Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-06-2023 06:10
Static task
static1
Behavioral task
behavioral1
Sample
d3298e33df1052b3af424cff4a972a9b228f8fc0aace1234575eacde90091395.exe
Resource
win10v2004-20230220-en
General
-
Target
d3298e33df1052b3af424cff4a972a9b228f8fc0aace1234575eacde90091395.exe
-
Size
584KB
-
MD5
f9e8b9b032e1706b4bbedceb716a0060
-
SHA1
586dd8f7b8cf7f88bab323cb80ea7fac262b4095
-
SHA256
d3298e33df1052b3af424cff4a972a9b228f8fc0aace1234575eacde90091395
-
SHA512
e880ec50b4c2f75a89e0a3bad9bde6334ad22ebd9a7acb314bd7075f78b3022c1db241b3b33fbbf9396b965ee9a09c16444410d9b303538c16160ea44be282ce
-
SSDEEP
12288:PMrsy90BSk8D2Bj3cNWGJXf1ydvAb980UyjcFpdCzam3:7ywSZ2l3cN1FfAggLdCza0
Malware Config
Extracted
redline
diza
83.97.73.126:19048
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k8324475.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k8324475.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k8324475.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k8324475.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection k8324475.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k8324475.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 4964 y1948775.exe 380 y0562208.exe 460 k8324475.exe 2788 l1951428.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" k8324475.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y1948775.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y1948775.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y0562208.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y0562208.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d3298e33df1052b3af424cff4a972a9b228f8fc0aace1234575eacde90091395.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d3298e33df1052b3af424cff4a972a9b228f8fc0aace1234575eacde90091395.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 460 k8324475.exe 460 k8324475.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 460 k8324475.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4264 wrote to memory of 4964 4264 d3298e33df1052b3af424cff4a972a9b228f8fc0aace1234575eacde90091395.exe 84 PID 4264 wrote to memory of 4964 4264 d3298e33df1052b3af424cff4a972a9b228f8fc0aace1234575eacde90091395.exe 84 PID 4264 wrote to memory of 4964 4264 d3298e33df1052b3af424cff4a972a9b228f8fc0aace1234575eacde90091395.exe 84 PID 4964 wrote to memory of 380 4964 y1948775.exe 85 PID 4964 wrote to memory of 380 4964 y1948775.exe 85 PID 4964 wrote to memory of 380 4964 y1948775.exe 85 PID 380 wrote to memory of 460 380 y0562208.exe 86 PID 380 wrote to memory of 460 380 y0562208.exe 86 PID 380 wrote to memory of 2788 380 y0562208.exe 87 PID 380 wrote to memory of 2788 380 y0562208.exe 87 PID 380 wrote to memory of 2788 380 y0562208.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3298e33df1052b3af424cff4a972a9b228f8fc0aace1234575eacde90091395.exe"C:\Users\Admin\AppData\Local\Temp\d3298e33df1052b3af424cff4a972a9b228f8fc0aace1234575eacde90091395.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1948775.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1948775.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y0562208.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y0562208.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k8324475.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k8324475.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:460
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l1951428.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l1951428.exe4⤵
- Executes dropped EXE
PID:2788
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD528333862295b20bc28cfec9066d001d5
SHA1a5ae639f348229e501a1c3f8639de07fe0c26375
SHA2569e0196bb55cdb420a88d1a45f4dd714c96483a2b217ac97ff6fee254129aa0f9
SHA512e98ee86eb7baab098b30ca330896f8dd256cbd5c622173d908b39d62908dfa7371a9fa4870987c4094d3d8d00391186e72fbac894e35176c5dfedcd76cce8880
-
Filesize
377KB
MD528333862295b20bc28cfec9066d001d5
SHA1a5ae639f348229e501a1c3f8639de07fe0c26375
SHA2569e0196bb55cdb420a88d1a45f4dd714c96483a2b217ac97ff6fee254129aa0f9
SHA512e98ee86eb7baab098b30ca330896f8dd256cbd5c622173d908b39d62908dfa7371a9fa4870987c4094d3d8d00391186e72fbac894e35176c5dfedcd76cce8880
-
Filesize
206KB
MD5839d1c306a762a3952fa234cca7f6807
SHA1eb755523dee5ed9c6faf1d1d8478b16ae91cfb0f
SHA256ce922d50a518a9a3b6e55a6bf3bd9e9fdb6574bed723120e496ee55855899c26
SHA51224aa6ebaa238051e7b955ffb11cdd93f7127017b349ca5bd00b9bfce94ea4de3aeacd3c39ad2bf15326f5405a5da57a0d88c7aa8ae8ccf0063f7422e8f382ce3
-
Filesize
206KB
MD5839d1c306a762a3952fa234cca7f6807
SHA1eb755523dee5ed9c6faf1d1d8478b16ae91cfb0f
SHA256ce922d50a518a9a3b6e55a6bf3bd9e9fdb6574bed723120e496ee55855899c26
SHA51224aa6ebaa238051e7b955ffb11cdd93f7127017b349ca5bd00b9bfce94ea4de3aeacd3c39ad2bf15326f5405a5da57a0d88c7aa8ae8ccf0063f7422e8f382ce3
-
Filesize
13KB
MD5aae065afc92ee0f0bbb5168ea0d741f6
SHA17c6807111b975df378b2520bde83cdb25e52182f
SHA256c2fa94717a20ebb66848d1ddc66b204f027219847228395a632257bf15a9000c
SHA512a78fe340ab6dfa8a11e6dd23aed7c7ea257370bab4553bfe048025a40031d5e17a099d6a82e904b50c6e5b288639486308a869e8bd04dcdfc801f419d22ed923
-
Filesize
13KB
MD5aae065afc92ee0f0bbb5168ea0d741f6
SHA17c6807111b975df378b2520bde83cdb25e52182f
SHA256c2fa94717a20ebb66848d1ddc66b204f027219847228395a632257bf15a9000c
SHA512a78fe340ab6dfa8a11e6dd23aed7c7ea257370bab4553bfe048025a40031d5e17a099d6a82e904b50c6e5b288639486308a869e8bd04dcdfc801f419d22ed923
-
Filesize
172KB
MD5f5d205e0c827698bd42bd5756ad100dd
SHA19ab75eb1ff8810f35269f492d7b07e8e00adbaec
SHA25668b85cfe8c73cc35e7160c5b905d8ee5b7d3c56b51fcd331474a4e6386b92119
SHA5128865fb6634eea4578385474d1b8e23994ef6b945095f31b93a0b28cd6f04b89a1370c4afc57055c66def68a0d881e89e02b93d82ffc7e3ec773f6789aff6b771
-
Filesize
172KB
MD5f5d205e0c827698bd42bd5756ad100dd
SHA19ab75eb1ff8810f35269f492d7b07e8e00adbaec
SHA25668b85cfe8c73cc35e7160c5b905d8ee5b7d3c56b51fcd331474a4e6386b92119
SHA5128865fb6634eea4578385474d1b8e23994ef6b945095f31b93a0b28cd6f04b89a1370c4afc57055c66def68a0d881e89e02b93d82ffc7e3ec773f6789aff6b771