Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-06-2023 06:47
Static task
static1
Behavioral task
behavioral1
Sample
a5d61912dbd2a83e907946937998836a97321a6b772df1da9e4dd48d14453056.exe
Resource
win10v2004-20230220-en
General
-
Target
a5d61912dbd2a83e907946937998836a97321a6b772df1da9e4dd48d14453056.exe
-
Size
580KB
-
MD5
78985f5d07c69fe642bd48a513d2da88
-
SHA1
f6f79a7c1d5b0f569f9af1d42aa07b849c13ed74
-
SHA256
a5d61912dbd2a83e907946937998836a97321a6b772df1da9e4dd48d14453056
-
SHA512
7d5114601dc5cd4e3cbd910bbced3ea4cad9e8d8a0121b7bc3e9a4211d8b090759980ce3dea17c3ef7c7bc4dc4ffd5fcb1bc71a7277af4d806f1f244881fdd3a
-
SSDEEP
12288:dMrTy90BxU0FpXFBICNRXZmGqgvIu++yrL7nO8bAW:myc3ICNUrTnO8bAW
Malware Config
Extracted
redline
maxi
83.97.73.126:19046
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Signatures
-
Processes:
a2685808.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a2685808.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a2685808.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a2685808.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a2685808.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a2685808.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a2685808.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
Processes:
v6335402.exev1190457.exea2685808.exeb7059520.exepid process 3572 v6335402.exe 3656 v1190457.exe 4036 a2685808.exe 4456 b7059520.exe -
Processes:
a2685808.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a2685808.exe -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
a5d61912dbd2a83e907946937998836a97321a6b772df1da9e4dd48d14453056.exev6335402.exev1190457.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a5d61912dbd2a83e907946937998836a97321a6b772df1da9e4dd48d14453056.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a5d61912dbd2a83e907946937998836a97321a6b772df1da9e4dd48d14453056.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v6335402.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v6335402.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v1190457.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v1190457.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
a2685808.exepid process 4036 a2685808.exe 4036 a2685808.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
a2685808.exedescription pid process Token: SeDebugPrivilege 4036 a2685808.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
a5d61912dbd2a83e907946937998836a97321a6b772df1da9e4dd48d14453056.exev6335402.exev1190457.exedescription pid process target process PID 2980 wrote to memory of 3572 2980 a5d61912dbd2a83e907946937998836a97321a6b772df1da9e4dd48d14453056.exe v6335402.exe PID 2980 wrote to memory of 3572 2980 a5d61912dbd2a83e907946937998836a97321a6b772df1da9e4dd48d14453056.exe v6335402.exe PID 2980 wrote to memory of 3572 2980 a5d61912dbd2a83e907946937998836a97321a6b772df1da9e4dd48d14453056.exe v6335402.exe PID 3572 wrote to memory of 3656 3572 v6335402.exe v1190457.exe PID 3572 wrote to memory of 3656 3572 v6335402.exe v1190457.exe PID 3572 wrote to memory of 3656 3572 v6335402.exe v1190457.exe PID 3656 wrote to memory of 4036 3656 v1190457.exe a2685808.exe PID 3656 wrote to memory of 4036 3656 v1190457.exe a2685808.exe PID 3656 wrote to memory of 4456 3656 v1190457.exe b7059520.exe PID 3656 wrote to memory of 4456 3656 v1190457.exe b7059520.exe PID 3656 wrote to memory of 4456 3656 v1190457.exe b7059520.