Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/06/2023, 10:55
Static task
static1
Behavioral task
behavioral1
Sample
b9bd9bd0a4b59d5e8e2ab1653fd711d34519d182ff779302f78810c06e109eed.exe
Resource
win10v2004-20230220-en
General
-
Target
b9bd9bd0a4b59d5e8e2ab1653fd711d34519d182ff779302f78810c06e109eed.exe
-
Size
580KB
-
MD5
5d029a3a6db1cfefb1d5d08a71939a57
-
SHA1
e56aa2fec42c492d3d60eb8bd303442ae65413b9
-
SHA256
b9bd9bd0a4b59d5e8e2ab1653fd711d34519d182ff779302f78810c06e109eed
-
SHA512
973d37a48d581a94c778dbdf386c5d463eed9a2bb2bdfdf266b437afd6cb08e4b2368697a0c5aa20bdf6656195db9514507e53c1a5056b845e51917834a0320f
-
SSDEEP
12288:+Mr5y903rYdpMOHDrIbJdxA5PzNPCLCT1k72p:Ly0ETMOPIfxA5PZ6LCmM
Malware Config
Extracted
redline
diza
83.97.73.126:19046
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection k3926869.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k3926869.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k3926869.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k3926869.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k3926869.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k3926869.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 324 y9504625.exe 4496 y8089603.exe 1932 k3926869.exe 1120 l5578106.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" k3926869.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b9bd9bd0a4b59d5e8e2ab1653fd711d34519d182ff779302f78810c06e109eed.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y9504625.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y9504625.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y8089603.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y8089603.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b9bd9bd0a4b59d5e8e2ab1653fd711d34519d182ff779302f78810c06e109eed.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 1932 k3926869.exe 1932 k3926869.exe 1120 l5578106.exe 1120 l5578106.exe 1120 l5578106.exe 1120 l5578106.exe 1120 l5578106.exe 1120 l5578106.exe 1120 l5578106.exe 1120 l5578106.exe 1120 l5578106.exe 1120 l5578106.exe 1120 l5578106.exe 1120 l5578106.exe 1120 l5578106.exe 1120 l5578106.exe 1120 l5578106.exe 1120 l5578106.exe 1120 l5578106.exe 1120 l5578106.exe 1120 l5578106.exe 1120 l5578106.exe 1120 l5578106.exe 1120 l5578106.exe 1120 l5578106.exe 1120 l5578106.exe 1120 l5578106.exe 1120 l5578106.exe 1120 l5578106.exe 1120 l5578106.exe 1120 l5578106.exe 1120 l5578106.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1932 k3926869.exe Token: SeDebugPrivilege 1120 l5578106.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1944 wrote to memory of 324 1944 b9bd9bd0a4b59d5e8e2ab1653fd711d34519d182ff779302f78810c06e109eed.exe 86 PID 1944 wrote to memory of 324 1944 b9bd9bd0a4b59d5e8e2ab1653fd711d34519d182ff779302f78810c06e109eed.exe 86 PID 1944 wrote to memory of 324 1944 b9bd9bd0a4b59d5e8e2ab1653fd711d34519d182ff779302f78810c06e109eed.exe 86 PID 324 wrote to memory of 4496 324 y9504625.exe 87 PID 324 wrote to memory of 4496 324 y9504625.exe 87 PID 324 wrote to memory of 4496 324 y9504625.exe 87 PID 4496 wrote to memory of 1932 4496 y8089603.exe 88 PID 4496 wrote to memory of 1932 4496 y8089603.exe 88 PID 4496 wrote to memory of 1120 4496 y8089603.exe 89 PID 4496 wrote to memory of 1120 4496 y8089603.exe 89 PID 4496 wrote to memory of 1120 4496 y8089603.