Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
05-06-2023 08:32
Static task
static1
Behavioral task
behavioral1
Sample
cae22920e1a922ca7820074785c5da58b081243779f2dcbba7def7850a87f376.exe
Resource
win10-20230220-en
General
-
Target
cae22920e1a922ca7820074785c5da58b081243779f2dcbba7def7850a87f376.exe
-
Size
580KB
-
MD5
63aa5505e68b0f1bce5d3f13df4eada5
-
SHA1
28c4a169f021fc7947e84c5527b2ca8d9bd2735f
-
SHA256
cae22920e1a922ca7820074785c5da58b081243779f2dcbba7def7850a87f376
-
SHA512
5e03bb79c9b268a25406ca6291822ffae77917ac1635a6fdbf2d88b312b07cfa6c293f44d9c900b07b1f5802c7642e96bbaf275d2a4f1751a06ea23b7e806a93
-
SSDEEP
12288:XMrvy90+tIL5OYNRmylbRk4pwKLwr8oLgeS65Rq53GCBkVW:YyZt7Y+yLpnLS8oc2Or
Malware Config
Extracted
redline
maxi
83.97.73.126:19046
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Signatures
-
Processes:
a7008541.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a7008541.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a7008541.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a7008541.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a7008541.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a7008541.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
Processes:
v6889711.exev8055372.exea7008541.exeb9260350.exepid process 3220 v6889711.exe 4268 v8055372.exe 1452 a7008541.exe 5056 b9260350.exe -
Processes:
a7008541.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a7008541.exe -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
cae22920e1a922ca7820074785c5da58b081243779f2dcbba7def7850a87f376.exev6889711.exev8055372.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce cae22920e1a922ca7820074785c5da58b081243779f2dcbba7def7850a87f376.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cae22920e1a922ca7820074785c5da58b081243779f2dcbba7def7850a87f376.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v6889711.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v6889711.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v8055372.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v8055372.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
a7008541.exepid process 1452 a7008541.exe 1452 a7008541.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
a7008541.exedescription pid process Token: SeDebugPrivilege 1452 a7008541.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
cae22920e1a922ca7820074785c5da58b081243779f2dcbba7def7850a87f376.exev6889711.exev8055372.exedescription pid process target process PID 2868 wrote to memory of 3220 2868 cae22920e1a922ca7820074785c5da58b081243779f2dcbba7def7850a87f376.exe v6889711.exe PID 2868 wrote to memory of 3220 2868 cae22920e1a922ca7820074785c5da58b081243779f2dcbba7def7850a87f376.exe v6889711.exe PID 2868 wrote to memory of 3220 2868 cae22920e1a922ca7820074785c5da58b081243779f2dcbba7def7850a87f376.exe v6889711.exe PID 3220 wrote to memory of 4268 3220 v6889711.exe v8055372.exe PID 3220 wrote to memory of 4268 3220 v6889711.exe v8055372.exe PID 3220 wrote to memory of 4268 3220 v6889711.exe v8055372.exe PID 4268 wrote to memory of 1452 4268 v8055372.exe a7008541.exe PID 4268 wrote to memory of 1452 4268 v8055372.exe a7008541.exe PID 4268 wrote to memory of 5056 4268 v8055372.exe b9260350.exe PID 4268 wrote to memory of 5056 4268 v8055372.exe b9260350.exe PID 4268 wrote to memory of 5056 4268 v8055372.exe b9260350.