Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2023 10:47
Static task
static1
Behavioral task
behavioral1
Sample
connector361.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
connector361.exe
Resource
win10v2004-20230220-en
General
-
Target
connector361.exe
-
Size
1.0MB
-
MD5
581026913ad722416f7644094188e68a
-
SHA1
df366a2268e5373f407e73fc80c7f694d31db551
-
SHA256
cb0d7efc51da225943743f0055cdf3584ad5d4f3a855150eb0bad8697e579433
-
SHA512
c3f316d248469d932bd10254eccc2f3f3a71f291bd8b068c857247c43ba6d5616672bdb317e404939381e6b1e2452243987b6c7e2205c75b87d29c99ed23b90c
-
SSDEEP
24576:1yJAzsS6ggVpLLy2qFYDJi1se/qenD6ezp9sXp9G8iZvKwIe:QJLSiVpS2q2i1seCenuezQXiZv
Malware Config
Extracted
redline
diza
185.161.248.37:4138
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k7190923.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k7190923.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k7190923.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k7190923.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k7190923.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k7190923.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 552 y2501370.exe 3648 y9897793.exe 5044 k7190923.exe 432 l8580593.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k7190923.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k7190923.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y2501370.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y9897793.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y9897793.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce connector361.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" connector361.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y2501370.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5044 k7190923.exe 5044 k7190923.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5044 k7190923.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4692 wrote to memory of 552 4692 connector361.exe 85 PID 4692 wrote to memory of 552 4692 connector361.exe 85 PID 4692 wrote to memory of 552 4692 connector361.exe 85 PID 552 wrote to memory of 3648 552 y2501370.exe 86 PID 552 wrote to memory of 3648 552 y2501370.exe 86 PID 552 wrote to memory of 3648 552 y2501370.exe 86 PID 3648 wrote to memory of 5044 3648 y9897793.exe 87 PID 3648 wrote to memory of 5044 3648 y9897793.exe 87 PID 3648 wrote to memory of 5044 3648 y9897793.exe 87 PID 3648 wrote to memory of 432 3648 y9897793.exe 88 PID 3648 wrote to memory of 432 3648 y9897793.exe 88 PID 3648 wrote to memory of 432 3648 y9897793.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\connector361.exe"C:\Users\Admin\AppData\Local\Temp\connector361.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2501370.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2501370.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y9897793.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y9897793.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k7190923.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k7190923.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5044
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l8580593.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l8580593.exe4⤵
- Executes dropped EXE
PID:432
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
750KB
MD50500fd3e93d3b1d1c668bd1ddb2c335c
SHA13e78d16bb8c85bb3ec4def142b48efde564c04a9
SHA25620232bc5eb828ddbec60f01c2ab2f7ce250490e01a2dfe33518b5a84674323fe
SHA5125f20b65c60136ab1db0e690e7a339a69f8d9a0537ec704d138aa3ff4707b15e4745903bcdcf517d905b4dfd8ca499c3441565ba5f78e700a2bf036cbe7442adf
-
Filesize
750KB
MD50500fd3e93d3b1d1c668bd1ddb2c335c
SHA13e78d16bb8c85bb3ec4def142b48efde564c04a9
SHA25620232bc5eb828ddbec60f01c2ab2f7ce250490e01a2dfe33518b5a84674323fe
SHA5125f20b65c60136ab1db0e690e7a339a69f8d9a0537ec704d138aa3ff4707b15e4745903bcdcf517d905b4dfd8ca499c3441565ba5f78e700a2bf036cbe7442adf
-
Filesize
305KB
MD58ffef05a7c87d31fdf35aa7467119627
SHA100120a17c8b7c36e5b7c14f91a01a9dba9dd1030
SHA256872df7c6f35a3d2603518d59d6249ea88572c2ef3e635b39998631e183a15c6c
SHA512fcbfa224d0fd0d7b5071e106ef7c7b4be3bca0805e5db6e2dff6de40634d051c3cfcedfec05e922c4ff6807fd48a91ae8134bf3c0d8dbfc23c23e74e221c01b6
-
Filesize
305KB
MD58ffef05a7c87d31fdf35aa7467119627
SHA100120a17c8b7c36e5b7c14f91a01a9dba9dd1030
SHA256872df7c6f35a3d2603518d59d6249ea88572c2ef3e635b39998631e183a15c6c
SHA512fcbfa224d0fd0d7b5071e106ef7c7b4be3bca0805e5db6e2dff6de40634d051c3cfcedfec05e922c4ff6807fd48a91ae8134bf3c0d8dbfc23c23e74e221c01b6
-
Filesize
186KB
MD5fca0f1c3037a2b4f0b9871e10e16c038
SHA180c39dfb8b07c97cdae11d5c7e335c4d96b0aef1
SHA256b86263755a383b136d8da35c23bf5a8e59b6743fb9e5942a4e7378dfab5928ec
SHA51244f428d58a62f45f2e3febfd2bd43f9cc2731ca434f9e319ec6671d6a1dcec9928797896b0a7edd0c34c7a9a14525f53d0a4cc6b79a20597376ef44887473801
-
Filesize
186KB
MD5fca0f1c3037a2b4f0b9871e10e16c038
SHA180c39dfb8b07c97cdae11d5c7e335c4d96b0aef1
SHA256b86263755a383b136d8da35c23bf5a8e59b6743fb9e5942a4e7378dfab5928ec
SHA51244f428d58a62f45f2e3febfd2bd43f9cc2731ca434f9e319ec6671d6a1dcec9928797896b0a7edd0c34c7a9a14525f53d0a4cc6b79a20597376ef44887473801
-
Filesize
145KB
MD5030c62470251bad5ea2d288efca95591
SHA1799e7324ba03d96efa7be12d6baf6396e7754918
SHA2564cac0717b5ddf640fbcd467e6b5155372412013f9860aada39177e0003559190
SHA5120e166a99ebedb7021763212182ffce8688286c8530fcbc2a7f411c3bc0dcb89fe8a45890efe258e69a32c0f440d36b3756a6fbaa8a31fb89a9708831e7b80c47
-
Filesize
145KB
MD5030c62470251bad5ea2d288efca95591
SHA1799e7324ba03d96efa7be12d6baf6396e7754918
SHA2564cac0717b5ddf640fbcd467e6b5155372412013f9860aada39177e0003559190
SHA5120e166a99ebedb7021763212182ffce8688286c8530fcbc2a7f411c3bc0dcb89fe8a45890efe258e69a32c0f440d36b3756a6fbaa8a31fb89a9708831e7b80c47