Analysis
-
max time kernel
61s -
max time network
64s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
04/06/2023, 19:25
Static task
static1
Behavioral task
behavioral1
Sample
fe8656855a1318e7c373c588021ac41e01a8c25d0eb14d11ee5166f858f11448.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
fe8656855a1318e7c373c588021ac41e01a8c25d0eb14d11ee5166f858f11448.exe
Resource
win10v2004-20230220-en
General
-
Target
fe8656855a1318e7c373c588021ac41e01a8c25d0eb14d11ee5166f858f11448.exe
-
Size
580KB
-
MD5
7de7eb8be918cb898e6b38ac6d04898f
-
SHA1
f6a281dbfac83073dcd679ee0ade72dd9ee357dc
-
SHA256
fe8656855a1318e7c373c588021ac41e01a8c25d0eb14d11ee5166f858f11448
-
SHA512
e3d25d05da377c48845f3104171199e1699b2915f049e43fbe14f3a008dc7da1de5e714cc0990d3933e67381d2616d85fb380722945422c1a949ac5daa9fa1f3
-
SSDEEP
12288:mMrIy9056mGJk1tZhg+1Smzw2snTfLMSP7d8bOZ4x8SKR:qytmGJulxSR2sTfpP7eCOxhS
Malware Config
Extracted
redline
diza
83.97.73.126:19046
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k4219910.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection k4219910.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k4219910.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k4219910.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k4219910.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k4219910.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 1288 y0746831.exe 760 y2876121.exe 1932 k4219910.exe 1376 l6811063.exe -
Loads dropped DLL 7 IoCs
pid Process 1732 fe8656855a1318e7c373c588021ac41e01a8c25d0eb14d11ee5166f858f11448.exe 1288 y0746831.exe 1288 y0746831.exe 760 y2876121.exe 760 y2876121.exe 760 y2876121.exe 1376 l6811063.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features k4219910.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" k4219910.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y2876121.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce fe8656855a1318e7c373c588021ac41e01a8c25d0eb14d11ee5166f858f11448.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fe8656855a1318e7c373c588021ac41e01a8c25d0eb14d11ee5166f858f11448.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce y0746831.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y0746831.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce y2876121.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Modifies registry class 20 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f4225481e03947bc34db131e946b44c8dd50000 notepad.exe Set value (str) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\TV_TopViewID = "{82BA0782-5B7A-4569-B5D7-EC83085F08CC}" notepad.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff notepad.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags notepad.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 notepad.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000_Classes\Local Settings notepad.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell notepad.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff notepad.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 9e0000001a00eebbfe23000010007db10d7bd29c934a973346cc89022e7c00002a0000000000efbe000000200000000000000000000000000000000000000000000000000100000020002a0000000000efbe7e47b3fbe4c93b4ba2bad3f5d3cd46f98207ba827a5b6945b5d7ec83085f08cc20002a0000000000efbe000000200000000000000000000000000000000000000000000000000100000020000000 notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 notepad.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg notepad.exe Set value (str) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\TV_FolderType = "{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\TV_TopViewVersion = "0" notepad.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1932 k4219910.exe 1932 k4219910.exe 1376 l6811063.exe 1376 l6811063.exe 1376 l6811063.exe 1376 l6811063.exe 1376 l6811063.exe 1376 l6811063.exe 1376 l6811063.exe 1376 l6811063.exe 1376 l6811063.exe 1376 l6811063.