Analysis
-
max time kernel
155s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/06/2023, 00:52
Static task
static1
Behavioral task
behavioral1
Sample
b1a83c2d2962cf0fe4d4940df9740a06602cf9ead2dd9456cb2475efaa327a4f.exe
Resource
win10v2004-20230220-en
General
-
Target
b1a83c2d2962cf0fe4d4940df9740a06602cf9ead2dd9456cb2475efaa327a4f.exe
-
Size
583KB
-
MD5
0b710baf188f9fec3314c7d15e47cba6
-
SHA1
8c8fd58ae31d09967a20a3453914484569080f69
-
SHA256
b1a83c2d2962cf0fe4d4940df9740a06602cf9ead2dd9456cb2475efaa327a4f
-
SHA512
597e44e2797e8956998a56a23fb6a864e102c96898d3c0ddbe3de0a48021ed730bd6ba93c55ec24aaf15c0c42089584509fafaf83279b879b02d8b116ccaaae3
-
SSDEEP
12288:eMr0y90P8SE3RFAWT1ouI4cql3lWhl9xPIykWATD2oJlN504:Gy28S0AqM4yNPVlA3PDN
Malware Config
Extracted
redline
diza
83.97.73.126:19048
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k4972052.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection k4972052.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k4972052.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k4972052.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k4972052.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k4972052.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 5060 y8937723.exe 4508 y8105523.exe 2936 k4972052.exe 3996 l0304411.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" k4972052.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b1a83c2d2962cf0fe4d4940df9740a06602cf9ead2dd9456cb2475efaa327a4f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b1a83c2d2962cf0fe4d4940df9740a06602cf9ead2dd9456cb2475efaa327a4f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y8937723.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y8937723.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y8105523.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y8105523.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2936 k4972052.exe 2936 k4972052.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2936 k4972052.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2032 wrote to memory of 5060 2032 b1a83c2d2962cf0fe4d4940df9740a06602cf9ead2dd9456cb2475efaa327a4f.exe 83 PID 2032 wrote to memory of 5060 2032 b1a83c2d2962cf0fe4d4940df9740a06602cf9ead2dd9456cb2475efaa327a4f.exe 83 PID 2032 wrote to memory of 5060 2032 b1a83c2d2962cf0fe4d4940df9740a06602cf9ead2dd9456cb2475efaa327a4f.exe 83 PID 5060 wrote to memory of 4508 5060 y8937723.exe 84 PID 5060 wrote to memory of 4508 5060 y8937723.exe 84 PID 5060 wrote to memory of 4508 5060 y8937723.exe 84 PID 4508 wrote to memory of 2936 4508 y8105523.exe 85 PID 4508 wrote to memory of 2936 4508 y8105523.exe 85 PID 4508 wrote to memory of 3996 4508 y8105523.exe 86 PID 4508 wrote to memory of 3996 4508 y8105523.exe 86 PID 4508 wrote to memory of 3996 4508 y8105523.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1a83c2d2962cf0fe4d4940df9740a06602cf9ead2dd9456cb2475efaa327a4f.exe"C:\Users\Admin\AppData\Local\Temp\b1a83c2d2962cf0fe4d4940df9740a06602cf9ead2dd9456cb2475efaa327a4f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8937723.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8937723.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y8105523.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y8105523.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k4972052.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k4972052.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2936
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l0304411.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l0304411.exe4⤵
- Executes dropped EXE
PID:3996
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD5539f228c52fc77b944f9f9a3b6bc50e7
SHA1ab9b11883035a71044bf814e7b2ae35257caa21d
SHA25622a7bbcfc5cc4372a7378d296af76f79e1f48cfa102b0a87821d76838c9b06ee
SHA5126284eef48d82ff4d960f8ffc05f167df22b3a62abf80b7f7dcc8007a408038efce36958dd0b160e782e9cdf777fe2a50520d8c16ababea67c6ba6e06946a2cf4
-
Filesize
377KB
MD5539f228c52fc77b944f9f9a3b6bc50e7
SHA1ab9b11883035a71044bf814e7b2ae35257caa21d
SHA25622a7bbcfc5cc4372a7378d296af76f79e1f48cfa102b0a87821d76838c9b06ee
SHA5126284eef48d82ff4d960f8ffc05f167df22b3a62abf80b7f7dcc8007a408038efce36958dd0b160e782e9cdf777fe2a50520d8c16ababea67c6ba6e06946a2cf4
-
Filesize
206KB
MD5fec6c998adb2c2bafb9575559493642a
SHA170887680ec095faf9138928bf07458d35a483af8
SHA2566c4a9b99eaf34ced4c2682f86fb980864e21db5d06f5409f3995da79acab3454
SHA512b7082723b20d54a60e8350a1d6842abaff75e2670156bcc489101ead17b8ce60a6c6c4d2d6e9425f6310f9d9fa589f39ad7195bea262869eedddf31b16c79601
-
Filesize
206KB
MD5fec6c998adb2c2bafb9575559493642a
SHA170887680ec095faf9138928bf07458d35a483af8
SHA2566c4a9b99eaf34ced4c2682f86fb980864e21db5d06f5409f3995da79acab3454
SHA512b7082723b20d54a60e8350a1d6842abaff75e2670156bcc489101ead17b8ce60a6c6c4d2d6e9425f6310f9d9fa589f39ad7195bea262869eedddf31b16c79601
-
Filesize
13KB
MD5464291ebdf9499c6a2d36b45850c128d
SHA138e8f34097e59a4123bac72eca3fbdaa10eaa57a
SHA256147f89c7f420a29f063660dabea8183c4692040d5a69808baea7c969a932cc5e
SHA512a671c66ffeb7b0804e4aa15d307d5a799bbe5f928d2979eccd22872c7337c269a3c933b893dd3ca4c46cdc27836272ca2b6cc71cf710a63ef7a8378d4b2f43f9
-
Filesize
13KB
MD5464291ebdf9499c6a2d36b45850c128d
SHA138e8f34097e59a4123bac72eca3fbdaa10eaa57a
SHA256147f89c7f420a29f063660dabea8183c4692040d5a69808baea7c969a932cc5e
SHA512a671c66ffeb7b0804e4aa15d307d5a799bbe5f928d2979eccd22872c7337c269a3c933b893dd3ca4c46cdc27836272ca2b6cc71cf710a63ef7a8378d4b2f43f9
-
Filesize
172KB
MD5f9adb31d9127566023ebe72c57346add
SHA1bf63b1a0a183462f238dfd70ba044bfbaec37c32
SHA256f324adb5a17530232444b3e5fd6373a9855cd933444382b53bd92060d1297340
SHA512c8602b13cbce155e7916b69ec4cf2ac27789dfb7acb806dbdae5238a201dd2d972f8943d30438bf65b0d3cb9d828fe77d66a87c289f6aec99b5b21e3920ab9bd
-
Filesize
172KB
MD5f9adb31d9127566023ebe72c57346add
SHA1bf63b1a0a183462f238dfd70ba044bfbaec37c32
SHA256f324adb5a17530232444b3e5fd6373a9855cd933444382b53bd92060d1297340
SHA512c8602b13cbce155e7916b69ec4cf2ac27789dfb7acb806dbdae5238a201dd2d972f8943d30438bf65b0d3cb9d828fe77d66a87c289f6aec99b5b21e3920ab9bd