Analysis
-
max time kernel
130s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
22/05/2023, 10:47
Static task
static1
Behavioral task
behavioral1
Sample
file429.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
file429.exe
Resource
win10v2004-20230220-en
General
-
Target
file429.exe
-
Size
1.0MB
-
MD5
497a45950203e618980f2e4545f9838c
-
SHA1
d7109011a2a588da37eb89e6f3a2cfab4de7e4db
-
SHA256
bd48e85f2607991dc27704ad7c4367be0cf6e46aa08de8342ab4d8909c0f2c10
-
SHA512
2778e35c61a44d2112123f468e31cd796acd4ae88b1c58e24f09b740bf27508bb4e27cf0ba1234ca639f26af250e1de931d25f4e50b1061d67a4bebf660dc838
-
SSDEEP
24576:Wyww5Y4Yphy72eLSqLpFpI8gUkcm9yjVSfMJgQQ2PJKnVo:lwbI72eLSq7pmcmUSfegQQ2O
Malware Config
Extracted
redline
diza
185.161.248.37:4138
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection k0789123.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k0789123.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k0789123.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k0789123.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k0789123.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k0789123.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 1744 y3682812.exe 432 y7265859.exe 468 k0789123.exe 2016 l7862873.exe -
Loads dropped DLL 8 IoCs
pid Process 1580 file429.exe 1744 y3682812.exe 1744 y3682812.exe 432 y7265859.exe 432 y7265859.exe 468 k0789123.exe 432 y7265859.exe 2016 l7862873.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k0789123.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features k0789123.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y7265859.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce file429.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file429.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce y3682812.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y3682812.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce y7265859.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 468 k0789123.exe 468 k0789123.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 468 k0789123.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1580 wrote to memory of 1744 1580 file429.exe 28 PID 1580 wrote to memory of 1744 1580 file429.exe 28 PID 1580 wrote to memory of 1744 1580 file429.exe 28 PID 1580 wrote to memory of 1744 1580 file429.exe 28 PID 1580 wrote to memory of 1744 1580 file429.exe 28 PID 1580 wrote to memory of 1744 1580 file429.exe 28 PID 1580 wrote to memory of 1744 1580 file429.exe 28 PID 1744 wrote to memory of 432 1744 y3682812.exe 29 PID 1744 wrote to memory of 432 1744 y3682812.exe 29 PID 1744 wrote to memory of 432 1744 y3682812.exe 29 PID 1744 wrote to memory of 432 1744 y3682812.exe 29 PID 1744 wrote to memory of 432 1744 y3682812.exe 29 PID 1744 wrote to memory of 432 1744 y3682812.exe 29 PID 1744 wrote to memory of 432 1744 y3682812.exe 29 PID 432 wrote to memory of 468 432 y7265859.exe 30 PID 432 wrote to memory of 468 432 y7265859.exe 30 PID 432 wrote to memory of 468 432 y7265859.exe 30 PID 432 wrote to memory of 468 432 