
966KB
MD53d30499dede20f662a6ec3c1fdef2fc4
SHA1c7d29e8a2d1d07b65864bdee9e7495022cb87cd2
SHA256a90ca450da84fef8537202c55f734f1009075712c49067e0db498a5646779a33
SHA512022b2da7d273ab36819303e49411ff8d2c4a0aecd4229464706621b8a0ad1dd6701c053ada52ff4b0355fd513b29f8afe6d08da02f985bd9308fda7dac9183ae
-
Filesize
966KB
MD53d30499dede20f662a6ec3c1fdef2fc4
SHA1c7d29e8a2d1d07b65864bdee9e7495022cb87cd2
SHA256a90ca450da84fef8537202c55f734f1009075712c49067e0db498a5646779a33
SHA512022b2da7d273ab36819303e49411ff8d2c4a0aecd4229464706621b8a0ad1dd6701c053ada52ff4b0355fd513b29f8afe6d08da02f985bd9308fda7dac9183ae
-
Filesize
306KB
MD5b93f0f023fd2ad16a73f93703c241353
SHA16af5dd803900d184c68f4013fcd285783242dc21
SHA256caa4065a05bf3c5a54a8f4c7647261888d9f764f42922cd3cb781ed9dee518bf
SHA51250807c325c78e78c9a0b8ba1bc1687add483b066a19c5ca128d287641eb3085448c6abdaf5dbfd407038c59376134c891f958c539b379ddd7bdbf8245a1a41fd
-
Filesize
306KB
MD5b93f0f023fd2ad16a73f93703c241353
SHA16af5dd803900d184c68f4013fcd285783242dc21
SHA256caa4065a05bf3c5a54a8f4c7647261888d9f764f42922cd3cb781ed9dee518bf
SHA51250807c325c78e78c9a0b8ba1bc1687add483b066a19c5ca128d287641eb3085448c6abdaf5dbfd407038c59376134c891f958c539b379ddd7bdbf8245a1a41fd
-
Filesize
146KB
MD5a7020deba2ce8a1a3182a442ecdf2b74
SHA195dfaee334e1e848e13ef1bd90fbf3efd71f8416
SHA25696b76f2f9f76f0149088a1988ea04b079469865d17a718568f57b2a0f2e70911
SHA512e575b1b16e33f0a5813cbc0ceaa959414aaa9cd9576ae962f53270fd53aab4d4ac90079579c95c77be16147e6a46dfee1213a13714fc8e74d0d9b61fb74c6da7
-
Filesize
146KB
MD5a7020deba2ce8a1a3182a442ecdf2b74
SHA195dfaee334e1e848e13ef1bd90fbf3efd71f8416
SHA25696b76f2f9f76f0149088a1988ea04b079469865d17a718568f57b2a0f2e70911
SHA512e575b1b16e33f0a5813cbc0ceaa959414aaa9cd9576ae962f53270fd53aab4d4ac90079579c95c77be16147e6a46dfee1213a13714fc8e74d0d9b61fb74c6da7
-
Filesize
186KB
MD53ea5e789a43575c35ffeac88f3a66b3c
SHA1aeafc7e996ab7c956b8ce9dfa4845c57a8ba2311
SHA256d000e0fbcf4b64d2df3cd03e07f23b8d5e213c84ce5f86fb09d244cf88691e6e
SHA51241ce15f294822e519286e24b23f04cd8548a2de5950719f42c64e2ea1cb82c4deb1947ed7e3084e7ff49de298b3cf1693e1ac689eb8d2c754a1d2ef816650961
-
Filesize
186KB
MD53ea5e789a43575c35ffeac88f3a66b3c
SHA1aeafc7e996ab7c956b8ce9dfa4845c57a8ba2311
SHA256d000e0fbcf4b64d2df3cd03e07f23b8d5e213c84ce5f86fb09d244cf88691e6e
SHA51241ce15f294822e519286e24b23f04cd8548a2de5950719f42c64e2ea1cb82c4deb1947ed7e3084e7ff49de298b3cf1693e1ac689eb8d2c754a1d2ef816650961
-
Filesize
750KB
MD5a4dd0d61d98e711a7ac981d2a27617fa
SHA13333066257217735ba7d2261dc245c033dfd1216
SHA256755a3a9058227ab0a80ccaf1e52fdf024c4d6645ef63df90aa507cdfb0f9abca
SHA512193b734b21b23644954cb0f7368b0be19d8d05facc5c0e625c22a645585a6f07f22cf7cc1426cf522d51206a0681f3360df98f82007101a558ae2067acec3988
-
Filesize
750KB
MD5a4dd0d61d98e711a7ac981d2a27617fa
SHA13333066257217735ba7d2261dc245c033dfd1216
SHA256755a3a9058227ab0a80ccaf1e52fdf024c4d6645ef63df90aa507cdfb0f9abca
SHA512193b734b21b23644954cb0f7368b0be19d8d05facc5c0e625c22a645585a6f07f22cf7cc1426cf522d51206a0681f3360df98f82007101a558ae2067acec3988
-
Filesize
966KB
MD53d30499dede20f662a6ec3c1fdef2fc4
SHA1c7d29e8a2d1d07b65864bdee9e7495022cb87cd2
SHA256a90ca450da84fef8537202c55f734f1009075712c49067e0db498a5646779a33
