Analysis
-
max time kernel
135s -
max time network
149s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
04-06-2023 18:57
Static task
static1
Behavioral task
behavioral1
Sample
8453c7a8c17598c7bfef05aa8ea0ab03d2c26490cb5eb90789aa29047402508c.exe
Resource
win10-20230220-en
General
-
Target
8453c7a8c17598c7bfef05aa8ea0ab03d2c26490cb5eb90789aa29047402508c.exe
-
Size
581KB
-
MD5
67cf2c6121c733832666746c1c1eb460
-
SHA1
1d4cdee83faf9a147e72b9f123fa595d4af120cd
-
SHA256
8453c7a8c17598c7bfef05aa8ea0ab03d2c26490cb5eb90789aa29047402508c
-
SHA512
d9cbed38c2976f9f64cc6c1eccda3f1b1d4631fafea4c43d2907a21d1a0fecac1e39b7f451f6e6baf1f1eb645b6279cca939844202acb4ff97f428811f86a6bc
-
SSDEEP
12288:WMr7y908gKDqrtRkLPI0REWPF62dGcrqqo9lB0EfMjzUjV:tyeKAnkLI0RvPF5UhlVUGV
Malware Config
Extracted
redline
maxi
83.97.73.126:19046
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Signatures
-
Processes:
a8956228.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a8956228.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a8956228.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a8956228.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a8956228.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a8956228.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
Processes:
v6303284.exev2529730.exea8956228.exeb9302014.exepid process 4660 v6303284.exe 5104 v2529730.exe 2160 a8956228.exe 4040 b9302014.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
a8956228.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a8956228.exe -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
8453c7a8c17598c7bfef05aa8ea0ab03d2c26490cb5eb90789aa29047402508c.exev6303284.exev2529730.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 8453c7a8c17598c7bfef05aa8ea0ab03d2c26490cb5eb90789aa29047402508c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8453c7a8c17598c7bfef05aa8ea0ab03d2c26490cb5eb90789aa29047402508c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v6303284.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v6303284.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v2529730.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v2529730.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
a8956228.exeb9302014.exepid process 2160 a8956228.exe 2160 a8956228.exe 4040 b9302014.exe 4040 b9302014.exe 4040 b9302014.exe 4040 b9302014.exe 4040 b9302014.exe 4040 b9302014.exe 4040 b9302014.exe 4040 b9302014.exe 4040 b9302014.exe 4040 b9302014.exe 4040 b9302014.exe 4040 b9302014.exe 4040 b9302014.exe 4040 b9302014.exe 4040 b9302014.exe 4040 b9302014.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
a8956228.exeb9302014.exedescription pid process Token: SeDebugPrivilege 2160 a8956228.exe Token: SeDebugPrivilege 4040 b9302014.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
8453c7a8c17598c7bfef05aa8ea0ab03d2c26490cb5eb90789aa29047402508c.exev6303284.exev2529730.exedescription pid process target process PID 4268 wrote to memory of 4660 4268 8453c7a8c17598c7bfef05aa8ea0ab03d2c26490cb5eb90789aa29047402508c.exe v6303284.exe PID 4268 wrote to memory of 4660 4268 8453c7a8c17598c7bfef05aa8ea0ab03d2c26490cb5eb90789aa29047402508c.exe v6303284.exe PID 4268 wrote to memory of 4660 4268 8453c7a8c17598c7bfef05aa8ea0ab03d2c26490cb5eb90789aa29047402508c.exe v6303284.exe PID 4660 wrote to memory of 5104 4660 v6303284.exe v2529730.exe PID 4660 wrote to memory of 5104 4660 v6303284.exe v2529730.exe PID 4660 wrote to memory of 5104 4660 v6303284.exe v2529730.exe PID 5104 wrote to memory of 2160 5104 v2529730.exe a8956228.exe PID 5104 wrote to memory of 2160 5104 v2529730.exe a8956228.exe PID 5104 wrote to memory of 4040 5104 v2529730.exe b9302014.exe PID 5104 wrote to memory of 4040 5104 v2529730.exe b9302014.exe PID 5104 wrote to memory of 4040 5104 v2529730.exe b9302014.