Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
05-06-2023 05:38
Static task
static1
Behavioral task
behavioral1
Sample
459eed0c50ea623534ea90eba5b10ca4f5c7bfbbe668d7d78432f72e9501d4ed.exe
Resource
win10-20230220-en
General
-
Target
459eed0c50ea623534ea90eba5b10ca4f5c7bfbbe668d7d78432f72e9501d4ed.exe
-
Size
581KB
-
MD5
7d278bc1d7a94670fb24c4fb1624b51a
-
SHA1
52ac91e3ae38d668589c1a84a6368fb98a1e0091
-
SHA256
459eed0c50ea623534ea90eba5b10ca4f5c7bfbbe668d7d78432f72e9501d4ed
-
SHA512
4e44508189b59aa5481779b9b80ac2e97463a4c4b12724ce2378082d924e878d605892f6dc25710e93226c94561107effda501ea7490cebc435809da84167aab
-
SSDEEP
12288:bMr5y90dDwGz26OaCiZucg1ez8Sw6jZ6pqCHpkJ:yyWkQYiZnoE8ojIET
Malware Config
Extracted
redline
maxi
83.97.73.126:19046
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Signatures
-
Processes:
a9039003.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a9039003.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a9039003.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a9039003.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a9039003.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a9039003.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
Processes:
v2871303.exev8370618.exea9039003.exeb9491872.exepid process 3924 v2871303.exe 3416 v8370618.exe 4092 a9039003.exe 5108 b9491872.exe -
Processes:
a9039003.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a9039003.exe -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
v2871303.exev8370618.exe459eed0c50ea623534ea90eba5b10ca4f5c7bfbbe668d7d78432f72e9501d4ed.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v2871303.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v2871303.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v8370618.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v8370618.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 459eed0c50ea623534ea90eba5b10ca4f5c7bfbbe668d7d78432f72e9501d4ed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 459eed0c50ea623534ea90eba5b10ca4f5c7bfbbe668d7d78432f72e9501d4ed.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
a9039003.exepid process 4092 a9039003.exe 4092 a9039003.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
a9039003.exedescription pid process Token: SeDebugPrivilege 4092 a9039003.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
459eed0c50ea623534ea90eba5b10ca4f5c7bfbbe668d7d78432f72e9501d4ed.exev2871303.exev8370618.exedescription pid process target process PID 1012 wrote to memory of 3924 1012 459eed0c50ea623534ea90eba5b10ca4f5c7bfbbe668d7d78432f72e9501d4ed.exe v2871303.exe PID 1012 wrote to memory of 3924 1012 459eed0c50ea623534ea90eba5b10ca4f5c7bfbbe668d7d78432f72e9501d4ed.exe v2871303.exe PID 1012 wrote to memory of 3924 1012 459eed0c50ea623534ea90eba5b10ca4f5c7bfbbe668d7d78432f72e9501d4ed.exe v2871303.exe PID 3924 wrote to memory of 3416 3924 v2871303.exe v8370618.exe PID 3924 wrote to memory of 3416 3924 v2871303.exe v8370618.exe PID 3924 wrote to memory of 3416 3924 v2871303.exe v8370618.exe PID 3416 wrote to memory of 4092 3416 v8370618.exe a9039003.exe PID 3416 wrote to memory of 4092 3416 v8370618.exe a9039003.exe PID 3416 wrote to memory of 5108 3416 v8370618.exe b9491872.exe PID 3416 wrote to memory of 5108 3416 v8370618.exe b9491872.exe PID 3416 wrote to memory of 5108 3416 v8370618.exe b9491872.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\459eed0c50ea623534ea90eba5b10ca4f5c7bfbbe668d7d78432f72e9501d4ed.exe"C:\Users\Admin\AppData\Local\Temp\459eed0c50ea623534ea90eba5b10ca4f5c7bfbbe668d7d78432f72e9501d4ed.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2871303.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2871303.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8370618.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8370618.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a9039003.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a9039003.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9491872.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9491872.exe4⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2871303.exeFilesize