SHA512022b2da7d273ab36819303e49411ff8d2c4a0aecd4229464706621b8a0ad1dd6701c053ada52ff4b0355fd513b29f8afe6d08da02f985bd9308fda7dac9183ae
-
Filesize
966KB
MD53d30499dede20f662a6ec3c1fdef2fc4
SHA1c7d29e8a2d1d07b65864bdee9e7495022cb87cd2
SHA256a90ca450da84fef8537202c55f734f1009075712c49067e0db498a5646779a33
SHA512022b2da7d273ab36819303e49411ff8d2c4a0aecd4229464706621b8a0ad1dd6701c053ada52ff4b0355fd513b29f8afe6d08da02f985bd9308fda7dac9183ae
-
Filesize
966KB
MD53d30499dede20f662a6ec3c1fdef2fc4
SHA1c7d29e8a2d1d07b65864bdee9e7495022cb87cd2
SHA256a90ca450da84fef8537202c55f734f1009075712c49067e0db498a5646779a33
SHA512022b2da7d273ab36819303e49411ff8d2c4a0aecd4229464706621b8a0ad1dd6701c053ada52ff4b0355fd513b29f8afe6d08da02f985bd9308fda7dac9183ae
-
Filesize
966KB
MD53d30499dede20f662a6ec3c1fdef2fc4
SHA1c7d29e8a2d1d07b65864bdee9e7495022cb87cd2
SHA256a90ca450da84fef8537202c55f734f1009075712c49067e0db498a5646779a33
SHA512022b2da7d273ab36819303e49411ff8d2c4a0aecd4229464706621b8a0ad1dd6701c053ada52ff4b0355fd513b29f8afe6d08da02f985bd9308fda7dac9183ae
-
Filesize
966KB
MD53d30499dede20f662a6ec3c1fdef2fc4
SHA1c7d29e8a2d1d07b65864bdee9e7495022cb87cd2
SHA256a90ca450da84fef8537202c55f734f1009075712c49067e0db498a5646779a33
SHA512022b2da7d273ab36819303e49411ff8d2c4a0aecd4229464706621b8a0ad1dd6701c053ada52ff4b0355fd513b29f8afe6d08da02f985bd9308fda7dac9183ae
-
Filesize
306KB
MD5b93f0f023fd2ad16a73f93703c241353
SHA16af5dd803900d184c68f4013fcd285783242dc21
SHA256caa4065a05bf3c5a54a8f4c7647261888d9f764f42922cd3cb781ed9dee518bf
SHA51250807c325c78e78c9a0b8ba1bc1687add483b066a19c5ca128d287641eb3085448c6abdaf5dbfd407038c59376134c891f958c539b379ddd7bdbf8245a1a41fd
-
Filesize
306KB
MD5b93f0f023fd2ad16a73f93703c241353
SHA16af5dd803900d184c68f4013fcd285783242dc21
SHA256caa4065a05bf3c5a54a8f4c7647261888d9f764f42922cd3cb781ed9dee518bf
SHA51250807c325c78e78c9a0b8ba1bc1687add483b066a19c5ca128d287641eb3085448c6abdaf5dbfd407038c59376134c891f958c539b379ddd7bdbf8245a1a41fd
-
Filesize
146KB
MD5a7020deba2ce8a1a3182a442ecdf2b74
SHA195dfaee334e1e848e13ef1bd90fbf3efd71f8416
SHA25696b76f2f9f76f0149088a1988ea04b079469865d17a718568f57b2a0f2e70911
SHA512e575b1b16e33f0a5813cbc0ceaa959414aaa9cd9576ae962f53270fd53aab4d4ac90079579c95c77be16147e6a46dfee1213a13714fc8e74d0d9b61fb74c6da7
-
Filesize
146KB
MD5a7020deba2ce8a1a3182a442ecdf2b74
SHA195dfaee334e1e848e13ef1bd90fbf3efd71f8416
SHA25696b76f2f9f76f0149088a1988ea04b079469865d17a718568f57b2a0f2e70911
SHA512e575b1b16e33f0a5813cbc0ceaa959414aaa9cd9576ae962f53270fd53aab4d4ac90079579c95c77be16147e6a46dfee1213a13714fc8e74d0d9b61fb74c6da7
-
Filesize
186KB
MD53ea5e789a43575c35ffeac88f3a66b3c
SHA1aeafc7e996ab7c956b8ce9dfa4845c57a8ba2311
SHA256d000e0fbcf4b64d2df3cd03e07f23b8d5e213c84ce5f86fb09d244cf88691e6e
SHA51241ce15f294822e519286e24b23f04cd8548a2de5950719f42c64e2ea1cb82c4deb1947ed7e3084e7ff49de298b3cf1693e1ac689eb8d2c754a1d2ef816650961
-
Filesize
186KB
MD53ea5e789a43575c35ffeac88f3a66b3c
SHA1aeafc7e996ab7c956b8ce9dfa4845c57a8ba2311
SHA256d000e0fbcf4b64d2df3cd03e07f23b8d5e213c84ce5f86fb09d244cf88691e6e
SHA51241ce15f294822e519286e24b23f04cd8548a2de5950719f42c64e2ea1cb82c4deb1947ed7e3084e7ff49de298b3cf1693e1ac689eb8d2c754a1d2ef816650961