Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2023 10:45
Static task
static1
Behavioral task
behavioral1
Sample
62263263167.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
62263263167.exe
Resource
win10v2004-20230220-en
General
-
Target
62263263167.exe
-
Size
1.0MB
-
MD5
e7a5b9384e98d5824908250151350ab9
-
SHA1
d8fa0e261190fe467a0f995ea374336ce4202d7e
-
SHA256
399c54c2eee7682054160b286afb63afdf46995224531f4d2f13f68df90f865f
-
SHA512
586d8b33547748c2c69b86888cde3a5290e75b453a0a5db8e6faf0b2d4e142782f7942cded609eb53003f2b002a516c5e0f1d75c01835fd20203a140b7cbcf77
-
SSDEEP
24576:JyGzT/ZbdDh4h5kBqFR8jVNZKA2/LynKPxTj07uBhNupXCf:8UT/ZpD6h5qqFR8hI/yKPxc7u/4
Malware Config
Extracted
redline
mixa
185.161.248.37:4138
-
auth_value
9d14534b25ac495ab25b59800acf3bb2
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a4979988.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a4979988.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a4979988.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a4979988.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a4979988.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a4979988.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 1508 v4737552.exe 1224 v3408182.exe 2932 a4979988.exe 756 b2410683.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a4979988.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a4979988.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v3408182.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v3408182.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 62263263167.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 62263263167.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v4737552.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v4737552.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2932 a4979988.exe 2932 a4979988.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2932 a4979988.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3820 wrote to memory of 1508 3820 62263263167.exe 84 PID 3820 wrote to memory of 1508 3820 62263263167.exe 84 PID 3820 wrote to memory of 1508 3820 62263263167.exe 84 PID 1508 wrote to memory of 1224 1508 v4737552.exe 85 PID 1508 wrote to memory of 1224 1508 v4737552.exe 85 PID 1508 wrote to memory of 1224 1508 v4737552.exe 85 PID 1224 wrote to memory of 2932 1224 v3408182.exe 86 PID 1224 wrote to memory of 2932 1224 v3408182.exe 86 PID 1224 wrote to memory of 2932 1224 v3408182.exe 86 PID 1224 wrote to memory of 756 1224 v3408182.exe 87 PID 1224 wrote to memory of 756 1224 v3408182.exe 87 PID 1224 wrote to memory of 756 1224 v3408182.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\62263263167.exe"C:\Users\Admin\AppData\Local\Temp\62263263167.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4737552.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4737552.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3408182.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3408182.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4979988.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4979988.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2932
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2410683.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2410683.exe4⤵
- Executes dropped EXE
PID:756
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
750KB
MD56c39f304f011fb4e37da902bc7492335
SHA1a4b0ca855482acf8e396a23ce3863d71092f023c
SHA256af7bf73aa1ef3b228bb4568438df70fcf90ff86514c838810bd989f6405b34ec
SHA512a0d617cabccd90b4c43782ccd400bc2c83739e133eeb028765f6b6ad85aad332f855709dd93224904d5b0085c9715375d44e42de2054520c39599d812de35a6b
-
Filesize
750KB
MD56c39f304f011fb4e37da902bc7492335
SHA1a4b0ca855482acf8e396a23ce3863d71092f023c
SHA256af7bf73aa1ef3b228bb4568438df70fcf90ff86514c838810bd989f6405b34ec
SHA512a0d617cabccd90b4c43782ccd400bc2c83739e133eeb028765f6b6ad85aad332f855709dd93224904d5b0085c9715375d44e42de2054520c39599d812de35a6b
-
Filesize
306KB
MD5b651bdeed6389373ac44ab7de014727a
SHA1e310ce17d2ba9c288a80833a7bc8e0255c925181
SHA256a6d4e59659000be2c46c138198bf7f10534ec55754d53eb75db3fbdf0f4cd7a0
SHA5125135d5d038c72dd022debbb4acbd1fb141b67028dd82879835683d23164b4aa17bce21c64af368b5208a60185c35bcaf15d33d161c831905ab94dd65cc1146ae
-
Filesize
306KB
MD5b651bdeed6389373ac44ab7de014727a
SHA1e310ce17d2ba9c288a80833a7bc8e0255c925181
SHA256a6d4e59659000be2c46c138198bf7f10534ec55754d53eb75db3fbdf0f4cd7a0
SHA5125135d5d038c72dd022debbb4acbd1fb141b67028dd82879835683d23164b4aa17bce21c64af368b5208a60185c35bcaf15d33d161c831905ab94dd65cc1146ae
-
Filesize
186KB
MD5f090ed698ba64c6c799545878d27ae94
SHA168f3acab6d66227594308237a4905fdc8d3642dc
SHA2560908fba4a129abb44e884df1eb42733b49c7c91637f26b51e7204cd943518095
SHA512aec029142535a8554740ddcddf89c16974fdb36f04cae9b7fca62fb3eb582588171dc23e27d35a562379f768816126e7c5bb52b4931e8d98cea6d09bec614fd8
-
Filesize
186KB
MD5f090ed698ba64c6c799545878d27ae94
SHA168f3acab6d66227594308237a4905fdc8d3642dc
SHA2560908fba4a129abb44e884df1eb42733b49c7c91637f26b51e7204cd943518095
SHA512aec029142535a8554740ddcddf89c16974fdb36f04cae9b7fca62fb3eb582588171dc23e27d35a562379f768816126e7c5bb52b4931e8d98cea6d09bec614fd8
-
Filesize
145KB
MD5fa04e1cb745d792c45793109f24d7f88
SHA19dcdfd4565dd6b19c58b03aec7b8182d3f4ab204
SHA2566d4ae791eb8ac7121d7057cd17137fb37eced4b4657283a07d0882bd52fb3ff2
SHA51273585a6d345fc93ddfb6d91b78d591fd315f303247fa89ff78b3b72b3bdcb76ffd2a6084bffb4dc5b09fc6cccc1e67fa8dc0eb630e184fdd74b743ef1030f3a2
-
Filesize
145KB
MD5fa04e1cb745d792c45793109f24d7f88
SHA19dcdfd4565dd6b19c58b03aec7b8182d3f4ab204
SHA2566d4ae791eb8ac7121d7057cd17137fb37eced4b4657283a07d0882bd52fb3ff2
SHA51273585a6d345fc93ddfb6d91b78d591fd315f303247fa89ff78b3b72b3bdcb76ffd2a6084bffb4dc5b09fc6cccc1e67fa8dc0eb630e184fdd74b743ef1030f3a2