Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
04-06-2023 22:24
Static task
static1
Behavioral task
behavioral1
Sample
1e674e8f362386ca1be61af5cb5e9cd8b043b98ba33f7ef1377898cbab2f70b5.exe
Resource
win10v2004-20230220-en
General
-
Target
1e674e8f362386ca1be61af5cb5e9cd8b043b98ba33f7ef1377898cbab2f70b5.exe
-
Size
580KB
-
MD5
da9117e3e0d477494774b16ee143a653
-
SHA1
f65f531098d08fec2723028713b3fc4fa3f82736
-
SHA256
1e674e8f362386ca1be61af5cb5e9cd8b043b98ba33f7ef1377898cbab2f70b5
-
SHA512
d97a37b1b909fd7a68503cf036a570ac2f0d453e70967b7fe357f41f869de309c52f6848832454da9abbf9452070f6fddf0e22b64700657d7fa6c7f0c5d1e58a
-
SSDEEP
12288:dMrZy90ouSjCvtVdX76AbtJhG7rI1WjKe3pZczwb06LUwo8XbjYe:IyQjLbtJWP3ptQ6LnoUjYe
Malware Config
Extracted
redline
maxi
83.97.73.126:19046
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Signatures
-
Processes:
a3398282.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a3398282.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a3398282.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a3398282.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a3398282.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a3398282.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a3398282.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
Processes:
v5764735.exev9223371.exea3398282.exeb4511450.exepid process 3740 v5764735.exe 3080 v9223371.exe 4428 a3398282.exe 1288 b4511450.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
a3398282.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a3398282.exe -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
1e674e8f362386ca1be61af5cb5e9cd8b043b98ba33f7ef1377898cbab2f70b5.exev5764735.exev9223371.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1e674e8f362386ca1be61af5cb5e9cd8b043b98ba33f7ef1377898cbab2f70b5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1e674e8f362386ca1be61af5cb5e9cd8b043b98ba33f7ef1377898cbab2f70b5.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v5764735.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v5764735.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v9223371.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v9223371.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 32 IoCs
Processes:
a3398282.exeb4511450.exepid process 4428 a3398282.exe 4428 a3398282.exe 1288 b4511450.exe 1288 b4511450.exe 1288 b4511450.exe 1288 b4511450.exe 1288 b4511450.exe 1288 b4511450.exe 1288 b4511450.exe 1288 b4511450.exe 1288 b4511450.exe 1288 b4511450.exe 1288 b4511450.exe 1288 b4511450.exe 1288 b4511450.exe 1288 b4511450.exe 1288 b4511450.exe 1288 b4511450.exe 1288 b4511450.exe 1288 b4511450.exe 1288 b4511450.exe 1288 b4511450.exe 1288 b4511450.exe 1288 b4511450.exe 1288 b4511450.exe 1288 b4511450.exe 1288 b4511450.exe 1288 b4511450.exe 1288 b4511450.exe 1288 b4511450.exe 1288 b4511450.exe 1288 b4511450.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
a3398282.exeb4511450.exedescription pid process Token: SeDebugPrivilege 4428 a3398282.exe Token: SeDebugPrivilege 1288 b4511450.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
1e674e8f362386ca1be61af5cb5e9cd8b043b98ba33f7ef1377898cbab2f70b5.exev5764735.exev9223371.exedescription pid process target process PID 4896 wrote to memory of 3740 4896 1e674e8f362386ca1be61af5cb5e9cd8b043b98ba33f7ef1377898cbab2f70b5.exe v5764735.exe PID 4896 wrote to memory of 3740 4896 1e674e8f362386ca1be61af5cb5e9cd8b043b98ba33f7ef1377898cbab2f70b5.exe v5764735.exe PID 4896 wrote to memory of 3740 4896 1e674e8f362386ca1be61af5cb5e9cd8b043b98ba33f7ef1377898cbab2f70b5.exe v5764735.exe PID 3740 wrote to memory of 3080 3740 v5764735.exe v9223371.exe PID 3740 wrote to memory of 3080 3740 v5764735.exe v9223371.exe PID 3740 wrote to memory of 3080 3740 v5764735.exe v9223371.exe PID 3080 wrote to memory of 4428 3080 v9223371.exe a3398282.exe PID 3080 wrote to memory of 4428 3080 v9223371.exe a3398282.exe PID 3080 wrote to memory of 1288 3080 v9223371.exe b4511450.exe PID 3080 wrote to memory of 1288 3080 v9223371.exe b4511450.exe PID 3080 wrote to memory of 1288 3080 v9223371.exe b4511450.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e674e8f362386ca1be61af5cb5e9cd8b043b98ba33f7ef1377898cbab2f70b5.exe"C:\Users\Admin\AppData\Local\Temp\1e674e8f362386ca1be61af5cb5e9cd8b043b98ba33f7ef1377898cbab2f70b5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5764735.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5764735.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9223371.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9223371.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a3398282.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a3398282.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4511450.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4511450.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5764735.exeFilesize