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5d61912dbd2a83e907946937998836a97321a6b772df1da9e4dd48d14453056.exe"C:\Users\Admin\AppData\Local\Temp\a5d61912dbd2a83e907946937998836a97321a6b772df1da9e4dd48d14453056.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6335402.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6335402.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1190457.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1190457.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a2685808.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a2685808.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4036 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7059520.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7059520.exe4⤵
- Executes dropped EXE
PID:4456
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD599c1134041d8562d60cf60295cc7ca8c
SHA1f1f7eb0a95a79a5dd4a896c7122b8024d68adfbf
SHA256be09795d5078afa668facce75e40a47cb3cfcd1ab4bb68e4a95eb0eefd05bb5b
SHA512f33c8bd79432db2533c30ac58548989f09b11b3408999561d9dcbbaefb4c557b6b5c0f6349fd983557ab8bc937faea0fc7e99fae9bd190d8ce1c696b3fdca21b
-
Filesize
377KB
MD599c1134041d8562d60cf60295cc7ca8c
SHA1f1f7eb0a95a79a5dd4a896c7122b8024d68adfbf
SHA256be09795d5078afa668facce75e40a47cb3cfcd1ab4bb68e4a95eb0eefd05bb5b
SHA512f33c8bd79432db2533c30ac58548989f09b11b3408999561d9dcbbaefb4c557b6b5c0f6349fd983557ab8bc937faea0fc7e99fae9bd190d8ce1c696b3fdca21b
-
Filesize
206KB
MD5f1818bad375c929d2ee85e0e555eb338
SHA1a6a45c3a61fab269467842944e1d3ff07d71017c
SHA256ed951f87f8e5840a8b852c4ecadeafad51acf5a35e1978084cb2501451832be8
SHA512a33817caf5be8157067ac2e6ce5e0f6119bdf1a683def129922505b295c308f434186128832e5cdbee7673b33de3389a253a32bf24e36744a0e71380a1201d45
-
Filesize
206KB
MD5f1818bad375c929d2ee85e0e555eb338
SHA1a6a45c3a61fab269467842944e1d3ff07d71017c
SHA256ed951f87f8e5840a8b852c4ecadeafad51acf5a35e1978084cb2501451832be8
SHA512a33817caf5be8157067ac2e6ce5e0f6119bdf1a683def129922505b295c308f434186128832e5cdbee7673b33de3389a253a32bf24e36744a0e71380a1201d45
-
Filesize
11KB
MD52421f3f61a7aeccbd9392636d3e90ff3
SHA1e7cc687c5af49e8e1378e1f54cc113aa9b9c22e5
SHA2565c3916bf9435beaf644db3d4c519f4e682a367c20df5a0df9b5014cd5e246115
SHA512fe9c6e59344268ba383c0d44d501049036f6c94691a91cf95ddb799344fcef0e81151ba50b60119c996fd8292fdd58612a3ab186bc21c5e513216adb5e1196d2
-
Filesize
11KB
MD52421f3f61a7aeccbd9392636d3e90ff3
SHA1e7cc687c5af49e8e1378e1f54cc113aa9b9c22e5
SHA2565c3916bf9435beaf644db3d4c519f4e682a367c20df5a0df9b5014cd5e246115
SHA512fe9c6e59344268ba383c0d44d501049036f6c94691a91cf95ddb799344fcef0e81151ba50b60119c996fd8292fdd58612a3ab186bc21c5e513216adb5e1196d2
-
Filesize
172KB
MD5c995b998dec8b2718778a1dfac453f37
SHA1e9542483d65f17b9831065979aa37950722b6892
SHA2561362e075a00579887dd6703c91d4f97cfde565f426292d8493b6f347f1138a6b
SHA51218066250c9faca6d0a2bb05c180957725f605b6c68577020eee8f0af5ca2676e943f22f1f2cd357f1d7dcd9e2923dc15cc0965b39f18c564c2e51b277287e54a
-
Filesize
172KB
MD5c995b998dec8b2718778a1dfac453f37
SHA1e9542483d65f17b9831065979aa37950722b6892
SHA2561362e075a00579887dd6703c91d4f97cfde565f426292d8493b6f347f1138a6b
SHA51218066250c9faca6d0a2bb05c180957725f605b6c68577020eee8f0af5ca2676e943f22f1f2cd357f1d7dcd9e2923dc15cc0965b39f18c564c2e51b277287e54a