Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
04-06-2023 17:53
Static task
static1
Behavioral task
behavioral1
Sample
f1d6e1ee58614de34c9fea8c2b7598f17d5f71d788784f3a3624401cef1bf631.exe
Resource
win10v2004-20230221-en
General
-
Target
f1d6e1ee58614de34c9fea8c2b7598f17d5f71d788784f3a3624401cef1bf631.exe
-
Size
580KB
-
MD5
f3fbaa2c30aa294221f9e77ad7149ece
-
SHA1
8c1dc1662db19b6b0f8928405ec75913282af1f9
-
SHA256
f1d6e1ee58614de34c9fea8c2b7598f17d5f71d788784f3a3624401cef1bf631
-
SHA512
42091043a3d7c6288784d950a2b9e4c5c2b8a50d49fe4b250a1841c49172ad0bc679b21425ec314540433e003b1f9f89712c9741a2282c2a100ed1cc9b3f6e94
-
SSDEEP
12288:EMr7y909OMnflICTw8ZEuhg2ePw4Wx7vZuqyZZAEfhxg:nyRMflRNhgHP1WxzP8g
Malware Config
Extracted
redline
maxi
83.97.73.126:19046
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Signatures
-
Processes:
a2439304.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a2439304.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a2439304.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a2439304.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a2439304.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a2439304.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a2439304.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
Processes:
v1605331.exev1248436.exea2439304.exeb4413564.exepid process 4672 v1605331.exe 1972 v1248436.exe 3452 a2439304.exe 1432 b4413564.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
a2439304.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a2439304.exe -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
v1248436.exef1d6e1ee58614de34c9fea8c2b7598f17d5f71d788784f3a3624401cef1bf631.exev1605331.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v1248436.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v1248436.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f1d6e1ee58614de34c9fea8c2b7598f17d5f71d788784f3a3624401cef1bf631.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f1d6e1ee58614de34c9fea8c2b7598f17d5f71d788784f3a3624401cef1bf631.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v1605331.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v1605331.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 34 IoCs
Processes:
a2439304.exeb4413564.exepid process 3452 a2439304.exe 3452 a2439304.exe 1432 b4413564.exe 1432 b4413564.exe 1432 b4413564.exe 1432 b4413564.exe 1432 b4413564.exe 1432 b4413564.exe 1432 b4413564.exe 1432 b4413564.exe 1432 b4413564.exe 1432 b4413564.exe 1432 b4413564.exe 1432 b4413564.exe 1432 b4413564.exe 1432 b4413564.exe 1432 b4413564.exe 1432 b4413564.exe 1432 b4413564.exe 1432 b4413564.exe 1432 b4413564.exe 1432 b4413564.exe 1432 b4413564.exe 1432 b4413564.exe 1432 b4413564.exe 1432 b4413564.exe 1432 b4413564.exe 1432 b4413564.exe 1432 b4413564.exe 1432 b4413564.exe 1432 b4413564.exe 1432 b4413564.exe 1432 b4413564.exe 1432 b4413564.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
a2439304.exeb4413564.exedescription pid process Token: SeDebugPrivilege 3452 a2439304.exe Token: SeDebugPrivilege 1432 b4413564.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
f1d6e1ee58614de34c9fea8c2b7598f17d5f71d788784f3a3624401cef1bf631.exev1605331.exev1248436.exedescription pid process target process PID 2768 wrote to memory of 4672 2768 f1d6e1ee58614de34c9fea8c2b7598f17d5f71d788784f3a3624401cef1bf631.exe v1605331.exe PID 2768 wrote to memory of 4672 2768 f1d6e1ee58614de34c9fea8c2b7598f17d5f71d788784f3a3624401cef1bf631.exe v1605331.exe PID 2768 wrote to memory of 4672 2768 f1d6e1ee58614de34c9fea8c2b7598f17d5f71d788784f3a3624401cef1bf631.exe v1605331.exe PID 4672 wrote to memory of 1972 4672 v1605331.exe v1248436.exe PID 4672 wrote to memory of 1972 4672 v1605331.exe v1248436.exe PID 4672 wrote to memory of 1972 4672 v1605331.exe v1248436.exe PID 1972 wrote to memory of 3452 1972 v1248436.exe a2439304.exe PID 1972 wrote to memory of 3452 1972 v1248436.exe a2439304.exe PID 1972 wrote to memory of 1432 1972 v1248436.exe b4413564.exe PID 1972 wrote to memory of 1432 1972 v1248436.exe b4413564.exe PID 1972 wrote to memory of 1432 1972 v1248436.exe b4413564.