Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
05-06-2023 01:23
Static task
static1
Behavioral task
behavioral1
Sample
5dffc7254a3daeec3b53cd052ce09422f89b2b2b96d42ed83441fd63750b74be.exe
Resource
win10-20230220-en
General
-
Target
5dffc7254a3daeec3b53cd052ce09422f89b2b2b96d42ed83441fd63750b74be.exe
-
Size
581KB
-
MD5
4e284b1257451e69eeec6a0f70199f60
-
SHA1
a1dde698c9cbaf62057dc5db558d1cc851b1201e
-
SHA256
5dffc7254a3daeec3b53cd052ce09422f89b2b2b96d42ed83441fd63750b74be
-
SHA512
74dd32faebae44f5632d00da15aedcf9e65c7c40ba2f0c7f3fb9a18d30b83b8f18260a58e17943b1f58bc5177ddebcd6e32d76a4d93881d4075c5648723b081d
-
SSDEEP
12288:fMrFy90MhQtPwx7D8WiL5TNGJYpthp6Bo5IXUcn:OyctoFD8dZrCo5IXUS
Malware Config
Extracted
redline
maxi
83.97.73.126:19046
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Signatures
-
Processes:
a5387004.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a5387004.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a5387004.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a5387004.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a5387004.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a5387004.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
Processes:
v6362982.exev0929784.exea5387004.exeb3202068.exepid process 2504 v6362982.exe 2896 v0929784.exe 4248 a5387004.exe 4988 b3202068.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
a5387004.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a5387004.exe -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
v6362982.exev0929784.exe5dffc7254a3daeec3b53cd052ce09422f89b2b2b96d42ed83441fd63750b74be.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v6362982.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v6362982.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v0929784.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v0929784.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5dffc7254a3daeec3b53cd052ce09422f89b2b2b96d42ed83441fd63750b74be.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5dffc7254a3daeec3b53cd052ce09422f89b2b2b96d42ed83441fd63750b74be.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 30 IoCs
Processes:
a5387004.exeb3202068.exepid process 4248 a5387004.exe 4248 a5387004.exe 4988 b3202068.exe 4988 b3202068.exe 4988 b3202068.exe 4988 b3202068.exe 4988 b3202068.exe 4988 b3202068.exe 4988 b3202068.exe 4988 b3202068.exe 4988 b3202068.exe 4988 b3202068.exe 4988 b3202068.exe 4988 b3202068.exe 4988 b3202068.exe 4988 b3202068.exe 4988 b3202068.exe 4988 b3202068.exe 4988 b3202068.exe 4988 b3202068.exe 4988 b3202068.exe 4988 b3202068.exe 4988 b3202068.exe 4988 b3202068.exe 4988 b3202068.exe 4988 b3202068.exe 4988 b3202068.exe 4988 b3202068.exe 4988 b3202068.exe 4988 b3202068.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
a5387004.exeb3202068.exedescription pid process Token: SeDebugPrivilege 4248 a5387004.exe Token: SeDebugPrivilege 4988 b3202068.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
5dffc7254a3daeec3b53cd052ce09422f89b2b2b96d42ed83441fd63750b74be.exev6362982.exev0929784.exedescription pid process target process PID 2276 wrote to memory of 2504 2276 5dffc7254a3daeec3b53cd052ce09422f89b2b2b96d42ed83441fd63750b74be.exe v6362982.exe PID 2276 wrote to memory of 2504 2276 5dffc7254a3daeec3b53cd052ce09422f89b2b2b96d42ed83441fd63750b74be.exe v6362982.exe PID 2276 wrote to memory of 2504 2276 5dffc7254a3daeec3b53cd052ce09422f89b2b2b96d42ed83441fd63750b74be.exe v6362982.exe PID 2504 wrote to memory of 2896 2504 v6362982.exe v0929784.exe PID 2504 wrote to memory of 2896 2504 v6362982.exe v0929784.exe PID 2504 wrote to memory of 2896 2504 v6362982.exe v0929784.exe PID 2896 wrote to memory of 4248 2896 v0929784.exe a5387004.exe PID 2896 wrote to memory of 4248 2896 v0929784.exe a5387004.exe PID 2896 wrote to memory of 4988 2896 v0929784.exe b3202068.exe PID 2896 wrote to memory of 4988 2896 v0929784.exe b3202068.exe PID 2896 wrote to memory of 4988 2896 v0929784.exe b3202068.