Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
05/06/2023, 09:51
Static task
static1
Behavioral task
behavioral1
Sample
b892cd5c413c4a4eea7ba7e916524627e14255ef2da789001a9a5a835bd97218.exe
Resource
win10v2004-20230221-en
General
-
Target
b892cd5c413c4a4eea7ba7e916524627e14255ef2da789001a9a5a835bd97218.exe
-
Size
580KB
-
MD5
d9cc4773aa8ca82d0e4b0759e2a63ad9
-
SHA1
353fc6ddbc18540d62abb6b9e419f07c3643dd05
-
SHA256
b892cd5c413c4a4eea7ba7e916524627e14255ef2da789001a9a5a835bd97218
-
SHA512
fb59079c4adf181d3b13c22d72731d345014c5a94a75afd68a243db44f1d8ef4fa15a743287fd994b372aba8af9bbc8baccce7570bc3781394bd262fb54e396a
-
SSDEEP
12288:JMrcy90+LWK3mHC/l6X7v4nTDbp64I6qzSgYFOpLt:1yYNaGvcT04xqzOFOT
Malware Config
Extracted
redline
diza
83.97.73.126:19046
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k0139678.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k0139678.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection k0139678.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k0139678.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k0139678.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k0139678.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 4600 y4835186.exe 3920 y2363710.exe 996 k0139678.exe 5108 l4390254.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" k0139678.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b892cd5c413c4a4eea7ba7e916524627e14255ef2da789001a9a5a835bd97218.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y4835186.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y4835186.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y2363710.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y2363710.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b892cd5c413c4a4eea7ba7e916524627e14255ef2da789001a9a5a835bd97218.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 996 k0139678.exe 996 k0139678.exe 5108 l4390254.exe 5108 l4390254.exe 5108 l4390254.exe 5108 l4390254.exe 5108 l4390254.exe 5108 l4390254.exe 5108 l4390254.exe 5108 l4390254.exe 5108 l4390254.exe 5108 l4390254.exe 5108 l4390254.exe 5108 l4390254.exe 5108 l4390254.exe 5108 l4390254.exe 5108 l4390254.exe 5108 l4390254.exe 5108 l4390254.exe 5108 l4390254.exe 5108 l4390254.exe 5108 l4390254.exe 5108 l4390254.exe 5108 l4390254.exe 5108 l4390254.exe 5108 l4390254.exe 5108 l4390254.exe 5108 l4390254.exe 5108 l4390254.exe 5108 l4390254.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 996 k0139678.exe Token: SeDebugPrivilege 5108 l4390254.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4220 wrote to memory of 4600 4220 b892cd5c413c4a4eea7ba7e916524627e14255ef2da789001a9a5a835bd97218.exe 85 PID 4220 wrote to memory of 4600 4220 b892cd5c413c4a4eea7ba7e916524627e14255ef2da789001a9a5a835bd97218.exe 85 PID 4220 wrote to memory of 4600 4220 b892cd5c413c4a4eea7ba7e916524627e14255ef2da789001a9a5a835bd97218.exe 85 PID 4600 wrote to memory of 3920 4600 y4835186.exe 86 PID 4600 wrote to memory of 3920 4600 y4835186.exe 86 PID 4600 wrote to memory of 3920 4600 y4835186.exe 86 PID 3920 wrote to memory of 996 3920 y2363710.exe 87 PID 3920 wrote to memory of 996 3920 y2363710.exe 87 PID 3920 wrote to memory of 5108 3920 y2363710.exe 88 PID 3920 wrote to memory of 5108 3920 y2363710.exe 88 PID 3920 wrote to memory of 5108 3920 y2363710.