Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
05-06-2023 01:49
Static task
static1
Behavioral task
behavioral1
Sample
977b2eb0222cd54da6a56abc17715838759486391dde8ac85c5bcc368f6dd635.exe
Resource
win10v2004-20230221-en
General
-
Target
977b2eb0222cd54da6a56abc17715838759486391dde8ac85c5bcc368f6dd635.exe
-
Size
580KB
-
MD5
452489a1150425131ed17dbfe2c0ca39
-
SHA1
fb7023bb777ec8971e4f2de371d574beceda87ba
-
SHA256
977b2eb0222cd54da6a56abc17715838759486391dde8ac85c5bcc368f6dd635
-
SHA512
16912a8046fd41dd501e604f19bd4b6e0341787aafff3aac324d34e9c6d3e33b403a38edb49d631747ac7008041d466a8cc3ab2a23359bf8e4353e983adfa0d5
-
SSDEEP
12288:SMrYy90+xeBwhCxCVeshK4WaJkgqJ1OW8S+XoPspUx8a/:+yneBmbEgqyHSg0EUx8a/
Malware Config
Extracted
redline
diza
83.97.73.126:19046
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection k7702934.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k7702934.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k7702934.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k7702934.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k7702934.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k7702934.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 1948 y1139040.exe 4604 y1205878.exe 4668 k7702934.exe 4216 l9010273.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" k7702934.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 977b2eb0222cd54da6a56abc17715838759486391dde8ac85c5bcc368f6dd635.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 977b2eb0222cd54da6a56abc17715838759486391dde8ac85c5bcc368f6dd635.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y1139040.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y1139040.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y1205878.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y1205878.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 4668 k7702934.exe 4668 k7702934.exe 4216 l9010273.exe 4216 l9010273.exe 4216 l9010273.exe 4216 l9010273.exe 4216 l9010273.exe 4216 l9010273.exe 4216 l9010273.exe 4216 l9010273.exe 4216 l9010273.exe 4216 l9010273.exe 4216 l9010273.exe 4216 l9010273.exe 4216 l9010273.exe 4216 l9010273.exe 4216 l9010273.exe 4216 l9010273.exe 4216 l9010273.exe 4216 l9010273.exe 4216 l9010273.exe 4216 l9010273.exe 4216 l9010273.exe 4216 l9010273.exe 4216 l9010273.exe 4216 l9010273.exe 4216 l9010273.exe 4216 l9010273.exe 4216 l9010273.exe 4216 l9010273.exe 4216 l9010273.exe 4216 l9010273.exe 4216 l9010273.exe 4216 l9010273.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4668 k7702934.exe Token: SeDebugPrivilege 4216 l9010273.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1188 wrote to memory of 1948 1188 977b2eb0222cd54da6a56abc17715838759486391dde8ac85c5bcc368f6dd635.exe 82 PID 1188 wrote to memory of 1948 1188 977b2eb0222cd54da6a56abc17715838759486391dde8ac85c5bcc368f6dd635.exe 82 PID 1188 wrote to memory of 1948 1188 977b2eb0222cd54da6a56abc17715838759486391dde8ac85c5bcc368f6dd635.exe 82 PID 1948 wrote to memory of 4604 1948 y1139040.exe 83 PID 1948 wrote to memory of 4604 1948 y1139040.exe 83 PID 1948 wrote to memory of 4604 1948 y1139040.exe 83 PID 4604 wrote to memory of 4668 4604 y1205878.exe 84 PID 4604 wrote to memory of 4668 4604 y1205878.exe 84 PID 4604 wrote to memory of 4216 4604 y1205878.exe 85 PID 4604 wrote to memory of 4216 4604 y1205878.exe 85 PID 4604 wrote to memory of 4216 4604 y1205878.