Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-06-2023 09:58
Static task
static1
Behavioral task
behavioral1
Sample
f5e999b8524832d7c81385f9924bb31548e153a0b6d9f4e6a14fcd2ae5fd27bd.exe
Resource
win10v2004-20230220-en
General
-
Target
f5e999b8524832d7c81385f9924bb31548e153a0b6d9f4e6a14fcd2ae5fd27bd.exe
-
Size
585KB
-
MD5
e84e20684704e921c47e5c8c51bfefe6
-
SHA1
4fca20604ccdf9fccbc036b8608b98c8b18f79da
-
SHA256
f5e999b8524832d7c81385f9924bb31548e153a0b6d9f4e6a14fcd2ae5fd27bd
-
SHA512
055d1b3aaaf766508ef911c9a4327bc4d1ddf6747ed6b55e07974ba50de659feaf957f778105ec360d9c0d2d53e85c622a2a724cafdc4442d077ad252e181437
-
SSDEEP
12288:JMrny90EngQXYImyH3xM1PGJ+752ndVdHEtYfEaEOdH3E2XMiwa:CyngM/oPa+752nVYzatdXsa
Malware Config
Extracted
redline
diza
83.97.73.126:19048
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k8286292.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k8286292.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection k8286292.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k8286292.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k8286292.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k8286292.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 3080 y0494671.exe 3472 y0744906.exe 3776 k8286292.exe 1796 l9444029.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" k8286292.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f5e999b8524832d7c81385f9924bb31548e153a0b6d9f4e6a14fcd2ae5fd27bd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f5e999b8524832d7c81385f9924bb31548e153a0b6d9f4e6a14fcd2ae5fd27bd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y0494671.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y0494671.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y0744906.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y0744906.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 3776 k8286292.exe 3776 k8286292.exe 1796 l9444029.exe 1796 l9444029.exe 1796 l9444029.exe 1796 l9444029.exe 1796 l9444029.exe 1796 l9444029.exe 1796 l9444029.exe 1796 l9444029.exe 1796 l9444029.exe 1796 l9444029.exe 1796 l9444029.exe 1796 l9444029.exe 1796 l9444029.exe 1796 l9444029.exe 1796 l9444029.exe 1796 l9444029.exe 1796 l9444029.exe 1796 l9444029.exe 1796 l9444029.exe 1796 l9444029.exe 1796 l9444029.exe 1796 l9444029.exe 1796 l9444029.exe 1796 l9444029.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3776 k8286292.exe Token: SeDebugPrivilege 1796 l9444029.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4112 wrote to memory of 3080 4112 f5e999b8524832d7c81385f9924bb31548e153a0b6d9f4e6a14fcd2ae5fd27bd.exe 83 PID 4112 wrote to memory of 3080 4112 f5e999b8524832d7c81385f9924bb31548e153a0b6d9f4e6a14fcd2ae5fd27bd.exe 83 PID 4112 wrote to memory of 3080 4112 f5e999b8524832d7c81385f9924bb31548e153a0b6d9f4e6a14fcd2ae5fd27bd.exe 83 PID 3080 wrote to memory of 3472 3080 y0494671.exe 84 PID 3080 wrote to memory of 3472 3080 y0494671.exe 84 PID 3080 wrote to memory of 3472 3080 y0494671.exe 84 PID 3472 wrote to memory of 3776 3472 y0744906.exe 85 PID 3472 wrote to memory of 3776 3472 y0744906.exe 85 PID 3472 wrote to memory of 1796 3472 y0744906.exe 86 PID 3472 wrote to memory of 1796 3472 y0744906.exe 86 PID 3472 wrote to memory of 1796 3472 y0744906.