Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
04-06-2023 21:51
Static task
static1
Behavioral task
behavioral1
Sample
3d2f2034d0f089cdd8c63c497cb8647ba20a6d8c54531b6f82fc475f4209074a.exe
Resource
win10-20230220-en
General
-
Target
3d2f2034d0f089cdd8c63c497cb8647ba20a6d8c54531b6f82fc475f4209074a.exe
-
Size
580KB
-
MD5
4c814a765fe6bc2a8ffd46a9a188d20b
-
SHA1
c55626cc596f4a3e9e5e1b3f3d3be339c510c8ee
-
SHA256
3d2f2034d0f089cdd8c63c497cb8647ba20a6d8c54531b6f82fc475f4209074a
-
SHA512
2c1a6ebba830ee41fe049dfbcbf1e223b1713669f5fa5a4aab58675e44bdcb0bc242ce268c4539750754c12d1fb7da29abc5bcfa91cb2f49601085ae4a4b714a
-
SSDEEP
12288:CMrxy90E5FB4dG+Ka5OEmXDuDJFA/ObTmFYwKAp:jyp4gDa5OE4DuDJq/OnmFZ
Malware Config
Extracted
redline
maxi
83.97.73.126:19046
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Signatures
-
Processes:
a8500897.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a8500897.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a8500897.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a8500897.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a8500897.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a8500897.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
Processes:
v2948524.exev1515548.exea8500897.exeb4838218.exepid process 4216 v2948524.exe 4836 v1515548.exe 1540 a8500897.exe 4304 b4838218.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
a8500897.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a8500897.exe -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
3d2f2034d0f089cdd8c63c497cb8647ba20a6d8c54531b6f82fc475f4209074a.exev2948524.exev1515548.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3d2f2034d0f089cdd8c63c497cb8647ba20a6d8c54531b6f82fc475f4209074a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3d2f2034d0f089cdd8c63c497cb8647ba20a6d8c54531b6f82fc475f4209074a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v2948524.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v2948524.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v1515548.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v1515548.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
a8500897.exeb4838218.exepid process 1540 a8500897.exe 1540 a8500897.exe 4304 b4838218.exe 4304 b4838218.exe 4304 b4838218.exe 4304 b4838218.exe 4304 b4838218.exe 4304 b4838218.exe 4304 b4838218.exe 4304 b4838218.exe 4304 b4838218.exe 4304 b4838218.exe 4304 b4838218.exe 4304 b4838218.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
a8500897.exeb4838218.exedescription pid process Token: SeDebugPrivilege 1540 a8500897.exe Token: SeDebugPrivilege 4304 b4838218.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
3d2f2034d0f089cdd8c63c497cb8647ba20a6d8c54531b6f82fc475f4209074a.exev2948524.exev1515548.exedescription pid process target process PID 4100 wrote to memory of 4216 4100 3d2f2034d0f089cdd8c63c497cb8647ba20a6d8c54531b6f82fc475f4209074a.exe v2948524.exe PID 4100 wrote to memory of 4216 4100 3d2f2034d0f089cdd8c63c497cb8647ba20a6d8c54531b6f82fc475f4209074a.exe v2948524.exe PID 4100 wrote to memory of 4216 4100 3d2f2034d0f089cdd8c63c497cb8647ba20a6d8c54531b6f82fc475f4209074a.exe v2948524.exe PID 4216 wrote to memory of 4836 4216 v2948524.exe v1515548.exe PID 4216 wrote to memory of 4836 4216 v2948524.exe v1515548.exe PID 4216 wrote to memory of 4836 4216 v2948524.exe v1515548.exe PID 4836 wrote to memory of 1540 4836 v1515548.exe a8500897.exe PID 4836 wrote to memory of 1540 4836 v1515548.exe a8500897.exe PID 4836 wrote to memory of 4304 4836 v1515548.exe b4838218.exe PID 4836 wrote to memory of 4304 4836 v1515548.exe b4838218.exe PID 4836 wrote to memory of 4304 4836 v1515548.exe b4838218.