Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
05/06/2023, 22:07
Static task
static1
Behavioral task
behavioral1
Sample
23e5050f56c59eec354be12f922a4a134b59830c8e827b9bcd840d52489d0588.exe
Resource
win10v2004-20230221-en
General
-
Target
23e5050f56c59eec354be12f922a4a134b59830c8e827b9bcd840d52489d0588.exe
-
Size
584KB
-
MD5
a9d43d9f4c543471ec296a17d84fc4aa
-
SHA1
ab4cea1abb84124539a4e8b5a9ec319940921e47
-
SHA256
23e5050f56c59eec354be12f922a4a134b59830c8e827b9bcd840d52489d0588
-
SHA512
434f1e3eca649d967294e16a37e62c35ecfe4452380e766506a69ac7951d117fdf66472ecd646e066d3cb7f76460d1855ecc17de42ec4104fb85b48d10bd03fb
-
SSDEEP
12288:eMrPy90l8rHiOLBelXY6IzRv0YRJJb+KaVp0l5orZuTb46hJqPRe4ukXis:9yiaiWBFhlhbepc5orUc62ZZXis
Malware Config
Extracted
redline
diza
83.97.73.126:19048
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection k4762878.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k4762878.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k4762878.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k4762878.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k4762878.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k4762878.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 1400 y6683649.exe 2156 y8421474.exe 2080 k4762878.exe 1572 l5999444.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" k4762878.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y8421474.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y8421474.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 23e5050f56c59eec354be12f922a4a134b59830c8e827b9bcd840d52489d0588.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 23e5050f56c59eec354be12f922a4a134b59830c8e827b9bcd840d52489d0588.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y6683649.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y6683649.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 2080 k4762878.exe 2080 k4762878.exe 1572 l5999444.exe 1572 l5999444.exe 1572 l5999444.exe 1572 l5999444.exe 1572 l5999444.exe 1572 l5999444.exe 1572 l5999444.exe 1572 l5999444.exe 1572 l5999444.exe 1572 l5999444.exe 1572 l5999444.exe 1572 l5999444.exe 1572 l5999444.exe 1572 l5999444.exe 1572 l5999444.exe 1572 l5999444.exe 1572 l5999444.exe 1572 l5999444.exe 1572 l5999444.exe 1572 l5999444.exe 1572 l5999444.exe 1572 l5999444.exe 1572 l5999444.exe 1572 l5999444.exe 1572 l5999444.exe 1572 l5999444.exe 1572 l5999444.exe 1572 l5999444.exe 1572 l5999444.exe 1572 l5999444.exe 1572 l5999444.exe 1572 l5999444.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2080 k4762878.exe Token: SeDebugPrivilege 1572 l5999444.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4616 wrote to memory of 1400 4616 23e5050f56c59eec354be12f922a4a134b59830c8e827b9bcd840d52489d0588.exe 82 PID 4616 wrote to memory of 1400 4616 23e5050f56c59eec354be12f922a4a134b59830c8e827b9bcd840d52489d0588.exe 82 PID 4616 wrote to memory of 1400 4616 23e5050f56c59eec354be12f922a4a134b59830c8e827b9bcd840d52489d0588.exe 82 PID 1400 wrote to memory of 2156 1400 y6683649.exe 83 PID 1400 wrote to memory of 2156 1400 y6683649.exe 83 PID 1400 wrote to memory of 2156 1400 y6683649.exe 83 PID 2156 wrote to memory of 2080 2156 y8421474.exe 84 PID 2156 wrote to memory of 2080 2156 y8421474.exe 84 PID 2156 wrote to memory of 1572 2156 y8421474.exe 85 PID 2156 wrote to memory of 1572 2156 y8421474.exe 85 PID 2156 wrote to memory of 1572 2156 y8421474.