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1932 k4219910.exe Token: SeDebugPrivilege 1376 l6811063.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1048 notepad.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1732 wrote to memory of 1288 1732 fe8656855a1318e7c373c588021ac41e01a8c25d0eb14d11ee5166f858f11448.exe 28 PID 1732 wrote to memory of 1288 1732 fe8656855a1318e7c373c588021ac41e01a8c25d0eb14d11ee5166f858f11448.exe 28 PID 1732 wrote to memory of 1288 1732 fe8656855a1318e7c373c588021ac41e01a8c25d0eb14d11ee5166f858f11448.exe 28 PID 1732 wrote to memory of 1288 1732 fe8656855a1318e7c373c588021ac41e01a8c25d0eb14d11ee5166f858f11448.exe 28 PID 1732 wrote to memory of 1288 1732 fe8656855a1318e7c373c588021ac41e01a8c25d0eb14d11ee5166f858f11448.exe 28 PID 1732 wrote to memory of 1288 1732 fe8656855a1318e7c373c588021ac41e01a8c25d0eb14d11ee5166f858f11448.exe 28 PID 1732 wrote to memory of 1288 1732 fe8656855a1318e7c373c588021ac41e01a8c25d0eb14d11ee5166f858f11448.exe 28 PID 1288 wrote to memory of 760 1288 y0746831.exe 29 PID 1288 wrote to memory of 760 1288 y0746831.exe 29 PID 1288 wrote to memory of 760 1288 y0746831.exe 29 PID 1288 wrote to memory of 760 1288 y0746831.exe 29 PID 1288 wrote to memory of 760 1288 y0746831.exe 29 PID 1288 wrote to memory of 760 1288 y0746831.exe 29 PID 1288 wrote to memory of 760 1288 y0746831.exe 29 PID 760 wrote to memory of 1932 760 y2876121.exe 30 PID 760 wrote to memory of 1932 760 y2876121.exe 30 PID 760 wrote to memory of 1932 760 y2876121.exe 30 PID 760 wrote to memory of 1932 760 y2876121.exe 30 PID 760 wrote to memory of 1932 760 y2876121.exe 30 PID 760 wrote to memory of 1932 760 y2876121.exe 30 PID 760 wrote to memory of 1932 760 y2876121.exe 30 PID 760 wrote to memory of 1376 760 y2876121.exe 31 PID 760 wrote to memory of 1376 760 y2876121.exe 31 PID 760 wrote to memory of 1376 760 y2876121.exe 31 PID 760 wrote to memory of 1376 760 y2876121.exe 31 PID 760 wrote to memory of 1376 760 y2876121.exe 31 PID 760 wrote to memory of 1376 760 y2876121.exe 31 PID 760 wrote to memory of 1376 760 y2876121.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe8656855a1318e7c373c588021ac41e01a8c25d0eb14d11ee5166f858f11448.exe"C:\Users\Admin\AppData\Local\Temp\fe8656855a1318e7c373c588021ac41e01a8c25d0eb14d11ee5166f858f11448.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0746831.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0746831.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y2876121.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y2876121.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k4219910.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k4219910.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1932
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l6811063.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l6811063.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1376
-
-
-
-
C:\Windows\system32\notepad.exe"C:\Windows\system32\notepad.exe"1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1048
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD567bdffbf66b3ee53184ff981f62708fe
SHA1b31e9eceae8df9fc96fe58f2945a2a286f84a9d8
SHA2569ad37a7a920312ff585602fe7a7beed82c10494eaf860c17cd79864c5e666f52
SHA51208624f91ccb95cbe8e4ffa7a601619b3a5461d3b7d96a55fe4439ff4306a17eabd1ec4292c566c51e8cbc366ca36129a3d51405f4a3a0e33d08dc9db933d2839
-
Filesize
377KB
MD567bdffbf66b3ee53184ff981f62708fe
SHA1b31e9eceae8df9fc96fe58f2945a2a286f84a9d8
SHA2569ad37a7a920312ff585602fe7a7beed82c10494eaf860c17cd79864c5e666f52
SHA51208624f91ccb95cbe8e4ffa7a601619b3a5461d3b7d96a55fe4439ff4306a17eabd1ec4292c566c51e8cbc366ca36129a3d51405f4a3a0e33d08dc9db933d2839
-
Filesize
206KB
MD5d3979512f8870fbd68b5ccf36e9d3fae
SHA174c518b1de6a7a0b0a9abdfe37bdb2f645e4de0e
