Analysis
-
max time kernel
140s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-06-2023 00:12
Static task
static1
Behavioral task
behavioral1
Sample
25f9fa0c0bda7ec46c931caa308cea1abf8220ef7bb46f7ec576a7a964ff36ad.exe
Resource
win10v2004-20230220-en
General
-
Target
25f9fa0c0bda7ec46c931caa308cea1abf8220ef7bb46f7ec576a7a964ff36ad.exe
-
Size
580KB
-
MD5
7732e10eb10bab5e9eda47ffabd909c3
-
SHA1
da88680b8cea482d22f45eefb68a00e01fafc427
-
SHA256
25f9fa0c0bda7ec46c931caa308cea1abf8220ef7bb46f7ec576a7a964ff36ad
-
SHA512
51e2a6c2b30cabe5fc42097714be6040810c78b2aa96b0741532e546d05d9ceb8e96d36c1465585b83156493d2da38f0652a041dd115695fe0e6ddef06da6576
-
SSDEEP
12288:1MrEy90+hPj0psBGhy4TsHSmITerPfT1dP0WNJ5Sw8yRmGps:Ryzh5BQySGSxebrfNJmyIG6
Malware Config
Extracted
redline
maxi
83.97.73.126:19046
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Signatures
-
Processes:
a1167496.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a1167496.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a1167496.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a1167496.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a1167496.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a1167496.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a1167496.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
Processes:
v3010864.exev5627664.exea1167496.exeb5513066.exepid process 2152 v3010864.exe 5000 v5627664.exe 1292 a1167496.exe 4328 b5513066.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
a1167496.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a1167496.exe -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
25f9fa0c0bda7ec46c931caa308cea1abf8220ef7bb46f7ec576a7a964ff36ad.exev3010864.exev5627664.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 25f9fa0c0bda7ec46c931caa308cea1abf8220ef7bb46f7ec576a7a964ff36ad.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v3010864.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v3010864.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v5627664.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v5627664.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 25f9fa0c0bda7ec46c931caa308cea1abf8220ef7bb46f7ec576a7a964ff36ad.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 26 IoCs
Processes:
a1167496.exeb5513066.exepid process 1292 a1167496.exe 1292 a1167496.exe 4328 b5513066.exe 4328 b5513066.exe 4328 b5513066.exe 4328 b5513066.exe 4328 b5513066.exe 4328 b5513066.exe 4328 b5513066.exe 4328 b5513066.exe 4328 b5513066.exe 4328 b5513066.exe 4328 b5513066.exe 4328 b5513066.exe 4328 b5513066.exe 4328 b5513066.exe 4328 b5513066.exe 4328 b5513066.exe 4328 b5513066.exe 4328 b5513066.exe 4328 b5513066.exe 4328 b5513066.exe 4328 b5513066.exe 4328 b5513066.exe 4328 b5513066.exe 4328 b5513066.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
a1167496.exeb5513066.exedescription pid process Token: SeDebugPrivilege 1292 a1167496.exe Token: SeDebugPrivilege 4328 b5513066.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
25f9fa0c0bda7ec46c931caa308cea1abf8220ef7bb46f7ec576a7a964ff36ad.exev3010864.exev5627664.exedescription pid process target process PID 1884 wrote to memory of 2152 1884 25f9fa0c0bda7ec46c931caa308cea1abf8220ef7bb46f7ec576a7a964ff36ad.exe v3010864.exe PID 1884 wrote to memory of 2152 1884 25f9fa0c0bda7ec46c931caa308cea1abf8220ef7bb46f7ec576a7a964ff36ad.exe v3010864.exe PID 1884 wrote to memory of 2152 1884 25f9fa0c0bda7ec46c931caa308cea1abf8220ef7bb46f7ec576a7a964ff36ad.exe v3010864.exe PID 2152 wrote to memory of 5000 2152 v3010864.exe v5627664.exe PID 2152 wrote to memory of 5000 2152 v3010864.exe v5627664.exe PID 2152 wrote to memory of 5000 2152 v3010864.exe v5627664.exe PID 5000 wrote to memory of 1292 5000 v5627664.exe a1167496.exe PID 5000 wrote to memory of 1292 5000 v5627664.exe a1167496.exe PID 5000 wrote to memory of 4328 5000 v5627664.exe b5513066.exe PID 5000 wrote to memory of 4328 5000 v5627664.exe b5513066.exe PID 5000 wrote to memory of 4328 5000 v5627664.exe b5513066.