Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-06-2023 01:00
Static task
static1
Behavioral task
behavioral1
Sample
5e69dbb4f7aa15117e6527a0e69de7a94bfc1cea590a401ff734fc34a5711538.exe
Resource
win10v2004-20230220-en
General
-
Target
5e69dbb4f7aa15117e6527a0e69de7a94bfc1cea590a401ff734fc34a5711538.exe
-
Size
581KB
-
MD5
662c5ac0edba1723ab0501f081652345
-
SHA1
bcf288f72548d6fe6f19c43a230892201f2ca298
-
SHA256
5e69dbb4f7aa15117e6527a0e69de7a94bfc1cea590a401ff734fc34a5711538
-
SHA512
8cec945266747a7dfe63d03568581105fe8aa468911c4daf7aeea679d7b31460c08aac1951894d74e4d30b58256b561fe638d5d1f398feaf01ba288adfd51edb
-
SSDEEP
12288:lMrQy90BtAavUoCPEtfY91OYgQz1aAmbip4:FyUfvvtw9EQz1fmGp4
Malware Config
Extracted
redline
maxi
83.97.73.126:19046
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Signatures
-
Processes:
a2441698.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a2441698.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a2441698.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a2441698.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a2441698.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a2441698.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a2441698.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
Processes:
v3580945.exev4852591.exea2441698.exeb1831578.exepid process 3164 v3580945.exe 4980 v4852591.exe 1660 a2441698.exe 3820 b1831578.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
a2441698.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a2441698.exe -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
5e69dbb4f7aa15117e6527a0e69de7a94bfc1cea590a401ff734fc34a5711538.exev3580945.exev4852591.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5e69dbb4f7aa15117e6527a0e69de7a94bfc1cea590a401ff734fc34a5711538.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5e69dbb4f7aa15117e6527a0e69de7a94bfc1cea590a401ff734fc34a5711538.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v3580945.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v3580945.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v4852591.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v4852591.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 28 IoCs
Processes:
a2441698.exeb1831578.exepid process 1660 a2441698.exe 1660 a2441698.exe 3820 b1831578.exe 3820 b1831578.exe 3820 b1831578.exe 3820 b1831578.exe 3820 b1831578.exe 3820 b1831578.exe 3820 b1831578.exe 3820 b1831578.exe 3820 b1831578.exe 3820 b1831578.exe 3820 b1831578.exe 3820 b1831578.exe 3820 b1831578.exe 3820 b1831578.exe 3820 b1831578.exe 3820 b1831578.exe 3820 b1831578.exe 3820 b1831578.exe 3820 b1831578.exe 3820 b1831578.exe 3820 b1831578.exe 3820 b1831578.exe 3820 b1831578.exe 3820 b1831578.exe 3820 b1831578.exe 3820 b1831578.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
a2441698.exeb1831578.exedescription pid process Token: SeDebugPrivilege 1660 a2441698.exe Token: SeDebugPrivilege 3820 b1831578.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
5e69dbb4f7aa15117e6527a0e69de7a94bfc1cea590a401ff734fc34a5711538.exev3580945.exev4852591.exedescription pid process target process PID 4120 wrote to memory of 3164 4120 5e69dbb4f7aa15117e6527a0e69de7a94bfc1cea590a401ff734fc34a5711538.exe v3580945.exe PID 4120 wrote to memory of 3164 4120 5e69dbb4f7aa15117e6527a0e69de7a94bfc1cea590a401ff734fc34a5711538.exe v3580945.exe PID 4120 wrote to memory of 3164 4120 5e69dbb4f7aa15117e6527a0e69de7a94bfc1cea590a401ff734fc34a5711538.exe v3580945.exe PID 3164 wrote to memory of 4980 3164 v3580945.exe v4852591.exe PID 3164 wrote to memory of 4980 3164 v3580945.exe v4852591.exe PID 3164 wrote to memory of 4980 3164 v3580945.exe v4852591.exe PID 4980 wrote to memory of 1660 4980 v4852591.exe a2441698.exe PID 4980 wrote to memory of 1660 4980 v4852591.exe a2441698.exe PID 4980 wrote to memory of 3820 4980 v4852591.exe b1831578.exe PID 4980 wrote to memory of 3820 4980 v4852591.exe b1831578.exe PID 4980 wrote to memory of 3820 4980 v4852591.exe b1831578.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e69dbb4f7aa15117e6527a0e69de7a94bfc1cea590a401ff734fc34a5711538.exe"C:\Users\Admin\AppData\Local\Temp\5e69dbb4f7aa15117e6527a0e69de7a94bfc1cea590a401ff734fc34a5711538.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3580945.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3580945.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4852591.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4852591.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a2441698.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a2441698.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1831578.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1831578.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3580945.exeFilesize
