Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/06/2023, 09:45
Static task
static1
Behavioral task
behavioral1
Sample
69c2f90a492a1ec30b2594140ba68d2af450cd52b16f162ac866b8d585039315.exe
Resource
win10v2004-20230220-en
General
-
Target
69c2f90a492a1ec30b2594140ba68d2af450cd52b16f162ac866b8d585039315.exe
-
Size
584KB
-
MD5
647c1ced324c447f7d396e0861c00516
-
SHA1
5d86c37e5daa0762ae77cdb32013ad719be54c6b
-
SHA256
69c2f90a492a1ec30b2594140ba68d2af450cd52b16f162ac866b8d585039315
-
SHA512
4a03aea8024d90c6faab133711551430403df753dc833784df623f23bea3683e26cab79a63d4e2ff6f3bd5da1d823c78561cb8356e808504ae05a244a79a08d8
-
SSDEEP
12288:KMrUy90ymdr7aoY9ebxtCDVObYN04dP/OWKxA3sfkwr:qyMrH0DVOsq4dnOH636
Malware Config
Extracted
redline
diza
83.97.73.126:19048
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection k2718107.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k2718107.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k2718107.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k2718107.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k2718107.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k2718107.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 3980 y2540326.exe 2920 y4862083.exe 1396 k2718107.exe 5044 l3904473.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" k2718107.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y4862083.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y4862083.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 69c2f90a492a1ec30b2594140ba68d2af450cd52b16f162ac866b8d585039315.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 69c2f90a492a1ec30b2594140ba68d2af450cd52b16f162ac866b8d585039315.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y2540326.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y2540326.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 1396 k2718107.exe 1396 k2718107.exe 5044 l3904473.exe 5044 l3904473.exe 5044 l3904473.exe 5044 l3904473.exe 5044 l3904473.exe 5044 l3904473.exe 5044 l3904473.exe 5044 l3904473.exe 5044 l3904473.exe 5044 l3904473.exe 5044 l3904473.exe 5044 l3904473.exe 5044 l3904473.exe 5044 l3904473.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1396 k2718107.exe Token: SeDebugPrivilege 5044 l3904473.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1564 wrote to memory of 3980 1564 69c2f90a492a1ec30b2594140ba68d2af450cd52b16f162ac866b8d585039315.exe 84 PID 1564 wrote to memory of 3980 1564 69c2f90a492a1ec30b2594140ba68d2af450cd52b16f162ac866b8d585039315.exe 84 PID 1564 wrote to memory of 3980 1564 69c2f90a492a1ec30b2594140ba68d2af450cd52b16f162ac866b8d585039315.exe 84 PID 3980 wrote to memory of 2920 3980 y2540326.exe 85 PID 3980 wrote to memory of 2920 3980 y2540326.exe 85 PID 3980 wrote to memory of 2920 3980 y2540326.exe 85 PID 2920 wrote to memory of 1396 2920 y4862083.exe 86 PID 2920 wrote to memory of 1396 2920 y4862083.exe 86 PID 2920 wrote to memory of 5044 2920 y4862083.exe 87 PID 2920 wrote to memory of 5044 2920 y4862083.exe 87 PID 2920 wrote to memory of 5044 2920 y4862083.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\69c2f90a492a1ec30b2594140ba68d2af450cd52b16f162ac866b8d585039315.exe"C:\Users\Admin\AppData\Local\Temp\69c2f90a492a1ec30b2594140ba68d2af450cd52b16f162ac866b8d585039315.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2540326.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2540326.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y4862083.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y4862083.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k2718107.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k2718107.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1396
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l3904473.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l3904473.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5044
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD5a27d9253c5c70f903ba031df80188413
SHA1ede3edf858c70058e5dc54c29168c32308aa28a5
SHA256275a86b514dcb82efde05000bdc2e71616d930323f7f0513af391a64180e6bbb
SHA512f57225f4de01c69b5a9716d6211d273b8f9e7b71d66ee11396168094b4fa49efc97d14f7544a8406f58ddff1b1f4709cbb6895dc54ed402af208f4595e69da3d
-
Filesize
377KB
MD5a27d9253c5c70f903ba031df80188413
SHA1ede3edf858c70058e5dc54c29168c32308aa28a5
SHA256275a86b514dcb82efde05000bdc2e71616d930323f7f0513af391a64180e6bbb
SHA512f57225f4de01c69b5a9716d6211d273b8f9e7b71d66ee11396168094b4fa49efc97d14f7544a8406f58ddff1b1f4709cbb6895dc54ed402af208f4595e69da3d
-
Filesize
206KB
MD50862d36bdd5e3c1cff4f2bc183043fab
SHA1f2cdd7922b841fa6bde521b0938e5b24e77fb75b
SHA2569564f255ea1b1fb29a73f36acbeea512d84162ccbb255951ce48ab39a39dde72
SHA512e121be5daca0e331dc644bc70ad5fa65ce7eff19e16f4d220c041361497aababea0b6e754fd3c7176ecfdeb58aea72d82e133accc5fb8dd4549dd726a8bd0cf6
-
Filesize
206KB
MD50862d36bdd5e3c1cff4f2bc183043fab
SHA1f2cdd7922b841fa6bde521b0938e5b24e77fb75b
SHA2569564f255ea1b1fb29a73f36acbeea512d84162ccbb255951ce48ab39a39dde72
SHA512e121be5daca0e331dc644bc70ad5fa65ce7eff19e16f4d220c041361497aababea0b6e754fd3c7176ecfdeb58aea72d82e133accc5fb8dd4549dd726a8bd0cf6
-
Filesize
13KB
MD5a70ecef3e4acf4232bffa964f905a858
SHA13fc87dd115ab90a8a1c991eb46829108e50d2031
SHA2566ef22156a68bc69751dca5d2c3dcf0a2a651417529a3a3511382da2e5a0103e1
SHA5122cc85dc3bea6191a63bf50160201947d1f69a414896a120cf48aed029f267f2e9a1141bc3ef025acbd2a76333305c24d5a074e2edae8fc2039780bc5ba832839
-
Filesize
13KB
MD5a70ecef3e4acf4232bffa964f905a858
SHA13fc87dd115ab90a8a1c991eb46829108e50d2031
SHA2566ef22156a68bc69751dca5d2c3dcf0a2a651417529a3a3511382da2e5a0103e1
SHA5122cc85dc3bea6191a63bf50160201947d1f69a414896a120cf48aed029f267f2e9a1141bc3ef025acbd2a76333305c24d5a074e2edae8fc2039780bc5ba832839
-
Filesize
172KB
MD5d53c2dba7a9e96cf34c17dc81bf55a22
SHA1d27c0ff90e8a74b1ce5d37a9f9b2d22275f8b987
SHA256af57a35c1a6c4a4eff85fc7a3c34589bfd51345e969c9825f95bc34ee5bd0984
SHA512fc8940ac98e39e96ea3bd4832aa9ff3e5ec3a61d7fd709beb77a30c942b2d0d28a315901d4b0d27dece0672aa2ce4c71c07a241bec421baeeef4e51a77f7c8bf
-
Filesize
172KB
MD5d53c2dba7a9e96cf34c17dc81bf55a22
SHA1d27c0ff90e8a74b1ce5d37a9f9b2d22275f8b987
SHA256af57a35c1a6c4a4eff85fc7a3c34589bfd51345e969c9825f95bc34ee5bd0984
SHA512fc8940ac98e39e96ea3bd4832aa9ff3e5ec3a61d7fd709beb77a30c942b2d0d28a315901d4b0d27dece0672aa2ce4c71c07a241bec421baeeef4e51a77f7c8bf