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cae22920e1a922ca7820074785c5da58b081243779f2dcbba7def7850a87f376.exe"C:\Users\Admin\AppData\Local\Temp\cae22920e1a922ca7820074785c5da58b081243779f2dcbba7def7850a87f376.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6889711.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6889711.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8055372.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8055372.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a7008541.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a7008541.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9260350.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9260350.exe4⤵
- Executes dropped EXE
PID:5056
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD55af67022669869664d487f785ef9b905
SHA1fdea7609ea84e520747247b352f4058946194440
SHA2561ac45fcb6792b082d51e8b367b40e78880a8b40eb1fd3fb223f1bed695925f93
SHA5128d54a7769b09a6a672b833e2131f594ad7c8dd3ed4ab1b7847f76c727dd84b7a1fb352363c6ca0624b356bc420b2c96a10d154c911c15ff75c76a2d770a350db
-
Filesize
377KB
MD55af67022669869664d487f785ef9b905
SHA1fdea7609ea84e520747247b352f4058946194440
SHA2561ac45fcb6792b082d51e8b367b40e78880a8b40eb1fd3fb223f1bed695925f93
SHA5128d54a7769b09a6a672b833e2131f594ad7c8dd3ed4ab1b7847f76c727dd84b7a1fb352363c6ca0624b356bc420b2c96a10d154c911c15ff75c76a2d770a350db
-
Filesize
206KB
MD58edfe8f4bc6332089d8e75dabceb22a8
SHA1d41b0f1c192b75e1c28d0e8cb391e19e8709e13b
SHA256ccff3d84c41494c731d524d1997b8aba6c01d1d1bb0cfa92af0338d717443b2a
SHA5128fee1766a619fc7e013b67a55a39358f5e89ca64b90911ec72a8b3cd3d04b11d96bb3bda4035dfa2c9361452e83f4dffd1d3eb63150c3ecba016a46287c02c97
-
Filesize
206KB
MD58edfe8f4bc6332089d8e75dabceb22a8
SHA1d41b0f1c192b75e1c28d0e8cb391e19e8709e13b
SHA256ccff3d84c41494c731d524d1997b8aba6c01d1d1bb0cfa92af0338d717443b2a
SHA5128fee1766a619fc7e013b67a55a39358f5e89ca64b90911ec72a8b3cd3d04b11d96bb3bda4035dfa2c9361452e83f4dffd1d3eb63150c3ecba016a46287c02c97
-
Filesize
12KB
MD52ec4640232b1848ae68845f48a57f912
SHA1f104382796c69ca74f3c3305774819a738fc672f
SHA256a73dee9964005b1f37bf42680cb70acad7355ca2d481e0f4dd39036b870dd22e
SHA512db88d8f58550872a2a57bd2ae09900661ca92805f209652dc039f659a696da2b38e57f56fdf5922f50d968f4eada29361ef34fdf5b656c92867058f053a5be26
-
Filesize
12KB
MD52ec4640232b1848ae68845f48a57f912
SHA1f104382796c69ca74f3c3305774819a738fc672f
SHA256a73dee9964005b1f37bf42680cb70acad7355ca2d481e0f4dd39036b870dd22e
SHA512db88d8f58550872a2a57bd2ae09900661ca92805f209652dc039f659a696da2b38e57f56fdf5922f50d968f4eada29361ef34fdf5b656c92867058f053a5be26
-
Filesize
172KB
MD5820300667eabda4ef41502f4e4bdaea7
SHA1dcd46b0c29aa71fbfaa761ccacc829472e8b4fab
SHA256788bb3a5f2eafe9eec250d5bd7eaf56e8202120e38506eae54de67bbe1ad1add
SHA512e0e39a4f2e115084c9abdb6c70c50ae24f7cf117910794e34d5a7c520111bf76e4ff41e1034b6b10b8b47540376232440bca364228f7be035c1670b9ed81f020
-
Filesize
172KB
MD5820300667eabda4ef41502f4e4bdaea7
SHA1dcd46b0c29aa71fbfaa761ccacc829472e8b4fab
SHA256788bb3a5f2eafe9eec250d5bd7eaf56e8202120e38506eae54de67bbe1ad1add
SHA512e0e39a4f2e115084c9abdb6c70c50ae24f7cf117910794e34d5a7c520111bf76e4ff41e1034b6b10b8b47540376232440bca364228f7be035c1670b9ed81f020