Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
05/06/2023, 19:56
Static task
static1
Behavioral task
behavioral1
Sample
d8a860b47c297d054a41adc27b659088aac19c0ccf0f5f56755810cd005b70a0.exe
Resource
win10-20230220-en
General
-
Target
d8a860b47c297d054a41adc27b659088aac19c0ccf0f5f56755810cd005b70a0.exe
-
Size
584KB
-
MD5
0f7cbdb1c7395b351099360a89410cef
-
SHA1
0e5776633ee0d36d1b839145a53b2637c64be181
-
SHA256
d8a860b47c297d054a41adc27b659088aac19c0ccf0f5f56755810cd005b70a0
-
SHA512
f6d640e7ecdc7b5bc089c2e6be1045d2562627d80a0fdd152697a59935e2295f220abc358dcd815407e9c4b059c037e075695992cdfbbd5b77ef2cdaf1f9f0c3
-
SSDEEP
12288:HMrSy90c/KcfqvBUG7EzzuT7uxe6VKUk+4pdG:Vyj8yCuIuzB
Malware Config
Extracted
redline
diza
83.97.73.126:19048
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k8728674.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k8728674.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k8728674.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k8728674.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k8728674.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 2520 y7962169.exe 3168 y9045222.exe 5028 k8728674.exe 3840 l1381581.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" k8728674.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d8a860b47c297d054a41adc27b659088aac19c0ccf0f5f56755810cd005b70a0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d8a860b47c297d054a41adc27b659088aac19c0ccf0f5f56755810cd005b70a0.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y7962169.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y7962169.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y9045222.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y9045222.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5028 k8728674.exe 5028 k8728674.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5028 k8728674.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2480 wrote to memory of 2520 2480 d8a860b47c297d054a41adc27b659088aac19c0ccf0f5f56755810cd005b70a0.exe 66 PID 2480 wrote to memory of 2520 2480 d8a860b47c297d054a41adc27b659088aac19c0ccf0f5f56755810cd005b70a0.exe 66 PID 2480 wrote to memory of 2520 2480 d8a860b47c297d054a41adc27b659088aac19c0ccf0f5f56755810cd005b70a0.exe 66 PID 2520 wrote to memory of 3168 2520 y7962169.exe 67 PID 2520 wrote to memory of 3168 2520 y7962169.exe 67 PID 2520 wrote to memory of 3168 2520 y7962169.exe 67 PID 3168 wrote to memory of 5028 3168 y9045222.exe 68 PID 3168 wrote to memory of 5028 3168 y9045222.exe 68 PID 3168 wrote to memory of 3840 3168 y9045222.exe 69 PID 3168 wrote to memory of 3840 3168 y9045222.exe 69 PID 3168 wrote to memory of 3840 3168 y9045222.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\d8a860b47c297d054a41adc27b659088aac19c0ccf0f5f56755810cd005b70a0.exe"C:\Users\Admin\AppData\Local\Temp\d8a860b47c297d054a41adc27b659088aac19c0ccf0f5f56755810cd005b70a0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7962169.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7962169.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y9045222.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y9045222.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k8728674.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k8728674.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5028
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l1381581.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l1381581.exe4⤵
- Executes dropped EXE
PID:3840
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD5b8de5cec99f9a60c7057b7f42345446a
SHA168257e2ddde67dc8991d509b2e2c391dbaec9c16
SHA256117a2aed1bc000beb5112aacbf719f3c76d2ffc928626f259a2daa273365dcf5
SHA5126855b124e0546f7e71d122e0b9ae1ef2010fb939951167563612f6174e47ae0748da6e2c994d0927cf7d72245aec116d94bc6d9afc3f54065d8eea2ca66a9668
-
Filesize
377KB
MD5b8de5cec99f9a60c7057b7f42345446a
SHA168257e2ddde67dc8991d509b2e2c391dbaec9c16
SHA256117a2aed1bc000beb5112aacbf719f3c76d2ffc928626f259a2daa273365dcf5
SHA5126855b124e0546f7e71d122e0b9ae1ef2010fb939951167563612f6174e47ae0748da6e2c994d0927cf7d72245aec116d94bc6d9afc3f54065d8eea2ca66a9668
-
Filesize
206KB
MD58280aeca2af6aa11490aef60b0d175f1
SHA19dc6910fe0bf7b37faead0ce794afa587bdda551
SHA256d656458eb85794f8ebf253bbe235f775ae90d57bc263e05b6f52a11c31f6d3b0
SHA51238c8a2681b3144f00a8c1607909b773dd873792168bd6989dcadcf35a1c9066d93ecbaaf0901a749a97f890d9b83261cf79bd225850837406bfbe86f7ebc2927
-
Filesize
206KB
MD58280aeca2af6aa11490aef60b0d175f1
SHA19dc6910fe0bf7b37faead0ce794afa587bdda551
SHA256d656458eb85794f8ebf253bbe235f775ae90d57bc263e05b6f52a11c31f6d3b0
SHA51238c8a2681b3144f00a8c1607909b773dd873792168bd6989dcadcf35a1c9066d93ecbaaf0901a749a97f890d9b83261cf79bd225850837406bfbe86f7ebc2927
-
Filesize
12KB
MD5a4a90c12051936be81b13f5b4778409b
SHA1e4a10b3fd62e25b6935dd56c07043205cdbb4188
SHA256dc6cbbb27e8f1a11f42d484ba7c6d5d0675aafdc479bd99397d374711e427aac
SHA51236066408c153b7da5efe90ce707845829492358f181ce076dc48893d5352c7957b82a8d092c1ac1e65d93911a309f7dda3b013310ddb876709cb325fce372851
-
Filesize
12KB
MD5a4a90c12051936be81b13f5b4778409b
SHA1e4a10b3fd62e25b6935dd56c07043205cdbb4188
SHA256dc6cbbb27e8f1a11f42d484ba7c6d5d0675aafdc479bd99397d374711e427aac
SHA51236066408c153b7da5efe90ce707845829492358f181ce076dc48893d5352c7957b82a8d092c1ac1e65d93911a309f7dda3b013310ddb876709cb325fce372851
-
Filesize
172KB
MD55ef5ffea5daed7e23ae5d9bd80efc093
SHA11997a806a7f98597deada80ad826c924be728fa3
SHA25645839f1d03fc7ec2f82735248ad1c05b2a212ac5050c2c811b87e68918dd4270
SHA51282d2dba5c6d4d1b4d8d801de92b2f4ef4b4ffc4c95aaf4762fb94487370f740e3666640b129e8ff7ed3cd69fc0087b60a7a6fb4f9b7b49100f2a40deb8b90f5d
-
Filesize
172KB
MD55ef5ffea5daed7e23ae5d9bd80efc093
SHA11997a806a7f98597deada80ad826c924be728fa3
SHA25645839f1d03fc7ec2f82735248ad1c05b2a212ac5050c2c811b87e68918dd4270
SHA51282d2dba5c6d4d1b4d8d801de92b2f4ef4b4ffc4c95aaf4762fb94487370f740e3666640b129e8ff7ed3cd69fc0087b60a7a6fb4f9b7b49100f2a40deb8b90f5d