Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
04-06-2023 19:13
Static task
static1
Behavioral task
behavioral1
Sample
3a724fa080005f1917e6ddd978e5fd4a75255f9ead7f653be7f1b6da3dd0a7a9.exe
Resource
win10v2004-20230220-en
General
-
Target
3a724fa080005f1917e6ddd978e5fd4a75255f9ead7f653be7f1b6da3dd0a7a9.exe
-
Size
580KB
-
MD5
f3a9d9ed539faa1735c7d70eeb5b1f0b
-
SHA1
61b758463f23248bafb6ae467e9be0f870e1d34f
-
SHA256
3a724fa080005f1917e6ddd978e5fd4a75255f9ead7f653be7f1b6da3dd0a7a9
-
SHA512
9bf04e0e1a7fccdfd643de0eb9e6a47b32c8900eaa19aba4b9119a1256c07895e9077f112b9520b97eac6ab7d7eb1aee9cd667b74d6316e85459a72dfb17d1fb
-
SSDEEP
12288:fMr9y90EhZHd5U9u0bjDcMCwJKvm+aE5u:yyVU9u4y0+aE5u
Malware Config
Extracted
redline
maxi
83.97.73.126:19046
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Signatures
-
Processes:
a3395480.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a3395480.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a3395480.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a3395480.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a3395480.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a3395480.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a3395480.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
Processes:
v0331684.exev3355826.exea3395480.exeb1299828.exepid process 4828 v0331684.exe 624 v3355826.exe 4108 a3395480.exe 768 b1299828.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
a3395480.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a3395480.exe -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
3a724fa080005f1917e6ddd978e5fd4a75255f9ead7f653be7f1b6da3dd0a7a9.exev0331684.exev3355826.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3a724fa080005f1917e6ddd978e5fd4a75255f9ead7f653be7f1b6da3dd0a7a9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3a724fa080005f1917e6ddd978e5fd4a75255f9ead7f653be7f1b6da3dd0a7a9.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v0331684.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v0331684.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v3355826.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v3355826.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 22 IoCs
Processes:
a3395480.exeb1299828.exepid process 4108 a3395480.exe 4108 a3395480.exe 768 b1299828.exe 768 b1299828.exe 768 b1299828.exe 768 b1299828.exe 768 b1299828.exe 768 b1299828.exe 768 b1299828.exe 768 b1299828.exe 768 b1299828.exe 768 b1299828.exe 768 b1299828.exe 768 b1299828.exe 768 b1299828.exe 768 b1299828.exe 768 b1299828.exe 768 b1299828.exe 768 b1299828.exe 768 b1299828.exe 768 b1299828.exe 768 b1299828.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
a3395480.exeb1299828.exedescription pid process Token: SeDebugPrivilege 4108 a3395480.exe Token: SeDebugPrivilege 768 b1299828.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
3a724fa080005f1917e6ddd978e5fd4a75255f9ead7f653be7f1b6da3dd0a7a9.exev0331684.exev3355826.exedescription pid process target process PID 4968 wrote to memory of 4828 4968 3a724fa080005f1917e6ddd978e5fd4a75255f9ead7f653be7f1b6da3dd0a7a9.exe v0331684.exe PID 4968 wrote to memory of 4828 4968 3a724fa080005f1917e6ddd978e5fd4a75255f9ead7f653be7f1b6da3dd0a7a9.exe v0331684.exe PID 4968 wrote to memory of 4828 4968 3a724fa080005f1917e6ddd978e5fd4a75255f9ead7f653be7f1b6da3dd0a7a9.exe v0331684.exe PID 4828 wrote to memory of 624 4828 v0331684.exe v3355826.exe PID 4828 wrote to memory of 624 4828 v0331684.exe v3355826.exe PID 4828 wrote to memory of 624 4828 v0331684.exe v3355826.exe PID 624 wrote to memory of 4108 624 v3355826.exe a3395480.exe PID 624 wrote to memory of 4108 624 v3355826.exe a3395480.exe PID 624 wrote to memory of 768 624 v3355826.exe b1299828.exe PID 624 wrote to memory of 768 624 v3355826.exe b1299828.exe PID 624 wrote to memory of 768 624 v3355826.exe b1299828.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a724fa080005f1917e6ddd978e5fd4a75255f9ead7f653be7f1b6da3dd0a7a9.exe"C:\Users\Admin\AppData\Local\Temp\3a724fa080005f1917e6ddd978e5fd4a75255f9ead7f653be7f1b6da3dd0a7a9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0331684.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0331684.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3355826.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3355826.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a3395480.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a3395480.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1299828.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1299828.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0331684.exeFilesize
