Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
04/06/2023, 18:49
Static task
static1
Behavioral task
behavioral1
Sample
da8fcde10abb4d4a5fcf819e839811667795a72a48b07dad24d68f92eca2991e.exe
Resource
win10v2004-20230221-en
General
-
Target
da8fcde10abb4d4a5fcf819e839811667795a72a48b07dad24d68f92eca2991e.exe
-
Size
580KB
-
MD5
ab03e1d4641686bc329fc2b44f0ab8e5
-
SHA1
903269a8b77eb0367973d744259578195b23adcf
-
SHA256
da8fcde10abb4d4a5fcf819e839811667795a72a48b07dad24d68f92eca2991e
-
SHA512
4aab7a5f54c4a06954a01a332c0c052fb421d51162c45b717778f1742e736bee1e885d1834d2bde114c413d1fcef7ab3c9479d2de5f0ae60590a4927d81cf91d
-
SSDEEP
12288:+MrGy90nz+X1l5wSqnmqKtZbnVB4zf04QpckU0yRIYY:8y6aX1XkGtJnVBKfkcoyur
Malware Config
Extracted
redline
diza
83.97.73.126:19046
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k3853368.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k3853368.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection k3853368.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k3853368.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k3853368.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k3853368.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 1576 y4819533.exe 1432 y1880180.exe 4828 k3853368.exe 2532 l2012548.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" k3853368.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce da8fcde10abb4d4a5fcf819e839811667795a72a48b07dad24d68f92eca2991e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" da8fcde10abb4d4a5fcf819e839811667795a72a48b07dad24d68f92eca2991e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y4819533.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y4819533.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y1880180.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y1880180.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 4828 k3853368.exe 4828 k3853368.exe 2532 l2012548.exe 2532 l2012548.exe 2532 l2012548.exe 2532 l2012548.exe 2532 l2012548.exe 2532 l2012548.exe 2532 l2012548.exe 2532 l2012548.exe 2532 l2012548.exe 2532 l2012548.exe 2532 l2012548.exe 2532 l2012548.exe 2532 l2012548.exe 2532 l2012548.exe 2532 l2012548.exe 2532 l2012548.exe 2532 l2012548.exe 2532 l2012548.exe 2532 l2012548.exe 2532 l2012548.exe 2532 l2012548.exe 2532 l2012548.exe 2532 l2012548.exe 2532 l2012548.exe 2532 l2012548.exe 2532 l2012548.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4828 k3853368.exe Token: SeDebugPrivilege 2532 l2012548.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1468 wrote to memory of 1576 1468 da8fcde10abb4d4a5fcf819e839811667795a72a48b07dad24d68f92eca2991e.exe 83 PID 1468 wrote to memory of 1576 1468 da8fcde10abb4d4a5fcf819e839811667795a72a48b07dad24d68f92eca2991e.exe 83 PID 1468 wrote to memory of 1576 1468 da8fcde10abb4d4a5fcf819e839811667795a72a48b07dad24d68f92eca2991e.exe 83 PID 1576 wrote to memory of 1432 1576 y4819533.exe 84 PID 1576 wrote to memory of 1432 1576 y4819533.exe 84 PID 1576 wrote to memory of 1432 1576 y4819533.exe 84 PID 1432 wrote to memory of 4828 1432 y1880180.exe 85 PID 1432 wrote to memory of 4828 1432 y1880180.exe 85 PID 1432 wrote to memory of 2532 1432 y1880180.exe 86 PID 1432 wrote to memory of 2532 1432 y1880180.exe 86 PID 1432 wrote to memory of 2532 1432 y1880180.