SHA2568c70e69e6c586b4f65b91b213bec67541027bd0a92cd5e03b30cad00d17c9c88
SHA512e9ad27b3bcb4a0ea1ef6202135c620883844028da2f2e8cdd17f4553afc8179d7339d925bbb060c3ba781690c59202b5f793d02957a2741d323f91248ff76074
-
Filesize
206KB
MD5d3979512f8870fbd68b5ccf36e9d3fae
SHA174c518b1de6a7a0b0a9abdfe37bdb2f645e4de0e
SHA2568c70e69e6c586b4f65b91b213bec67541027bd0a92cd5e03b30cad00d17c9c88
SHA512e9ad27b3bcb4a0ea1ef6202135c620883844028da2f2e8cdd17f4553afc8179d7339d925bbb060c3ba781690c59202b5f793d02957a2741d323f91248ff76074
-
Filesize
11KB
MD597927ec7f8672fe4432697491ee9e4fd
SHA11f6f22d89f72f4ac176c84b9862fd3df63de73a1
SHA2565950d4dc717d1fa5272fb7cd49857f12fd02c7cd8e61e1d7b7f0f6bcccfe39ee
SHA512c75d7400af11f014496ff6cc66d29de4d77ff2af29578b37b8a7aef65838fbb6577bd3ba1b972fa04680f34c6567c75733b42ff80a95db288203643bcd505222
-
Filesize
11KB
MD597927ec7f8672fe4432697491ee9e4fd
SHA11f6f22d89f72f4ac176c84b9862fd3df63de73a1
SHA2565950d4dc717d1fa5272fb7cd49857f12fd02c7cd8e61e1d7b7f0f6bcccfe39ee
SHA512c75d7400af11f014496ff6cc66d29de4d77ff2af29578b37b8a7aef65838fbb6577bd3ba1b972fa04680f34c6567c75733b42ff80a95db288203643bcd505222
-
Filesize
172KB
MD54443d4427937246e6a448db55fd0a4bc
SHA1c2ad372047ec4a90e69931835f1f8da5bcb1556d
SHA256d61fa7c85e06c4976b315052c131ed00b7913dd8cc9c516e9c2ba9e1a3146fcc
SHA512e4e21232ce49d8f6552ff35f37de4c39c628908ddd19188a60dfadcbf8581495aed234b366c6f3be71e9e97c7a603e8259305f3ee4ee5be800e6b213a3b17dd3
-
Filesize
172KB
MD54443d4427937246e6a448db55fd0a4bc
SHA1c2ad372047ec4a90e69931835f1f8da5bcb1556d
SHA256d61fa7c85e06c4976b315052c131ed00b7913dd8cc9c516e9c2ba9e1a3146fcc
SHA512e4e21232ce49d8f6552ff35f37de4c39c628908ddd19188a60dfadcbf8581495aed234b366c6f3be71e9e97c7a603e8259305f3ee4ee5be800e6b213a3b17dd3
-
Filesize
377KB
MD567bdffbf66b3ee53184ff981f62708fe
SHA1b31e9eceae8df9fc96fe58f2945a2a286f84a9d8
SHA2569ad37a7a920312ff585602fe7a7beed82c10494eaf860c17cd79864c5e666f52
SHA51208624f91ccb95cbe8e4ffa7a601619b3a5461d3b7d96a55fe4439ff4306a17eabd1ec4292c566c51e8cbc366ca36129a3d51405f4a3a0e33d08dc9db933d2839
-
Filesize
377KB
MD567bdffbf66b3ee53184ff981f62708fe
SHA1b31e9eceae8df9fc96fe58f2945a2a286f84a9d8
SHA2569ad37a7a920312ff585602fe7a7beed82c10494eaf860c17cd79864c5e666f52
SHA51208624f91ccb95cbe8e4ffa7a601619b3a5461d3b7d96a55fe4439ff4306a17eabd1ec4292c566c51e8cbc366ca36129a3d51405f4a3a0e33d08dc9db933d2839
-
Filesize
206KB
MD5d3979512f8870fbd68b5ccf36e9d3fae
SHA174c518b1de6a7a0b0a9abdfe37bdb2f645e4de0e
SHA2568c70e69e6c586b4f65b91b213bec67541027bd0a92cd5e03b30cad00d17c9c88
SHA512e9ad27b3bcb4a0ea1ef6202135c620883844028da2f2e8cdd17f4553afc8179d7339d925bbb060c3ba781690c59202b5f793d02957a2741d323f91248ff76074
-
Filesize
206KB
MD5d3979512f8870fbd68b5ccf36e9d3fae
SHA174c518b1de6a7a0b0a9abdfe37bdb2f645e4de0e
SHA2568c70e69e6c586b4f65b91b213bec67541027bd0a92cd5e03b30cad00d17c9c88
SHA512e9ad27b3bcb4a0ea1ef6202135c620883844028da2f2e8cdd17f4553afc8179d7339d925bbb060c3ba781690c59202b5f793d02957a2741d323f91248ff76074
-
Filesize
11KB
MD597927ec7f8672fe4432697491ee9e4fd
SHA11f6f22d89f72f4ac176c84b9862fd3df63de73a1
SHA2565950d4dc717d1fa5272fb7cd49857f12fd02c7cd8e61e1d7b7f0f6bcccfe39ee
SHA512c75d7400af11f014496ff6cc66d29de4d77ff2af29578b37b8a7aef65838fbb6577bd3ba1b972fa04680f34c6567c75733b42ff80a95db288203643bcd505222
-
Filesize
172KB
MD54443d4427937246e6a448db55fd0a4bc
SHA1c2ad372047ec4a90e69931835f1f8da5bcb1556d
SHA256d61fa7c85e06c4976b315052c131ed00b7913dd8cc9c516e9c2ba9e1a3146fcc
SHA512e4e21232ce49d8f6552ff35f37de4c39c628908ddd19188a60dfadcbf8581495aed234b366c6f3be71e9e97c7a603e8259305f3ee4ee5be800e6b213a3b17dd3
-
Filesize
172KB
MD54443d4427937246e6a448db55fd0a4bc
SHA1c2ad372047ec4a90e69931835f1f8da5bcb1556d
SHA256d61fa7c85e06c4976b315052c131ed00b7913dd8cc9c516e9c2ba9e1a3146fcc
SHA512e4e21232ce49d8f6552ff35f37de4c39c628908ddd19188a60dfadcbf8581495aed234b366c6f3be71e9e97c7a603e8259305f3ee4ee5be800e6b213a3b17dd3