377KB
MD58739dfa21182118c6a2facc9554886a3
SHA13068167cd9812b4db9c5be1c72eb0e790d5b1cb3
SHA25610e67a46c9c4a919c9de3799effc313d2778d666a0744f510cf083f4216f2329
SHA512af367664ce531b7afb618895d108f833a30dd84888a6276c55a32a33e34f331f4438b5fdddd6b8946d03c1cd48ba163b1cb0844b6437f2b06a06c2ddf72e2841
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2871303.exeFilesize
377KB
MD58739dfa21182118c6a2facc9554886a3
SHA13068167cd9812b4db9c5be1c72eb0e790d5b1cb3
SHA25610e67a46c9c4a919c9de3799effc313d2778d666a0744f510cf083f4216f2329
SHA512af367664ce531b7afb618895d108f833a30dd84888a6276c55a32a33e34f331f4438b5fdddd6b8946d03c1cd48ba163b1cb0844b6437f2b06a06c2ddf72e2841
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8370618.exeFilesize
206KB
MD5ab81a4ac6dd27c6658ac0d117a282445
SHA164b62e5bf348ea3510c30ad45982dbb9fdb8213f
SHA256cc1959bce708296cf115526c582747ae838b8ed69b51b5088ed76fce7ac05c17
SHA512c320e3e98f70c563912247dd1efd753feffc6d75c966ddfd1b32c23f4ef7605526a3bbed940364bcaf3c18d6fd2b16f034d8129e0fbd5adf13e24d4682a24efe
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8370618.exeFilesize
206KB
MD5ab81a4ac6dd27c6658ac0d117a282445
SHA164b62e5bf348ea3510c30ad45982dbb9fdb8213f
SHA256cc1959bce708296cf115526c582747ae838b8ed69b51b5088ed76fce7ac05c17
SHA512c320e3e98f70c563912247dd1efd753feffc6d75c966ddfd1b32c23f4ef7605526a3bbed940364bcaf3c18d6fd2b16f034d8129e0fbd5adf13e24d4682a24efe
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a9039003.exeFilesize
11KB
MD5745780a05e9025c6c3694ba01d543a92
SHA140ffe53a550d1dad4c2f2c41703d07998aed540c
SHA256000281454f5a284b3416e9c5599f4680cbacd0f10a6feb2bbd17acffab672beb
SHA512395857d034ad2489a014070a453f340a8bfef56307f5426f6d746c3e7264e900d659045b29a2f98957eabff2223f04fa3e3e74342c757e683bfb4e4d340a278f
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a9039003.exeFilesize
11KB
MD5745780a05e9025c6c3694ba01d543a92
SHA140ffe53a550d1dad4c2f2c41703d07998aed540c
SHA256000281454f5a284b3416e9c5599f4680cbacd0f10a6feb2bbd17acffab672beb
SHA512395857d034ad2489a014070a453f340a8bfef56307f5426f6d746c3e7264e900d659045b29a2f98957eabff2223f04fa3e3e74342c757e683bfb4e4d340a278f
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9491872.exeFilesize
172KB
MD5778d4526820b779505d6f6bbc73dc49b
SHA16752e8831f33e5360369c933f8c98ab7df8a45d7
SHA256767a034aef93378517a83daa0ac3491392bb3593b6505a4160c99a6d6f459aab
SHA5124499afc797b9880a3ecc3cefdcc85bfe6a281c9932a06ae9f269b1586b417b40dfce98411a227b24b2a700321496588ddcbe263ca0fd4e9be4313cfb87823251
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9491872.exeFilesize
172KB
MD5778d4526820b779505d6f6bbc73dc49b
SHA16752e8831f33e5360369c933f8c98ab7df8a45d7
SHA256767a034aef93378517a83daa0ac3491392bb3593b6505a4160c99a6d6f459aab
SHA5124499afc797b9880a3ecc3cefdcc85bfe6a281c9932a06ae9f269b1586b417b40dfce98411a227b24b2a700321496588ddcbe263ca0fd4e9be4313cfb87823251
-
memory/4092-142-0x00000000007B0000-0x00000000007BA000-memory.dmpFilesize
40KB
-
memory/5108-147-0x0000000000260000-0x0000000000290000-memory.dmpFilesize
192KB
-
memory/5108-148-0x0000000002540000-0x0000000002546000-memory.dmpFilesize
24KB
-
memory/5108-149-0x000000000A4E0000-0x000000000AAE6000-memory.dmpFilesize
6.0MB
-
memory/5108-150-0x000000000A060000-0x000000000A16A000-memory.dmpFilesize
1.0MB
-
memory/5108-151-0x0000000009F90000-0x0000000009FA2000-memory.dmpFilesize
72KB
-
memory/5108-152-0x0000000009FF0000-0x000000000A02E000-memory.dmpFilesize
248KB
-
memory/5108-153-0x000000000A170000-0x000000000A1BB000-memory.dmpFilesize
300KB
-
memory/5108-154-0x0000000004B40000-0x0000000004B50000-memory.dmpFilesize
64KB
-
memory/5108-155-0x0000000004B40000-0x0000000004B50000-memory.dmpFilesize
64KB