Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
04-06-2023 20:13
Static task
static1
Behavioral task
behavioral1
Sample
619ea159c4b88ca11c0c494ab31e9d5975fe65a08c11a8841635b1b4a5ea72bc.exe
Resource
win10v2004-20230220-en
General
-
Target
619ea159c4b88ca11c0c494ab31e9d5975fe65a08c11a8841635b1b4a5ea72bc.exe
-
Size
581KB
-
MD5
0863ba586ee7601cfc948aa65b93b67e
-
SHA1
f176a03bbdb75297bbe332db62a043b6e5c7b078
-
SHA256
619ea159c4b88ca11c0c494ab31e9d5975fe65a08c11a8841635b1b4a5ea72bc
-
SHA512
ba9ae639058703e4aa23bde1774c5bf7945bb7ac1e4092f09324f298c6ee8b0b8c90acfa76947505051e8780bbe02ee843c7b16255b7a8091c9783041cc2eb78
-
SSDEEP
12288:rMrKy908bEQir/GYqmUPUNN9XZrxEO8+Z7FnrbQtd7jehpqw:VyPbED/GYqmFN9EO8whbcd7jYpqw
Malware Config
Extracted
redline
maxi
83.97.73.126:19046
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Signatures
-
Processes:
a5803859.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a5803859.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a5803859.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a5803859.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a5803859.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a5803859.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a5803859.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
Processes:
v1996417.exev6537811.exea5803859.exeb2822897.exepid process 3432 v1996417.exe 3632 v6537811.exe 2392 a5803859.exe 1964 b2822897.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
a5803859.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a5803859.exe -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
v1996417.exev6537811.exe619ea159c4b88ca11c0c494ab31e9d5975fe65a08c11a8841635b1b4a5ea72bc.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v1996417.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v1996417.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v6537811.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v6537811.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 619ea159c4b88ca11c0c494ab31e9d5975fe65a08c11a8841635b1b4a5ea72bc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 619ea159c4b88ca11c0c494ab31e9d5975fe65a08c11a8841635b1b4a5ea72bc.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 36 IoCs
Processes:
a5803859.exeb2822897.exepid process 2392 a5803859.exe 2392 a5803859.exe 1964 b2822897.exe 1964 b2822897.exe 1964 b2822897.exe 1964 b2822897.exe 1964 b2822897.exe 1964 b2822897.exe 1964 b2822897.exe 1964 b2822897.exe 1964 b2822897.exe 1964 b2822897.exe 1964 b2822897.exe 1964 b2822897.exe 1964 b2822897.exe 1964 b2822897.exe 1964 b2822897.exe 1964 b2822897.exe 1964 b2822897.exe 1964 b2822897.exe 1964 b2822897.exe 1964 b2822897.exe 1964 b2822897.exe 1964 b2822897.exe 1964 b2822897.exe 1964 b2822897.exe 1964 b2822897.exe 1964 b2822897.exe 1964 b2822897.exe 1964 b2822897.exe 1964 b2822897.exe 1964 b2822897.exe 1964 b2822897.exe 1964 b2822897.exe 1964 b2822897.exe 1964 b2822897.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
a5803859.exeb2822897.exedescription pid process Token: SeDebugPrivilege 2392 a5803859.exe Token: SeDebugPrivilege 1964 b2822897.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
619ea159c4b88ca11c0c494ab31e9d5975fe65a08c11a8841635b1b4a5ea72bc.exev1996417.exev6537811.exedescription pid process target process PID 2820 wrote to memory of 3432 2820 619ea159c4b88ca11c0c494ab31e9d5975fe65a08c11a8841635b1b4a5ea72bc.exe v1996417.exe PID 2820 wrote to memory of 3432 2820 619ea159c4b88ca11c0c494ab31e9d5975fe65a08c11a8841635b1b4a5ea72bc.exe v1996417.exe PID 2820 wrote to memory of 3432 2820 619ea159c4b88ca11c0c494ab31e9d5975fe65a08c11a8841635b1b4a5ea72bc.exe v1996417.exe PID 3432 wrote to memory of 3632 3432 v1996417.exe v6537811.exe PID 3432 wrote to memory of 3632 3432 v1996417.exe v6537811.exe PID 3432 wrote to memory of 3632 3432 v1996417.exe v6537811.exe PID 3632 wrote to memory of 2392 3632 v6537811.exe a5803859.exe PID 3632 wrote to memory of 2392 3632 v6537811.exe a5803859.exe PID 3632 wrote to memory of 1964 3632 v6537811.exe b2822897.exe PID 3632 wrote to memory of 1964 3632 v6537811.exe b2822897.exe PID 3632 wrote to memory of 1964 3632 v6537811.exe b2822897.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\619ea159c4b88ca11c0c494ab31e9d5975fe65a08c11a8841635b1b4a5ea72bc.exe"C:\Users\Admin\AppData\Local\Temp\619ea159c4b88ca11c0c494ab31e9d5975fe65a08c11a8841635b1b4a5ea72bc.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1996417.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1996417.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6537811.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6537811.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a5803859.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a5803859.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2822897.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2822897.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1996417.exeFilesize
