Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
04-06-2023 19:07
Static task
static1
Behavioral task
behavioral1
Sample
0eefba825ed9df5480f9a2defa04c70a75032b577e56708896ad67a0b4fe5398.exe
Resource
win10v2004-20230221-en
General
-
Target
0eefba825ed9df5480f9a2defa04c70a75032b577e56708896ad67a0b4fe5398.exe
-
Size
580KB
-
MD5
3807a40d47311173052d0d7b4a8e2d17
-
SHA1
dca087287596f24a31c79e9ea8f0906b9dc34aa3
-
SHA256
0eefba825ed9df5480f9a2defa04c70a75032b577e56708896ad67a0b4fe5398
-
SHA512
d7708de19e3890de7bdcdc0591e48cc63a10193146f5423ab55109052bf3064656bce8082cdb572e98dcac6710b3af14cf768cf61adec7a50605ec309744322b
-
SSDEEP
12288:QMrHy90xlDas0uGB9w0wQlw9aeYYGpou3YoPjnCXKMXGcUQLFKeyULAcrc:HyalDeXP+WYXYSG3EPpg
Malware Config
Extracted
redline
maxi
83.97.73.126:19046
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Signatures
-
Processes:
a4925887.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a4925887.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a4925887.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a4925887.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a4925887.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a4925887.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a4925887.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
Processes:
v1062987.exev9887372.exea4925887.exeb4820348.exepid process 5116 v1062987.exe 4388 v9887372.exe 4708 a4925887.exe 4628 b4820348.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
a4925887.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a4925887.exe -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
0eefba825ed9df5480f9a2defa04c70a75032b577e56708896ad67a0b4fe5398.exev1062987.exev9887372.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0eefba825ed9df5480f9a2defa04c70a75032b577e56708896ad67a0b4fe5398.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0eefba825ed9df5480f9a2defa04c70a75032b577e56708896ad67a0b4fe5398.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v1062987.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v1062987.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v9887372.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v9887372.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 28 IoCs
Processes:
a4925887.exeb4820348.exepid process 4708 a4925887.exe 4708 a4925887.exe 4628 b4820348.exe 4628 b4820348.exe 4628 b4820348.exe 4628 b4820348.exe 4628 b4820348.exe 4628 b4820348.exe 4628 b4820348.exe 4628 b4820348.exe 4628 b4820348.exe 4628 b4820348.exe 4628 b4820348.exe 4628 b4820348.exe 4628 b4820348.exe 4628 b4820348.exe 4628 b4820348.exe 4628 b4820348.exe 4628 b4820348.exe 4628 b4820348.exe 4628 b4820348.exe 4628 b4820348.exe 4628 b4820348.exe 4628 b4820348.exe 4628 b4820348.exe 4628 b4820348.exe 4628 b4820348.exe 4628 b4820348.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
a4925887.exeb4820348.exedescription pid process Token: SeDebugPrivilege 4708 a4925887.exe Token: SeDebugPrivilege 4628 b4820348.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
0eefba825ed9df5480f9a2defa04c70a75032b577e56708896ad67a0b4fe5398.exev1062987.exev9887372.exedescription pid process target process PID 4432 wrote to memory of 5116 4432 0eefba825ed9df5480f9a2defa04c70a75032b577e56708896ad67a0b4fe5398.exe v1062987.exe PID 4432 wrote to memory of 5116 4432 0eefba825ed9df5480f9a2defa04c70a75032b577e56708896ad67a0b4fe5398.exe v1062987.exe PID 4432 wrote to memory of 5116 4432 0eefba825ed9df5480f9a2defa04c70a75032b577e56708896ad67a0b4fe5398.exe v1062987.exe PID 5116 wrote to memory of 4388 5116 v1062987.exe v9887372.exe PID 5116 wrote to memory of 4388 5116 v1062987.exe v9887372.exe PID 5116 wrote to memory of 4388 5116 v1062987.exe v9887372.exe PID 4388 wrote to memory of 4708 4388 v9887372.exe a4925887.exe PID 4388 wrote to memory of 4708 4388 v9887372.exe a4925887.exe PID 4388 wrote to memory of 4628 4388 v9887372.exe b4820348.exe PID 4388 wrote to memory of 4628 4388 v9887372.exe b4820348.exe PID 4388 wrote to memory of 4628 4388 v9887372.exe b4820348.