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\25f9fa0c0bda7ec46c931caa308cea1abf8220ef7bb46f7ec576a7a964ff36ad.exe"C:\Users\Admin\AppData\Local\Temp\25f9fa0c0bda7ec46c931caa308cea1abf8220ef7bb46f7ec576a7a964ff36ad.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3010864.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3010864.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5627664.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5627664.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a1167496.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a1167496.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5513066.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5513066.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4328
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD523b56bb712a6e79004c0169340c22765
SHA1b3f96a45f5c3850f053e0865fa05699c8767c6a0
SHA256b5e05bf31b8e092421087fbe68d303a398044699e9c9f4642c4e2817ded14cdc
SHA51225325e9c683413d26f6cf5372eeb67e5bba0630f8364b529519ae02b3a6872adca49eaff3bd943648e0ea7430d9396c7ab3f3fbd7ed08ef98d377bcd6155615d
-
Filesize
377KB
MD523b56bb712a6e79004c0169340c22765
SHA1b3f96a45f5c3850f053e0865fa05699c8767c6a0
SHA256b5e05bf31b8e092421087fbe68d303a398044699e9c9f4642c4e2817ded14cdc
SHA51225325e9c683413d26f6cf5372eeb67e5bba0630f8364b529519ae02b3a6872adca49eaff3bd943648e0ea7430d9396c7ab3f3fbd7ed08ef98d377bcd6155615d
-
Filesize
206KB
MD53f200b50a57cd5a666c34c4fcd81bd23
SHA1135e530834751818ffc304dcfdc42b0d90fd6b3a
SHA2560932c2531483576fb58ab16d27e1720e3cf3b3ddf8bc773700381c0deb3df321
SHA512904418a4b1c6686e6cc08ec5db557b202303e257220b95a5849988eda11410b3b76bf0bf60ce37d1a18d3e2fcd9d94230310f52ab0c4a71e4479f80be79e56fd
-
Filesize
206KB
MD53f200b50a57cd5a666c34c4fcd81bd23
SHA1135e530834751818ffc304dcfdc42b0d90fd6b3a
SHA2560932c2531483576fb58ab16d27e1720e3cf3b3ddf8bc773700381c0deb3df321
SHA512904418a4b1c6686e6cc08ec5db557b202303e257220b95a5849988eda11410b3b76bf0bf60ce37d1a18d3e2fcd9d94230310f52ab0c4a71e4479f80be79e56fd
-
Filesize
11KB
MD5f1d69ae29322e0d720f2bdd18edd4d01
SHA12d829e412ca2eb5da7a48959bc71bda958d03974
SHA25663eb6de577bd7e2fec5d194fe8baef5dca4ab3acedd14456481ff5230c83be2a
SHA5122a0556d937c005050a5193b3d2658313416abc35acf506946477aaa1f0f801bb177637c2762e4773fd84d7b339d4a60f7eef808637b06826b88c33a82791a735
-
Filesize
11KB
MD5f1d69ae29322e0d720f2bdd18edd4d01
SHA12d829e412ca2eb5da7a48959bc71bda958d03974
SHA25663eb6de577bd7e2fec5d194fe8baef5dca4ab3acedd14456481ff5230c83be2a
SHA5122a0556d937c005050a5193b3d2658313416abc35acf506946477aaa1f0f801bb177637c2762e4773fd84d7b339d4a60f7eef808637b06826b88c33a82791a735
-
Filesize
172KB
MD531b096a9581d561b7364e5972dec1de0
SHA162501cddbe5651db938ff49eedebb0876c730cfe
SHA2564934f0f9d3c3b4d80e76df184e85b583ace9465d6d980effe52161f5ee8bacec
SHA512ebd9fc6890c0110f6a04f3e4f725587ed5903defb4c5235a94b8adfbe20d2c36d4e9e428b03924403173512314ed6b037e1e38ff2c408403b533b7b46a0c599b
-
Filesize
172KB
MD531b096a9581d561b7364e5972dec1de0
SHA162501cddbe5651db938ff49eedebb0876c730cfe
SHA2564934f0f9d3c3b4d80e76df184e85b583ace9465d6d980effe52161f5ee8bacec
SHA512ebd9fc6890c0110f6a04f3e4f725587ed5903defb4c5235a94b8adfbe20d2c36d4e9e428b03924403173512314ed6b037e1e38ff2c408403b533b7b46a0c599b