Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2023 10:48
Static task
static1
Behavioral task
behavioral1
Sample
networking992.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
networking992.exe
Resource
win10v2004-20230220-en
General
-
Target
networking992.exe
-
Size
1.0MB
-
MD5
d95487f0e0bff3c3ab490116a194c958
-
SHA1
665262a1ab5225e67a0a75d0d44bf93a7eb3a573
-
SHA256
c9c89cfb3d3239dd2e0402da23caa0f803be818f8557bb568a09afab20285b7b
-
SHA512
1bf424c7554b71a691fcdb6d6c13a5f30ced42659521582aa1a739a175b9aa5a595da8e8ef08911b8f9dbd7e75a5a6db61327555eef5df80e9a53a9f1fa0e2e3
-
SSDEEP
24576:rycHy/2NUD8zFq6vYk2xNh6Le1bRnv2yg0iJnfQhA:ecSeNMgFq6ADxce1Myyhs
Malware Config
Extracted
redline
mixa
185.161.248.37:4138
-
auth_value
9d14534b25ac495ab25b59800acf3bb2
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a7934065.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a7934065.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a7934065.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a7934065.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a7934065.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a7934065.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 2420 v3611307.exe 1436 v7715084.exe 4672 a7934065.exe 4040 b6816992.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a7934065.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a7934065.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v3611307.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v7715084.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v7715084.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce networking992.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" networking992.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v3611307.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4672 a7934065.exe 4672 a7934065.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4672 a7934065.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1548 wrote to memory of 2420 1548 networking992.exe 85 PID 1548 wrote to memory of 2420 1548 networking992.exe 85 PID 1548 wrote to memory of 2420 1548 networking992.exe 85 PID 2420 wrote to memory of 1436 2420 v3611307.exe 86 PID 2420 wrote to memory of 1436 2420 v3611307.exe 86 PID 2420 wrote to memory of 1436 2420 v3611307.exe 86 PID 1436 wrote to memory of 4672 1436 v7715084.exe 87 PID 1436 wrote to memory of 4672 1436 v7715084.exe 87 PID 1436 wrote to memory of 4672 1436 v7715084.exe 87 PID 1436 wrote to memory of 4040 1436 v7715084.exe 88 PID 1436 wrote to memory of 4040 1436 v7715084.exe 88 PID 1436 wrote to memory of 4040 1436 v7715084.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\networking992.exe"C:\Users\Admin\AppData\Local\Temp\networking992.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3611307.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3611307.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7715084.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7715084.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a7934065.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a7934065.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4672
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b6816992.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b6816992.exe4⤵
- Executes dropped EXE
PID:4040
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
750KB
MD5947525a6a0a1262885446ec3c32f288f
SHA1976d2c6452d98b837a0f86f4329d9f0e57cb150b
SHA256fd2c4b8e122f3b8e980414a40d1eaaea04417ed18d0e8acf867fbb661f236e98
SHA5122db17e50cb9065b4e1bd96a2256636a4dfb4b85807ae0228483f38313db41ca0441b7eb4ff73499f72fec49547649eab49cb3971035ea08c5f1074715cb7efa7
-
Filesize
750KB
MD5947525a6a0a1262885446ec3c32f288f
SHA1976d2c6452d98b837a0f86f4329d9f0e57cb150b
SHA256fd2c4b8e122f3b8e980414a40d1eaaea04417ed18d0e8acf867fbb661f236e98
SHA5122db17e50cb9065b4e1bd96a2256636a4dfb4b85807ae0228483f38313db41ca0441b7eb4ff73499f72fec49547649eab49cb3971035ea08c5f1074715cb7efa7
-
Filesize
306KB
MD5740fdcb2e6198a7fb68c6034d735a30b
SHA147cabf70d899e6e883a8862ac968235c75379770
SHA2560add766601b420ba282063c7ecc75c63611c1d5bd193c4ad8338ed24d94a3a33
SHA5121bb0b7f1b4e16282e1d61e8c06f50d747dfebe169d2b543c348a556c140a41ddb5dc34f3425c34a3ff5c2c599ad24a27b36919ca168e461d57d402739d4836d1
-
Filesize
306KB
MD5740fdcb2e6198a7fb68c6034d735a30b
SHA147cabf70d899e6e883a8862ac968235c75379770
SHA2560add766601b420ba282063c7ecc75c63611c1d5bd193c4ad8338ed24d94a3a33
SHA5121bb0b7f1b4e16282e1d61e8c06f50d747dfebe169d2b543c348a556c140a41ddb5dc34f3425c34a3ff5c2c599ad24a27b36919ca168e461d57d402739d4836d1
-
Filesize
186KB
MD55f69f279b6130732e483136cb36b8c35
SHA15f220f6f8f5c6308386c01adcfecfaf7b5c78a42
SHA256134121460c736242c52953f3e45df3940be8088c700e060ba15de3fa5bfb6083
SHA5127f8ced0869ea692591e8216c6f0aeb9780693b768ce8a70b7721f81611e72c8281520d04d10f7d39890a855d5f8eba38c75797300d019333bf7e378d1b546ae6
-
Filesize
186KB
MD55f69f279b6130732e483136cb36b8c35
SHA15f220f6f8f5c6308386c01adcfecfaf7b5c78a42
SHA256134121460c736242c52953f3e45df3940be8088c700e060ba15de3fa5bfb6083
SHA5127f8ced0869ea692591e8216c6f0aeb9780693b768ce8a70b7721f81611e72c8281520d04d10f7d39890a855d5f8eba38c75797300d019333bf7e378d1b546ae6
-
Filesize
145KB
MD5fa5e92966b1defe4a248651d2d58d2a0
SHA11742eeea2e391c7038ec720770a99958c85e0c8b
SHA256e8821fe17025c680b6dd656623273c69d58b8b8199e6f966d46137f60ca89fe3
SHA51221d871d29022cb895ef41e7d72dfbbcd1cd896177e428730910f264ab139189ab144c069dc8bae8c9dd294c99e6bf61225306b736310741e8e29f49a10a1fbb2
-
Filesize
145KB
MD5fa5e92966b1defe4a248651d2d58d2a0
SHA11742eeea2e391c7038ec720770a99958c85e0c8b
SHA256e8821fe17025c680b6dd656623273c69d58b8b8199e6f966d46137f60ca89fe3
SHA51221d871d29022cb895ef41e7d72dfbbcd1cd896177e428730910f264ab139189ab144c069dc8bae8c9dd294c99e6bf61225306b736310741e8e29f49a10a1fbb2