Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
04-06-2023 22:00
Static task
static1
Behavioral task
behavioral1
Sample
89ab6dacef6ad4a609c50311d700c19e84ff0926048f48492349e5bec153c9ba.exe
Resource
win10v2004-20230221-en
General
-
Target
89ab6dacef6ad4a609c50311d700c19e84ff0926048f48492349e5bec153c9ba.exe
-
Size
580KB
-
MD5
32374f95456d2d9de9b070b6319c9413
-
SHA1
7203f9ef412c21b934ccdaad98f9598f46551876
-
SHA256
89ab6dacef6ad4a609c50311d700c19e84ff0926048f48492349e5bec153c9ba
-
SHA512
b07198e09dca2f6b8903929f0f7c9989e23170a3e1ffc7bedeb3ea65989599219c6d46ace1714e8e82b40060be5eb81295079e15fcbaa1bc7eaea6eacf6e894a
-
SSDEEP
12288:fMrFy90ot6jKLn+mv+E9mFeafBReSWTQa8vECeDGi8js:yyLt6jK0ESR/Wc3deD3cs
Malware Config
Extracted
redline
maxi
83.97.73.126:19046
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Signatures
-
Processes:
a5859561.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a5859561.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a5859561.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a5859561.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a5859561.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a5859561.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a5859561.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
Processes:
v3881318.exev5144456.exea5859561.exeb9424400.exepid process 2696 v3881318.exe 4452 v5144456.exe 4644 a5859561.exe 3180 b9424400.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
a5859561.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a5859561.exe -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
89ab6dacef6ad4a609c50311d700c19e84ff0926048f48492349e5bec153c9ba.exev3881318.exev5144456.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 89ab6dacef6ad4a609c50311d700c19e84ff0926048f48492349e5bec153c9ba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 89ab6dacef6ad4a609c50311d700c19e84ff0926048f48492349e5bec153c9ba.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v3881318.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v3881318.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v5144456.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v5144456.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 34 IoCs
Processes:
a5859561.exeb9424400.exepid process 4644 a5859561.exe 4644 a5859561.exe 3180 b9424400.exe 3180 b9424400.exe 3180 b9424400.exe 3180 b9424400.exe 3180 b9424400.exe 3180 b9424400.exe 3180 b9424400.exe 3180 b9424400.exe 3180 b9424400.exe 3180 b9424400.exe 3180 b9424400.exe 3180 b9424400.exe 3180 b9424400.exe 3180 b9424400.exe 3180 b9424400.exe 3180 b9424400.exe 3180 b9424400.exe 3180 b9424400.exe 3180 b9424400.exe 3180 b9424400.exe 3180 b9424400.exe 3180 b9424400.exe 3180 b9424400.exe 3180 b9424400.exe 3180 b9424400.exe 3180 b9424400.exe 3180 b9424400.exe 3180 b9424400.exe 3180 b9424400.exe 3180 b9424400.exe 3180 b9424400.exe 3180 b9424400.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
a5859561.exeb9424400.exedescription pid process Token: SeDebugPrivilege 4644 a5859561.exe Token: SeDebugPrivilege 3180 b9424400.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
89ab6dacef6ad4a609c50311d700c19e84ff0926048f48492349e5bec153c9ba.exev3881318.exev5144456.exedescription pid process target process PID 4752 wrote to memory of 2696 4752 89ab6dacef6ad4a609c50311d700c19e84ff0926048f48492349e5bec153c9ba.exe v3881318.exe PID 4752 wrote to memory of 2696 4752 89ab6dacef6ad4a609c50311d700c19e84ff0926048f48492349e5bec153c9ba.exe v3881318.exe PID 4752 wrote to memory of 2696 4752 89ab6dacef6ad4a609c50311d700c19e84ff0926048f48492349e5bec153c9ba.exe v3881318.exe PID 2696 wrote to memory of 4452 2696 v3881318.exe v5144456.exe PID 2696 wrote to memory of 4452 2696 v3881318.exe v5144456.exe PID 2696 wrote to memory of 4452 2696 v3881318.exe v5144456.exe PID 4452 wrote to memory of 4644 4452 v5144456.exe a5859561.exe PID 4452 wrote to memory of 4644 4452 v5144456.exe a5859561.exe PID 4452 wrote to memory of 3180 4452 v5144456.exe b9424400.exe PID 4452 wrote to memory of 3180 4452 v5144456.exe b9424400.exe PID 4452 wrote to memory of 3180 4452 v5144456.exe b9424400.