Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2023, 01:04
Static task
static1
Behavioral task
behavioral1
Sample
f3f7c727a9f743d2162b7e119d5969b73ba671a69138a66f9069defd99ba123d.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
f3f7c727a9f743d2162b7e119d5969b73ba671a69138a66f9069defd99ba123d.exe
Resource
win10v2004-20230220-en
General
-
Target
f3f7c727a9f743d2162b7e119d5969b73ba671a69138a66f9069defd99ba123d.exe
-
Size
1.0MB
-
MD5
0acaeccb230c0d5aec117a471c1dca84
-
SHA1
55179af371986e97dde6e4470f755a6b0d2a9841
-
SHA256
f3f7c727a9f743d2162b7e119d5969b73ba671a69138a66f9069defd99ba123d
-
SHA512
f8d5e3d643baa49d3889a86099109043676e7471cef7e3a0e0788599529701a3703a0f87a91da16379c396c047210088af7f857d19383c4bf3ed9832d3806e09
-
SSDEEP
24576:/y+5eGuwMo6q0pxZtO1ghWJKUILjdAttM1OZWl:K1GPMo6qqt0GWJKUgAgc
Malware Config
Extracted
redline
diza
185.161.248.37:4138
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k7265131.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k7265131.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k7265131.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k7265131.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k7265131.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k7265131.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 2416 y9505562.exe 4104 y2065260.exe 3768 k7265131.exe 228 l1795422.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k7265131.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k7265131.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f3f7c727a9f743d2162b7e119d5969b73ba671a69138a66f9069defd99ba123d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f3f7c727a9f743d2162b7e119d5969b73ba671a69138a66f9069defd99ba123d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y9505562.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y9505562.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y2065260.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y2065260.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3768 k7265131.exe 3768 k7265131.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3768 k7265131.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1300 wrote to memory of 2416 1300 f3f7c727a9f743d2162b7e119d5969b73ba671a69138a66f9069defd99ba123d.exe 84 PID 1300 wrote to memory of 2416 1300 f3f7c727a9f743d2162b7e119d5969b73ba671a69138a66f9069defd99ba123d.exe 84 PID 1300 wrote to memory of 2416 1300 f3f7c727a9f743d2162b7e119d5969b73ba671a69138a66f9069defd99ba123d.exe 84 PID 2416 wrote to memory of 4104 2416 y9505562.exe 85 PID 2416 wrote to memory of 4104 2416 y9505562.exe 85 PID 2416 wrote to memory of 4104 2416 y9505562.exe 85 PID 4104 wrote to memory of 3768 4104 y2065260.exe 86 PID 4104 wrote to memory of 3768 4104 y2065260.exe 86 PID 4104 wrote to memory of 3768 4104 y2065260.exe 86 PID 4104 wrote to memory of 228 4104 y2065260.exe 87 PID 4104 wrote to memory of 228 4104 y2065260.exe 87 PID 4104 wrote to memory of 228 4104 y2065260.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3f7c727a9f743d2162b7e119d5969b73ba671a69138a66f9069defd99ba123d.exe"C:\Users\Admin\AppData\Local\Temp\f3f7c727a9f743d2162b7e119d5969b73ba671a69138a66f9069defd99ba123d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9505562.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9505562.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y2065260.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y2065260.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k7265131.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k7265131.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3768
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l1795422.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l1795422.exe4⤵
- Executes dropped EXE
PID:228
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
751KB
MD5813d703194c34e6cda8af4b042ff7184
SHA1e02a154d7e2d2975d682a7c09bfa1732eccde8cd
SHA2562022eeed53cffcd1d82d0baed327e9d290475d640a9fc4f26ddff844efc268e3
SHA5127b40e00cff9c9a192d30fd7111b46055fac2a7e2d486a0dc8e3da9e15c7c02b42dc3214f2d9011afc0d9436142a75177894b9b52048935211810ef5424db5b25
-
Filesize
751KB
MD5813d703194c34e6cda8af4b042ff7184
SHA1e02a154d7e2d2975d682a7c09bfa1732eccde8cd
SHA2562022eeed53cffcd1d82d0baed327e9d290475d640a9fc4f26ddff844efc268e3
SHA5127b40e00cff9c9a192d30fd7111b46055fac2a7e2d486a0dc8e3da9e15c7c02b42dc3214f2d9011afc0d9436142a75177894b9b52048935211810ef5424db5b25
-
Filesize
305KB
MD5ea953d723f931b554299f5bb45323bd0
SHA18e09963ca7d227fef3707d555860944af887c195
SHA2566202e1ef8aa85b50a6f25ef3b3c9f136f6c605b016bf35b7d990b3cd6e0f6557
SHA512e50271d4b236aad780cc4f9444e3b4c507b872332125d74aa928c85f0c4929c290cb67fdd5b581321206efc1c797dc640c4a2f0cbec32f00d188a99e59d4164a
-
Filesize
305KB
MD5ea953d723f931b554299f5bb45323bd0
SHA18e09963ca7d227fef3707d555860944af887c195
SHA2566202e1ef8aa85b50a6f25ef3b3c9f136f6c605b016bf35b7d990b3cd6e0f6557
SHA512e50271d4b236aad780cc4f9444e3b4c507b872332125d74aa928c85f0c4929c290cb67fdd5b581321206efc1c797dc640c4a2f0cbec32f00d188a99e59d4164a
-
Filesize
185KB
MD599ce08dd99428dc7830abb315b57e000
SHA1349d67a1d8f15b2ae82a1d4fd33522c5784f4274
SHA25683725721a72435a19e4bca613a6c5dd2d429fe5094e83533e3b88536ffb4f630
SHA512c85a21baf692d2655f56229b1aacf9400c14284305094745a67f454e362ccfd8a86960242af0cc7239c0fc903fd7880fed6cbedc107e03308cc7ee57a014cfe2
-
Filesize
185KB
MD599ce08dd99428dc7830abb315b57e000
SHA1349d67a1d8f15b2ae82a1d4fd33522c5784f4274
SHA25683725721a72435a19e4bca613a6c5dd2d429fe5094e83533e3b88536ffb4f630
SHA512c85a21baf692d2655f56229b1aacf9400c14284305094745a67f454e362ccfd8a86960242af0cc7239c0fc903fd7880fed6cbedc107e03308cc7ee57a014cfe2
-
Filesize
145KB
MD55850b8c1a181a329366b01d058b96717
SHA1fa163aa7feb9a9abc4d5714790da72ac383f476b
SHA256f2953b5ebe87272d5da256eed6f78113250aa0371267f9d8ca4de8f4ce7d0b9a
SHA512e3aadc5493b8c32eab2eecc43ca4b2d047237611c681e5478a6da680b3e3bdd318406b68b347cd847513ace56bfa91c9294064bbafaddcb54d2d8502ab7b5be6
-
Filesize
145KB
MD55850b8c1a181a329366b01d058b96717
SHA1fa163aa7feb9a9abc4d5714790da72ac383f476b
SHA256f2953b5ebe87272d5da256eed6f78113250aa0371267f9d8ca4de8f4ce7d0b9a
SHA512e3aadc5493b8c32eab2eecc43ca4b2d047237611c681e5478a6da680b3e3bdd318406b68b347cd847513ace56bfa91c9294064bbafaddcb54d2d8502ab7b5be6