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8453c7a8c17598c7bfef05aa8ea0ab03d2c26490cb5eb90789aa29047402508c.exe"C:\Users\Admin\AppData\Local\Temp\8453c7a8c17598c7bfef05aa8ea0ab03d2c26490cb5eb90789aa29047402508c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6303284.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6303284.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2529730.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2529730.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a8956228.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a8956228.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9302014.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9302014.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4040
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD5158b51f59d34bd81a00fc05fec0736ea
SHA1ab582737af08ace4d3b2cc42c4149908685f13d7
SHA256a7fc4f1422ce78ad25a205ba90a9d5814d7a7155f496356c6abf50d7250d6d5f
SHA512bff71e9326209ed1a97bd25a6768d02c83377f05de0742ee3f7b5bfcb38a94e1558977d1fcbf29707bd4e13eeaa8e128eb3ec7f7649ceaf70e6d67ce03dcd030
-
Filesize
377KB
MD5158b51f59d34bd81a00fc05fec0736ea
SHA1ab582737af08ace4d3b2cc42c4149908685f13d7
SHA256a7fc4f1422ce78ad25a205ba90a9d5814d7a7155f496356c6abf50d7250d6d5f
SHA512bff71e9326209ed1a97bd25a6768d02c83377f05de0742ee3f7b5bfcb38a94e1558977d1fcbf29707bd4e13eeaa8e128eb3ec7f7649ceaf70e6d67ce03dcd030
-
Filesize
206KB
MD5eea29b1622855f476f65cd78e32b791c
SHA1f25c3a2d8908bf687115ceee23a619f2130366f8
SHA25633cbaed9699929573a4b52ee014f747465600742ba6d0185b036a37ceb959b88
SHA51209f8ef2cc26012dc4590f55e7ac481698aabfabd942d20c87215b961525821d175064c61299a5b5f36d082a53b4fd4fe721c42a8aa9af4358166c089b2a2d1c7
-
Filesize
206KB
MD5eea29b1622855f476f65cd78e32b791c
SHA1f25c3a2d8908bf687115ceee23a619f2130366f8
SHA25633cbaed9699929573a4b52ee014f747465600742ba6d0185b036a37ceb959b88
SHA51209f8ef2cc26012dc4590f55e7ac481698aabfabd942d20c87215b961525821d175064c61299a5b5f36d082a53b4fd4fe721c42a8aa9af4358166c089b2a2d1c7
-
Filesize
11KB
MD5b106d4440f5f040ff50060bd7934ae1c
SHA17b5c32459bf3de28a3e51be601ddeefeb944b9a8
SHA256c908333bc1a8c50e9c99d81e9d8683e09c22226bd3b62659cdb7c8179b176917
SHA512af2ce19f0ede1366733957c4d8029314c275c83128d7843ed28282872b85ad90373cd04fa0b012c9648690ec0b573ed64c2dc4383c6aa700236c6c1adc0220ca
-
Filesize
11KB
MD5b106d4440f5f040ff50060bd7934ae1c
SHA17b5c32459bf3de28a3e51be601ddeefeb944b9a8
SHA256c908333bc1a8c50e9c99d81e9d8683e09c22226bd3b62659cdb7c8179b176917
SHA512af2ce19f0ede1366733957c4d8029314c275c83128d7843ed28282872b85ad90373cd04fa0b012c9648690ec0b573ed64c2dc4383c6aa700236c6c1adc0220ca
-
Filesize
172KB
MD513c33913372d50ff446ee03403ceb4b8
SHA1624d06ccb1ecd7da08344002c16082e8397148df
SHA256bd32691bfcf5dc40067057a345060d4de1f531e88e50b2583fe3413bb534043f
SHA5124364739134e02c72f775ea6f085ea5607b60e58e1f6a00f34826f87cc5c7db0db5e5ab859f4619ef86559bf5049f3d402eda463c7269f708cdd78dc34b3b95e0
-
Filesize
172KB
MD513c33913372d50ff446ee03403ceb4b8
SHA1624d06ccb1ecd7da08344002c16082e8397148df
SHA256bd32691bfcf5dc40067057a345060d4de1f531e88e50b2583fe3413bb534043f
SHA5124364739134e02c72f775ea6f085ea5607b60e58e1f6a00f34826f87cc5c7db0db5e5ab859f4619ef86559bf5049f3d402eda463c7269f708cdd78dc34b3b95e0