377KB
MD5b616183e02752c96b23d8da4d8e41d80
SHA1a710a33035626e666fc310c4efb8106d62d5d9d4
SHA256cba6a3f67eac2479d63b537f2dfeca0b5d18af621afa5110ca38b548bce94b81
SHA5125b74caa221aa1ecb14b5b2c2530f0f4be90030d95ded8e1f23eca0a79461505e7b13d5969ebf6904e478ad0618e28e9f9ae78062e19396e1f2e47130da5d4714
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3580945.exeFilesize
377KB
MD5b616183e02752c96b23d8da4d8e41d80
SHA1a710a33035626e666fc310c4efb8106d62d5d9d4
SHA256cba6a3f67eac2479d63b537f2dfeca0b5d18af621afa5110ca38b548bce94b81
SHA5125b74caa221aa1ecb14b5b2c2530f0f4be90030d95ded8e1f23eca0a79461505e7b13d5969ebf6904e478ad0618e28e9f9ae78062e19396e1f2e47130da5d4714
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4852591.exeFilesize
206KB
MD53e889d6c69272ed176523988aa78b620
SHA1242ff8af5a84cc185c225b5dcf14a989b136359a
SHA25626960f1cfc23cef6b26a6b6756da6ba0a20ac743bd434fe44dc4329de760ce72
SHA512dbe9fba24ec20ccce7b2d6d888f11cbc6b39559809a399159a89d8cffb3bb17e7d39806915549fb5bacb92df863030f3ad0f851f4082aea3bd321443ab10f35b
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4852591.exeFilesize
206KB
MD53e889d6c69272ed176523988aa78b620
SHA1242ff8af5a84cc185c225b5dcf14a989b136359a
SHA25626960f1cfc23cef6b26a6b6756da6ba0a20ac743bd434fe44dc4329de760ce72
SHA512dbe9fba24ec20ccce7b2d6d888f11cbc6b39559809a399159a89d8cffb3bb17e7d39806915549fb5bacb92df863030f3ad0f851f4082aea3bd321443ab10f35b
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a2441698.exeFilesize
11KB
MD5f3e8146d85121910da2fd1a88e617784
SHA17140831370a0f2038c5f6bd9af5babc0dd9e6c8a
SHA256884e3fb676fe3119ea691aec8ed0d39a66debe26c89c2ac810b5d31e2602353c
SHA512f9210d03beb58c41ae0b5575552c79410150e3981ea33754ded6d00cc757359df7b666646ed39fa8b037545cf215f04f722de534e904dd940f41cb1cabf68c65
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a2441698.exeFilesize
11KB
MD5f3e8146d85121910da2fd1a88e617784
SHA17140831370a0f2038c5f6bd9af5babc0dd9e6c8a
SHA256884e3fb676fe3119ea691aec8ed0d39a66debe26c89c2ac810b5d31e2602353c
SHA512f9210d03beb58c41ae0b5575552c79410150e3981ea33754ded6d00cc757359df7b666646ed39fa8b037545cf215f04f722de534e904dd940f41cb1cabf68c65
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1831578.exeFilesize
172KB
MD562c121fe524d76897ce3ebb09c84cccc
SHA1225ce469a6f35c179a3f0c1a573b6e04c4d8b0f1
SHA256e2284c3c4e70f7a7d8cc580034e2ceefe02d79facfcbb2465ae92f0195d50fb9
SHA512a208ec224551103d82a289bffd6096008623579c9fe7f593e3bb1d188109c96108b3797fc9da1f3c221521728adb540bda2da91cb349a1b18fe84a6dae626ee0
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1831578.exeFilesize
172KB
MD562c121fe524d76897ce3ebb09c84cccc
SHA1225ce469a6f35c179a3f0c1a573b6e04c4d8b0f1
SHA256e2284c3c4e70f7a7d8cc580034e2ceefe02d79facfcbb2465ae92f0195d50fb9
SHA512a208ec224551103d82a289bffd6096008623579c9fe7f593e3bb1d188109c96108b3797fc9da1f3c221521728adb540bda2da91cb349a1b18fe84a6dae626ee0
-
memory/1660-154-0x00000000007A0000-0x00000000007AA000-memory.dmpFilesize
40KB
-
memory/3820-160-0x000000000AA90000-0x000000000B0A8000-memory.dmpFilesize
6.1MB
-
memory/3820-166-0x000000000A9E0000-0x000000000AA72000-memory.dmpFilesize
584KB
-
memory/3820-161-0x000000000A610000-0x000000000A71A000-memory.dmpFilesize
1.0MB
-
memory/3820-162-0x000000000A550000-0x000000000A562000-memory.dmpFilesize
72KB
-
memory/3820-163-0x000000000A5B0000-0x000000000A5EC000-memory.dmpFilesize
240KB
-
memory/3820-164-0x0000000002A40000-0x0000000002A50000-memory.dmpFilesize
64KB
-
memory/3820-165-0x000000000A8C0000-0x000000000A936000-memory.dmpFilesize
472KB
-
memory/3820-159-0x0000000000690000-0x00000000006C0000-memory.dmpFilesize
192KB
-
memory/3820-167-0x000000000B660000-0x000000000BC04000-memory.dmpFilesize
5.6MB
-
memory/3820-168-0x000000000B220000-0x000000000B286000-memory.dmpFilesize
408KB
-
memory/3820-169-0x000000000BD10000-0x000000000BD60000-memory.dmpFilesize
320KB
-
memory/3820-170-0x000000000BF30000-0x000000000C0F2000-memory.dmpFilesize
1.8MB
-
memory/3820-171-0x000000000C630000-0x000000000CB5C000-memory.dmpFilesize
5.2MB
-
memory/3820-172-0x0000000002A40000-0x0000000002A50000-memory.dmpFilesize
64KB