377KB
MD571d0c45c56ed1cf86ffddf1681a83ea6
SHA119ba2e30dfc9cab5b05fb90f8679b6ef66c6a41a
SHA2564271ab4b04a5ec0b8d2df7d089dee53c19a79bdd8ad2952c0ec087e9c62753b3
SHA51257bb60b4b2dd47ed15aee0e76034c98515e02134d9bae0f3f993b332db626c37840660bb259cc5ba25b1b6c6ecbf8c2a2045807352e3076692bfb056204e1979
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0331684.exeFilesize
377KB
MD571d0c45c56ed1cf86ffddf1681a83ea6
SHA119ba2e30dfc9cab5b05fb90f8679b6ef66c6a41a
SHA2564271ab4b04a5ec0b8d2df7d089dee53c19a79bdd8ad2952c0ec087e9c62753b3
SHA51257bb60b4b2dd47ed15aee0e76034c98515e02134d9bae0f3f993b332db626c37840660bb259cc5ba25b1b6c6ecbf8c2a2045807352e3076692bfb056204e1979
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3355826.exeFilesize
206KB
MD5d3f1610edc309ec70ab7271a7429a018
SHA1a376ab53e86fb24edab39254df5e28e2a36de7fa
SHA25655f274aac84b090e3461933b13a3ef9ece0aaeec948b1dcfddb5eab90f9350b3
SHA512357ec54c9783a8aa96918d02f423eebd64956bcf323c05baf4085fa4c5ac0ace62dd16f9000d7720e653513a7cb74249bdfb71f921453611e04e74ee8793ce02
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3355826.exeFilesize
206KB
MD5d3f1610edc309ec70ab7271a7429a018
SHA1a376ab53e86fb24edab39254df5e28e2a36de7fa
SHA25655f274aac84b090e3461933b13a3ef9ece0aaeec948b1dcfddb5eab90f9350b3
SHA512357ec54c9783a8aa96918d02f423eebd64956bcf323c05baf4085fa4c5ac0ace62dd16f9000d7720e653513a7cb74249bdfb71f921453611e04e74ee8793ce02
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a3395480.exeFilesize
11KB
MD59f6f894f28c49d8b23913539aa186baa
SHA10368d75e4be14fe5199c313197341a5895c8c177
SHA25604fd844840c0b0ba71606f6a7b45f08db11f09c6e5edbd0b2b4d721380d10368
SHA5129757b094129caaba542ccf04879053135fe3a1e19ea5192ff30dd750d4d1e67f3bd566398670f958693c7310140738c24e757f8d2d561e9b40139b221791717c
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a3395480.exeFilesize
11KB
MD59f6f894f28c49d8b23913539aa186baa
SHA10368d75e4be14fe5199c313197341a5895c8c177
SHA25604fd844840c0b0ba71606f6a7b45f08db11f09c6e5edbd0b2b4d721380d10368
SHA5129757b094129caaba542ccf04879053135fe3a1e19ea5192ff30dd750d4d1e67f3bd566398670f958693c7310140738c24e757f8d2d561e9b40139b221791717c
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1299828.exeFilesize
172KB
MD5b82821ecf07cf3b91ac38df700ff6987
SHA141d3d93cba9cde6b4ec745de994bf32b62b8bcb4
SHA25625f842d67bc9907e2c38faebe7d4dedb364af4d69d3f2effbeee6ed2e756404d
SHA5122ea4583256bd27615c87ee162de04c60dde94fb7ff975caa0a1d854654d0fda44bdce879ee625a06c8826d3199ceb13a0c98ffeac7795fc3a79ed8f716cae9cd
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1299828.exeFilesize
172KB
MD5b82821ecf07cf3b91ac38df700ff6987
SHA141d3d93cba9cde6b4ec745de994bf32b62b8bcb4
SHA25625f842d67bc9907e2c38faebe7d4dedb364af4d69d3f2effbeee6ed2e756404d
SHA5122ea4583256bd27615c87ee162de04c60dde94fb7ff975caa0a1d854654d0fda44bdce879ee625a06c8826d3199ceb13a0c98ffeac7795fc3a79ed8f716cae9cd
-
memory/768-160-0x000000000AED0000-0x000000000B4E8000-memory.dmpFilesize
6.1MB
-
memory/768-165-0x000000000ACA0000-0x000000000AD16000-memory.dmpFilesize
472KB
-
memory/768-172-0x000000000C2D0000-0x000000000C320000-memory.dmpFilesize
320KB
-
memory/768-161-0x000000000AA00000-0x000000000AB0A000-memory.dmpFilesize
1.0MB
-
memory/768-162-0x000000000A930000-0x000000000A942000-memory.dmpFilesize
72KB
-
memory/768-163-0x000000000A990000-0x000000000A9CC000-memory.dmpFilesize
240KB
-
memory/768-164-0x0000000005520000-0x0000000005530000-memory.dmpFilesize
64KB
-
memory/768-159-0x0000000000BB0000-0x0000000000BE0000-memory.dmpFilesize
192KB
-
memory/768-166-0x000000000ADC0000-0x000000000AE52000-memory.dmpFilesize
584KB
-
memory/768-167-0x000000000BBA0000-0x000000000C144000-memory.dmpFilesize
5.6MB
-
memory/768-168-0x000000000B5F0000-0x000000000B656000-memory.dmpFilesize
408KB
-
memory/768-169-0x000000000C320000-0x000000000C4E2000-memory.dmpFilesize
1.8MB
-
memory/768-170-0x000000000CA20000-0x000000000CF4C000-memory.dmpFilesize
5.2MB
-
memory/768-171-0x0000000005520000-0x0000000005530000-memory.dmpFilesize
64KB
-
memory/4108-154-0x0000000000120000-0x000000000012A000-memory.dmpFilesize
40KB