Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
04-06-2023 20:11
Static task
static1
Behavioral task
behavioral1
Sample
669e03979829733877829c51cef18861992890a015e9954bff1bc854a3ff8d5d.exe
Resource
win10v2004-20230220-en
General
-
Target
669e03979829733877829c51cef18861992890a015e9954bff1bc854a3ff8d5d.exe
-
Size
581KB
-
MD5
8406a310d8bb9b5f2aeae92594ae4923
-
SHA1
f972f23cff20475e308019221931ebb6f7b30f93
-
SHA256
669e03979829733877829c51cef18861992890a015e9954bff1bc854a3ff8d5d
-
SHA512
ff581fecb93cf790e7ecc6ce462799caea278b123d439ade6499c85d4d2b43122b1a657eac215eab9a49639b0981f8efa819c56af892032479a35d8b8ea64104
-
SSDEEP
12288:tMrny90tuvjd2l2tCMRhV6ROaC/QHNmoyc4FnKGkWLCAdDnY:yyqOjdJtCMs4aC/kNmrFKHWWAdDnY
Malware Config
Extracted
redline
maxi
83.97.73.126:19046
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Signatures
-
Processes:
a4526248.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a4526248.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a4526248.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a4526248.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a4526248.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a4526248.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a4526248.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
Processes:
v2910760.exev0543216.exea4526248.exeb0031310.exepid process 4360 v2910760.exe 1480 v0543216.exe 1428 a4526248.exe 3700 b0031310.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
a4526248.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a4526248.exe -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
669e03979829733877829c51cef18861992890a015e9954bff1bc854a3ff8d5d.exev2910760.exev0543216.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 669e03979829733877829c51cef18861992890a015e9954bff1bc854a3ff8d5d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 669e03979829733877829c51cef18861992890a015e9954bff1bc854a3ff8d5d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v2910760.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v2910760.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v0543216.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v0543216.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 34 IoCs
Processes:
a4526248.exeb0031310.exepid process 1428 a4526248.exe 1428 a4526248.exe 3700 b0031310.exe 3700 b0031310.exe 3700 b0031310.exe 3700 b0031310.exe 3700 b0031310.exe 3700 b0031310.exe 3700 b0031310.exe 3700 b0031310.exe 3700 b0031310.exe 3700 b0031310.exe 3700 b0031310.exe 3700 b0031310.exe 3700 b0031310.exe 3700 b0031310.exe 3700 b0031310.exe 3700 b0031310.exe 3700 b0031310.exe 3700 b0031310.exe 3700 b0031310.exe 3700 b0031310.exe 3700 b0031310.exe 3700 b0031310.exe 3700 b0031310.exe 3700 b0031310.exe 3700 b0031310.exe 3700 b0031310.exe 3700 b0031310.exe 3700 b0031310.exe 3700 b0031310.exe 3700 b0031310.exe 3700 b0031310.exe 3700 b0031310.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
a4526248.exeb0031310.exedescription pid process Token: SeDebugPrivilege 1428 a4526248.exe Token: SeDebugPrivilege 3700 b0031310.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
669e03979829733877829c51cef18861992890a015e9954bff1bc854a3ff8d5d.exev2910760.exev0543216.exedescription pid process target process PID 2772 wrote to memory of 4360 2772 669e03979829733877829c51cef18861992890a015e9954bff1bc854a3ff8d5d.exe v2910760.exe PID 2772 wrote to memory of 4360 2772 669e03979829733877829c51cef18861992890a015e9954bff1bc854a3ff8d5d.exe v2910760.exe PID 2772 wrote to memory of 4360 2772 669e03979829733877829c51cef18861992890a015e9954bff1bc854a3ff8d5d.exe v2910760.exe PID 4360 wrote to memory of 1480 4360 v2910760.exe v0543216.exe PID 4360 wrote to memory of 1480 4360 v2910760.exe v0543216.exe PID 4360 wrote to memory of 1480 4360 v2910760.exe v0543216.exe PID 1480 wrote to memory of 1428 1480 v0543216.exe a4526248.exe PID 1480 wrote to memory of 1428 1480 v0543216.exe a4526248.exe PID 1480 wrote to memory of 3700 1480 v0543216.exe b0031310.exe PID 1480 wrote to memory of 3700 1480 v0543216.exe b0031310.exe PID 1480 wrote to memory of 3700 1480 v0543216.exe b0031310.