Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-06-2023 16:20
Static task
static1
Behavioral task
behavioral1
Sample
380a185d85d46b4d2922fa907fa0a566fe12f7a8ee4cebcf0055b3a7347e808d.exe
Resource
win10v2004-20230220-en
General
-
Target
380a185d85d46b4d2922fa907fa0a566fe12f7a8ee4cebcf0055b3a7347e808d.exe
-
Size
584KB
-
MD5
45af27398a9201c734e7682e50211330
-
SHA1
4381dc9db83247ac4e0ec61ae8a5d969e8ad487b
-
SHA256
380a185d85d46b4d2922fa907fa0a566fe12f7a8ee4cebcf0055b3a7347e808d
-
SHA512
d8a1a7cc872492d9d91faa8dc190ef48df12a571abbd58e5ae3e2700703c9b4ed432ef921e647bd1646ff7a1f13c400f6d46423925fe9db65462738575ab7ade
-
SSDEEP
12288:2MrAy90I9HsAsWBJFmHzqsfDPJ/Vrn1eBzX/msrsp:CyHh/ETqsrPlVrn1eBzvTsp
Malware Config
Extracted
redline
diza
83.97.73.126:19048
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection k9931037.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k9931037.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k9931037.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k9931037.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k9931037.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k9931037.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 1556 y0067221.exe 3356 y6361421.exe 1492 k9931037.exe 1664 l0225945.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" k9931037.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y6361421.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 380a185d85d46b4d2922fa907fa0a566fe12f7a8ee4cebcf0055b3a7347e808d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 380a185d85d46b4d2922fa907fa0a566fe12f7a8ee4cebcf0055b3a7347e808d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y0067221.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y0067221.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y6361421.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 1492 k9931037.exe 1492 k9931037.exe 1664 l0225945.exe 1664 l0225945.exe 1664 l0225945.exe 1664 l0225945.exe 1664 l0225945.exe 1664 l0225945.exe 1664 l0225945.exe 1664 l0225945.exe 1664 l0225945.exe 1664 l0225945.exe 1664 l0225945.exe 1664 l0225945.exe 1664 l0225945.exe 1664 l0225945.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1492 k9931037.exe Token: SeDebugPrivilege 1664 l0225945.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4996 wrote to memory of 1556 4996 380a185d85d46b4d2922fa907fa0a566fe12f7a8ee4cebcf0055b3a7347e808d.exe 82 PID 4996 wrote to memory of 1556 4996 380a185d85d46b4d2922fa907fa0a566fe12f7a8ee4cebcf0055b3a7347e808d.exe 82 PID 4996 wrote to memory of 1556 4996 380a185d85d46b4d2922fa907fa0a566fe12f7a8ee4cebcf0055b3a7347e808d.exe 82 PID 1556 wrote to memory of 3356 1556 y0067221.exe 83 PID 1556 wrote to memory of 3356 1556 y0067221.exe 83 PID 1556 wrote to memory of 3356 1556 y0067221.exe 83 PID 3356 wrote to memory of 1492 3356 y6361421.exe 84 PID 3356 wrote to memory of 1492 3356 y6361421.exe 84 PID 3356 wrote to memory of 1664 3356 y6361421.exe 86 PID 3356 wrote to memory of 1664 3356 y6361421.exe 86 PID 3356 wrote to memory of 1664 3356 y6361421.