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\b892cd5c413c4a4eea7ba7e916524627e14255ef2da789001a9a5a835bd97218.exe"C:\Users\Admin\AppData\Local\Temp\b892cd5c413c4a4eea7ba7e916524627e14255ef2da789001a9a5a835bd97218.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4835186.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4835186.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y2363710.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y2363710.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k0139678.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k0139678.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:996
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l4390254.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l4390254.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5108
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD5c9f830d7dbbc7f78ed1d7f977467c64b
SHA12ebc796ed24dff2132c0d5d1e3d595e1c456d3da
SHA2561849ff178121099777a52b308452526a31f828666621f83e4c5c7838fd1b744d
SHA51217a2a6406b316896f7922804f8a017660bd7655304e1df0f58c227eb69d0b8a2f215aad2d036ecbff131ffff82c1b216fb9a6e8c3dfa92e6f294ba080644b32a
-
Filesize
377KB
MD5c9f830d7dbbc7f78ed1d7f977467c64b
SHA12ebc796ed24dff2132c0d5d1e3d595e1c456d3da
SHA2561849ff178121099777a52b308452526a31f828666621f83e4c5c7838fd1b744d
SHA51217a2a6406b316896f7922804f8a017660bd7655304e1df0f58c227eb69d0b8a2f215aad2d036ecbff131ffff82c1b216fb9a6e8c3dfa92e6f294ba080644b32a
-
Filesize
206KB
MD5d6ff90291f748b4185849f11f7c650d3
SHA1fe0ddc50c9cbd324c93478bb7e8c13c890918786
SHA256df5fd04e2c144caab34ee53fbff0fbd376cbdde0c1bd6c6b9fd703e7119dcca2
SHA512ea05de0c8355f3519f7f1676434ff27bb2ebb3f45ca8eab80962037671c1722bee208a4d3f6a5f38f10760ee199b03bf95a5882ac3ef26ca6eb26c67b274e597
-
Filesize
206KB
MD5d6ff90291f748b4185849f11f7c650d3
SHA1fe0ddc50c9cbd324c93478bb7e8c13c890918786
SHA256df5fd04e2c144caab34ee53fbff0fbd376cbdde0c1bd6c6b9fd703e7119dcca2
SHA512ea05de0c8355f3519f7f1676434ff27bb2ebb3f45ca8eab80962037671c1722bee208a4d3f6a5f38f10760ee199b03bf95a5882ac3ef26ca6eb26c67b274e597
-
Filesize
12KB
MD5b77baf2824ce0be9990b03a6b8978625
SHA165c4b2b42fd0c59bf3aca2648b2290753893a394
SHA25631adf715be19e8fac757c7c74c6b866ee205c0744728ec2b803dc73238839344
SHA512fef6e8f48daa5efa40b8842818c41edb9730da089dc65d5635cffa309860a7f88eb8b7a7697e3424c40c873a7d6f0f755425756562e5f6c288305d497b336f34
-
Filesize
12KB
MD5b77baf2824ce0be9990b03a6b8978625
SHA165c4b2b42fd0c59bf3aca2648b2290753893a394
SHA25631adf715be19e8fac757c7c74c6b866ee205c0744728ec2b803dc73238839344
SHA512fef6e8f48daa5efa40b8842818c41edb9730da089dc65d5635cffa309860a7f88eb8b7a7697e3424c40c873a7d6f0f755425756562e5f6c288305d497b336f34
-
Filesize
173KB
MD5d6cffdac2fd01390cf5c55c3cdf27ae2
SHA1e2bbed931d7339eadd8d4828d82a1737b40b947f
SHA2566b7920622f7eb225354be4f1e99ce769d63d8ada1b413847b3f29509e400bcaf
SHA512dae78b6c992e6af904b38f3b42a4a90e8e5850bd5ab66595ee50bc3b144ed417e0e5cf81d39d99952274023512ae411c7c7124ff0897d175563827f4f16cbe8c
-
Filesize
173KB
MD5d6cffdac2fd01390cf5c55c3cdf27ae2
SHA1e2bbed931d7339eadd8d4828d82a1737b40b947f
SHA2566b7920622f7eb225354be4f1e99ce769d63d8ada1b413847b3f29509e400bcaf
SHA512dae78b6c992e6af904b38f3b42a4a90e8e5850bd5ab66595ee50bc3b144ed417e0e5cf81d39d99952274023512ae411c7c7124ff0897d175563827f4f16cbe8c