Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
05-06-2023 04:07
Static task
static1
Behavioral task
behavioral1
Sample
601e2537f321ce891dfc3cbe45ce6c96d0d7208a5bd6f96e8f02be748feb203d.exe
Resource
win10-20230220-en
General
-
Target
601e2537f321ce891dfc3cbe45ce6c96d0d7208a5bd6f96e8f02be748feb203d.exe
-
Size
580KB
-
MD5
199e955416728e56ec9cb5de1a9c021e
-
SHA1
c5704cac5d66b79fee22be3c1d6955274612e7b8
-
SHA256
601e2537f321ce891dfc3cbe45ce6c96d0d7208a5bd6f96e8f02be748feb203d
-
SHA512
c7b23f07caf20b8227291752dd7562dcdc88c3c6f9d39432af1fa0bd3fb2afced407552a764f22f58a832a8510c4f89197e3f1f50cb4b1585681f7ac8ef2732d
-
SSDEEP
12288:YMrJy90h0lWTSZkmNshyUHvfXllHmNwRXsb+t:hyPWTrUCfXEwOa
Malware Config
Extracted
redline
maxi
83.97.73.126:19046
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Signatures
-
Processes:
a4905426.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a4905426.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a4905426.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a4905426.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a4905426.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a4905426.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
Processes:
v1241781.exev3800398.exea4905426.exeb4760783.exepid process 3968 v1241781.exe 4912 v3800398.exe 2064 a4905426.exe 4304 b4760783.exe -
Processes:
a4905426.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a4905426.exe -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
601e2537f321ce891dfc3cbe45ce6c96d0d7208a5bd6f96e8f02be748feb203d.exev1241781.exev3800398.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 601e2537f321ce891dfc3cbe45ce6c96d0d7208a5bd6f96e8f02be748feb203d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 601e2537f321ce891dfc3cbe45ce6c96d0d7208a5bd6f96e8f02be748feb203d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v1241781.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v1241781.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v3800398.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v3800398.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
a4905426.exepid process 2064 a4905426.exe 2064 a4905426.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
a4905426.exedescription pid process Token: SeDebugPrivilege 2064 a4905426.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
601e2537f321ce891dfc3cbe45ce6c96d0d7208a5bd6f96e8f02be748feb203d.exev1241781.exev3800398.exedescription pid process target process PID 1608 wrote to memory of 3968 1608 601e2537f321ce891dfc3cbe45ce6c96d0d7208a5bd6f96e8f02be748feb203d.exe v1241781.exe PID 1608 wrote to memory of 3968 1608 601e2537f321ce891dfc3cbe45ce6c96d0d7208a5bd6f96e8f02be748feb203d.exe v1241781.exe PID 1608 wrote to memory of 3968 1608 601e2537f321ce891dfc3cbe45ce6c96d0d7208a5bd6f96e8f02be748feb203d.exe v1241781.exe PID 3968 wrote to memory of 4912 3968 v1241781.exe v3800398.exe PID 3968 wrote to memory of 4912 3968 v1241781.exe v3800398.exe PID 3968 wrote to memory of 4912 3968 v1241781.exe v3800398.exe PID 4912 wrote to memory of 2064 4912 v3800398.exe a4905426.exe PID 4912 wrote to memory of 2064 4912 v3800398.exe a4905426.exe PID 4912 wrote to memory of 4304 4912 v3800398.exe b4760783.exe PID 4912 wrote to memory of 4304 4912 v3800398.exe b4760783.exe PID 4912 wrote to memory of 4304 4912 v3800398.exe b4760783.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\601e2537f321ce891dfc3cbe45ce6c96d0d7208a5bd6f96e8f02be748feb203d.exe"C:\Users\Admin\AppData\Local\Temp\601e2537f321ce891dfc3cbe45ce6c96d0d7208a5bd6f96e8f02be748feb203d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1241781.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1241781.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3800398.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3800398.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4905426.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4905426.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4760783.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4760783.exe4⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1241781.exeFilesize