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5e999b8524832d7c81385f9924bb31548e153a0b6d9f4e6a14fcd2ae5fd27bd.exe"C:\Users\Admin\AppData\Local\Temp\f5e999b8524832d7c81385f9924bb31548e153a0b6d9f4e6a14fcd2ae5fd27bd.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0494671.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0494671.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y0744906.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y0744906.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k8286292.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k8286292.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3776
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l9444029.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l9444029.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1796
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD5a69813656ba7694d7c5d89823e8c992c
SHA13201b6c39b1e4eae7e01707c9e6f87085bc486ed
SHA2560d9993092cce794a16629d6a68292a39ec9d9464fac4025c51fe225a2a259bd2
SHA512d11ae25b56c4c3ded6e065d0d3ea7dc9059818f226336726af864ad3e46ece4775d4b300d24c11f7a7dc076524cb0a45c2cf9f442749728a4bf50a4d2633d54d
-
Filesize
377KB
MD5a69813656ba7694d7c5d89823e8c992c
SHA13201b6c39b1e4eae7e01707c9e6f87085bc486ed
SHA2560d9993092cce794a16629d6a68292a39ec9d9464fac4025c51fe225a2a259bd2
SHA512d11ae25b56c4c3ded6e065d0d3ea7dc9059818f226336726af864ad3e46ece4775d4b300d24c11f7a7dc076524cb0a45c2cf9f442749728a4bf50a4d2633d54d
-
Filesize
206KB
MD5b7ca62c2edb6e49001c88548b6d54243
SHA10d5bde80c82ee372ec929aafcb7e0890c7b2f610
SHA256c03d7539d2893a1e3defb57049344269192c97294acad7277fb9afa2a6b9a081
SHA512ace8f1ee1de25786c6e9be4c7b0b5e3e184f9967518102c5c889c527196d41ec7f70c3a9a774c0905edf9f91680196c1542ed40aa79a4b71ba148f651821bb61
-
Filesize
206KB
MD5b7ca62c2edb6e49001c88548b6d54243
SHA10d5bde80c82ee372ec929aafcb7e0890c7b2f610
SHA256c03d7539d2893a1e3defb57049344269192c97294acad7277fb9afa2a6b9a081
SHA512ace8f1ee1de25786c6e9be4c7b0b5e3e184f9967518102c5c889c527196d41ec7f70c3a9a774c0905edf9f91680196c1542ed40aa79a4b71ba148f651821bb61
-
Filesize
13KB
MD5e65e0ddb355fc792d217002f05b087ad
SHA11d7e02c04d8aca04939cc0a0d973811b2f584b9a
SHA2562a28e5b4c20ad8ebd34632c590abeac7ea54e613c0047e0f5bc02055883850a0
SHA51285793b4e3e5035da60ec14f311794be1e8fe0264140fe588c821e0a9102c3196b7c6228f766da343285272c7d4c44f13c91871c59d40c46b01a53fdd99765545
-
Filesize
13KB
MD5e65e0ddb355fc792d217002f05b087ad
SHA11d7e02c04d8aca04939cc0a0d973811b2f584b9a
SHA2562a28e5b4c20ad8ebd34632c590abeac7ea54e613c0047e0f5bc02055883850a0
SHA51285793b4e3e5035da60ec14f311794be1e8fe0264140fe588c821e0a9102c3196b7c6228f766da343285272c7d4c44f13c91871c59d40c46b01a53fdd99765545
-
Filesize
172KB
MD5d45320c3ca316c30a5097989793d9f10
SHA180a953de540502351a87e8d4ba975965adf2289e
SHA256d81bc641c78ca1ac827f38432d861618911306b7fe4131779e09d5be9b09b9dd
SHA512a583f241d5e5738232f5259d5e31b0cbb8166680fcb8ff48b3bcf7d2758bea79ad14f2bda3940c24f1ff0b7ca7289ef57b812f68dade3ac06c8177e572349923
-
Filesize
172KB
MD5d45320c3ca316c30a5097989793d9f10
SHA180a953de540502351a87e8d4ba975965adf2289e
SHA256d81bc641c78ca1ac827f38432d861618911306b7fe4131779e09d5be9b09b9dd
SHA512a583f241d5e5738232f5259d5e31b0cbb8166680fcb8ff48b3bcf7d2758bea79ad14f2bda3940c24f1ff0b7ca7289ef57b812f68dade3ac06c8177e572349923