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9bd9bd0a4b59d5e8e2ab1653fd711d34519d182ff779302f78810c06e109eed.exe"C:\Users\Admin\AppData\Local\Temp\b9bd9bd0a4b59d5e8e2ab1653fd711d34519d182ff779302f78810c06e109eed.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9504625.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9504625.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y8089603.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y8089603.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k3926869.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k3926869.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1932
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l5578106.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l5578106.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1120
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD55615c0c1e9ad688b8fd1f561149482fc
SHA19c227671920881e6144d2f836b03374644c45fbe
SHA256862cc3ba2ae2fc097a26608323ca4bdc959b282eeeae55f144e1d0b7ef2e86af
SHA5122b10f25e71f95a368cf77d4a4371678ec54aa9918fe4e74780248496696b4b0cc66a8450eaca9e7fdc7844a9aef1cc4b242688dc14cbff154c484410ef8553bf
-
Filesize
377KB
MD55615c0c1e9ad688b8fd1f561149482fc
SHA19c227671920881e6144d2f836b03374644c45fbe
SHA256862cc3ba2ae2fc097a26608323ca4bdc959b282eeeae55f144e1d0b7ef2e86af
SHA5122b10f25e71f95a368cf77d4a4371678ec54aa9918fe4e74780248496696b4b0cc66a8450eaca9e7fdc7844a9aef1cc4b242688dc14cbff154c484410ef8553bf
-
Filesize
206KB
MD5de2a039451ede206e53614636b2d7673
SHA1dee67ff138f1796e6b2484edc3f1595a82df7c4a
SHA256079943b0e1ae7986bd80f91a4f88531c0bcaa74526798a101e69a7f8b69a57c5
SHA5128a09622082fa89258645155f7b3e9bc5f5c091c04a5a16676f305878f15f078f48a589ce9e1576558b4d83e4099dbc1bde1af73832fa1b4214c14f64a7d1eba2
-
Filesize
206KB
MD5de2a039451ede206e53614636b2d7673
SHA1dee67ff138f1796e6b2484edc3f1595a82df7c4a
SHA256079943b0e1ae7986bd80f91a4f88531c0bcaa74526798a101e69a7f8b69a57c5
SHA5128a09622082fa89258645155f7b3e9bc5f5c091c04a5a16676f305878f15f078f48a589ce9e1576558b4d83e4099dbc1bde1af73832fa1b4214c14f64a7d1eba2
-
Filesize
12KB
MD5ec6a49e3433c5eec9aafca187547e6c9
SHA109a0bcdea91a480aaba06d0fae6fc96b41259a52
SHA2566f73eddae0f8b9d7a8aa0de9a10f8703fd5802218bf34dfb1ce0d881673b9858
SHA5121b1b98cb8c47d727f4b5d481befcbe061f72e3a6d3091466844d60b12f7e5bff7a648aec399dc14664a2e475f52d72fd2306a16a0a8cbd13fc0c7e8edc4fd515
-
Filesize
12KB
MD5ec6a49e3433c5eec9aafca187547e6c9
SHA109a0bcdea91a480aaba06d0fae6fc96b41259a52
SHA2566f73eddae0f8b9d7a8aa0de9a10f8703fd5802218bf34dfb1ce0d881673b9858
SHA5121b1b98cb8c47d727f4b5d481befcbe061f72e3a6d3091466844d60b12f7e5bff7a648aec399dc14664a2e475f52d72fd2306a16a0a8cbd13fc0c7e8edc4fd515
-
Filesize
173KB
MD59107c67e3cca08ffdc3ff6927bf2025b
SHA18e680c8243eb31b4970dbbaebf2c1bec58a2cb17
SHA25644c3d71db35767deffb8f6ba4bcd9058b982bbc4d097a97316232e5722772142
SHA512749ec11735155a56416f48911d75dc14a2116493c5ef7695e69f4e9f3db079dbc9129d20c0995ff531f0e942165183c2cccaaaf7543bc86a04a962453467221d
-
Filesize
173KB
MD59107c67e3cca08ffdc3ff6927bf2025b
SHA18e680c8243eb31b4970dbbaebf2c1bec58a2cb17
SHA25644c3d71db35767deffb8f6ba4bcd9058b982bbc4d097a97316232e5722772142
SHA512749ec11735155a56416f48911d75dc14a2116493c5ef7695e69f4e9f3db079dbc9129d20c0995ff531f0e942165183c2cccaaaf7543bc86a04a962453467221d