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\380a185d85d46b4d2922fa907fa0a566fe12f7a8ee4cebcf0055b3a7347e808d.exe"C:\Users\Admin\AppData\Local\Temp\380a185d85d46b4d2922fa907fa0a566fe12f7a8ee4cebcf0055b3a7347e808d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0067221.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0067221.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6361421.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6361421.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k9931037.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k9931037.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1492
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l0225945.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l0225945.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1664
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD5cd362817e2f1208d276db0632aeb71f1
SHA1f1234a35ec19dbf3ecfedf85bf39bd8050f5f1a6
SHA25688a92b42756d377aeb8f306dc9be6262013493259f478d3d6310a2532527b176
SHA51298d80c427d5003ee5d84575fad05899e04fd1e533c3096d59ca6ca8bf6818813f0bcef2c2025556ccdac747091b0e2cff538b81710f639d164d9b0637fd6389e
-
Filesize
377KB
MD5cd362817e2f1208d276db0632aeb71f1
SHA1f1234a35ec19dbf3ecfedf85bf39bd8050f5f1a6
SHA25688a92b42756d377aeb8f306dc9be6262013493259f478d3d6310a2532527b176
SHA51298d80c427d5003ee5d84575fad05899e04fd1e533c3096d59ca6ca8bf6818813f0bcef2c2025556ccdac747091b0e2cff538b81710f639d164d9b0637fd6389e
-
Filesize
206KB
MD5502f42a600be827ce126eeb8bbc51786
SHA1c4c322123022cc52e9cfc83d82cab95386a54e9b
SHA256f623043b1594aeace62a51786e66ca42bd0e384634216da189301a8866616561
SHA51291ec5b8e20ab19d68785ffb3d2eea8823d13f1e8f817a43dcce61389986701e66d95e2fa31986bb8a74ee02425b3205e2dc3b5f403dd87621ac5a010c4df0012
-
Filesize
206KB
MD5502f42a600be827ce126eeb8bbc51786
SHA1c4c322123022cc52e9cfc83d82cab95386a54e9b
SHA256f623043b1594aeace62a51786e66ca42bd0e384634216da189301a8866616561
SHA51291ec5b8e20ab19d68785ffb3d2eea8823d13f1e8f817a43dcce61389986701e66d95e2fa31986bb8a74ee02425b3205e2dc3b5f403dd87621ac5a010c4df0012
-
Filesize
12KB
MD54f7376e03334470e8c673bea75943b86
SHA1ea9b365b712950f7ab3f2630e58ad94c33501a42
SHA256fa27aa2befa7665dacc716764769d0c67a767f751887e798b37ff5c4638bb9d8
SHA5123b526daa169343f9b1fd21b16ac118c7733b0f4e95fea5a41349d0820bcde949e1ee4ccf58ba82b5b269f476b9c646af54f62fbf7e15ae5ddd72fdb3f5324fd3
-
Filesize
12KB
MD54f7376e03334470e8c673bea75943b86
SHA1ea9b365b712950f7ab3f2630e58ad94c33501a42
SHA256fa27aa2befa7665dacc716764769d0c67a767f751887e798b37ff5c4638bb9d8
SHA5123b526daa169343f9b1fd21b16ac118c7733b0f4e95fea5a41349d0820bcde949e1ee4ccf58ba82b5b269f476b9c646af54f62fbf7e15ae5ddd72fdb3f5324fd3
-
Filesize
172KB
MD5dbe10f2333d3340b6dd3e7953a3db957
SHA15eb5a24c3ea3299a32f9bca0afb2b4b63c33063f
SHA25691ac8c9b9aef0054b656f9d969ff7831bfd5d5385f1cd6e33ccb3fd4674cfc0e
SHA5125e24ee65620035257e5ce4d7c4eeb73bdb3bf074fd851a89d2b9f93cc1e174cec56968f399e459895561a9bd78c7e4a30abf51dc15799a7b11a51a20ae03bbd8
-
Filesize
172KB
MD5dbe10f2333d3340b6dd3e7953a3db957
SHA15eb5a24c3ea3299a32f9bca0afb2b4b63c33063f
SHA25691ac8c9b9aef0054b656f9d969ff7831bfd5d5385f1cd6e33ccb3fd4674cfc0e
SHA5125e24ee65620035257e5ce4d7c4eeb73bdb3bf074fd851a89d2b9f93cc1e174cec56968f399e459895561a9bd78c7e4a30abf51dc15799a7b11a51a20ae03bbd8