377KB
MD55ebb2a95f3f2c672095cc9bb039ca15a
SHA1746d8bc131c89a699f5b7357f169b0e1eec0e27b
SHA2565e2c58f47f9644136281dc475bb948f9d1c024efcc080ad77a96c2fb39e0ad26
SHA5120499c04f2efdd207604190fe912f208b5938ec83589cb2a308fedce1dc8bba4f447d12d031bd5bb56d7cdd0bcf74ac4f28ea4454ed466cbee44d346e65674115
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1241781.exeFilesize
377KB
MD55ebb2a95f3f2c672095cc9bb039ca15a
SHA1746d8bc131c89a699f5b7357f169b0e1eec0e27b
SHA2565e2c58f47f9644136281dc475bb948f9d1c024efcc080ad77a96c2fb39e0ad26
SHA5120499c04f2efdd207604190fe912f208b5938ec83589cb2a308fedce1dc8bba4f447d12d031bd5bb56d7cdd0bcf74ac4f28ea4454ed466cbee44d346e65674115
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3800398.exeFilesize
206KB
MD5d784438018cfd5132c04ca2c77048883
SHA198c1cafeaa0682fcd55330e434038a16b0454741
SHA25619cba917ce83844be77bd2d01d5deb6db3461f0052d2cc6df24c48cda29bcf2d
SHA512684b4b4a46a4ba8ed5b0adfca5fffa2e2917d290184441f5233f8bfc234b22fbecd5ef89d98d6a226f1cff03608eeeae90011a82b0c1a8ffd4f87305b2377729
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3800398.exeFilesize
206KB
MD5d784438018cfd5132c04ca2c77048883
SHA198c1cafeaa0682fcd55330e434038a16b0454741
SHA25619cba917ce83844be77bd2d01d5deb6db3461f0052d2cc6df24c48cda29bcf2d
SHA512684b4b4a46a4ba8ed5b0adfca5fffa2e2917d290184441f5233f8bfc234b22fbecd5ef89d98d6a226f1cff03608eeeae90011a82b0c1a8ffd4f87305b2377729
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4905426.exeFilesize
11KB
MD55fc8b85e5a5a9a8497bb482ad785b940
SHA1092c83d3fbc4f83b6eac6e885e7b36110fd47264
SHA256f6bf6a82e616259c39ce9fe477155fccca0bd0e482b23467d7a334f02e79e10d
SHA51213e09d6ae8ec2263d812bf83a74f891bed88453952b727b51bef2d4a07c2cda752c4f7ba9bee4fe6443f4603ddfd04d294fc6d09867ceae31d4ac4fc52fa81cb
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4905426.exeFilesize
11KB
MD55fc8b85e5a5a9a8497bb482ad785b940
SHA1092c83d3fbc4f83b6eac6e885e7b36110fd47264
SHA256f6bf6a82e616259c39ce9fe477155fccca0bd0e482b23467d7a334f02e79e10d
SHA51213e09d6ae8ec2263d812bf83a74f891bed88453952b727b51bef2d4a07c2cda752c4f7ba9bee4fe6443f4603ddfd04d294fc6d09867ceae31d4ac4fc52fa81cb
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4760783.exeFilesize
172KB
MD58d6b81cb0e4eaca3d3b33e0e672a57d6
SHA1e31f4182de6718da963aaf2bce2417bb70e04815
SHA25643209a7e1f0317ffc0642a1f2b474f03d023f20e38a1cf1cfe9059cf5be0f2e8
SHA5120d9ebc854207edbe6c03b2026d9a7aa661d45d381dcadb52871b796089ab6b69e98cfa87530696054c76a5191a9955513ea62a212b223699b21cb56be484273e
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4760783.exeFilesize
172KB
MD58d6b81cb0e4eaca3d3b33e0e672a57d6
SHA1e31f4182de6718da963aaf2bce2417bb70e04815
SHA25643209a7e1f0317ffc0642a1f2b474f03d023f20e38a1cf1cfe9059cf5be0f2e8
SHA5120d9ebc854207edbe6c03b2026d9a7aa661d45d381dcadb52871b796089ab6b69e98cfa87530696054c76a5191a9955513ea62a212b223699b21cb56be484273e
-
memory/2064-141-0x0000000000350000-0x000000000035A000-memory.dmpFilesize
40KB
-
memory/4304-146-0x0000000000460000-0x0000000000490000-memory.dmpFilesize
192KB
-
memory/4304-147-0x0000000000BD0000-0x0000000000BD6000-memory.dmpFilesize
24KB
-
memory/4304-148-0x0000000005510000-0x0000000005B16000-memory.dmpFilesize
6.0MB
-
memory/4304-149-0x0000000005010000-0x000000000511A000-memory.dmpFilesize
1.0MB
-
memory/4304-150-0x0000000004CB0000-0x0000000004CC2000-memory.dmpFilesize
72KB
-
memory/4304-151-0x0000000004CF0000-0x0000000004D00000-memory.dmpFilesize
64KB
-
memory/4304-152-0x0000000004F00000-0x0000000004F3E000-memory.dmpFilesize
248KB
-
memory/4304-153-0x0000000004F40000-0x0000000004F8B000-memory.dmpFilesize
300KB
-
memory/4304-154-0x0000000004CF0000-0x0000000004D00000-memory.dmpFilesize
64KB