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\89ab6dacef6ad4a609c50311d700c19e84ff0926048f48492349e5bec153c9ba.exe"C:\Users\Admin\AppData\Local\Temp\89ab6dacef6ad4a609c50311d700c19e84ff0926048f48492349e5bec153c9ba.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3881318.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3881318.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5144456.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5144456.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a5859561.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a5859561.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9424400.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9424400.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3180
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD5181faa892d21c4bf0a3a91f188cb1769
SHA19cd48f14937f61fc357f1bbdea46be906cbdaa56
SHA256172c41841a40b4f51068f5836a3b4364793e4219c71fd79cbebf417e3c4110d1
SHA512a7cd5dd9d3cfd9fa2a563b0ae132e2bb98a510ac98474ecac2a7d583fa9e427a1b52e858cbae850043eeafa53b4901f81f6fd44dbe476fcabec10b79b1e12e05
-
Filesize
377KB
MD5181faa892d21c4bf0a3a91f188cb1769
SHA19cd48f14937f61fc357f1bbdea46be906cbdaa56
SHA256172c41841a40b4f51068f5836a3b4364793e4219c71fd79cbebf417e3c4110d1
SHA512a7cd5dd9d3cfd9fa2a563b0ae132e2bb98a510ac98474ecac2a7d583fa9e427a1b52e858cbae850043eeafa53b4901f81f6fd44dbe476fcabec10b79b1e12e05
-
Filesize
206KB
MD51a22d1da807a63133d70a0aa74dd57ea
SHA149addee52ddad6b870dc54e007497ce5350cd23c
SHA2566cf060f66b3f916a4afe596c0b8ab1d396d2664719822610231ccfe59456f504
SHA51268f5aa108779435d1c8ce2f8d23906f2e980a084b087d59801baddf9b883acbf16f9b20afd33c20cb587263118366833b75cfb6e1e759c3d09228d45a67bcf09
-
Filesize
206KB
MD51a22d1da807a63133d70a0aa74dd57ea
SHA149addee52ddad6b870dc54e007497ce5350cd23c
SHA2566cf060f66b3f916a4afe596c0b8ab1d396d2664719822610231ccfe59456f504
SHA51268f5aa108779435d1c8ce2f8d23906f2e980a084b087d59801baddf9b883acbf16f9b20afd33c20cb587263118366833b75cfb6e1e759c3d09228d45a67bcf09
-
Filesize
11KB
MD58ce39ad5969c1ea23005e8401a5165f5
SHA1a80ce9600e7b93de283b20ecc8746bb8772d9a57
SHA2562531efc96d9712965b124f2b952da47f616d569200976dbd12df8024dcc56d22
SHA5120b0b051d3c450b99c3f708bf0187ec0b5cf768fe37af5f0c74e2df89b356cb48a99bed3ae646c4597cf497dfa952fb6d566d947c84ed3c570213606290fd110c
-
Filesize
11KB
MD58ce39ad5969c1ea23005e8401a5165f5
SHA1a80ce9600e7b93de283b20ecc8746bb8772d9a57
SHA2562531efc96d9712965b124f2b952da47f616d569200976dbd12df8024dcc56d22
SHA5120b0b051d3c450b99c3f708bf0187ec0b5cf768fe37af5f0c74e2df89b356cb48a99bed3ae646c4597cf497dfa952fb6d566d947c84ed3c570213606290fd110c
-
Filesize
172KB
MD5c50ed3ad980574632d5c609dfd6e470f
SHA17353e86e81366fe47fc5f65fbf656357a814222d
SHA2567242441b4dc79d0c0990a85f2c74e1930626bc16893590369b2958f1908441b7
SHA512db0fafd125c5062c9aaa89e8fd27a44f7c9aefee55a30526bfabf1121c5206672650c8506f0f50ea2449206f609490031c47aac2d78002528017ae2f4d29b98e
-
Filesize
172KB
MD5c50ed3ad980574632d5c609dfd6e470f
SHA17353e86e81366fe47fc5f65fbf656357a814222d
SHA2567242441b4dc79d0c0990a85f2c74e1930626bc16893590369b2958f1908441b7
SHA512db0fafd125c5062c9aaa89e8fd27a44f7c9aefee55a30526bfabf1121c5206672650c8506f0f50ea2449206f609490031c47aac2d78002528017ae2f4d29b98e