Analysis
-
max time kernel
136s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-06-2023 05:23
Static task
static1
Behavioral task
behavioral1
Sample
2f574d2eea034e896b38aa19ea7192a162c353cc7c31c30e8e3ca5a1180ee68e.exe
Resource
win10v2004-20230220-en
General
-
Target
2f574d2eea034e896b38aa19ea7192a162c353cc7c31c30e8e3ca5a1180ee68e.exe
-
Size
581KB
-
MD5
fd5490265aba587f9be6ab85373f2502
-
SHA1
90e19b4452bb49c0ab21fcffdb53c5f9ea3c02d6
-
SHA256
2f574d2eea034e896b38aa19ea7192a162c353cc7c31c30e8e3ca5a1180ee68e
-
SHA512
4a39e5c322bdda69def8ba96d5024060c78f722e0d89ab279ba477b5f27b6faccadc7a19695ec5a3b0d22807afbb33fc9aa5f77794b8510da54288705d65caee
-
SSDEEP
12288:5MrXy90Qy0CBt4CgYkTq044wNn27rkxmfnhgP6OXXLw:myBy0o4wakxPP6O8
Malware Config
Extracted
redline
maxi
83.97.73.126:19046
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Signatures
-
Processes:
a4821990.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a4821990.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a4821990.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a4821990.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a4821990.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a4821990.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a4821990.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
Processes:
v9501190.exev6878159.exea4821990.exeb3074710.exepid process 4456 v9501190.exe 4292 v6878159.exe 2672 a4821990.exe 2816 b3074710.exe -
Processes:
a4821990.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a4821990.exe -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
2f574d2eea034e896b38aa19ea7192a162c353cc7c31c30e8e3ca5a1180ee68e.exev9501190.exev6878159.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2f574d2eea034e896b38aa19ea7192a162c353cc7c31c30e8e3ca5a1180ee68e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2f574d2eea034e896b38aa19ea7192a162c353cc7c31c30e8e3ca5a1180ee68e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v9501190.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v9501190.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v6878159.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v6878159.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
a4821990.exepid process 2672 a4821990.exe 2672 a4821990.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
a4821990.exedescription pid process Token: SeDebugPrivilege 2672 a4821990.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
2f574d2eea034e896b38aa19ea7192a162c353cc7c31c30e8e3ca5a1180ee68e.exev9501190.exev6878159.exedescription pid process target process PID 436 wrote to memory of 4456 436 2f574d2eea034e896b38aa19ea7192a162c353cc7c31c30e8e3ca5a1180ee68e.exe v9501190.exe PID 436 wrote to memory of 4456 436 2f574d2eea034e896b38aa19ea7192a162c353cc7c31c30e8e3ca5a1180ee68e.exe v9501190.exe PID 436 wrote to memory of 4456 436 2f574d2eea034e896b38aa19ea7192a162c353cc7c31c30e8e3ca5a1180ee68e.exe v9501190.exe PID 4456 wrote to memory of 4292 4456 v9501190.exe v6878159.exe PID 4456 wrote to memory of 4292 4456 v9501190.exe v6878159.exe PID 4456 wrote to memory of 4292 4456 v9501190.exe v6878159.exe PID 4292 wrote to memory of 2672 4292 v6878159.exe a4821990.exe PID 4292 wrote to memory of 2672 4292 v6878159.exe a4821990.exe PID 4292 wrote to memory of 2816 4292 v6878159.exe b3074710.exe PID 4292 wrote to memory of 2816 4292 v6878159.exe b3074710.exe PID 4292 wrote to memory of 2816 4292 v6878159.exe b3074710.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f574d2eea034e896b38aa19ea7192a162c353cc7c31c30e8e3ca5a1180ee68e.exe"C:\Users\Admin\AppData\Local\Temp\2f574d2eea034e896b38aa19ea7192a162c353cc7c31c30e8e3ca5a1180ee68e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9501190.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9501190.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6878159.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6878159.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4821990.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4821990.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3074710.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3074710.exe4⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9501190.exeFilesize