y7265859.exe 30 PID 432 wrote to memory of 468 432 y7265859.exe 30 PID 432 wrote to memory of 468 432 y7265859.exe 30 PID 432 wrote to memory of 468 432 y7265859.exe 30 PID 432 wrote to memory of 2016 432 y7265859.exe 31 PID 432 wrote to memory of 2016 432 y7265859.exe 31 PID 432 wrote to memory of 2016 432 y7265859.exe 31 PID 432 wrote to memory of 2016 432 y7265859.exe 31 PID 432 wrote to memory of 2016 432 y7265859.exe 31 PID 432 wrote to memory of 2016 432 y7265859.exe 31 PID 432 wrote to memory of 2016 432 y7265859.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\file429.exe"C:\Users\Admin\AppData\Local\Temp\file429.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3682812.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3682812.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y7265859.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y7265859.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k0789123.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k0789123.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:468
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l7862873.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l7862873.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2016
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
751KB
MD5185a51d07776fe373d7cc99d77716291
SHA18528c88ea0116b7262675d540c2cd33e50961355
SHA2563a9a76b46275a66269568c99812d9e7dc09ea943b84f6ddcb76a20b45de4e6bd
SHA5123d019369af433ca612dd44ebf9a97e6391339e5ac20d11ccdac5d1dc5ceaea46d8803d969e2b4cd48a49f4ff07c38d61a54d49e07459e0ecc6382e6de26464b3
-
Filesize
751KB
MD5185a51d07776fe373d7cc99d77716291
SHA18528c88ea0116b7262675d540c2cd33e50961355
SHA2563a9a76b46275a66269568c99812d9e7dc09ea943b84f6ddcb76a20b45de4e6bd
SHA5123d019369af433ca612dd44ebf9a97e6391339e5ac20d11ccdac5d1dc5ceaea46d8803d969e2b4cd48a49f4ff07c38d61a54d49e07459e0ecc6382e6de26464b3
-
Filesize
305KB
MD5189327a17f0263ed6ed5d5a093357f55
SHA16bd1680125d068c085ffb808d963609db224dd68
SHA256bacc9b8f03f77aec2700a57608406a9d3c4db286016ae130570906fa81834569
SHA512eb6544513ab59d5c27a1b42e40aab032eaa1867ba1e6611730c0651ebb7f28f677fa5badc7757a96f1be7d7923851dc4df3b145a4ae51e487567d6cabe786390
-
Filesize
305KB
MD5189327a17f0263ed6ed5d5a093357f55
SHA16bd1680125d068c085ffb808d963609db224dd68
SHA256bacc9b8f03f77aec2700a57608406a9d3c4db286016ae130570906fa81834569
SHA512eb6544513ab59d5c27a1b42e40aab032eaa1867ba1e6611730c0651ebb7f28f677fa5badc7757a96f1be7d7923851dc4df3b145a4ae51e487567d6cabe786390
-
Filesize
186KB
MD58945615a7d96ab076ec9e5d25d8d2a53
SHA14c4fd6732d02b4c45caecb3791f25a94a13543c8
SHA256d67fc414808101b89c7ee4fb28656aeea1b0681de2008ee9489d9b79b9f438b2
SHA5120302150c7f96e874095463f858e3d4cac24c2062c758ace3f8c9791aa189c9d3eecd66482968ec938dba100f817cfedacdb0d7005dd9b46559a89d4997cc2bd4
-
Filesize
186KB
MD58945615a7d96ab076ec9e5d25d8d2a53
SHA14c4fd6732d02b4c45caecb3791f25a94a13543c8
SHA256d67fc414808101b89c7ee4fb28656aeea1b0681de2008ee9489d9b79b9f438b2
SHA5120302150c7f96e874095463f858e3d4cac24c2062c758ace3f8c9791aa189c9d3eecd66482968ec938dba100f817cfedacdb0d7005dd9b46559a89d4997cc2bd4