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5dffc7254a3daeec3b53cd052ce09422f89b2b2b96d42ed83441fd63750b74be.exe"C:\Users\Admin\AppData\Local\Temp\5dffc7254a3daeec3b53cd052ce09422f89b2b2b96d42ed83441fd63750b74be.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6362982.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6362982.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0929784.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0929784.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a5387004.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a5387004.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3202068.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3202068.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4988
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD559c8a3351885c154b9eb61b551300fc9
SHA14c66eea50df647d8e0fdd942a5106f196fd1d24c
SHA2561c3ba1a41a51a9f995d018c30a7708b14cc97e02ecd204967ef7056fa0c798db
SHA512cee3cadd4b763662eb74bea2e73df295bbd99242fdc1098350f789a134d1f9cd32336809a58c53f25be5c8efa064822f020e0be277e7445d7e0581b86419dc64
-
Filesize
377KB
MD559c8a3351885c154b9eb61b551300fc9
SHA14c66eea50df647d8e0fdd942a5106f196fd1d24c
SHA2561c3ba1a41a51a9f995d018c30a7708b14cc97e02ecd204967ef7056fa0c798db
SHA512cee3cadd4b763662eb74bea2e73df295bbd99242fdc1098350f789a134d1f9cd32336809a58c53f25be5c8efa064822f020e0be277e7445d7e0581b86419dc64
-
Filesize
206KB
MD5aa48ed0be159d9e40f5137ddb4cb6ea1
SHA12b5036c62f158bcc6f27fbf6bdff2d5364cd75d5
SHA2569627596933e2e8f18d87303635f6d4b4e62c0f9d93d5d61c87ad5e4d112f4460
SHA512af12887859b3e1777bea067697903dadb90965efcc5c9ad0e940111c0cd76a2315dfea063fcd6615116b6d1c58ef5d97ca5623b8fd416e7e7b9b28a68d308754
-
Filesize
206KB
MD5aa48ed0be159d9e40f5137ddb4cb6ea1
SHA12b5036c62f158bcc6f27fbf6bdff2d5364cd75d5
SHA2569627596933e2e8f18d87303635f6d4b4e62c0f9d93d5d61c87ad5e4d112f4460
SHA512af12887859b3e1777bea067697903dadb90965efcc5c9ad0e940111c0cd76a2315dfea063fcd6615116b6d1c58ef5d97ca5623b8fd416e7e7b9b28a68d308754
-
Filesize
11KB
MD54c4ef888cc493f9e92c1d330b01bcff6
SHA1ca17575cd69197ab39e875c1e7a2eb72fc25f8ba
SHA25619985d10279bee2bb04bda3bc3f6c37ab8c3ab66df4adff597aaff60debd7348
SHA512ef90cf20c7e5900a551db04f28507501256c19c1cb3e23c08de9e93d4bc874c40b9792012d6570fbc16fe4dc39694a32ac1094926b9e33c4ec96a1cb3dfe788d
-
Filesize
11KB
MD54c4ef888cc493f9e92c1d330b01bcff6
SHA1ca17575cd69197ab39e875c1e7a2eb72fc25f8ba
SHA25619985d10279bee2bb04bda3bc3f6c37ab8c3ab66df4adff597aaff60debd7348
SHA512ef90cf20c7e5900a551db04f28507501256c19c1cb3e23c08de9e93d4bc874c40b9792012d6570fbc16fe4dc39694a32ac1094926b9e33c4ec96a1cb3dfe788d
-
Filesize
172KB
MD5d4c833a252a1bcd102b86907be9a8af3
SHA14e1b3c5de967e4bb50c313a7fb0c18411e1dab74
SHA256f952db86d909c66ec4850a145d58a8173c529d2f60c8ba00d087862ab9ad2d83
SHA512781543b47d645bcc65f220ce183b01355ff10781b4e7a91941e5c2124b62fe27b83f0f88ecc32125f70706bcc8787040d062e588c30878e6322b976fba1080e5
-
Filesize
172KB
MD5d4c833a252a1bcd102b86907be9a8af3
SHA14e1b3c5de967e4bb50c313a7fb0c18411e1dab74
SHA256f952db86d909c66ec4850a145d58a8173c529d2f60c8ba00d087862ab9ad2d83
SHA512781543b47d645bcc65f220ce183b01355ff10781b4e7a91941e5c2124b62fe27b83f0f88ecc32125f70706bcc8787040d062e588c30878e6322b976fba1080e5