Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-06-2023 01:31
Static task
static1
Behavioral task
behavioral1
Sample
8a7f8c0259749086a5f013368b9f7ace8d3699306f4beb2be248033375fd7564.exe
Resource
win10v2004-20230220-en
General
-
Target
8a7f8c0259749086a5f013368b9f7ace8d3699306f4beb2be248033375fd7564.exe
-
Size
581KB
-
MD5
72a13ece4130c5f1ceda92efad69e6e7
-
SHA1
97651bf1ac3de3e783847b8389423ad0e6ef8826
-
SHA256
8a7f8c0259749086a5f013368b9f7ace8d3699306f4beb2be248033375fd7564
-
SHA512
6bd3162418447eaff750989ba62cdc5776a723c243bbc3cf8535ebac0cee7bafb2a366f969981287270f3cd476400f93f2f8e84e45c76c17396e83f4ee336fc2
-
SSDEEP
12288:0MrFy90cBwhhljada53nOmh27bDDKkMgnk7bGLA1G1liKer:py9Bmbada53OJnDDKl57bGLA1DKer
Malware Config
Extracted
redline
maxi
83.97.73.126:19046
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Signatures
-
Processes:
a9554471.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a9554471.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a9554471.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a9554471.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a9554471.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a9554471.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a9554471.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
Processes:
v7303078.exev4820897.exea9554471.exeb0939185.exepid process 3372 v7303078.exe 4924 v4820897.exe 2988 a9554471.exe 216 b0939185.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
a9554471.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a9554471.exe -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
8a7f8c0259749086a5f013368b9f7ace8d3699306f4beb2be248033375fd7564.exev7303078.exev4820897.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 8a7f8c0259749086a5f013368b9f7ace8d3699306f4beb2be248033375fd7564.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8a7f8c0259749086a5f013368b9f7ace8d3699306f4beb2be248033375fd7564.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v7303078.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v7303078.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v4820897.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v4820897.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 34 IoCs
Processes:
a9554471.exeb0939185.exepid process 2988 a9554471.exe 2988 a9554471.exe 216 b0939185.exe 216 b0939185.exe 216 b0939185.exe 216 b0939185.exe 216 b0939185.exe 216 b0939185.exe 216 b0939185.exe 216 b0939185.exe 216 b0939185.exe 216 b0939185.exe 216 b0939185.exe 216 b0939185.exe 216 b0939185.exe 216 b0939185.exe 216 b0939185.exe 216 b0939185.exe 216 b0939185.exe 216 b0939185.exe 216 b0939185.exe 216 b0939185.exe 216 b0939185.exe 216 b0939185.exe 216 b0939185.exe 216 b0939185.exe 216 b0939185.exe 216 b0939185.exe 216 b0939185.exe 216 b0939185.exe 216 b0939185.exe 216 b0939185.exe 216 b0939185.exe 216 b0939185.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
a9554471.exeb0939185.exedescription pid process Token: SeDebugPrivilege 2988 a9554471.exe Token: SeDebugPrivilege 216 b0939185.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
8a7f8c0259749086a5f013368b9f7ace8d3699306f4beb2be248033375fd7564.exev7303078.exev4820897.exedescription pid process target process PID 4136 wrote to memory of 3372 4136 8a7f8c0259749086a5f013368b9f7ace8d3699306f4beb2be248033375fd7564.exe v7303078.exe PID 4136 wrote to memory of 3372 4136 8a7f8c0259749086a5f013368b9f7ace8d3699306f4beb2be248033375fd7564.exe v7303078.exe PID 4136 wrote to memory of 3372 4136 8a7f8c0259749086a5f013368b9f7ace8d3699306f4beb2be248033375fd7564.exe v7303078.exe PID 3372 wrote to memory of 4924 3372 v7303078.exe v4820897.exe PID 3372 wrote to memory of 4924 3372 v7303078.exe v4820897.exe PID 3372 wrote to memory of 4924 3372 v7303078.exe v4820897.exe PID 4924 wrote to memory of 2988 4924 v4820897.exe a9554471.exe PID 4924 wrote to memory of 2988 4924 v4820897.exe a9554471.exe PID 4924 wrote to memory of 216 4924 v4820897.exe b0939185.exe PID 4924 wrote to memory of 216 4924 v4820897.exe b0939185.exe PID 4924 wrote to memory of 216 4924 v4820897.exe b0939185.