Analysis
-
max time kernel
136s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/06/2023, 11:34
Static task
static1
Behavioral task
behavioral1
Sample
04140999.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
04140999.exe
Resource
win10v2004-20230221-en
General
-
Target
04140999.exe
-
Size
585KB
-
MD5
83e1b1d4b051f68421b948e376147a80
-
SHA1
160a9ffefb4b937a9be4f5fdc76c3092c07d1f23
-
SHA256
a3023fd31ad761747b24e6472f1c1d62e5f4ecda61a94606145f1b8e3dee43a0
-
SHA512
8672588d3954c948eb8180248e4cdab80dd819fbcb2fb386c313ce77e888747379722d52e8ca6d108c5c586236adf7c5c0757beb742160c921aed8550254d38f
-
SSDEEP
12288:mMr+y90mfyHg7Ubji4Yj/gtecRyZNh+I1RM:UysHg7fURIbM
Malware Config
Extracted
redline
diza
83.97.73.126:19048
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection k4296425.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k4296425.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k4296425.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k4296425.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k4296425.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k4296425.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 1768 y4914211.exe 1108 y6032575.exe 1516 k4296425.exe 304 l8999147.exe -
Loads dropped DLL 7 IoCs
pid Process 920 04140999.exe 1768 y4914211.exe 1768 y4914211.exe 1108 y6032575.exe 1108 y6032575.exe 1108 y6032575.exe 304 l8999147.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features k4296425.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" k4296425.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 04140999.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce y4914211.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y4914211.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce y6032575.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y6032575.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 04140999.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 1516 k4296425.exe 1516 k4296425.exe 304 l8999147.exe 304 l8999147.exe 304 l8999147.exe 304 l8999147.exe 304 l8999147.exe 304 l8999147.exe 304 l8999147.exe 304 l8999147.exe 304 l8999147.exe 304 l8999147.exe 304 l8999147.exe 304 l8999147.exe 304 l8999147.exe 304 l8999147.exe 304 l8999147.exe 304 l8999147.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1516 k4296425.exe Token: SeDebugPrivilege 304 l8999147.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 920 wrote to memory of 1768 920 04140999.exe 28 PID 920 wrote to memory of 1768 920 04140999.exe 28 PID 920 wrote to memory of 1768 920 04140999.exe 28 PID 920 wrote to memory of 1768 920 04140999.exe 28 PID 920 wrote to memory of 1768 920 04140999.exe 28 PID 920 wrote to memory of 1768 920 04140999.exe 28 PID 920 wrote to memory of 1768 920 04140999.exe 28 PID 1768 wrote to memory of 1108 1768 y4914211.exe 29 PID 1768 wrote to memory of 1108 1768 y4914211.exe 29 PID 1768 wrote to memory of 1108 1768 y4914211.exe 29 PID 1768 wrote to memory of 1108 1768 y4914211.exe 29 PID 1768 wrote to memory of 1108 1768 y4914211.exe 29 PID 1768 wrote to