Analysis
-
max time kernel
133s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
05-06-2023 12:06
Static task
static1
Behavioral task
behavioral1
Sample
f7f106d576eb1f2e5d7dca4dee8dc4db077900e1607759c932f683f3b6dad99d.exe
Resource
win10v2004-20230221-en
General
-
Target
f7f106d576eb1f2e5d7dca4dee8dc4db077900e1607759c932f683f3b6dad99d.exe
-
Size
580KB
-
MD5
999de73cc0d142a823b0e3f9e98b8d00
-
SHA1
2e6cbabec2e7cbf4cae3653b27a955b04a4e9135
-
SHA256
f7f106d576eb1f2e5d7dca4dee8dc4db077900e1607759c932f683f3b6dad99d
-
SHA512
101183dff5b0a07e6261c1f35013cacf866b4302510c3b9d443208e25f352cf365a233c9bcfcec0f85133730f476c556398ca70c1a5946d2d6e68a090c290a2c
-
SSDEEP
12288:ZMrDy90bhEvTpZY6Lz5MFiv/ZRqJwl6DeaIvg:+ySEvTbYWeW//AveaYg
Malware Config
Extracted
redline
diza
83.97.73.126:19046
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection k4960388.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k4960388.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k4960388.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k4960388.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k4960388.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k4960388.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 2788 y1780522.exe 4348 y4745895.exe 1776 k4960388.exe 312 l7699799.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" k4960388.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y1780522.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y1780522.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y4745895.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y4745895.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f7f106d576eb1f2e5d7dca4dee8dc4db077900e1607759c932f683f3b6dad99d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f7f106d576eb1f2e5d7dca4dee8dc4db077900e1607759c932f683f3b6dad99d.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 1776 k4960388.exe 1776 k4960388.exe 312 l7699799.exe 312 l7699799.exe 312 l7699799.exe 312 l7699799.exe 312 l7699799.exe 312 l7699799.exe 312 l7699799.exe 312 l7699799.exe 312 l7699799.exe 312 l7699799.exe 312 l7699799.exe 312 l7699799.exe 312 l7699799.exe 312 l7699799.exe 312 l7699799.exe 312 l7699799.exe 312 l7699799.exe 312 l7699799.exe 312 l7699799.exe 312 l7699799.exe 312 l7699799.exe 312 l7699799.exe 312 l7699799.exe 312 l7699799.exe 312 l7699799.exe 312 l7699799.exe 312 l7699799.exe 312 l7699799.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1776 k4960388.exe Token: SeDebugPrivilege 312 l7699799.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1612 wrote to memory of 2788 1612 f7f106d576eb1f2e5d7dca4dee8dc4db077900e1607759c932f683f3b6dad99d.exe 82 PID 1612 wrote to memory of 2788 1612 f7f106d576eb1f2e5d7dca4dee8dc4db077900e1607759c932f683f3b6dad99d.exe 82 PID 1612 wrote to memory of 2788 1612 f7f106d576eb1f2e5d7dca4dee8dc4db077900e1607759c932f683f3b6dad99d.exe 82 PID 2788 wrote to memory of 4348 2788 y1780522.exe 83 PID 2788 wrote to memory of 4348 2788 y1780522.exe 83 PID 2788 wrote to memory of 4348 2788 y1780522.exe 83 PID 4348 wrote to memory of 1776 4348 y4745895.exe 84 PID 4348 wrote to memory of 1776 4348 y4745895.exe 84 PID 4348 wrote to memory of 312 4348 y4745895.exe 85 PID 4348 wrote to memory of 312 4348 y4745895.exe 85 PID 4348 wrote to memory of 312 4348 y4745895.