Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2023, 10:47
Static task
static1
Behavioral task
behavioral1
Sample
editor307.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
editor307.exe
Resource
win10v2004-20230221-en
General
-
Target
editor307.exe
-
Size
1.0MB
-
MD5
174ca1152c5569b07f50fcc4a7013ef3
-
SHA1
cb7a78d66be98157b4ef311ef5ec9117d6fb7c5f
-
SHA256
0132c101423fa2b115a816d8af7885526f7113321b27c78088990da08e9a634b
-
SHA512
024d25e91cb164b8d920c5658542b489fc936cf74b096e44ea86046e0e726201802b8931a48c9dcb5a13171834567786b347ed2f8bbe04458d75013731dd4f8e
-
SSDEEP
24576:qydvg+omjTkScyaGq9mw7Uy6cOklrDafpyD1:xdvhomjTpcyJq9mw7U8LIG
Malware Config
Extracted
redline
mixa
185.161.248.37:4138
-
auth_value
9d14534b25ac495ab25b59800acf3bb2
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a1482469.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a1482469.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a1482469.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a1482469.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a1482469.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a1482469.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 3916 v7397416.exe 4940 v6581417.exe 4964 a1482469.exe 1932 b6263688.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a1482469.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a1482469.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v6581417.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v6581417.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce editor307.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" editor307.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v7397416.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v7397416.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4964 a1482469.exe 4964 a1482469.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4964 a1482469.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2224 wrote to memory of 3916 2224 editor307.exe 84 PID 2224 wrote to memory of 3916 2224 editor307.exe 84 PID 2224 wrote to memory of 3916 2224 editor307.exe 84 PID 3916 wrote to memory of 4940 3916 v7397416.exe 85 PID 3916 wrote to memory of 4940 3916 v7397416.exe 85 PID 3916 wrote to memory of 4940 3916 v7397416.exe 85 PID 4940 wrote to memory of 4964 4940 v6581417.exe 86 PID 4940 wrote to memory of 4964 4940 v6581417.exe 86 PID 4940 wrote to memory of 4964 4940 v6581417.exe 86 PID 4940 wrote to memory of 1932 4940 v6581417.exe 87 PID 4940 wrote to memory of 1932 4940 v6581417.exe 87 PID 4940 wrote to memory of 1932 4940 v6581417.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\editor307.exe"C:\Users\Admin\AppData\Local\Temp\editor307.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7397416.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7397416.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6581417.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6581417.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a1482469.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a1482469.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4964
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b6263688.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b6263688.exe4⤵
- Executes dropped EXE
PID:1932
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
750KB
MD5dd3d0ba4b930479d955943f6cf0e066d
SHA12c7955d9d78fc7b8d8f3c732a44021c788b22a6e
SHA256ffc147a4e1c208fc44a897db7a8704c54d386e0e32bd79afa4c1d99459f61c54
SHA5126922294425e6dffe4628ef360b3edb21c6c450fd6ba365c6a97bdebf6b5ad4940e9397566c7bdfc47593aa02f24f5b3daa083c288547ee01e6903f948d9fdb3f
-
Filesize
750KB
MD5dd3d0ba4b930479d955943f6cf0e066d
SHA12c7955d9d78fc7b8d8f3c732a44021c788b22a6e
SHA256ffc147a4e1c208fc44a897db7a8704c54d386e0e32bd79afa4c1d99459f61c54
SHA5126922294425e6dffe4628ef360b3edb21c6c450fd6ba365c6a97bdebf6b5ad4940e9397566c7bdfc47593aa02f24f5b3daa083c288547ee01e6903f948d9fdb3f
-
Filesize
306KB
MD5dc60892e69496c81b27ac5e487f4b894
SHA1b62fa79020b9656d8a6130f52e021d6401f2c928
SHA2567dab6f54f1771b91c65f996bb5128bb9cea7edacd2f333fd9b0f925050609b43
SHA512dfa58814f38185ba486cd394255eb2626915f3d50b8976d47c654547a40d4fd478806d6e2b5106d27fd474f7dfa7dda29ba609a88f3be254bca9fcae7f654e9e
-
Filesize
306KB
MD5dc60892e69496c81b27ac5e487f4b894
SHA1b62fa79020b9656d8a6130f52e021d6401f2c928
SHA2567dab6f54f1771b91c65f996bb5128bb9cea7edacd2f333fd9b0f925050609b43
SHA512dfa58814f38185ba486cd394255eb2626915f3d50b8976d47c654547a40d4fd478806d6e2b5106d27fd474f7dfa7dda29ba609a88f3be254bca9fcae7f654e9e
-
Filesize
186KB
MD547b3215fc38e513c01039d103576f1d7
SHA10768d1d696748fb930ef8183095bbbf33735c706
SHA25640a8c3ebe4198364633a5c5dd69641cb6b72d5425e3b0bdda7a876b5cd7e9a98
SHA512c21d16b2988f80ecd45047b53e7119ea089632485652483316a430f83c0578de6cbb6f1ab3a8d448abfcf9b20ca112f583ed3cd83a4e3b882dc2fb0c87983c10
-
Filesize
186KB
MD547b3215fc38e513c01039d103576f1d7
SHA10768d1d696748fb930ef8183095bbbf33735c706
SHA25640a8c3ebe4198364633a5c5dd69641cb6b72d5425e3b0bdda7a876b5cd7e9a98
SHA512c21d16b2988f80ecd45047b53e7119ea089632485652483316a430f83c0578de6cbb6f1ab3a8d448abfcf9b20ca112f583ed3cd83a4e3b882dc2fb0c87983c10
-
Filesize
145KB
MD52415512e441f390fd969422145f5b5c1
SHA1c45aa0725c4d667aeb06d95a85ce15f03693d762
SHA25690c86f81638e8bbccbaa44afc991aef119af40154afe276cc7195882d107500d
SHA51242baf58c563d3c2d2297651cc3614f73359a6e7d81a25fff5c718901563deabae37ef848c2a123f7897c59fb5e6c4fd5f3af188b4137614afeb14f70bf4a8671
-
Filesize
145KB
MD52415512e441f390fd969422145f5b5c1
SHA1c45aa0725c4d667aeb06d95a85ce15f03693d762
SHA25690c86f81638e8bbccbaa44afc991aef119af40154afe276cc7195882d107500d
SHA51242baf58c563d3c2d2297651cc3614f73359a6e7d81a25fff5c718901563deabae37ef848c2a123f7897c59fb5e6c4fd5f3af188b4137614afeb14f70bf4a8671