memory of 1108 1768 y4914211.exe 29 PID 1768 wrote to memory of 1108 1768 y4914211.exe 29 PID 1108 wrote to memory of 1516 1108 y6032575.exe 30 PID 1108 wrote to memory of 1516 1108 y6032575.exe 30 PID 1108 wrote to memory of 1516 1108 y6032575.exe 30 PID 1108 wrote to memory of 1516 1108 y6032575.exe 30 PID 1108 wrote to memory of 1516 1108 y6032575.exe 30 PID 1108 wrote to memory of 1516 1108 y6032575.exe 30 PID 1108 wrote to memory of 1516 1108 y6032575.exe 30 PID 1108 wrote to memory of 304 1108 y6032575.exe 31 PID 1108 wrote to memory of 304 1108 y6032575.exe 31 PID 1108 wrote to memory of 304 1108 y6032575.exe 31 PID 1108 wrote to memory of 304 1108 y6032575.exe 31 PID 1108 wrote to memory of 304 1108 y6032575.exe 31 PID 1108 wrote to memory of 304 1108 y6032575.exe 31 PID 1108 wrote to memory of 304 1108 y6032575.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\04140999.exe"C:\Users\Admin\AppData\Local\Temp\04140999.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4914211.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4914211.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6032575.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6032575.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k4296425.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k4296425.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1516
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l8999147.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l8999147.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:304
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD58eed98323578f46f839f5f6c64338dfc
SHA14dc77f40c882fdfe042901c9fb68aa135af479d5
SHA256d712ad3d82844421f04e1bf98a132095ba7f82be0fa97318cbfe04df82f78eaa
SHA512fcf9cf522cac5a410d5fdddf419781d9c258513c49a0ce5769dac3f986a03dc4d7760dc1eb7091e4d2849a3534d54d3a1be0274868c1faac1208470a192efbc7
-
Filesize
377KB
MD58eed98323578f46f839f5f6c64338dfc
SHA14dc77f40c882fdfe042901c9fb68aa135af479d5
SHA256d712ad3d82844421f04e1bf98a132095ba7f82be0fa97318cbfe04df82f78eaa
SHA512fcf9cf522cac5a410d5fdddf419781d9c258513c49a0ce5769dac3f986a03dc4d7760dc1eb7091e4d2849a3534d54d3a1be0274868c1faac1208470a192efbc7
-
Filesize
206KB
MD579185704d68a7ef140e654d57f1c33ed
SHA1a719b91b5c194370740dce31ea1bb87df9f21013
SHA256946aa3032db6ad8b1b9c4a7dfafd8de9c5b37675242a8420a454a509f54595eb
SHA5120616421dfa11659ed76318fe11383d14bd78d1488af9a86a112753e912e728a31b9e5adb2414011c95d8c1851895f199350d85c1268baee1078fafb6ff19f553
-
Filesize
206KB
MD579185704d68a7ef140e654d57f1c33ed
SHA1a719b91b5c194370740dce31ea1bb87df9f21013
SHA256946aa3032db6ad8b1b9c4a7dfafd8de9c5b37675242a8420a454a509f54595eb
SHA5120616421dfa11659ed76318fe11383d14bd78d1488af9a86a112753e912e728a31b9e5adb2414011c95d8c1851895f199350d85c1268baee1078fafb6ff19f553
-
Filesize
13KB
MD5a2de3437fd394e851c67f6dc784bc824
SHA195a75d842945c6d63311834142f4d4d9137cde2c
SHA2568781273cf757bca88ea113b36d68f6d41b15731e28a6e6b543db46213959b77b
SHA512b7189d95121584fccfb3255bd58b42cceafdc900f831dd373e8d79cf412f16a64e14c2b3271af844d7ab7845df0eb3b87df5202fcc7578d12d6641a084202b82