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d2f2034d0f089cdd8c63c497cb8647ba20a6d8c54531b6f82fc475f4209074a.exe"C:\Users\Admin\AppData\Local\Temp\3d2f2034d0f089cdd8c63c497cb8647ba20a6d8c54531b6f82fc475f4209074a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2948524.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2948524.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1515548.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1515548.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a8500897.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a8500897.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4838218.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4838218.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4304
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD5b79b5e5225c11607696c5ae960897f7d
SHA11b1f70bd3fdd1eb9603c402b95e8cbdbb193464d
SHA2566dc8addc647191961904e42c2a03a7f620b727565d7ccadeefe47c0f186a4948
SHA5126cb66e29869d2c8ae0aa3dad3a08590495c3a85e24e4dc85e5f0e4fb9ac21b03236dcfd4eb19a0932f669aacfe3141ac103f0dd38fcfb1575af58f18ab6403c1
-
Filesize
377KB
MD5b79b5e5225c11607696c5ae960897f7d
SHA11b1f70bd3fdd1eb9603c402b95e8cbdbb193464d
SHA2566dc8addc647191961904e42c2a03a7f620b727565d7ccadeefe47c0f186a4948
SHA5126cb66e29869d2c8ae0aa3dad3a08590495c3a85e24e4dc85e5f0e4fb9ac21b03236dcfd4eb19a0932f669aacfe3141ac103f0dd38fcfb1575af58f18ab6403c1
-
Filesize
206KB
MD53cb1b135a8e6c570f2f6e94f9b82ec41
SHA12198bc04050356c374b7b98c24295df46776201e
SHA25612c5a9fb1ddb8491fd8d46136ceca27289d630dd5fe3ce84025ce503188b17e6
SHA512a4f9f05cf69d68975f9b7b30207bba9ce6ef67fb002586608e41f1b0ac544f7703179d2ae7bbb1229454c81b2347ea3a5a104bf91941707c0491133511325138
-
Filesize
206KB
MD53cb1b135a8e6c570f2f6e94f9b82ec41
SHA12198bc04050356c374b7b98c24295df46776201e
SHA25612c5a9fb1ddb8491fd8d46136ceca27289d630dd5fe3ce84025ce503188b17e6
SHA512a4f9f05cf69d68975f9b7b30207bba9ce6ef67fb002586608e41f1b0ac544f7703179d2ae7bbb1229454c81b2347ea3a5a104bf91941707c0491133511325138
-
Filesize
11KB
MD520093214719eff8ea5e487fc6e355e2f
SHA1d28a6a912f5b54ef969763119c4a1bec3234deba
SHA256340ec267276f0c7ce986f2d7341b3ed026472d6af0da81b256993b343616fd4f
SHA512735ac07b662da46487223eaffd58d1056ed76c4400e40c67524f7b14f216380d68074f8648b04185df8341a53807687ac4db7aae9b44a199d5ae3440145f2907
-
Filesize
11KB
MD520093214719eff8ea5e487fc6e355e2f
SHA1d28a6a912f5b54ef969763119c4a1bec3234deba
SHA256340ec267276f0c7ce986f2d7341b3ed026472d6af0da81b256993b343616fd4f
SHA512735ac07b662da46487223eaffd58d1056ed76c4400e40c67524f7b14f216380d68074f8648b04185df8341a53807687ac4db7aae9b44a199d5ae3440145f2907
-
Filesize
172KB
MD5184f119f64733d4cf61fed574e2cc550
SHA1bb2f955a4f9279bd9f93b362ea0057a06464d062
SHA25618e78a006d75273778e9afb13c3f24c1b3db1b4133f88c98264a2fb744a8136f
SHA5129d42d13dfb51d43bc5e9cabf173cd6bdad6bce9dd384703dd8607c3bf76e76b1d4a216b928b5f6a4c870ab47c1e13676b51ae5de82e24bc184ed053f750e6255
-
Filesize
172KB
MD5184f119f64733d4cf61fed574e2cc550
SHA1bb2f955a4f9279bd9f93b362ea0057a06464d062
SHA25618e78a006d75273778e9afb13c3f24c1b3db1b4133f88c98264a2fb744a8136f
SHA5129d42d13dfb51d43bc5e9cabf173cd6bdad6bce9dd384703dd8607c3bf76e76b1d4a216b928b5f6a4c870ab47c1e13676b51ae5de82e24bc184ed053f750e6255