Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
05-06-2023 20:16
Static task
static1
Behavioral task
behavioral1
Sample
a55b6b24fe0230a0cfb6479a20435c52cb3e7657bc1ecb729fd2222bac371d16.exe
Resource
win10-20230220-en
General
-
Target
a55b6b24fe0230a0cfb6479a20435c52cb3e7657bc1ecb729fd2222bac371d16.exe
-
Size
584KB
-
MD5
c8ca9e1071762fbd54a4451877d3763d
-
SHA1
a5ec2dca7c1d7490230407d0a83b605a3b6ab2fc
-
SHA256
a55b6b24fe0230a0cfb6479a20435c52cb3e7657bc1ecb729fd2222bac371d16
-
SHA512
aaf011528e715403b6f6002b0323409ff72dddc981e75528831bbec2a62b59f244caf2244eb5eaddd9fef10b28fe42313aa72c169fcdd066b271afa3a274e898
-
SSDEEP
12288:XMrky90wlFco/Rm2elh6KntIkeAxJTG56e/n1MBgLX/3GKMHoXoLb:/yJx7elh6Ut1eQi6Kn+AX/GKEoX0b
Malware Config
Extracted
redline
diza
83.97.73.126:19048
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k1086326.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k1086326.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k1086326.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k1086326.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k1086326.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 3028 y5684840.exe 4048 y5898723.exe 4228 k1086326.exe 4212 l8096134.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" k1086326.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a55b6b24fe0230a0cfb6479a20435c52cb3e7657bc1ecb729fd2222bac371d16.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a55b6b24fe0230a0cfb6479a20435c52cb3e7657bc1ecb729fd2222bac371d16.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y5684840.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y5684840.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y5898723.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y5898723.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4228 k1086326.exe 4228 k1086326.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4228 k1086326.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2548 wrote to memory of 3028 2548 a55b6b24fe0230a0cfb6479a20435c52cb3e7657bc1ecb729fd2222bac371d16.exe 66 PID 2548 wrote to memory of 3028 2548 a55b6b24fe0230a0cfb6479a20435c52cb3e7657bc1ecb729fd2222bac371d16.exe 66 PID 2548 wrote to memory of 3028 2548 a55b6b24fe0230a0cfb6479a20435c52cb3e7657bc1ecb729fd2222bac371d16.exe 66 PID 3028 wrote to memory of 4048 3028 y5684840.exe 67 PID 3028 wrote to memory of 4048 3028 y5684840.exe 67 PID 3028 wrote to memory of 4048 3028 y5684840.exe 67 PID 4048 wrote to memory of 4228 4048 y5898723.exe 68 PID 4048 wrote to memory of 4228 4048 y5898723.exe 68 PID 4048 wrote to memory of 4212 4048 y5898723.exe 69 PID 4048 wrote to memory of 4212 4048 y5898723.exe 69 PID 4048 wrote to memory of 4212 4048 y5898723.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\a55b6b24fe0230a0cfb6479a20435c52cb3e7657bc1ecb729fd2222bac371d16.exe"C:\Users\Admin\AppData\Local\Temp\a55b6b24fe0230a0cfb6479a20435c52cb3e7657bc1ecb729fd2222bac371d16.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5684840.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5684840.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y5898723.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y5898723.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k1086326.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k1086326.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4228
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l8096134.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l8096134.exe4⤵
- Executes dropped EXE
PID:4212
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD5a60d70b212f14e5035020972049bdb99
SHA1f59be69ec65cb3c6e1d776324cbc8c2adba10352
SHA256c517c6d07c5619d438eb1da3e7b2cb25f592712c91b5624377f5669cdcb190d9
SHA512d390bf230a120e9e3d16e4024a298fba39a470962d5a362c95722cdfb3118eea03b0fa053ed377f4f3cd1c8fb262df1f74c6645f4aa074aeeb4c7515b34b989b
-
Filesize
377KB
MD5a60d70b212f14e5035020972049bdb99
SHA1f59be69ec65cb3c6e1d776324cbc8c2adba10352
SHA256c517c6d07c5619d438eb1da3e7b2cb25f592712c91b5624377f5669cdcb190d9
SHA512d390bf230a120e9e3d16e4024a298fba39a470962d5a362c95722cdfb3118eea03b0fa053ed377f4f3cd1c8fb262df1f74c6645f4aa074aeeb4c7515b34b989b
-
Filesize
206KB
MD5cc7e0e2211f9762a314ea7f6043a095d
SHA1f5e7406905b24a5973bee6cfa76d16271dfd9535
SHA256bd25e1d318608d9b024d0ef288a98fad09815af5dd2cf38746c1ca332c839dd6
SHA512d181e846e265dc82786953cc31f5501a6cd202caf374cf0bb092a5881c2e5089e1c6054b4cb7e856c8a36a7ee1609832fda63d338224b8284e2f01c8324e4b50
-
Filesize
206KB
MD5cc7e0e2211f9762a314ea7f6043a095d
SHA1f5e7406905b24a5973bee6cfa76d16271dfd9535
SHA256bd25e1d318608d9b024d0ef288a98fad09815af5dd2cf38746c1ca332c839dd6
SHA512d181e846e265dc82786953cc31f5501a6cd202caf374cf0bb092a5881c2e5089e1c6054b4cb7e856c8a36a7ee1609832fda63d338224b8284e2f01c8324e4b50
-
Filesize
12KB
MD5131ac10565d3f8dc7f5a6b243624ae61
SHA11915ad3c36374cdb6ebf64a3158cac350e80d49e
SHA256ca9452f421588d0788784dd36050c41d4b92bc7dfe122402054c5d72d522c100
SHA5126347cf1b393bb7cd144a52a5723246eba982b1e3d0719b72ff0bc69897a873bb61228d7afa9db9fd9cc3899bb18f4f489034e8f7dafc33504eed8dd066b592cb
-
Filesize
12KB
MD5131ac10565d3f8dc7f5a6b243624ae61
SHA11915ad3c36374cdb6ebf64a3158cac350e80d49e
SHA256ca9452f421588d0788784dd36050c41d4b92bc7dfe122402054c5d72d522c100
SHA5126347cf1b393bb7cd144a52a5723246eba982b1e3d0719b72ff0bc69897a873bb61228d7afa9db9fd9cc3899bb18f4f489034e8f7dafc33504eed8dd066b592cb
-
Filesize
172KB
MD57ee6bbd32a504e277f4cdea9375f6ecb
SHA1e8af9caa8043b66641abc7b8f0422b6b5b530e1b
SHA256d27925e2cc4a0fa3ede6fa11f2e801df7ffcd02e4dc21ffcbd4bb712febed61a
SHA5120201e8876a4bb3e9eae07d31b9a54d4892d58be414a3b654f683ac7f9322dd50c1a2f006e44f46c06f9fe8feae7dcb9eff627d291606e32aeff30c7b5d8484d4
-
Filesize
172KB
MD57ee6bbd32a504e277f4cdea9375f6ecb
SHA1e8af9caa8043b66641abc7b8f0422b6b5b530e1b
SHA256d27925e2cc4a0fa3ede6fa11f2e801df7ffcd02e4dc21ffcbd4bb712febed61a
SHA5120201e8876a4bb3e9eae07d31b9a54d4892d58be414a3b654f683ac7f9322dd50c1a2f006e44f46c06f9fe8feae7dcb9eff627d291606e32aeff30c7b5d8484d4