Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-06-2023 11:59
Static task
static1
Behavioral task
behavioral1
Sample
9d277333ea29c5f072f7c9c568153bda91ff02aa10670422afadfa81f193dc81.exe
Resource
win10v2004-20230220-en
General
-
Target
9d277333ea29c5f072f7c9c568153bda91ff02aa10670422afadfa81f193dc81.exe
-
Size
579KB
-
MD5
89eada12388ed339d899c5c1a090bf89
-
SHA1
bf2c437a60d605c492a3c7c31bf8a022728f5969
-
SHA256
9d277333ea29c5f072f7c9c568153bda91ff02aa10670422afadfa81f193dc81
-
SHA512
2676cda9881965dc1548b1468d2a8e99fdf3c24a070acc7ecec366b60fc3b005c15d1188cdd03bd1bbd07a6e2b5c622cdeba08324538d26b98040377ae855022
-
SSDEEP
12288:UMrmy90za1Szd9Eb6TjDWJZlE7U90SuwT2SOxTE01291XpDBEora:KyIaEzTrTjkn9fuwTNo5181XpBa
Malware Config
Extracted
redline
diza
83.97.73.126:19046
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection k0948656.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k0948656.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k0948656.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k0948656.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k0948656.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k0948656.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 1184 y1090518.exe 636 y9961832.exe 2452 k0948656.exe 408 l9974775.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" k0948656.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y1090518.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y9961832.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y9961832.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9d277333ea29c5f072f7c9c568153bda91ff02aa10670422afadfa81f193dc81.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9d277333ea29c5f072f7c9c568153bda91ff02aa10670422afadfa81f193dc81.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y1090518.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 2452 k0948656.exe 2452 k0948656.exe 408 l9974775.exe 408 l9974775.exe 408 l9974775.exe 408 l9974775.exe 408 l9974775.exe 408 l9974775.exe 408 l9974775.exe 408 l9974775.exe 408 l9974775.exe 408 l9974775.exe 408 l9974775.exe 408 l9974775.exe 408 l9974775.exe 408 l9974775.exe 408 l9974775.exe 408 l9974775.exe 408 l9974775.exe 408 l9974775.exe 408 l9974775.exe 408 l9974775.exe 408 l9974775.exe 408 l9974775.exe 408 l9974775.exe 408 l9974775.exe 408 l9974775.exe 408 l9974775.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2452 k0948656.exe Token: SeDebugPrivilege 408 l9974775.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4280 wrote to memory of 1184 4280 9d277333ea29c5f072f7c9c568153bda91ff02aa10670422afadfa81f193dc81.exe 85 PID 4280 wrote to memory of 1184 4280 9d277333ea29c5f072f7c9c568153bda91ff02aa10670422afadfa81f193dc81.exe 85 PID 4280 wrote to memory of 1184 4280 9d277333ea29c5f072f7c9c568153bda91ff02aa10670422afadfa81f193dc81.exe 85 PID 1184 wrote to memory of 636 1184 y1090518.exe 86 PID 1184 wrote to memory of 636 1184 y1090518.exe 86 PID 1184 wrote to memory of 636 1184 y1090518.exe 86 PID 636 wrote to memory of 2452 636 y9961832.exe 87 PID 636 wrote to memory of 2452 636 y9961832.exe 87 PID 636 wrote to memory of 408 636 y9961832.exe 88 PID 636 wrote to memory of 408 636 y9961832.exe 88 PID 636 wrote to memory of 408 636 y9961832.