377KB
MD548b98919b04ea5bd1fd7a20f16be8fd7
SHA16591e94fda97f2253968684ea82f68c888309cb3
SHA256e4853ed0dcddb638d05b94e954236998ef86de51902a5784b43426ae2202fb58
SHA5122bf5ff289cb159a0753ea28e52685aad9b4e04532c258fc3d586d6fa2bd255509cd116fee08ec6d34684291deaa2d902a448021b8935c410f12207e4327e5dd2
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1996417.exeFilesize
377KB
MD548b98919b04ea5bd1fd7a20f16be8fd7
SHA16591e94fda97f2253968684ea82f68c888309cb3
SHA256e4853ed0dcddb638d05b94e954236998ef86de51902a5784b43426ae2202fb58
SHA5122bf5ff289cb159a0753ea28e52685aad9b4e04532c258fc3d586d6fa2bd255509cd116fee08ec6d34684291deaa2d902a448021b8935c410f12207e4327e5dd2
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6537811.exeFilesize
206KB
MD5e33dd36f511bd8c967af26e26a9e65f1
SHA1f5d8110556125d0f0ffe9273abd693107f7ef98d
SHA256dba111e69fd6389b2877151c16438e7dfe448e5c86b3fad5efbbfdaf4de9edb9
SHA5122d05b2c31df7e9c6a1d05873d4dc6d5fbb3eea06c23c3938a0c3e9f25d624fd89826fb3ec8a2878ead6011e54ce88cfd1b5599c55c5e12dbedbd2f62e6f91dfa
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6537811.exeFilesize
206KB
MD5e33dd36f511bd8c967af26e26a9e65f1
SHA1f5d8110556125d0f0ffe9273abd693107f7ef98d
SHA256dba111e69fd6389b2877151c16438e7dfe448e5c86b3fad5efbbfdaf4de9edb9
SHA5122d05b2c31df7e9c6a1d05873d4dc6d5fbb3eea06c23c3938a0c3e9f25d624fd89826fb3ec8a2878ead6011e54ce88cfd1b5599c55c5e12dbedbd2f62e6f91dfa
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a5803859.exeFilesize
11KB
MD50495c2ddffe4fa49800e746fa4bf28a3
SHA1610d5950b42f0f51307fbcaebbdb818c459f26b0
SHA2568a2ac20ee9cc1d4cbfbea2f78a9c29fe5a914ebd36e63ca1a3dc922540353564
SHA512b6216ec5b869af48c0d28b1823bea20208f87ce989c836fc4dbcdb2233491ddefa7192adb68cd9ac48754dac8eac1fe500f678e1e0a35bb0a8b0de30b79e765c
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a5803859.exeFilesize
11KB
MD50495c2ddffe4fa49800e746fa4bf28a3
SHA1610d5950b42f0f51307fbcaebbdb818c459f26b0
SHA2568a2ac20ee9cc1d4cbfbea2f78a9c29fe5a914ebd36e63ca1a3dc922540353564
SHA512b6216ec5b869af48c0d28b1823bea20208f87ce989c836fc4dbcdb2233491ddefa7192adb68cd9ac48754dac8eac1fe500f678e1e0a35bb0a8b0de30b79e765c
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2822897.exeFilesize
172KB
MD5021362129bfeb1efb45653a26b4222f0
SHA1901a3fa7a4cfe78c3b8a19ba7f75258789b2a600
SHA256552880f50af2cb0ecb7b5db176be77eef23fd782e70aee187de8b43e6eac2d5b
SHA5129f1eacd40ff6a268095fad7b4d9efbe1919d02f285a0f977166892d961465cd5020c096ec4c3705ed30fcbec57030fc83ce5fd53e2dacba944350ead299b8094
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2822897.exeFilesize
172KB
MD5021362129bfeb1efb45653a26b4222f0
SHA1901a3fa7a4cfe78c3b8a19ba7f75258789b2a600
SHA256552880f50af2cb0ecb7b5db176be77eef23fd782e70aee187de8b43e6eac2d5b
SHA5129f1eacd40ff6a268095fad7b4d9efbe1919d02f285a0f977166892d961465cd5020c096ec4c3705ed30fcbec57030fc83ce5fd53e2dacba944350ead299b8094
-
memory/1964-160-0x000000000A480000-0x000000000AA98000-memory.dmpFilesize
6.1MB
-
memory/1964-165-0x000000000A2B0000-0x000000000A326000-memory.dmpFilesize
472KB
-
memory/1964-172-0x0000000002480000-0x0000000002490000-memory.dmpFilesize
64KB
-
memory/1964-161-0x000000000A000000-0x000000000A10A000-memory.dmpFilesize
1.0MB
-
memory/1964-162-0x0000000009F40000-0x0000000009F52000-memory.dmpFilesize
72KB
-
memory/1964-163-0x0000000002480000-0x0000000002490000-memory.dmpFilesize
64KB
-
memory/1964-164-0x0000000009FA0000-0x0000000009FDC000-memory.dmpFilesize
240KB
-
memory/1964-159-0x0000000000080000-0x00000000000B0000-memory.dmpFilesize
192KB
-
memory/1964-166-0x000000000A3D0000-0x000000000A462000-memory.dmpFilesize
584KB
-
memory/1964-167-0x000000000B050000-0x000000000B5F4000-memory.dmpFilesize
5.6MB
-
memory/1964-168-0x000000000ABA0000-0x000000000AC06000-memory.dmpFilesize
408KB
-
memory/1964-169-0x000000000AFD0000-0x000000000B020000-memory.dmpFilesize
320KB
-
memory/1964-170-0x000000000B8D0000-0x000000000BA92000-memory.dmpFilesize
1.8MB
-
memory/1964-171-0x000000000BFD0000-0x000000000C4FC000-memory.dmpFilesize
5.2MB
-
memory/2392-154-0x0000000000BA0000-0x0000000000BAA000-memory.dmpFilesize
40KB