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0eefba825ed9df5480f9a2defa04c70a75032b577e56708896ad67a0b4fe5398.exe"C:\Users\Admin\AppData\Local\Temp\0eefba825ed9df5480f9a2defa04c70a75032b577e56708896ad67a0b4fe5398.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1062987.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1062987.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9887372.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9887372.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4925887.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4925887.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4820348.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4820348.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4628
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD5f5884f049343128056be1dd927dcb7e0
SHA124d423dc5cde31c3481f9913fffb814be24564a2
SHA256c1f2db75e8055c5bf395cdd2bea5713fa138ab910daad80e656a0a3f0957eae3
SHA51256360cb1e2ef80bb1f81c921bcf7e9d53db5759c16a5c56195a467ef96151888c99f66d79135021537e26ef9a96192edba9e55bda1d58a50c7b5f32768996726
-
Filesize
377KB
MD5f5884f049343128056be1dd927dcb7e0
SHA124d423dc5cde31c3481f9913fffb814be24564a2
SHA256c1f2db75e8055c5bf395cdd2bea5713fa138ab910daad80e656a0a3f0957eae3
SHA51256360cb1e2ef80bb1f81c921bcf7e9d53db5759c16a5c56195a467ef96151888c99f66d79135021537e26ef9a96192edba9e55bda1d58a50c7b5f32768996726
-
Filesize
206KB
MD581e921aa673857f680ba89b2d52d20f7
SHA1b0bb18376b43d1160a4798a155e2319ef2f32808
SHA25693ee47f929250f345303c3183f3ac4f31026bed7c29de0f549739be7bcd75b2d
SHA512f7b1b9d81e3c11249a22e17729b10065aa6436cf3b59b53f095320b5e3ade417a88d98a93608316ef6740c87c3a1087210494664f50bd99610e63b158a30aa29
-
Filesize
206KB
MD581e921aa673857f680ba89b2d52d20f7
SHA1b0bb18376b43d1160a4798a155e2319ef2f32808
SHA25693ee47f929250f345303c3183f3ac4f31026bed7c29de0f549739be7bcd75b2d
SHA512f7b1b9d81e3c11249a22e17729b10065aa6436cf3b59b53f095320b5e3ade417a88d98a93608316ef6740c87c3a1087210494664f50bd99610e63b158a30aa29
-
Filesize
11KB
MD5ce38d9d7ecc984decac9badc6b2b4b5f
SHA1ab3aeb8b8852f45bff7b8eebbe5f6fb38a2f6403
SHA256bc0e08474b9a4450c6fd28936d4b108f0636e7bcf72a3682a697f45f863148d6
SHA5120f22e62a89a2339c173af30c72a2ca0633db1842cc6077573847dab565756e7244a2a82c8aed5eec4d8f23b6f6c0d8f5fad2baf70b0b465e9d7aadb35b128fdd
-
Filesize
11KB
MD5ce38d9d7ecc984decac9badc6b2b4b5f
SHA1ab3aeb8b8852f45bff7b8eebbe5f6fb38a2f6403
SHA256bc0e08474b9a4450c6fd28936d4b108f0636e7bcf72a3682a697f45f863148d6
SHA5120f22e62a89a2339c173af30c72a2ca0633db1842cc6077573847dab565756e7244a2a82c8aed5eec4d8f23b6f6c0d8f5fad2baf70b0b465e9d7aadb35b128fdd
-
Filesize
172KB
MD5fef2283697d68be5d69caea76b6392f1
SHA1b2cc859067959582debaedcc4a80510f13c610d3
SHA256a9756e34edac477f36741b81372d235de19f31d18eb4c75879650c10f4d49366
SHA512e3f4b471450359714a92013ae208a3b292a1d0f2e6afe032541d61c0c526b72c3330a1cf8c8d64559ee99ccba4b302e872a112ea6a6f4887817b4178d22d1a6f
-
Filesize
172KB
MD5fef2283697d68be5d69caea76b6392f1
SHA1b2cc859067959582debaedcc4a80510f13c610d3
SHA256a9756e34edac477f36741b81372d235de19f31d18eb4c75879650c10f4d49366
SHA512e3f4b471450359714a92013ae208a3b292a1d0f2e6afe032541d61c0c526b72c3330a1cf8c8d64559ee99ccba4b302e872a112ea6a6f4887817b4178d22d1a6f