377KB
MD50295d4c139f72128128fade0bfb79bdb
SHA19af5487e0bad3aabf01b4f1de8378f11d6cdbd34
SHA25631604023abe0de136e9b16208ac5085f091d450c5c70e9d05312bd1604a90b85
SHA512a6cc0e7bb788ec5724fdaae3bcdd38cab6c14b382d5c33128db89cf1b51cdf1baccce09f74f479f76dac0ff9467df25de0ed5c3aa1edd95b4449c1b2c730d765
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9501190.exeFilesize
377KB
MD50295d4c139f72128128fade0bfb79bdb
SHA19af5487e0bad3aabf01b4f1de8378f11d6cdbd34
SHA25631604023abe0de136e9b16208ac5085f091d450c5c70e9d05312bd1604a90b85
SHA512a6cc0e7bb788ec5724fdaae3bcdd38cab6c14b382d5c33128db89cf1b51cdf1baccce09f74f479f76dac0ff9467df25de0ed5c3aa1edd95b4449c1b2c730d765
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6878159.exeFilesize
206KB
MD5e410fe0a5ef83e45772d9d6c9ddabbcc
SHA15cfb177e92f0e864f8846b1911b28788713ae559
SHA256b099ff159aa5942dec543933dff0c83d94b35b62874318c900ccca79e2f0fe7c
SHA512e0604ffb10dc33996cb1941359f0946e97a20baf930d57ca14a7bae00f46033ae3063673f85ad22e6f1495d2dbfd0e7de84dcf889eb498ff98e6f642654ca738
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6878159.exeFilesize
206KB
MD5e410fe0a5ef83e45772d9d6c9ddabbcc
SHA15cfb177e92f0e864f8846b1911b28788713ae559
SHA256b099ff159aa5942dec543933dff0c83d94b35b62874318c900ccca79e2f0fe7c
SHA512e0604ffb10dc33996cb1941359f0946e97a20baf930d57ca14a7bae00f46033ae3063673f85ad22e6f1495d2dbfd0e7de84dcf889eb498ff98e6f642654ca738
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4821990.exeFilesize
11KB
MD5196b6f6a3f018793a27516ce66aab9d3
SHA14efc104dc1e8801215c8416c158f84aaef37d8be
SHA25698334b644bcd77acf7abafdb3d47d9a1652a93dc4d2f05df206a20bdf2bb27b2
SHA512effcfd6a1857bcd08e4732ba145c20bf4d1001716b9b3a22fd4f172f13757c84daab26d6ad766103b5721b2747e36686ee7a58620449fff4580271444bd6eee0
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4821990.exeFilesize
11KB
MD5196b6f6a3f018793a27516ce66aab9d3
SHA14efc104dc1e8801215c8416c158f84aaef37d8be
SHA25698334b644bcd77acf7abafdb3d47d9a1652a93dc4d2f05df206a20bdf2bb27b2
SHA512effcfd6a1857bcd08e4732ba145c20bf4d1001716b9b3a22fd4f172f13757c84daab26d6ad766103b5721b2747e36686ee7a58620449fff4580271444bd6eee0
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3074710.exeFilesize
172KB
MD5bf9c58f183a56065521f3536512df259
SHA107a12364826786379f206cdcca734f5d20689de6
SHA2568c0d3d9fc2bc13125848aebfc0f7fbf2cbc2aed66a20371ae5f92aaea00cc118
SHA512baf5b2f502b04f032d251451451111213621cfe1039dda18a651a177629a74de048650f52f863aa940c6a75a06e1328bc4807627410178b2703201af33681e8f
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3074710.exeFilesize
172KB
MD5bf9c58f183a56065521f3536512df259
SHA107a12364826786379f206cdcca734f5d20689de6
SHA2568c0d3d9fc2bc13125848aebfc0f7fbf2cbc2aed66a20371ae5f92aaea00cc118
SHA512baf5b2f502b04f032d251451451111213621cfe1039dda18a651a177629a74de048650f52f863aa940c6a75a06e1328bc4807627410178b2703201af33681e8f
-
memory/2672-154-0x0000000000310000-0x000000000031A000-memory.dmpFilesize
40KB
-
memory/2816-159-0x0000000000A40000-0x0000000000A70000-memory.dmpFilesize
192KB
-
memory/2816-160-0x000000000AE90000-0x000000000B4A8000-memory.dmpFilesize
6.1MB
-
memory/2816-161-0x000000000A9C0000-0x000000000AACA000-memory.dmpFilesize
1.0MB
-
memory/2816-162-0x000000000A900000-0x000000000A912000-memory.dmpFilesize
72KB
-
memory/2816-164-0x000000000A960000-0x000000000A99C000-memory.dmpFilesize
240KB
-
memory/2816-163-0x00000000054E0000-0x00000000054F0000-memory.dmpFilesize
64KB
-
memory/2816-165-0x00000000054E0000-0x00000000054F0000-memory.dmpFilesize
64KB