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a7f8c0259749086a5f013368b9f7ace8d3699306f4beb2be248033375fd7564.exe"C:\Users\Admin\AppData\Local\Temp\8a7f8c0259749086a5f013368b9f7ace8d3699306f4beb2be248033375fd7564.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7303078.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7303078.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4820897.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4820897.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a9554471.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a9554471.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b0939185.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b0939185.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:216
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD537682f48aa2136ecc4cdd59336622618
SHA1685e07cad3584dd1b0f73d74710d7f459f8c84a0
SHA2561f9263436f8de3974db2448efff328bcbd5f14c9be6df1a868cdbc4ad7b4cdf5
SHA512908a74e0d78cef9e5e83c2d6477113ce85b81b13f59f5d8cd495c056f5ad6d42e5dbd835836a4430c3ff046a54f6359b99c77c3f2bd42b9d8e37caead293a819
-
Filesize
377KB
MD537682f48aa2136ecc4cdd59336622618
SHA1685e07cad3584dd1b0f73d74710d7f459f8c84a0
SHA2561f9263436f8de3974db2448efff328bcbd5f14c9be6df1a868cdbc4ad7b4cdf5
SHA512908a74e0d78cef9e5e83c2d6477113ce85b81b13f59f5d8cd495c056f5ad6d42e5dbd835836a4430c3ff046a54f6359b99c77c3f2bd42b9d8e37caead293a819
-
Filesize
206KB
MD50e17f3e8b3f5dc0bb1fc8fbe9bbe095f
SHA10442d3a41fe6e825d97b4ee5c60642cfaefa88ef
SHA256071e4c69d2d0481a5025654de2a71744bf23f24ab2896df4dcf8d418722c1259
SHA512d6e4e217493cb771e6a33de6a1c06b5ea90ad38773a8006cb75bde2b05eee532081d30af0b646e81b3a4567b48690383fdc8e54347cb9c542e219af0a023d08a
-
Filesize
206KB
MD50e17f3e8b3f5dc0bb1fc8fbe9bbe095f
SHA10442d3a41fe6e825d97b4ee5c60642cfaefa88ef
SHA256071e4c69d2d0481a5025654de2a71744bf23f24ab2896df4dcf8d418722c1259
SHA512d6e4e217493cb771e6a33de6a1c06b5ea90ad38773a8006cb75bde2b05eee532081d30af0b646e81b3a4567b48690383fdc8e54347cb9c542e219af0a023d08a
-
Filesize
11KB
MD520548fc1b56126563d558e5f562f0c2d
SHA1f915dbec9b28f6ed736c5183407ed12638c6b26f
SHA256a79da7ff353422d672ae4844b43f54845ce25c27e00676520f7feb33a33ac9c7
SHA512ad9f5fe08947ec0db09c6019c37246227e31ae57b929c96a0822f5f85fd48f77cd849e398fc13b1c139143a06a45b24f018558f91c724bb4ac3bd6657d011ee5
-
Filesize
11KB
MD520548fc1b56126563d558e5f562f0c2d
SHA1f915dbec9b28f6ed736c5183407ed12638c6b26f
SHA256a79da7ff353422d672ae4844b43f54845ce25c27e00676520f7feb33a33ac9c7
SHA512ad9f5fe08947ec0db09c6019c37246227e31ae57b929c96a0822f5f85fd48f77cd849e398fc13b1c139143a06a45b24f018558f91c724bb4ac3bd6657d011ee5
-
Filesize
172KB
MD5fc3b2744baaf8a16d4edb0bdb2e45822
SHA1dfbe92906f7ad5a9a72fb083e506312f90c79d83
SHA256215d262d2185385684cbd681eed9be060a68c1741a0dd945edd646bb941291c1
SHA512c30c42524e79038b9e617526afb9dfe8784edf0aff6cccbc01cc94085ec7e40de659d1c37d8999a89d9ca9a61f9c45fdf3378a172ccb5824d53ba914abcda913
-
Filesize
172KB
MD5fc3b2744baaf8a16d4edb0bdb2e45822
SHA1dfbe92906f7ad5a9a72fb083e506312f90c79d83
SHA256215d262d2185385684cbd681eed9be060a68c1741a0dd945edd646bb941291c1
SHA512c30c42524e79038b9e617526afb9dfe8784edf0aff6cccbc01cc94085ec7e40de659d1c37d8999a89d9ca9a61f9c45fdf3378a172ccb5824d53ba914abcda913