377KB
MD549ee05ca10f194ff8fa0702a5efadce5
SHA13d64e4eb23b06ad14e59e9ef4a323a7a31aec4f0
SHA25698f3bbd34fdd218a01cdc6c2a82bd9fd9f53fec06bfd549ceef3bf7fbc93051a
SHA5129e6bd830144bb6199cb4858239832826ca1f88065fa79f20720455828c34fa1f181025fa3bb144842c8c697482e1888e0d811ec9e900c624ebfecd8bd8b099f1
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5764735.exeFilesize
377KB
MD549ee05ca10f194ff8fa0702a5efadce5
SHA13d64e4eb23b06ad14e59e9ef4a323a7a31aec4f0
SHA25698f3bbd34fdd218a01cdc6c2a82bd9fd9f53fec06bfd549ceef3bf7fbc93051a
SHA5129e6bd830144bb6199cb4858239832826ca1f88065fa79f20720455828c34fa1f181025fa3bb144842c8c697482e1888e0d811ec9e900c624ebfecd8bd8b099f1
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9223371.exeFilesize
206KB
MD5e1e5a8c421e68b460a29cb14aa137e33
SHA1c0e82a48a5cce71d8e3e0b5bd006aedeec0ab260
SHA2565dd2691dec44ad8ca4eb43164b26508ce1ba859ad7a794230ce98c1029de5a6b
SHA512a3a73d212a13affb44fdf30f5e52a5f400096951e83fb7e0bad68dd832c8c8ad787cd902453770845b7807913ee040445131c23c563dcc60fed20905e5d0ac42
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9223371.exeFilesize
206KB
MD5e1e5a8c421e68b460a29cb14aa137e33
SHA1c0e82a48a5cce71d8e3e0b5bd006aedeec0ab260
SHA2565dd2691dec44ad8ca4eb43164b26508ce1ba859ad7a794230ce98c1029de5a6b
SHA512a3a73d212a13affb44fdf30f5e52a5f400096951e83fb7e0bad68dd832c8c8ad787cd902453770845b7807913ee040445131c23c563dcc60fed20905e5d0ac42
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a3398282.exeFilesize
11KB
MD5a1c448accf2f716fcbe604827d31155f
SHA175ada21ed96b4a53a87447df511681c3328856a4
SHA256cd477c9eafcbf38dfd2db68b92159857c2899066f59b9b27eee4fa1b840f1c27
SHA512fdc18935d4c1e948240c8f17d3ce138b7e3d502c7b23b9c92b1e5f1afb4b4182dd51cbc2ba5cc1860b91bd2be2dd5d4d7e76aee7df1f10aedbfff236bc7dce8c
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a3398282.exeFilesize
11KB
MD5a1c448accf2f716fcbe604827d31155f
SHA175ada21ed96b4a53a87447df511681c3328856a4
SHA256cd477c9eafcbf38dfd2db68b92159857c2899066f59b9b27eee4fa1b840f1c27
SHA512fdc18935d4c1e948240c8f17d3ce138b7e3d502c7b23b9c92b1e5f1afb4b4182dd51cbc2ba5cc1860b91bd2be2dd5d4d7e76aee7df1f10aedbfff236bc7dce8c
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4511450.exeFilesize
172KB
MD535140db4564d4f9426bfa7ff5e5bd2ef
SHA126812720711114529f19709b5de26a184cb1daab
SHA256c407662e9d29e406ccf988cfdc8690492e48679fb6bfc7e9cd9e6a174fcc0053
SHA512d61e30baed43408e145612d54299b9c99d43c9bb233bf6b9712ec7989d649b9a77f2b1d461d3979e4b26388704012c03ee511ba3059e26d2e35789430e52fb5c
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4511450.exeFilesize
172KB
MD535140db4564d4f9426bfa7ff5e5bd2ef
SHA126812720711114529f19709b5de26a184cb1daab
SHA256c407662e9d29e406ccf988cfdc8690492e48679fb6bfc7e9cd9e6a174fcc0053
SHA512d61e30baed43408e145612d54299b9c99d43c9bb233bf6b9712ec7989d649b9a77f2b1d461d3979e4b26388704012c03ee511ba3059e26d2e35789430e52fb5c
-
memory/1288-160-0x000000000AE50000-0x000000000B468000-memory.dmpFilesize
6.1MB
-
memory/1288-165-0x000000000AC60000-0x000000000ACD6000-memory.dmpFilesize
472KB
-
memory/1288-172-0x0000000003030000-0x0000000003040000-memory.dmpFilesize
64KB
-
memory/1288-161-0x000000000A9B0000-0x000000000AABA000-memory.dmpFilesize
1.0MB
-
memory/1288-162-0x000000000A8F0000-0x000000000A902000-memory.dmpFilesize
72KB
-
memory/1288-163-0x000000000A950000-0x000000000A98C000-memory.dmpFilesize
240KB
-
memory/1288-164-0x0000000003030000-0x0000000003040000-memory.dmpFilesize
64KB
-
memory/1288-159-0x0000000000A30000-0x0000000000A60000-memory.dmpFilesize
192KB
-
memory/1288-166-0x000000000AD80000-0x000000000AE12000-memory.dmpFilesize
584KB
-
memory/1288-167-0x000000000BA20000-0x000000000BFC4000-memory.dmpFilesize
5.6MB
-
memory/1288-168-0x000000000B470000-0x000000000B4D6000-memory.dmpFilesize
408KB
-
memory/1288-169-0x000000000B980000-0x000000000B9D0000-memory.dmpFilesize
320KB
-
memory/1288-170-0x000000000C2A0000-0x000000000C462000-memory.dmpFilesize
1.8MB
-
memory/1288-171-0x000000000C9A0000-0x000000000CECC000-memory.dmpFilesize
5.2MB
-
memory/4428-154-0x0000000000F50000-0x0000000000F5A000-memory.dmpFilesize
40KB