Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-06-2023 09:00
Static task
static1
Behavioral task
behavioral1
Sample
36e6b5c6297bfd9fab4c6c84c7e3e568e305412bfe05c6e6c12bb664d7eecd1a.exe
Resource
win10v2004-20230220-en
General
-
Target
36e6b5c6297bfd9fab4c6c84c7e3e568e305412bfe05c6e6c12bb664d7eecd1a.exe
-
Size
579KB
-
MD5
cfd7f2eff9cbb823950b5a28d314a030
-
SHA1
ce7ecfb28b20d8f5a110c68749c0ba959a064545
-
SHA256
36e6b5c6297bfd9fab4c6c84c7e3e568e305412bfe05c6e6c12bb664d7eecd1a
-
SHA512
523f011c9ccf7dfe1dad0a6596e7a1c2663c928cebf32c992446b6f9d4454aa685cf36aa8a8abc669dbc0196d57f690736707f16f773f4c0d33693c0addd9f62
-
SSDEEP
12288:/MrZy908Pfh1aJdas3WBPqT9MK5FbDV6QiOctieBu:OyfJ1GYUmPqMcLEieBu
Malware Config
Extracted
redline
maxi
83.97.73.126:19046
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Signatures
-
Processes:
a3028110.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a3028110.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a3028110.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a3028110.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a3028110.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a3028110.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a3028110.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
Processes:
v2272915.exev4276499.exea3028110.exeb5784459.exepid process 3348 v2272915.exe 60 v4276499.exe 4772 a3028110.exe 1772 b5784459.exe -
Processes:
a3028110.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a3028110.exe -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
36e6b5c6297bfd9fab4c6c84c7e3e568e305412bfe05c6e6c12bb664d7eecd1a.exev2272915.exev4276499.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 36e6b5c6297bfd9fab4c6c84c7e3e568e305412bfe05c6e6c12bb664d7eecd1a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 36e6b5c6297bfd9fab4c6c84c7e3e568e305412bfe05c6e6c12bb664d7eecd1a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v2272915.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v2272915.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v4276499.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v4276499.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
a3028110.exepid process 4772 a3028110.exe 4772 a3028110.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
a3028110.exedescription pid process Token: SeDebugPrivilege 4772 a3028110.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
36e6b5c6297bfd9fab4c6c84c7e3e568e305412bfe05c6e6c12bb664d7eecd1a.exev2272915.exev4276499.exedescription pid process target process PID 4848 wrote to memory of 3348 4848 36e6b5c6297bfd9fab4c6c84c7e3e568e305412bfe05c6e6c12bb664d7eecd1a.exe v2272915.exe PID 4848 wrote to memory of 3348 4848 36e6b5c6297bfd9fab4c6c84c7e3e568e305412bfe05c6e6c12bb664d7eecd1a.exe v2272915.exe PID 4848 wrote to memory of 3348 4848 36e6b5c6297bfd9fab4c6c84c7e3e568e305412bfe05c6e6c12bb664d7eecd1a.exe v2272915.exe PID 3348 wrote to memory of 60 3348 v2272915.exe v4276499.exe PID 3348 wrote to memory of 60 3348 v2272915.exe v4276499.exe PID 3348 wrote to memory of 60 3348 v2272915.exe v4276499.exe PID 60 wrote to memory of 4772 60 v4276499.exe a3028110.exe PID 60 wrote to memory of 4772 60 v4276499.exe a3028110.exe PID 60 wrote to memory of 1772 60 v4276499.exe b5784459.exe PID 60 wrote to memory of 1772 60 v4276499.exe b5784459.exe PID 60 wrote to memory of 1772 60 v4276499.exe b5784459.