-
Filesize
145KB
MD5d32af8a5b31345590774df3949fcd3a3
SHA1650267a29f677337bb8cb1747922057eeda253b0
SHA256c987d271113be7613c939efa2f470630c5b49f730bef7881c32922cb847d60b4
SHA512de81eb4d2f9e8caaec01de505933d0e9703e359aa0cf106c478393a586fb7df9b1d785c7cb243f6aa6c54f3ceb3d448a39f87fbeb2ea4ca5d6623b8b19a0f95f
-
Filesize
145KB
MD5d32af8a5b31345590774df3949fcd3a3
SHA1650267a29f677337bb8cb1747922057eeda253b0
SHA256c987d271113be7613c939efa2f470630c5b49f730bef7881c32922cb847d60b4
SHA512de81eb4d2f9e8caaec01de505933d0e9703e359aa0cf106c478393a586fb7df9b1d785c7cb243f6aa6c54f3ceb3d448a39f87fbeb2ea4ca5d6623b8b19a0f95f
-
Filesize
751KB
MD5185a51d07776fe373d7cc99d77716291
SHA18528c88ea0116b7262675d540c2cd33e50961355
SHA2563a9a76b46275a66269568c99812d9e7dc09ea943b84f6ddcb76a20b45de4e6bd
SHA5123d019369af433ca612dd44ebf9a97e6391339e5ac20d11ccdac5d1dc5ceaea46d8803d969e2b4cd48a49f4ff07c38d61a54d49e07459e0ecc6382e6de26464b3
-
Filesize
751KB
MD5185a51d07776fe373d7cc99d77716291
SHA18528c88ea0116b7262675d540c2cd33e50961355
SHA2563a9a76b46275a66269568c99812d9e7dc09ea943b84f6ddcb76a20b45de4e6bd
SHA5123d019369af433ca612dd44ebf9a97e6391339e5ac20d11ccdac5d1dc5ceaea46d8803d969e2b4cd48a49f4ff07c38d61a54d49e07459e0ecc6382e6de26464b3
-
Filesize
305KB
MD5189327a17f0263ed6ed5d5a093357f55
SHA16bd1680125d068c085ffb808d963609db224dd68
SHA256bacc9b8f03f77aec2700a57608406a9d3c4db286016ae130570906fa81834569
SHA512eb6544513ab59d5c27a1b42e40aab032eaa1867ba1e6611730c0651ebb7f28f677fa5badc7757a96f1be7d7923851dc4df3b145a4ae51e487567d6cabe786390
-
Filesize
305KB
MD5189327a17f0263ed6ed5d5a093357f55
SHA16bd1680125d068c085ffb808d963609db224dd68
SHA256bacc9b8f03f77aec2700a57608406a9d3c4db286016ae130570906fa81834569
SHA512eb6544513ab59d5c27a1b42e40aab032eaa1867ba1e6611730c0651ebb7f28f677fa5badc7757a96f1be7d7923851dc4df3b145a4ae51e487567d6cabe786390
-
Filesize
186KB
MD58945615a7d96ab076ec9e5d25d8d2a53
SHA14c4fd6732d02b4c45caecb3791f25a94a13543c8
SHA256d67fc414808101b89c7ee4fb28656aeea1b0681de2008ee9489d9b79b9f438b2
SHA5120302150c7f96e874095463f858e3d4cac24c2062c758ace3f8c9791aa189c9d3eecd66482968ec938dba100f817cfedacdb0d7005dd9b46559a89d4997cc2bd4
-
Filesize
186KB
MD58945615a7d96ab076ec9e5d25d8d2a53
SHA14c4fd6732d02b4c45caecb3791f25a94a13543c8
SHA256d67fc414808101b89c7ee4fb28656aeea1b0681de2008ee9489d9b79b9f438b2
SHA5120302150c7f96e874095463f858e3d4cac24c2062c758ace3f8c9791aa189c9d3eecd66482968ec938dba100f817cfedacdb0d7005dd9b46559a89d4997cc2bd4
-
Filesize
145KB
MD5d32af8a5b31345590774df3949fcd3a3
SHA1650267a29f677337bb8cb1747922057eeda253b0
SHA256c987d271113be7613c939efa2f470630c5b49f730bef7881c32922cb847d60b4
SHA512de81eb4d2f9e8caaec01de505933d0e9703e359aa0cf106c478393a586fb7df9b1d785c7cb243f6aa6c54f3ceb3d448a39f87fbeb2ea4ca5d6623b8b19a0f95f
-
Filesize
145KB
MD5d32af8a5b31345590774df3949fcd3a3
SHA1650267a29f677337bb8cb1747922057eeda253b0
SHA256c987d271113be7613c939efa2f470630c5b49f730bef7881c32922cb847d60b4
SHA512de81eb4d2f9e8caaec01de505933d0e9703e359aa0cf106c478393a586fb7df9b1d785c7cb243f6aa6c54f3ceb3d448a39f87fbeb2ea4ca5d6623b8b19a0f95f