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\977b2eb0222cd54da6a56abc17715838759486391dde8ac85c5bcc368f6dd635.exe"C:\Users\Admin\AppData\Local\Temp\977b2eb0222cd54da6a56abc17715838759486391dde8ac85c5bcc368f6dd635.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1139040.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1139040.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y1205878.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y1205878.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k7702934.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k7702934.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4668
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l9010273.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l9010273.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4216
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD57a4834acda15293bab3ef3c97d14a4a3
SHA12247528246dc05a1ec0a800377272aa457be47d5
SHA2560700167b79e7febf337249992af289fc89cdf8ca0ffd6cc994efa9327fb7687b
SHA512fd2ac5125b0c9de498385fa45b696ad4fae0cf0b473ed2b90d77b4442ccfcc521ad8f766ad7662d6dc653158c4f34953b0f2a20e7be9380425cd2c8010d6c832
-
Filesize
377KB
MD57a4834acda15293bab3ef3c97d14a4a3
SHA12247528246dc05a1ec0a800377272aa457be47d5
SHA2560700167b79e7febf337249992af289fc89cdf8ca0ffd6cc994efa9327fb7687b
SHA512fd2ac5125b0c9de498385fa45b696ad4fae0cf0b473ed2b90d77b4442ccfcc521ad8f766ad7662d6dc653158c4f34953b0f2a20e7be9380425cd2c8010d6c832
-
Filesize
206KB
MD5d335b9ea65d541899c5c858ab3ff0875
SHA19511b6daac68b9186d44d0323426448996ed1e01
SHA256f5e55fa136144a8f47da30d97d537c3dcc80997c8c2555d90cafcfc75ecde2fc
SHA5124a4f8d111f881e0dd23b55386095f14139561002dc5efc6848f2ba69c0d6189bda1890ab58f3020a882185813cd7769c3e951fdc5878fd9acaff032c7b3ae023
-
Filesize
206KB
MD5d335b9ea65d541899c5c858ab3ff0875
SHA19511b6daac68b9186d44d0323426448996ed1e01
SHA256f5e55fa136144a8f47da30d97d537c3dcc80997c8c2555d90cafcfc75ecde2fc
SHA5124a4f8d111f881e0dd23b55386095f14139561002dc5efc6848f2ba69c0d6189bda1890ab58f3020a882185813cd7769c3e951fdc5878fd9acaff032c7b3ae023
-
Filesize
11KB
MD52242a73e5d03dca57c8136edd90d2de1
SHA1a893a84a8048e464ad5dd78e62be9e4eac326aca
SHA256f55f37a6b45247381b7bd4f7629bd396d1ea86a919fc9a5e7866dc56921cb2d2
SHA51239e2eb06b62f81fc6287a1fa3bdcf3ec34bf5a1eb6e383956db43c28772dd8c281794668a5aaa7ae97c8adb81fc7f174f5676429cd8eeb1957a9ba4d9b454ef0
-
Filesize
11KB
MD52242a73e5d03dca57c8136edd90d2de1
SHA1a893a84a8048e464ad5dd78e62be9e4eac326aca
SHA256f55f37a6b45247381b7bd4f7629bd396d1ea86a919fc9a5e7866dc56921cb2d2
SHA51239e2eb06b62f81fc6287a1fa3bdcf3ec34bf5a1eb6e383956db43c28772dd8c281794668a5aaa7ae97c8adb81fc7f174f5676429cd8eeb1957a9ba4d9b454ef0
-
Filesize
172KB
MD53b91e8875fcd67904171b193cceef2ba
SHA1b420e12ad52565b5e49599afc9359ad7c86956be
SHA2565172d5e59066531bbb20e7bd398e01670d3e66a90a297bd362ab1d5753a869a3
SHA51277998e2832a20b3187bcbded55437c3f704fcbcb4dd6afebe0adf133d81a7d71d90e25e7ea0469a7ba14defa7e8ac7b4d7c53a2942360f5480ae1a6687afc2dd
-
Filesize
172KB
MD53b91e8875fcd67904171b193cceef2ba
SHA1b420e12ad52565b5e49599afc9359ad7c86956be
SHA2565172d5e59066531bbb20e7bd398e01670d3e66a90a297bd362ab1d5753a869a3
SHA51277998e2832a20b3187bcbded55437c3f704fcbcb4dd6afebe0adf133d81a7d71d90e25e7ea0469a7ba14defa7e8ac7b4d7c53a2942360f5480ae1a6687afc2dd