Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
05-06-2023 00:42
Static task
static1
Behavioral task
behavioral1
Sample
6974eb31b59e7d0b610badaee10a75d875f65264bb5383ecf11ba2a81b294702.exe
Resource
win10-20230220-en
General
-
Target
6974eb31b59e7d0b610badaee10a75d875f65264bb5383ecf11ba2a81b294702.exe
-
Size
581KB
-
MD5
72f91ee85080737bf8003258a3bd461e
-
SHA1
b4d9c35d7ece04adc9350f816e8b548caf30d1a4
-
SHA256
6974eb31b59e7d0b610badaee10a75d875f65264bb5383ecf11ba2a81b294702
-
SHA512
b010ab2621501cbf29af7ea34431382c3038a5c57375c894d50dde1f27f3e101c0068501602d44f0a5b94b8cae7a239c49a040caae71df9458b05772238dd873
-
SSDEEP
12288:bMr+y90d6ZOyC/YgRuwQbDrwMdxgxQ/XkA7Ly1LoCOPL:tyw6uhgws3gx43Ony
Malware Config
Extracted
redline
diza
83.97.73.126:19046
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k5059738.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k5059738.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k5059738.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k5059738.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k5059738.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 4288 y9936465.exe 4052 y5963345.exe 4296 k5059738.exe 4324 l8217781.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" k5059738.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y9936465.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y9936465.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y5963345.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y5963345.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6974eb31b59e7d0b610badaee10a75d875f65264bb5383ecf11ba2a81b294702.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6974eb31b59e7d0b610badaee10a75d875f65264bb5383ecf11ba2a81b294702.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 4296 k5059738.exe 4296 k5059738.exe 4324 l8217781.exe 4324 l8217781.exe 4324 l8217781.exe 4324 l8217781.exe 4324 l8217781.exe 4324 l8217781.exe 4324 l8217781.exe 4324 l8217781.exe 4324 l8217781.exe 4324 l8217781.exe 4324 l8217781.exe 4324 l8217781.exe 4324 l8217781.exe 4324 l8217781.exe 4324 l8217781.exe 4324 l8217781.exe 4324 l8217781.exe 4324 l8217781.exe 4324 l8217781.exe 4324 l8217781.exe 4324 l8217781.exe 4324 l8217781.exe 4324 l8217781.exe 4324 l8217781.exe 4324 l8217781.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4296 k5059738.exe Token: SeDebugPrivilege 4324 l8217781.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3228 wrote to memory of 4288 3228 6974eb31b59e7d0b610badaee10a75d875f65264bb5383ecf11ba2a81b294702.exe 66 PID 3228 wrote to memory of 4288 3228 6974eb31b59e7d0b610badaee10a75d875f65264bb5383ecf11ba2a81b294702.exe 66 PID 3228 wrote to memory of 4288 3228 6974eb31b59e7d0b610badaee10a75d875f65264bb5383ecf11ba2a81b294702.exe 66 PID 4288 wrote to memory of 4052 4288 y9936465.exe 67 PID 4288 wrote to memory of 4052 4288 y9936465.exe 67 PID 4288 wrote to memory of 4052 4288 y9936465.exe 67 PID 4052 wrote to memory of 4296 4052 y5963345.exe 68 PID 4052 wrote to memory of 4296 4052 y5963345.exe 68 PID 4052 wrote to memory of 4324 4052 y5963345.exe 69 PID 4052 wrote to memory of 4324 4052 y5963345.exe 69 PID 4052 wrote to memory of 4324 4052 y5963345.