Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-06-2023 02:16
Static task
static1
Behavioral task
behavioral1
Sample
e918c3e788ea50d8a445474cf24df6a5.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e918c3e788ea50d8a445474cf24df6a5.exe
Resource
win10v2004-20230220-en
General
-
Target
e918c3e788ea50d8a445474cf24df6a5.exe
-
Size
584KB
-
MD5
e918c3e788ea50d8a445474cf24df6a5
-
SHA1
87511142ea05cc980c38eaebeb873d203a6369b4
-
SHA256
069ff3a81f6e320aefcec2b4d3bea4d4accb2c5efc0f7242f69e726fe7a6c67c
-
SHA512
5e168350b01ecba882a999ebecdbdd1097b1ff63749d735989149bce29ce795daeafed2efac639e7330da80bd5ab783ad7f462f54a6a49d03bc873daa23e7cd2
-
SSDEEP
12288:zMriy90b6W71TSYxzpANmBPurdJblbiVrNjuDLvpHFtz:NyUSYVpkmRurdRlbyNaHfz
Malware Config
Extracted
redline
diza
83.97.73.126:19048
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k9073293.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k9073293.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection k9073293.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k9073293.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k9073293.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k9073293.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 820 y3883917.exe 4676 y8434884.exe 1592 k9073293.exe 4200 l8473760.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" k9073293.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e918c3e788ea50d8a445474cf24df6a5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e918c3e788ea50d8a445474cf24df6a5.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y3883917.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y3883917.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y8434884.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y8434884.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1592 k9073293.exe 1592 k9073293.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1592 k9073293.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4296 wrote to memory of 820 4296 e918c3e788ea50d8a445474cf24df6a5.exe 78 PID 4296 wrote to memory of 820 4296 e918c3e788ea50d8a445474cf24df6a5.exe 78 PID 4296 wrote to memory of 820 4296 e918c3e788ea50d8a445474cf24df6a5.exe 78 PID 820 wrote to memory of 4676 820 y3883917.exe 79 PID 820 wrote to memory of 4676 820 y3883917.exe 79 PID 820 wrote to memory of 4676 820 y3883917.exe 79 PID 4676 wrote to memory of 1592 4676 y8434884.exe 80 PID 4676 wrote to memory of 1592 4676 y8434884.exe 80 PID 4676 wrote to memory of 4200 4676 y8434884.exe 82 PID 4676 wrote to memory of 4200 4676 y8434884.exe 82 PID 4676 wrote to memory of 4200 4676 y8434884.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\e918c3e788ea50d8a445474cf24df6a5.exe"C:\Users\Admin\AppData\Local\Temp\e918c3e788ea50d8a445474cf24df6a5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3883917.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3883917.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y8434884.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y8434884.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k9073293.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k9073293.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1592
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l8473760.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l8473760.exe4⤵
- Executes dropped EXE
PID:4200
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD5363116cb8c3c785136038a0884ec9db8
SHA169f8c6a7173570123164c1637a23a1919463153f
SHA25665c389ded47b4daf0cce53d02ac15233f4dc4a49d0b07764030e5eee3183766a
SHA5120a5cc7dedea6ff424b39a1762df96ee07117025e2373a5ff62ece7ebcaf2b9d509e733f6378b44bc5055a57139115ca3e3394fb649f7effb9b5d445b665885ea
-
Filesize
377KB
MD5363116cb8c3c785136038a0884ec9db8
SHA169f8c6a7173570123164c1637a23a1919463153f
SHA25665c389ded47b4daf0cce53d02ac15233f4dc4a49d0b07764030e5eee3183766a
SHA5120a5cc7dedea6ff424b39a1762df96ee07117025e2373a5ff62ece7ebcaf2b9d509e733f6378b44bc5055a57139115ca3e3394fb649f7effb9b5d445b665885ea
-
Filesize
206KB
MD510848932f5db5bffc6d447c562453b94
SHA13a44d12d85b1c51c48c0f9d2a22591cae005f2be
SHA256845c446fcdb6f8055838b1aa4b851e2b7ab53ca8224fb5308064232714aaa584
SHA5127f70d76e18e12f35dfb404530b871e4c185ce003d132e0955e73204bde888d4fed71d0946cf09653d6e96cf126a1fff791c5f409b8314ef51cd12989e8747e87
-
Filesize
206KB
MD510848932f5db5bffc6d447c562453b94
SHA13a44d12d85b1c51c48c0f9d2a22591cae005f2be
SHA256845c446fcdb6f8055838b1aa4b851e2b7ab53ca8224fb5308064232714aaa584
SHA5127f70d76e18e12f35dfb404530b871e4c185ce003d132e0955e73204bde888d4fed71d0946cf09653d6e96cf126a1fff791c5f409b8314ef51cd12989e8747e87
-
Filesize
12KB
MD5bdb6ebef577e3901f1ab1cdbb09c83ce
SHA1fd0aa3ec9cf3b63b1b40b06455eeaf3d8a74bf49
SHA256331898a9875d9d918a9b39f8b88cfd29492486a60d43bc11d2b99b03c59f06e3
SHA51299023b993fbe4081f5d3eb8c5be7e884b059cb69c91672fe697b54960d8c7c1f160a7d2ae2f2a377d68db720b946f8ec3f61057cdd48460cfeb2017ad044f475
-
Filesize
12KB
MD5bdb6ebef577e3901f1ab1cdbb09c83ce
SHA1fd0aa3ec9cf3b63b1b40b06455eeaf3d8a74bf49
SHA256331898a9875d9d918a9b39f8b88cfd29492486a60d43bc11d2b99b03c59f06e3
SHA51299023b993fbe4081f5d3eb8c5be7e884b059cb69c91672fe697b54960d8c7c1f160a7d2ae2f2a377d68db720b946f8ec3f61057cdd48460cfeb2017ad044f475
-
Filesize
172KB
MD5abdaa2cd14b6f4135df4303102cb0cc4
SHA139fbcdf0ec5c054eee0c9021ca513c53af15d0e5
SHA256c6faf97e3986bf7a92383b62d4c29a4011c74da876e92b2ce07816da75a477c2
SHA512a9df990d35541f5e641d5f8805994a87184d1e98312bf2d3c0a52110e9e67c51f9d6712e325d42e4d441db178296510475a45c1a61d1f998c894f6938bf984da
-
Filesize
172KB
MD5abdaa2cd14b6f4135df4303102cb0cc4
SHA139fbcdf0ec5c054eee0c9021ca513c53af15d0e5
SHA256c6faf97e3986bf7a92383b62d4c29a4011c74da876e92b2ce07816da75a477c2
SHA512a9df990d35541f5e641d5f8805994a87184d1e98312bf2d3c0a52110e9e67c51f9d6712e325d42e4d441db178296510475a45c1a61d1f998c894f6938bf984da