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1d6e1ee58614de34c9fea8c2b7598f17d5f71d788784f3a3624401cef1bf631.exe"C:\Users\Admin\AppData\Local\Temp\f1d6e1ee58614de34c9fea8c2b7598f17d5f71d788784f3a3624401cef1bf631.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1605331.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1605331.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1248436.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1248436.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a2439304.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a2439304.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4413564.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4413564.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1432
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD56aacc672cf6562abe3b4c9e7097580f3
SHA1e7117268ec38fe84d539be03c000d1a2947e10bb
SHA2566d9db29f8271ffdb7742c4d781c75544d41a43c5bbc5b3e5c6af6ad1df9397e9
SHA512c487ada36da738d4d00974ba7e42efe32eaa3dc7331b47981596b59d449140886b4529a93913f161301fd0633148d1358abbf51eb78696ae0bcbc1adc0c3295c
-
Filesize
377KB
MD56aacc672cf6562abe3b4c9e7097580f3
SHA1e7117268ec38fe84d539be03c000d1a2947e10bb
SHA2566d9db29f8271ffdb7742c4d781c75544d41a43c5bbc5b3e5c6af6ad1df9397e9
SHA512c487ada36da738d4d00974ba7e42efe32eaa3dc7331b47981596b59d449140886b4529a93913f161301fd0633148d1358abbf51eb78696ae0bcbc1adc0c3295c
-
Filesize
206KB
MD5890815c21f3af170704979ae013b51b0
SHA146116759df8bfeec215700e086da7bb17e3b68d1
SHA25665928afe5723308993d39e24380613b83801c85094d925c813114503bb9c4529
SHA512df9ec2bdbebf290ecf11b40aac8676d0de5f877c4c9cb397ea00d62244d29177fc6254747b368e786cadcfdc49ddf0307970f61ed65667c23675e6836e5bc21b
-
Filesize
206KB
MD5890815c21f3af170704979ae013b51b0
SHA146116759df8bfeec215700e086da7bb17e3b68d1
SHA25665928afe5723308993d39e24380613b83801c85094d925c813114503bb9c4529
SHA512df9ec2bdbebf290ecf11b40aac8676d0de5f877c4c9cb397ea00d62244d29177fc6254747b368e786cadcfdc49ddf0307970f61ed65667c23675e6836e5bc21b
-
Filesize
11KB
MD5f3f7d21db806df8ffa070e03f92944f6
SHA127017a2c245744d64a5ef716da3a85a8799add5f
SHA2564f0a4b96086b2bc45032f0e6b04e6878a70bfa9c9b8eea4298f10cc7a36df6d5
SHA512ed935ace54ad21541655dc45494e0b09bd075c6556a51bbf506d54099d91d36c5948f474b6a25ff84245782348d939a886028ccfcec97f31f41019a302073b16
-
Filesize
11KB
MD5f3f7d21db806df8ffa070e03f92944f6
SHA127017a2c245744d64a5ef716da3a85a8799add5f
SHA2564f0a4b96086b2bc45032f0e6b04e6878a70bfa9c9b8eea4298f10cc7a36df6d5
SHA512ed935ace54ad21541655dc45494e0b09bd075c6556a51bbf506d54099d91d36c5948f474b6a25ff84245782348d939a886028ccfcec97f31f41019a302073b16
-
Filesize
172KB
MD54ad9fa9323c4d313c8c479ecc3aa9565
SHA14f35fd4d3832533636e8835af84804cc85c1b1af
SHA2560d6639e9f03bf886eb02ae7ac50f4808e914eba80388f0031a219ada50e553e5
SHA5129c7dfcba66164760a9d360e95ea81d1bb0487696826e95c909f583e0a060df92bdf6956eb10e0ea9f0b73c74426632e51a1a9e3744781f2fc428025deba9000c
-
Filesize
172KB
MD54ad9fa9323c4d313c8c479ecc3aa9565
SHA14f35fd4d3832533636e8835af84804cc85c1b1af
SHA2560d6639e9f03bf886eb02ae7ac50f4808e914eba80388f0031a219ada50e553e5
SHA5129c7dfcba66164760a9d360e95ea81d1bb0487696826e95c909f583e0a060df92bdf6956eb10e0ea9f0b73c74426632e51a1a9e3744781f2fc428025deba9000c