-
Filesize
13KB
MD5a2de3437fd394e851c67f6dc784bc824
SHA195a75d842945c6d63311834142f4d4d9137cde2c
SHA2568781273cf757bca88ea113b36d68f6d41b15731e28a6e6b543db46213959b77b
SHA512b7189d95121584fccfb3255bd58b42cceafdc900f831dd373e8d79cf412f16a64e14c2b3271af844d7ab7845df0eb3b87df5202fcc7578d12d6641a084202b82
-
Filesize
172KB
MD59e85716659a76beb7375ef8dc976e218
SHA163d6a65f9691565997db57282f5f34d650433c20
SHA25652ac8970fc5ebc37c8d2ba0c1593a4f27e28f87e5d07f2555d59bb0b4c420de9
SHA512625efffee846230ae4d493b0d213813ff275a636662acb7f4bf498c1f692e9758aa6163fd10e70ff69b5c388eae26f46a505fad4654e05f85893bc748bdac1a7
-
Filesize
172KB
MD59e85716659a76beb7375ef8dc976e218
SHA163d6a65f9691565997db57282f5f34d650433c20
SHA25652ac8970fc5ebc37c8d2ba0c1593a4f27e28f87e5d07f2555d59bb0b4c420de9
SHA512625efffee846230ae4d493b0d213813ff275a636662acb7f4bf498c1f692e9758aa6163fd10e70ff69b5c388eae26f46a505fad4654e05f85893bc748bdac1a7
-
Filesize
377KB
MD58eed98323578f46f839f5f6c64338dfc
SHA14dc77f40c882fdfe042901c9fb68aa135af479d5
SHA256d712ad3d82844421f04e1bf98a132095ba7f82be0fa97318cbfe04df82f78eaa
SHA512fcf9cf522cac5a410d5fdddf419781d9c258513c49a0ce5769dac3f986a03dc4d7760dc1eb7091e4d2849a3534d54d3a1be0274868c1faac1208470a192efbc7
-
Filesize
377KB
MD58eed98323578f46f839f5f6c64338dfc
SHA14dc77f40c882fdfe042901c9fb68aa135af479d5
SHA256d712ad3d82844421f04e1bf98a132095ba7f82be0fa97318cbfe04df82f78eaa
SHA512fcf9cf522cac5a410d5fdddf419781d9c258513c49a0ce5769dac3f986a03dc4d7760dc1eb7091e4d2849a3534d54d3a1be0274868c1faac1208470a192efbc7
-
Filesize
206KB
MD579185704d68a7ef140e654d57f1c33ed
SHA1a719b91b5c194370740dce31ea1bb87df9f21013
SHA256946aa3032db6ad8b1b9c4a7dfafd8de9c5b37675242a8420a454a509f54595eb
SHA5120616421dfa11659ed76318fe11383d14bd78d1488af9a86a112753e912e728a31b9e5adb2414011c95d8c1851895f199350d85c1268baee1078fafb6ff19f553
-
Filesize
206KB
MD579185704d68a7ef140e654d57f1c33ed
SHA1a719b91b5c194370740dce31ea1bb87df9f21013
SHA256946aa3032db6ad8b1b9c4a7dfafd8de9c5b37675242a8420a454a509f54595eb
SHA5120616421dfa11659ed76318fe11383d14bd78d1488af9a86a112753e912e728a31b9e5adb2414011c95d8c1851895f199350d85c1268baee1078fafb6ff19f553
-
Filesize
13KB
MD5a2de3437fd394e851c67f6dc784bc824
SHA195a75d842945c6d63311834142f4d4d9137cde2c
SHA2568781273cf757bca88ea113b36d68f6d41b15731e28a6e6b543db46213959b77b
SHA512b7189d95121584fccfb3255bd58b42cceafdc900f831dd373e8d79cf412f16a64e14c2b3271af844d7ab7845df0eb3b87df5202fcc7578d12d6641a084202b82
-
Filesize
172KB
MD59e85716659a76beb7375ef8dc976e218
SHA163d6a65f9691565997db57282f5f34d650433c20
SHA25652ac8970fc5ebc37c8d2ba0c1593a4f27e28f87e5d07f2555d59bb0b4c420de9
SHA512625efffee846230ae4d493b0d213813ff275a636662acb7f4bf498c1f692e9758aa6163fd10e70ff69b5c388eae26f46a505fad4654e05f85893bc748bdac1a7
-
Filesize
172KB
MD59e85716659a76beb7375ef8dc976e218
SHA163d6a65f9691565997db57282f5f34d650433c20
SHA25652ac8970fc5ebc37c8d2ba0c1593a4f27e28f87e5d07f2555d59bb0b4c420de9
SHA512625efffee846230ae4d493b0d213813ff275a636662acb7f4bf498c1f692e9758aa6163fd10e70ff69b5c388eae26f46a505fad4654e05f85893bc748bdac1a7