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7f106d576eb1f2e5d7dca4dee8dc4db077900e1607759c932f683f3b6dad99d.exe"C:\Users\Admin\AppData\Local\Temp\f7f106d576eb1f2e5d7dca4dee8dc4db077900e1607759c932f683f3b6dad99d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1780522.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1780522.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y4745895.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y4745895.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k4960388.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k4960388.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1776
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l7699799.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l7699799.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:312
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD5434e5ae345e0ed6a6b8e16402e4d99a7
SHA1df2bc968fcab71fa157c58ca99d6172cebcf1cd5
SHA25668868718aad605d9d6bfe7a36cabf82c788cc58d2a69c80893c5cec70c598cb8
SHA5122cd58bfe5aa540e6713cd2fdad09cf6c186df02fe5ca2052f8cb8bd093867d4bbaa03cb7a6c18bdd89df0176f00405b645d12b1c55d9d1a6b301a77d8f57fbda
-
Filesize
377KB
MD5434e5ae345e0ed6a6b8e16402e4d99a7
SHA1df2bc968fcab71fa157c58ca99d6172cebcf1cd5
SHA25668868718aad605d9d6bfe7a36cabf82c788cc58d2a69c80893c5cec70c598cb8
SHA5122cd58bfe5aa540e6713cd2fdad09cf6c186df02fe5ca2052f8cb8bd093867d4bbaa03cb7a6c18bdd89df0176f00405b645d12b1c55d9d1a6b301a77d8f57fbda
-
Filesize
206KB
MD50b54f990091f9c7fb7df0f777e418b9a
SHA16d34b9ac4f8687bf38a6fb9256dc35f53332f65b
SHA2568581595b143dd0a73b0776225a7d9da838872069fe8eadcc0727f9f7a8660068
SHA512e3f6ab9447cf822bb57dc3450f682b26a2db38c0ba824a8a229c4cdd742dacc5c501f66d5dfbf064971f27321135d28c2251e6908a57f4157379b11f71fa5ae6
-
Filesize
206KB
MD50b54f990091f9c7fb7df0f777e418b9a
SHA16d34b9ac4f8687bf38a6fb9256dc35f53332f65b
SHA2568581595b143dd0a73b0776225a7d9da838872069fe8eadcc0727f9f7a8660068
SHA512e3f6ab9447cf822bb57dc3450f682b26a2db38c0ba824a8a229c4cdd742dacc5c501f66d5dfbf064971f27321135d28c2251e6908a57f4157379b11f71fa5ae6
-
Filesize
12KB
MD5b962ecd162a2a4f4a05f7326cb52be3a
SHA104d204c0931ed409fd3ca00c35d5f818eb0b51be
SHA2563f8d8a68d195ab8d96746dc4807dadc7e36a9c37a2156d89a2068d71039f4f10
SHA5129cff29962e3b043bb1875716b474aabb82f7bd89f3d22f69dd1f4782406f536d1a483bc10e443d5489e239e1d7479ca2291f44d978910bd6bf8fdf301438b69e
-
Filesize
12KB
MD5b962ecd162a2a4f4a05f7326cb52be3a
SHA104d204c0931ed409fd3ca00c35d5f818eb0b51be
SHA2563f8d8a68d195ab8d96746dc4807dadc7e36a9c37a2156d89a2068d71039f4f10
SHA5129cff29962e3b043bb1875716b474aabb82f7bd89f3d22f69dd1f4782406f536d1a483bc10e443d5489e239e1d7479ca2291f44d978910bd6bf8fdf301438b69e
-
Filesize
173KB
MD5426b125f8509750ea6172dc063cefa9d
SHA18a17d4e6593b872ee7683239176bd8a43f41187f
SHA25620f5f36b802647d86a2318bde4e1e5b8d50e088ef4bf180b35cfa51b076e3cbf
SHA512db90f8d20d94c435793a4bb26595ba1dc2d010ade11429c4845d0bc3e5e7d2d492b1318cab5cf32393d1d2ded2963859870705f4981fd99104e536f7aa59e72b
-
Filesize
173KB
MD5426b125f8509750ea6172dc063cefa9d
SHA18a17d4e6593b872ee7683239176bd8a43f41187f
SHA25620f5f36b802647d86a2318bde4e1e5b8d50e088ef4bf180b35cfa51b076e3cbf
SHA512db90f8d20d94c435793a4bb26595ba1dc2d010ade11429c4845d0bc3e5e7d2d492b1318cab5cf32393d1d2ded2963859870705f4981fd99104e536f7aa59e72b