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\36e6b5c6297bfd9fab4c6c84c7e3e568e305412bfe05c6e6c12bb664d7eecd1a.exe"C:\Users\Admin\AppData\Local\Temp\36e6b5c6297bfd9fab4c6c84c7e3e568e305412bfe05c6e6c12bb664d7eecd1a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2272915.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2272915.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4276499.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4276499.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a3028110.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a3028110.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5784459.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5784459.exe4⤵
- Executes dropped EXE
PID:1772
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD552e205f2b7b1433f815be5426b120f95
SHA13d74c1708137967449aa57c6d5396f114b6eaf56
SHA256afe1c018c0813e54c4a80e6d6ac8d82187f9c26ec5968c21f4fe6858fdfac260
SHA512ffbdbb8314ca123a07a53e7a990e52fa9dbe1189509b00a16e695634f24d7491711a866b15d9861315cb0cf7f293c6fcc4601952ac10834cb4ed59d8627c547f
-
Filesize
377KB
MD552e205f2b7b1433f815be5426b120f95
SHA13d74c1708137967449aa57c6d5396f114b6eaf56
SHA256afe1c018c0813e54c4a80e6d6ac8d82187f9c26ec5968c21f4fe6858fdfac260
SHA512ffbdbb8314ca123a07a53e7a990e52fa9dbe1189509b00a16e695634f24d7491711a866b15d9861315cb0cf7f293c6fcc4601952ac10834cb4ed59d8627c547f
-
Filesize
206KB
MD5c5acdbead8c2ccdac036ab36bcc48e02
SHA1960dd8f08d9136075522fc47c4d4ab75c78e1707
SHA25695492a402cac3e92ebb439c2e67a94ce050a26fcc7fb7672e7e528340b05c63b
SHA51293b7bad5561bbb31809a3d62b02d55bef91ab52f2f316142ee31fc850c22e8a86b4a152c8570b9067ebb4f1a41fc36cc31b6d0e950644113231168c59e9c0ed3
-
Filesize
206KB
MD5c5acdbead8c2ccdac036ab36bcc48e02
SHA1960dd8f08d9136075522fc47c4d4ab75c78e1707
SHA25695492a402cac3e92ebb439c2e67a94ce050a26fcc7fb7672e7e528340b05c63b
SHA51293b7bad5561bbb31809a3d62b02d55bef91ab52f2f316142ee31fc850c22e8a86b4a152c8570b9067ebb4f1a41fc36cc31b6d0e950644113231168c59e9c0ed3
-
Filesize
12KB
MD5f2d3c56be1564cc85ba7c13881377619
SHA1962b88bf6e41c79cb44c5606b9f9dc7d648f1f45
SHA256892c18f6a918e2c4a21c5ac43701537a84c9e2828f9ef0bb617d807763e3eef6
SHA512972701a8b2fe63a96e5abfa3937e6f83c817cfe7542ab30f03a18dc68b7dfe383faa4af069ca0fa78d3dff3d81b68ef0acafe7648d6f68b44e79f456062ce069
-
Filesize
12KB
MD5f2d3c56be1564cc85ba7c13881377619
SHA1962b88bf6e41c79cb44c5606b9f9dc7d648f1f45
SHA256892c18f6a918e2c4a21c5ac43701537a84c9e2828f9ef0bb617d807763e3eef6
SHA512972701a8b2fe63a96e5abfa3937e6f83c817cfe7542ab30f03a18dc68b7dfe383faa4af069ca0fa78d3dff3d81b68ef0acafe7648d6f68b44e79f456062ce069
-
Filesize
172KB
MD553baaf6d1d16e49f6804249ad1f050c1
SHA1df98d928596dd83620c1ffe74721e697fd261b62
SHA2568e696ef539e484d3ebd01db4b5f927ce73678453a24e3f181de42d5a3f294027
SHA51260cf0294be69ecf87a4a83a11d73667f04887341c47e756f8ec7932787bd83c55b2913601d17ea005d5309899edadc5c27f0a84d35b4d4748ddd2f433cd0b6a2
-
Filesize
172KB
MD553baaf6d1d16e49f6804249ad1f050c1
SHA1df98d928596dd83620c1ffe74721e697fd261b62
SHA2568e696ef539e484d3ebd01db4b5f927ce73678453a24e3f181de42d5a3f294027
SHA51260cf0294be69ecf87a4a83a11d73667f04887341c47e756f8ec7932787bd83c55b2913601d17ea005d5309899edadc5c27f0a84d35b4d4748ddd2f433cd0b6a2