Analysis
-
max time kernel
130s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
04-06-2023 18:56
Static task
static1
Behavioral task
behavioral1
Sample
05200499.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
05200499.exe
Resource
win10v2004-20230220-en
General
-
Target
05200499.exe
-
Size
580KB
-
MD5
4ec4e3c61d59d98c654bb9a2e5853000
-
SHA1
29cebf9a339cfad22262e80c387ffcb874a5eb4e
-
SHA256
f4b092f5f134e9cfce7e29d2f9774092e408d8b20a619a63010872c24e1f8484
-
SHA512
07afd2ed9bbfdf803e2aade5629fb71accefcd4ba419dbda9abdb51e0d0bdfbdf4449fb429bf501834729dcd70b120c3bb8f40b038ccf86c20ecd56ae5b2bfe9
-
SSDEEP
12288:EMrpy90rQvZPEO1ia64hTVT0hTUtn85x/OXPcVNQCUkFMHGdHQ:NyHvBvTV9h8XmXkVW3Iw
Malware Config
Extracted
redline
diza
83.97.73.126:19046
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection k3287928.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k3287928.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k3287928.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k3287928.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k3287928.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k3287928.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 1088 y8439075.exe 588 y4259363.exe 1928 k3287928.exe 532 l4399455.exe -
Loads dropped DLL 7 IoCs
pid Process 2000 05200499.exe 1088 y8439075.exe 1088 y8439075.exe 588 y4259363.exe 588 y4259363.exe 588 y4259363.exe 532 l4399455.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features k3287928.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" k3287928.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 05200499.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 05200499.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce y8439075.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y8439075.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce y4259363.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y4259363.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1928 k3287928.exe 1928 k3287928.exe 532 l4399455.exe 532 l4399455.exe 532 l4399455.exe 532 l4399455.exe 532 l4399455.exe 532 l4399455.exe 532 l4399455.exe 532 l4399455.exe 532 l4399455.exe 532 l4399455.exe 532 l4399455.exe 532 l4399455.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1928 k3287928.exe Token: SeDebugPrivilege 532 l4399455.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2000 wrote to memory of 1088 2000 05200499.exe 28 PID 2000 wrote to memory of 1088 2000 05200499.exe 28 PID 2000 wrote to memory of 1088 2000 05200499.exe 28 PID 2000 wrote to memory of 1088 2000 05200499.exe 28 PID 2000 wrote to memory of 1088 2000 05200499.exe 28 PID 2000 wrote to memory of 1088 2000 05200499.exe 28 PID 2000 wrote to memory of 1088 2000 05200499.exe 28 PID 1088 wrote to memory of 588 1088 y8439075.exe 29 PID 1088 wrote to memory of 588 1088 y8439075.exe 29 PID 1088 wrote to memory of 588 1088 y8439075.exe 29 PID 1088 wrote to memory of 588 1088 y8439075.exe 29 PID 1088 wrote to memory of 588 1088 y8439075.exe 29 PID 1088 wrote to memory of 588 1088 y8439075.exe 29 PID 1088 wrote to memory of 588 1088 y8439075.exe 29 PID 588 wrote to memory of 1928 588 y4259363.exe 30 PID 588 wrote to memory of 1928 588 y4259363.exe 30 PID 588 wrote to memory of 1928 588 y4259363.exe 30 PID 588 wrote to memory of 1928 588 y4259363.exe 30 PID 588 wrote to memory of 1928 588 y4259363.exe 30 PID 588 wrote to memory of 1928 588 y4259363.exe 30 PID 588 wrote to memory of 1928 588 y4259363.exe 30 PID 588 wrote to memory of 532 588 y4259363.exe 31 PID 588 wrote to memory of 532 588 y4259363.exe 31 PID 588 wrote to memory of 532 588 y4259363.exe 31 PID 588 wrote to memory of 532 588 y4259363.exe 31 PID 588 wrote to memory of 532 588 y4259363.exe 31 PID 588 wrote to memory of 532 588 y4259363.exe 31 PID 588 wrote to memory of 532 588 y4259363.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\05200499.exe"C:\Users\Admin\AppData\Local\Temp\05200499.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8439075.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8439075.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y4259363.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y4259363.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k3287928.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k3287928.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1928
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l4399455.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l4399455.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:532