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d277333ea29c5f072f7c9c568153bda91ff02aa10670422afadfa81f193dc81.exe"C:\Users\Admin\AppData\Local\Temp\9d277333ea29c5f072f7c9c568153bda91ff02aa10670422afadfa81f193dc81.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1090518.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1090518.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y9961832.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y9961832.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k0948656.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k0948656.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2452
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l9974775.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l9974775.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:408
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD5c85372f3319368844d5a5acefb0ff261
SHA11077ec5daf47479edd59bcfd1ff454a619bfd09c
SHA25646a19a842d835d8b94b7036965c24245f9628e4dfcdc9e49fa4e575c9a5fa3ca
SHA5129cb2d402621ab746de54e036a28a8db7896a72419695bdb886fe2846f0ac8cc6cb9eec165c3e13719b78c759b14028bdbafb31d34079cdec83a1878c1c90914d
-
Filesize
377KB
MD5c85372f3319368844d5a5acefb0ff261
SHA11077ec5daf47479edd59bcfd1ff454a619bfd09c
SHA25646a19a842d835d8b94b7036965c24245f9628e4dfcdc9e49fa4e575c9a5fa3ca
SHA5129cb2d402621ab746de54e036a28a8db7896a72419695bdb886fe2846f0ac8cc6cb9eec165c3e13719b78c759b14028bdbafb31d34079cdec83a1878c1c90914d
-
Filesize
206KB
MD5e3f2b6963c4ba10680646e107e64f0c0
SHA1e9cc88bbe4e1b0173cfc4092bd9618e0cdd15113
SHA256068f283178d20f913813eab0da1a62de4211c86e146f80a3c6fc87846c1c0069
SHA5121eb28074b87d9d0b61f503fde118eef6e332a398969914d157a954838963d8ec4bd9a5c6ff93e5dea42411c8b9d62c2e8be0284d5f1e5144e31dcdb011589b4a
-
Filesize
206KB
MD5e3f2b6963c4ba10680646e107e64f0c0
SHA1e9cc88bbe4e1b0173cfc4092bd9618e0cdd15113
SHA256068f283178d20f913813eab0da1a62de4211c86e146f80a3c6fc87846c1c0069
SHA5121eb28074b87d9d0b61f503fde118eef6e332a398969914d157a954838963d8ec4bd9a5c6ff93e5dea42411c8b9d62c2e8be0284d5f1e5144e31dcdb011589b4a
-
Filesize
12KB
MD5749b84703f7bd82df02b77cb5541caa3
SHA1b6b0dc2d2d7088d211a25c4cc6967f5e96eec7c7
SHA25624df2aebf182f714b34eb70e998f4d1f7a8d4669e228217203dca4fec0d22ed2
SHA5129047272db4d41e230facc763fce068fa39a154da425dbebce141796d15013240657233f2b9a219f871192bb6c2fd68e180b61cf9134c080d1d9b3e637a91e3ab
-
Filesize
12KB
MD5749b84703f7bd82df02b77cb5541caa3
SHA1b6b0dc2d2d7088d211a25c4cc6967f5e96eec7c7
SHA25624df2aebf182f714b34eb70e998f4d1f7a8d4669e228217203dca4fec0d22ed2
SHA5129047272db4d41e230facc763fce068fa39a154da425dbebce141796d15013240657233f2b9a219f871192bb6c2fd68e180b61cf9134c080d1d9b3e637a91e3ab
-
Filesize
173KB
MD5e069360a7326f6a08b0852eebfe4ae2c
SHA15e8ab3837bca237d088df9c473ff5b0cfe372878
SHA25632821054258ee60d83e25cf7199613728d49acb479fb3e392a8eac9644b61e6d
SHA512a4d80539bd9897202145b2e563aee4844e9b30558925b95d3fe4185fedee19a0bc8627b1fdd3d2da65f1c52920668239e16eea296f575b640f51e8c0a3f57fd3
-
Filesize
173KB
MD5e069360a7326f6a08b0852eebfe4ae2c
SHA15e8ab3837bca237d088df9c473ff5b0cfe372878
SHA25632821054258ee60d83e25cf7199613728d49acb479fb3e392a8eac9644b61e6d
SHA512a4d80539bd9897202145b2e563aee4844e9b30558925b95d3fe4185fedee19a0bc8627b1fdd3d2da65f1c52920668239e16eea296f575b640f51e8c0a3f57fd3