Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2023, 10:44
Static task
static1
Behavioral task
behavioral1
Sample
2724243512.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2724243512.exe
Resource
win10v2004-20230220-en
General
-
Target
2724243512.exe
-
Size
1.0MB
-
MD5
5c22fc6b5fa3fdf465b43aa8b56569d1
-
SHA1
f32b1e9138e97545a55907120ae15db2f29a3f31
-
SHA256
8b67e7b1505ef5ab83c8589cbdad0f4b164e7976058e78d31233f4e80c15757d
-
SHA512
12f61e607d6b0fabd882caa5f523434f5e3b0a045013bf91bfd06c4adcb61b7e228bd9fa85f89e18c226508bdf0c568184a096de667f838400edd35757033805
-
SSDEEP
24576:oySfIcq3BYX98P+7OVSnxQzX33Siy8JNO:vSfXqR+9827jxu3K8N
Malware Config
Extracted
redline
diza
185.161.248.37:4138
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k8475682.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k8475682.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k8475682.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k8475682.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k8475682.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k8475682.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 1488 y5255326.exe 2056 y4118647.exe 1064 k8475682.exe 4440 l4900927.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k8475682.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k8475682.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y5255326.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y5255326.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y4118647.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y4118647.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2724243512.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2724243512.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1064 k8475682.exe 1064 k8475682.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1064 k8475682.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4948 wrote to memory of 1488 4948 2724243512.exe 85 PID 4948 wrote to memory of 1488 4948 2724243512.exe 85 PID 4948 wrote to memory of 1488 4948 2724243512.exe 85 PID 1488 wrote to memory of 2056 1488 y5255326.exe 87 PID 1488 wrote to memory of 2056 1488 y5255326.exe 87 PID 1488 wrote to memory of 2056 1488 y5255326.exe 87 PID 2056 wrote to memory of 1064 2056 y4118647.exe 88 PID 2056 wrote to memory of 1064 2056 y4118647.exe 88 PID 2056 wrote to memory of 1064 2056 y4118647.exe 88 PID 2056 wrote to memory of 4440 2056 y4118647.exe 89 PID 2056 wrote to memory of 4440 2056 y4118647.exe 89 PID 2056 wrote to memory of 4440 2056 y4118647.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\2724243512.exe"C:\Users\Admin\AppData\Local\Temp\2724243512.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5255326.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5255326.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y4118647.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y4118647.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k8475682.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k8475682.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1064
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l4900927.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l4900927.exe4⤵
- Executes dropped EXE
PID:4440
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
750KB
MD56c84c77871ce1a41cc463f7156971ad7
SHA190fecadb61ea0b6b7818b37395c6604c65d9975d
SHA256a4d896f5520c00fa8edb87f81774557256bdf7d98092c413370853d332d300d5
SHA512d9c724deaecdd3867b0e839c5bb26a3e5f749838993f86c0237395f439c8027d0f62f93d636b14f10335dc76acc59bb55f4258f08d527aabc9dd10e2c01effa0
-
Filesize
750KB
MD56c84c77871ce1a41cc463f7156971ad7
SHA190fecadb61ea0b6b7818b37395c6604c65d9975d
SHA256a4d896f5520c00fa8edb87f81774557256bdf7d98092c413370853d332d300d5
SHA512d9c724deaecdd3867b0e839c5bb26a3e5f749838993f86c0237395f439c8027d0f62f93d636b14f10335dc76acc59bb55f4258f08d527aabc9dd10e2c01effa0
-
Filesize
305KB
MD5c56e4122b7b42766bf4af2110f335e3e
SHA19913dbce9662fc5d777595bddd8bba1971e87367
SHA2561704fadfa4293bb9b787f475f49ec6077b0d6dd0f27021e6eaa850a8df38aa25
SHA512eb63d062a85af5b55f24dc30be889a76b4a8933f648e2de0819eff5315a3ef401d24e1df15cccf2bf902dcf6b678c7d3c024279f61046f45ea430aceacdee716
-
Filesize
305KB
MD5c56e4122b7b42766bf4af2110f335e3e
SHA19913dbce9662fc5d777595bddd8bba1971e87367
SHA2561704fadfa4293bb9b787f475f49ec6077b0d6dd0f27021e6eaa850a8df38aa25
SHA512eb63d062a85af5b55f24dc30be889a76b4a8933f648e2de0819eff5315a3ef401d24e1df15cccf2bf902dcf6b678c7d3c024279f61046f45ea430aceacdee716
-
Filesize
186KB
MD567d0c90e28ec128173b34bc02e8b5ca4
SHA151e4ffda96a565486b0770ce43a5eca49a5bb479
SHA256d3bd0fe838c098bd27c63847e081c9ed6b32a46968f7d9813b86d95ea4cf11ae
SHA51230a4d26e343b653ccea1dfae6a9bd556340ed9b5221e75a61553b952f280cbe524162193cc99587f052257340e80177bb58477e42354b37f5cd0571c12b9731b
-
Filesize
186KB
MD567d0c90e28ec128173b34bc02e8b5ca4
SHA151e4ffda96a565486b0770ce43a5eca49a5bb479
SHA256d3bd0fe838c098bd27c63847e081c9ed6b32a46968f7d9813b86d95ea4cf11ae
SHA51230a4d26e343b653ccea1dfae6a9bd556340ed9b5221e75a61553b952f280cbe524162193cc99587f052257340e80177bb58477e42354b37f5cd0571c12b9731b
-
Filesize
146KB
MD55d0411c3651920f0faf0890383208b6c
SHA165ea90b0a9cf9adaebcdfb1ff969a21ddf2af71a
SHA25614088580e3b44d54e58c783917b35506ac2f7c6f48d4abf066f95ede3014b01c
SHA5120cb2a715595c1482efd8eb1a65c8e07360b2634bee1d08f7238efa31aaffa178b6473c946b53a99e619fa57ebc04063319d807b565ccc2b2a06b22ac90073c78
-
Filesize
146KB
MD55d0411c3651920f0faf0890383208b6c
SHA165ea90b0a9cf9adaebcdfb1ff969a21ddf2af71a
SHA25614088580e3b44d54e58c783917b35506ac2f7c6f48d4abf066f95ede3014b01c
SHA5120cb2a715595c1482efd8eb1a65c8e07360b2634bee1d08f7238efa31aaffa178b6473c946b53a99e619fa57ebc04063319d807b565ccc2b2a06b22ac90073c78