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\6974eb31b59e7d0b610badaee10a75d875f65264bb5383ecf11ba2a81b294702.exe"C:\Users\Admin\AppData\Local\Temp\6974eb31b59e7d0b610badaee10a75d875f65264bb5383ecf11ba2a81b294702.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9936465.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9936465.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y5963345.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y5963345.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k5059738.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k5059738.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4296
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l8217781.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l8217781.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4324
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD5a63e0e8f2606441d6dbc108d1b21a40f
SHA18f634f535718bad7b9ba5f69302e6fa8e8db53fd
SHA256153bb3fe89283cff40f746981716feb9cbf21de7a70d5edfb6b8542eac849ae0
SHA5126a00b5617bfc8834814aade565e7b4e2222912966976a33c935c415e154d510bc7d26622aaf6a216e445759500da4c56621c94d880384b7a9b684dd0dbc52361
-
Filesize
377KB
MD5a63e0e8f2606441d6dbc108d1b21a40f
SHA18f634f535718bad7b9ba5f69302e6fa8e8db53fd
SHA256153bb3fe89283cff40f746981716feb9cbf21de7a70d5edfb6b8542eac849ae0
SHA5126a00b5617bfc8834814aade565e7b4e2222912966976a33c935c415e154d510bc7d26622aaf6a216e445759500da4c56621c94d880384b7a9b684dd0dbc52361
-
Filesize
206KB
MD577bc8c891114ec45155759a3be33c2de
SHA1a0adf41c01d1276f04c59446732543198404688c
SHA2563617cb64a0fe80ee0780469c38bf1fb9eac26a73d5d5900126eac349a713184d
SHA5122256a71aea626f74b8162b18859a75a9630ed445040f405082d53034b85b2579ae0fcada5e2f3f1119b4a106140da77d43676c6fe4b71971c06578bf61e52178
-
Filesize
206KB
MD577bc8c891114ec45155759a3be33c2de
SHA1a0adf41c01d1276f04c59446732543198404688c
SHA2563617cb64a0fe80ee0780469c38bf1fb9eac26a73d5d5900126eac349a713184d
SHA5122256a71aea626f74b8162b18859a75a9630ed445040f405082d53034b85b2579ae0fcada5e2f3f1119b4a106140da77d43676c6fe4b71971c06578bf61e52178
-
Filesize
11KB
MD5f6c748db35c29339034a1672a6c02f79
SHA10c6423377f89c8e6d37aa3a6fbdbde986d161b72
SHA256fec4ec9b89ae6ad25ad5dfc58c6455ffdeb8b1b436eb160cbee971500a2a1dd4
SHA51299c98b2df9128892612c8fc33389e88e54e40b840a09c1eba0aae5c87ce84beb9d64f8bb8cd6b920d8c94b09a54a9fd40d5f7691cac7d1ac0f93c8b9370ff2f6
-
Filesize
11KB
MD5f6c748db35c29339034a1672a6c02f79
SHA10c6423377f89c8e6d37aa3a6fbdbde986d161b72
SHA256fec4ec9b89ae6ad25ad5dfc58c6455ffdeb8b1b436eb160cbee971500a2a1dd4
SHA51299c98b2df9128892612c8fc33389e88e54e40b840a09c1eba0aae5c87ce84beb9d64f8bb8cd6b920d8c94b09a54a9fd40d5f7691cac7d1ac0f93c8b9370ff2f6
-
Filesize
172KB
MD586e018ab1cc01bc62893aac0e1726c17
SHA1e51a046217b430c713078999e4a3438ed52ef6df
SHA256977dc385c20e455225181a1b60782530f3ff80a480b7cc5709ba55131a6fb870
SHA512de3c0992dc67ce730d9fd5e5f2cf3a8eac8120112a20250c30fda41d679d7ea1c2002bc6514a2f88e9b23d734caec8751c378dbe9ba7699cb413db73885b4597
-
Filesize
172KB
MD586e018ab1cc01bc62893aac0e1726c17
SHA1e51a046217b430c713078999e4a3438ed52ef6df
SHA256977dc385c20e455225181a1b60782530f3ff80a480b7cc5709ba55131a6fb870
SHA512de3c0992dc67ce730d9fd5e5f2cf3a8eac8120112a20250c30fda41d679d7ea1c2002bc6514a2f88e9b23d734caec8751c378dbe9ba7699cb413db73885b4597