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD55a3e1866e73e16e80b37ef07782973f7
SHA11786ce717abf6778a67270d89762a6543c80318b
SHA2560ceb68105f8795b01ee04116550eaad2553de110a01663c53b76c91916b4c3bd
SHA5121eab9b575794f9f5f7fe957284effe02961ef7dfca9ea5f97fbe8978f4b669ccdee7d71729f2c81079e1d47107d1c6ba936ff815ee73373e94898f92d0ea6aa3
-
Filesize
377KB
MD55a3e1866e73e16e80b37ef07782973f7
SHA11786ce717abf6778a67270d89762a6543c80318b
SHA2560ceb68105f8795b01ee04116550eaad2553de110a01663c53b76c91916b4c3bd
SHA5121eab9b575794f9f5f7fe957284effe02961ef7dfca9ea5f97fbe8978f4b669ccdee7d71729f2c81079e1d47107d1c6ba936ff815ee73373e94898f92d0ea6aa3
-
Filesize
206KB
MD55cd308363f08d6a9e2ae305899f0236a
SHA16d34f84ee8416b2958330551a56be1353912b9dd
SHA25673ef92a6f8549874518c562ba11a73118b41f5a2d0ae3bffa58e6d39d82d84a7
SHA512b0f2859ae70c2b8b6f996afcb8568f9af215ed36245905d7f29a0ffe7d037c7171d1d0370208bafb13616096a85678faddcd59f41eaebc2618ec9aa54fc01409
-
Filesize
206KB
MD55cd308363f08d6a9e2ae305899f0236a
SHA16d34f84ee8416b2958330551a56be1353912b9dd
SHA25673ef92a6f8549874518c562ba11a73118b41f5a2d0ae3bffa58e6d39d82d84a7
SHA512b0f2859ae70c2b8b6f996afcb8568f9af215ed36245905d7f29a0ffe7d037c7171d1d0370208bafb13616096a85678faddcd59f41eaebc2618ec9aa54fc01409
-
Filesize
11KB
MD5cec0215e8f370c6969f24f91194d18ec
SHA1dae040da5a86cb571feaaa4d7a21e7404472872d
SHA256a9aa81b192926e158307b7a99eaeacefde3b3c612fa8f049a798162c90176738
SHA51216c5e4bcb91626646346091da3f2da7d006494c354d673c8377b15b672b2037946cfa6a855e45c1e84a58576c1243d00667561bae26011151e910b699c92db7e
-
Filesize
11KB
MD5cec0215e8f370c6969f24f91194d18ec
SHA1dae040da5a86cb571feaaa4d7a21e7404472872d
SHA256a9aa81b192926e158307b7a99eaeacefde3b3c612fa8f049a798162c90176738
SHA51216c5e4bcb91626646346091da3f2da7d006494c354d673c8377b15b672b2037946cfa6a855e45c1e84a58576c1243d00667561bae26011151e910b699c92db7e
-
Filesize
172KB
MD57b201c7a5e60033523a08b3196d80383
SHA14b768f0a8625f48da2c1376ce440d6f01fe40794
SHA2568b823d5708f966498e5d312ac22c1e28fc4446012480ee53b421bf527b197893
SHA512021db1dee0c34ef040c7bc4272ce53c86b18b5b42ee1c2e69702877d737897aacdb3181ecce458fadd2ce0d01778c6df88ce220568b5a2180c01a11cccc3a029
-
Filesize
172KB
MD57b201c7a5e60033523a08b3196d80383
SHA14b768f0a8625f48da2c1376ce440d6f01fe40794
SHA2568b823d5708f966498e5d312ac22c1e28fc4446012480ee53b421bf527b197893
SHA512021db1dee0c34ef040c7bc4272ce53c86b18b5b42ee1c2e69702877d737897aacdb3181ecce458fadd2ce0d01778c6df88ce220568b5a2180c01a11cccc3a029
-
Filesize
377KB
MD55a3e1866e73e16e80b37ef07782973f7
SHA11786ce717abf6778a67270d89762a6543c80318b
SHA2560ceb68105f8795b01ee04116550eaad2553de110a01663c53b76c91916b4c3bd
SHA5121eab9b575794f9f5f7fe957284effe02961ef7dfca9ea5f97fbe8978f4b669ccdee7d71729f2c81079e1d47107d1c6ba936ff815ee73373e94898f92d0ea6aa3
-
Filesize
377KB
MD55a3e1866e73e16e80b37ef07782973f7
SHA11786ce717abf6778a67270d89762a6543c80318b
SHA2560ceb68105f8795b01ee04116550eaad2553de110a01663c53b76c91916b4c3bd
SHA5121eab9b575794f9f5f7fe957284effe02961ef7dfca9ea5f97fbe8978f4b669ccdee7d71729f2c81079e1d47107d1c6ba936ff815ee73373e94898f92d0ea6aa3
-
Filesize
206KB
MD55cd308363f08d6a9e2ae305899f0236a
SHA16d34f84ee8416b2958330551a56be1353912b9dd
SHA25673ef92a6f8549874518c562ba11a73118b41f5a2d0ae3bffa58e6d39d82d84a7
SHA512b0f2859ae70c2b8b6f996afcb8568f9af215ed36245905d7f29a0ffe7d037c7171d1d0370208bafb13616096a85678faddcd59f41eaebc2618ec9aa54fc01409
-
Filesize
206KB
MD55cd308363f08d6a9e2ae305899f0236a
SHA16d34f84ee8416b2958330551a56be1353912b9dd
SHA25673ef92a6f8549874518c562ba11a73118b41f5a2d0ae3bffa58e6d39d82d84a7
SHA512b0f2859ae70c2b8b6f996afcb8568f9af215ed36245905d7f29a0ffe7d037c7171d1d0370208bafb13616096a85678faddcd59f41eaebc2618ec9aa54fc01409
-
Filesize
11KB
MD5cec0215e8f370c6969f24f91194d18ec
SHA1dae040da5a86cb571feaaa4d7a21e7404472872d
SHA256a9aa81b192926e158307b7a99eaeacefde3b3c612fa8f049a798162c90176738
SHA51216c5e4bcb91626646346091da3f2da7d006494c354d673c8377b15b672b2037946cfa6a855e45c1e84a58576c1243d00667561bae26011151e910b699c92db7e
-
Filesize
172KB
MD57b201c7a5e60033523a08b3196d80383
SHA14b768f0a8625f48da2c1376ce440d6f01fe40794
SHA2568b823d5708f966498e5d312ac22c1e28fc4446012480ee53b421bf527b197893
SHA512021db1dee0c34ef040c7bc4272ce53c86b18b5b42ee1c2e69702877d737897aacdb3181ecce458fadd2ce0d01778c6df88ce220568b5a2180c01a11cccc3a029
-
Filesize
172KB
MD57b201c7a5e60033523a08b3196d80383
SHA14b768f0a8625f48da2c1376ce440d6f01fe40794
SHA2568b823d5708f966498e5d312ac22c1e28fc4446012480ee53b421bf527b197893
SHA512021db1dee0c34ef040c7bc4272ce53c86b18b5b42ee1c2e69702877d737897aacdb3181ecce458fadd2ce0d01778c6df88ce220568b5a2180c01a11cccc3a029