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\da8fcde10abb4d4a5fcf819e839811667795a72a48b07dad24d68f92eca2991e.exe"C:\Users\Admin\AppData\Local\Temp\da8fcde10abb4d4a5fcf819e839811667795a72a48b07dad24d68f92eca2991e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4819533.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4819533.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y1880180.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y1880180.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k3853368.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k3853368.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4828
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l2012548.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l2012548.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2532
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD593e6132750ec1ebd77c635d3a313fe84
SHA10f52679aad96289af19efb1fd6c2fba741ef4a93
SHA25681ff2e606c8070f5cb65658222519a27fed1b93fc6e85b0c3f8f95db61adce87
SHA512103aa9cee9238bf33fcc7c91fb51554c6cd853cf85e7dedb331a7a4692366b02d9527cc7ab35f25e255370f5fd077f3377f125b5c284bed2dfca23eb5d8587d9
-
Filesize
377KB
MD593e6132750ec1ebd77c635d3a313fe84
SHA10f52679aad96289af19efb1fd6c2fba741ef4a93
SHA25681ff2e606c8070f5cb65658222519a27fed1b93fc6e85b0c3f8f95db61adce87
SHA512103aa9cee9238bf33fcc7c91fb51554c6cd853cf85e7dedb331a7a4692366b02d9527cc7ab35f25e255370f5fd077f3377f125b5c284bed2dfca23eb5d8587d9
-
Filesize
206KB
MD5dc8ac00e69fd60934f8dae584d5d8274
SHA1380ba5ce09e01aeea01f4cd36dd92adb5135c3a9
SHA256e293088998801ce6690124adff1156c55618350bdf033698bd08bd972113003d
SHA512e02d98d33617339db4c6466017a554a908eda23264ccd480b795e250eeb122c2aaa733f91f32f25a0782c51b3e0c884f310bc12d32fd1ca53268975692abf863
-
Filesize
206KB
MD5dc8ac00e69fd60934f8dae584d5d8274
SHA1380ba5ce09e01aeea01f4cd36dd92adb5135c3a9
SHA256e293088998801ce6690124adff1156c55618350bdf033698bd08bd972113003d
SHA512e02d98d33617339db4c6466017a554a908eda23264ccd480b795e250eeb122c2aaa733f91f32f25a0782c51b3e0c884f310bc12d32fd1ca53268975692abf863
-
Filesize
11KB
MD5015db5a7c065f354e78440f12985421a
SHA193d5f3e2217c27d2e3692429ed0cee04ccfb7a26
SHA256044fc7993210b7d55ca3f7a13f7d489ee92c0b152e22ea441469a686f0f75024
SHA512f89462aff2d677246ff6f54e585c745817401fc83f1d69a04cf5706d243d31759808cb55d8e0adcff39e2bd46909ed80682e535b38db503c8c563cd2bf628074
-
Filesize
11KB
MD5015db5a7c065f354e78440f12985421a
SHA193d5f3e2217c27d2e3692429ed0cee04ccfb7a26
SHA256044fc7993210b7d55ca3f7a13f7d489ee92c0b152e22ea441469a686f0f75024
SHA512f89462aff2d677246ff6f54e585c745817401fc83f1d69a04cf5706d243d31759808cb55d8e0adcff39e2bd46909ed80682e535b38db503c8c563cd2bf628074
-
Filesize
172KB
MD5f09e0bac7aaa041ed01fab10fa9a7ec7
SHA1e528157a96ff1810c0cd291063abfc0d13fe594f
SHA2568181fd04a21791bc59a1d0108c4270c47240d05ade93bc5a1d513d690ee11a73
SHA512d09b3d9a45284a66f3a8777a8f879d13f913cf80b540fc31b63e82db36adfad24ba0ddb77bf50aec2db7b17e45322bf7e0b5e57da04b2f1e02fce7540ba586b8
-
Filesize
172KB
MD5f09e0bac7aaa041ed01fab10fa9a7ec7
SHA1e528157a96ff1810c0cd291063abfc0d13fe594f
SHA2568181fd04a21791bc59a1d0108c4270c47240d05ade93bc5a1d513d690ee11a73
SHA512d09b3d9a45284a66f3a8777a8f879d13f913cf80b540fc31b63e82db36adfad24ba0ddb77bf50aec2db7b17e45322bf7e0b5e57da04b2f1e02fce7540ba586b8