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\669e03979829733877829c51cef18861992890a015e9954bff1bc854a3ff8d5d.exe"C:\Users\Admin\AppData\Local\Temp\669e03979829733877829c51cef18861992890a015e9954bff1bc854a3ff8d5d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2910760.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2910760.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0543216.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0543216.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4526248.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4526248.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1428 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b0031310.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b0031310.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3700
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD5a93179be0b5c3d930ee2174a36daca27
SHA1ea60dcd109d072e03377ff057e677757d2fba137
SHA25691f01af5fb89053e2b039703679b9cf2643363f08d03e63d7b8e4cfa48583532
SHA51291d3f9a10225b7ae258c2cadd4a4507040dc2b853b93dd0b6eaddd03a164e92c5594a6b5b6b0df40ae56cd063a86f58b75791264c9bf79056ece4fe56ecab4ae
-
Filesize
377KB
MD5a93179be0b5c3d930ee2174a36daca27
SHA1ea60dcd109d072e03377ff057e677757d2fba137
SHA25691f01af5fb89053e2b039703679b9cf2643363f08d03e63d7b8e4cfa48583532
SHA51291d3f9a10225b7ae258c2cadd4a4507040dc2b853b93dd0b6eaddd03a164e92c5594a6b5b6b0df40ae56cd063a86f58b75791264c9bf79056ece4fe56ecab4ae
-
Filesize
206KB
MD54fe80b6adc795ad211b218e5540d825b
SHA1bc17d37bc8b277cf932c850018ed4ec8ff597639
SHA2567653309bda46982e9251dad3e599abaa473e22c1e8bba44c872f3e758d723b3e
SHA512fdb20369998ff178ddbdbebe1e708a29b68435674fe6f83429e5dfd324daf5ff30d70d1d72d0b4e528d2e0ce4b37e295637f007dc6f3746b3cc01c0608156c17
-
Filesize
206KB
MD54fe80b6adc795ad211b218e5540d825b
SHA1bc17d37bc8b277cf932c850018ed4ec8ff597639
SHA2567653309bda46982e9251dad3e599abaa473e22c1e8bba44c872f3e758d723b3e
SHA512fdb20369998ff178ddbdbebe1e708a29b68435674fe6f83429e5dfd324daf5ff30d70d1d72d0b4e528d2e0ce4b37e295637f007dc6f3746b3cc01c0608156c17
-
Filesize
11KB
MD5558abca574ce4da32f3a0f7c9d6380b4
SHA135d73a4bf2e5d5c023aef0ccc63e962519d88c9e
SHA2563b59059bf1a4576877993bbcbdbe781abb3191188e40f97c1f84ce0066df95b2
SHA512b133778c1f071073b7e34d3af4a2b801a40165d10f9d54a269858816fde33afd090563e62e17ce29e766eeb34dbf8da56ebf56245aa008803d639dced44bfa42
-
Filesize
11KB
MD5558abca574ce4da32f3a0f7c9d6380b4
SHA135d73a4bf2e5d5c023aef0ccc63e962519d88c9e
SHA2563b59059bf1a4576877993bbcbdbe781abb3191188e40f97c1f84ce0066df95b2
SHA512b133778c1f071073b7e34d3af4a2b801a40165d10f9d54a269858816fde33afd090563e62e17ce29e766eeb34dbf8da56ebf56245aa008803d639dced44bfa42
-
Filesize
172KB
MD5994e00b47e285e0fefd6a00147b8dabb
SHA1fb0b39961a512165091992eeb4a206698365f628
SHA256573e09151467b07b1c1651576c7a10f8122e2a2f1250c0eaf3f14a7025fa40cd
SHA51256f043cadd8d2d88fed59db1d7b93be58a4e18dba2523f4a9a158e7caaecd48f3341215c5850dad2e8c506320e21c6a75b12ba9b07adff0658a274abd95e6633
-
Filesize
172KB
MD5994e00b47e285e0fefd6a00147b8dabb
SHA1fb0b39961a512165091992eeb4a206698365f628
SHA256573e09151467b07b1c1651576c7a10f8122e2a2f1250c0eaf3f14a7025fa40cd
SHA51256f043cadd8d2d88fed59db1d7b93be58a4e18dba2523f4a9a158e7caaecd48f3341215c5850dad2e8c506320e21c6a75b12ba9b07adff0658a274abd95e6633