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\23e5050f56c59eec354be12f922a4a134b59830c8e827b9bcd840d52489d0588.exe"C:\Users\Admin\AppData\Local\Temp\23e5050f56c59eec354be12f922a4a134b59830c8e827b9bcd840d52489d0588.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6683649.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6683649.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y8421474.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y8421474.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k4762878.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k4762878.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2080
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l5999444.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l5999444.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1572
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD5e793d85a8b074be72184c7b06183ca57
SHA1893285e9c11b1f3c4d440c6854761e56e5611c8a
SHA2565b291258c4fb1edb746fb6a33d0c2c384fbb4da8429a12a128cc1485aeeb9a4a
SHA512624e48cc4c471b7a76ceecc02480a775cde278148c77c90d0cf34eb9c2acec884ad8820467c57df67b286e11702fe197f94c26b7990e3dd033bdb869539725e3
-
Filesize
377KB
MD5e793d85a8b074be72184c7b06183ca57
SHA1893285e9c11b1f3c4d440c6854761e56e5611c8a
SHA2565b291258c4fb1edb746fb6a33d0c2c384fbb4da8429a12a128cc1485aeeb9a4a
SHA512624e48cc4c471b7a76ceecc02480a775cde278148c77c90d0cf34eb9c2acec884ad8820467c57df67b286e11702fe197f94c26b7990e3dd033bdb869539725e3
-
Filesize
206KB
MD5d48aba1722d4fab5668238beb75af222
SHA1afe116b801f0223284c41eafdf1eaf35da2cf74a
SHA2564e1316148da873df23ecaf66e2d49db95fce12697fa6b502a71fd9d9a0f9206d
SHA5124c548d1e4abe926d76b6f11ec990b05f813226927251df3fb4e531209119abec8daee6020a2b9d663928b4f751b2e8246605b8adcf860d7963bd47187836dfdb
-
Filesize
206KB
MD5d48aba1722d4fab5668238beb75af222
SHA1afe116b801f0223284c41eafdf1eaf35da2cf74a
SHA2564e1316148da873df23ecaf66e2d49db95fce12697fa6b502a71fd9d9a0f9206d
SHA5124c548d1e4abe926d76b6f11ec990b05f813226927251df3fb4e531209119abec8daee6020a2b9d663928b4f751b2e8246605b8adcf860d7963bd47187836dfdb
-
Filesize
12KB
MD5e6612c3bbfce6b8c0d47ea85df2d7fb0
SHA1de8103457e88248d1b8b3011c97a8bcaf07c653b
SHA256f78ea2d92d6f62d82b05cbb4387f0f97b2fa67ffb927fa0393a8f52139e2f576
SHA5126ac90335647a1ee29901d4a2b292b38db6380a44ad06f3f12d01eaf5965c9d9c6c3deb8144430fd3516e770e1aef6bb31ab38e3e54b885c72cd0075047b1ae31
-
Filesize
12KB
MD5e6612c3bbfce6b8c0d47ea85df2d7fb0
SHA1de8103457e88248d1b8b3011c97a8bcaf07c653b
SHA256f78ea2d92d6f62d82b05cbb4387f0f97b2fa67ffb927fa0393a8f52139e2f576
SHA5126ac90335647a1ee29901d4a2b292b38db6380a44ad06f3f12d01eaf5965c9d9c6c3deb8144430fd3516e770e1aef6bb31ab38e3e54b885c72cd0075047b1ae31
-
Filesize
172KB
MD50fb2e4c7d1b46d21301235766f1d64af
SHA153ddbeec1ed0f753c38211215f94568f2ce8ed04
SHA256ae91c91343621ec62a069f288319e8474fa94c0b9e5b39628af4f070ba8fe170
SHA51202437ff62f4a893cfd6d1b835570ea68b60ae3d0d8de1ec0f8534b4d56f89cc61b09ccfa8b3fa4de998666fbd69691c7f87a264be1cc11982e762d9b96cfadea
-
Filesize
172KB
MD50fb2e4c7d1b46d21301235766f1d64af
SHA153ddbeec1ed0f753c38211215f94568f2ce8ed04
SHA256ae91c91343621ec62a069f288319e8474fa94c0b9e5b39628af4f070ba8fe170
SHA51202437ff62f4a893cfd6d1b835570ea68b60ae3d0d8de1ec0f8534b4d56f89cc61b09ccfa8b3fa4de998666fbd69691c7f87a264be1cc11982e762d9b96cfadea