Analysis
-
max time kernel
133s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-06-2023 11:42
Static task
static1
Behavioral task
behavioral1
Sample
08259899.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
08259899.exe
Resource
win10v2004-20230220-en
General
-
Target
08259899.exe
-
Size
585KB
-
MD5
48fd57fde93bc3ea676506d9bc86ec90
-
SHA1
9768e0856cf7ce7b08609292dac2bc9546f70803
-
SHA256
e3420fc8be6b383d3c81fc05dea3d7243d88f8c58d946e120fc49115412017a2
-
SHA512
c65362f0cfbb7fcfd1ad6ded1bcd81ed215b6f9f785b5d90c40e6ef103f1063c2c944d413ca22361924e1b635eac95449123ea8e36f16ce0ae468c7602953ac3
-
SSDEEP
12288:lMrMy900rOFPjYRfLUWvxD/5D6pwIMbByl8V3oVpsFLJZy:xyhgYNLlF5D6poByNVpo7y
Malware Config
Extracted
redline
diza
83.97.73.126:19048
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection k6294941.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k6294941.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k6294941.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k6294941.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k6294941.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k6294941.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 564 y9454163.exe 2008 y7752669.exe 3612 k6294941.exe 3392 l9052720.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" k6294941.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y7752669.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y7752669.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 08259899.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 08259899.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y9454163.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y9454163.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 3612 k6294941.exe 3612 k6294941.exe 3392 l9052720.exe 3392 l9052720.exe 3392 l9052720.exe 3392 l9052720.exe 3392 l9052720.exe 3392 l9052720.exe 3392 l9052720.exe 3392 l9052720.exe 3392 l9052720.exe 3392 l9052720.exe 3392 l9052720.exe 3392 l9052720.exe 3392 l9052720.exe 3392 l9052720.exe 3392 l9052720.exe 3392 l9052720.exe 3392 l9052720.exe 3392 l9052720.exe 3392 l9052720.exe 3392 l9052720.exe 3392 l9052720.exe 3392 l9052720.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3612 k6294941.exe Token: SeDebugPrivilege 3392 l9052720.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 5052 wrote to memory of 564 5052 08259899.exe 85 PID 5052 wrote to memory of 564 5052 08259899.exe 85 PID 5052 wrote to memory of 564 5052 08259899.exe 85 PID 564 wrote to memory of 2008 564 y9454163.exe 86 PID 564 wrote to memory of 2008 564 y9454163.exe 86 PID 564 wrote to memory of 2008 564 y9454163.exe 86 PID 2008 wrote to memory of 3612 2008 y7752669.exe 87 PID 2008 wrote to memory of 3612 2008 y7752669.exe 87 PID 2008 wrote to memory of 3392 2008 y7752669.exe 88 PID 2008 wrote to memory of 3392 2008 y7752669.exe 88 PID 2008 wrote to memory of 3392 2008 y7752669.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\08259899.exe"C:\Users\Admin\AppData\Local\Temp\08259899.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9454163.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9454163.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y7752669.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y7752669.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k6294941.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k6294941.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3612
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l9052720.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l9052720.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3392
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD546afa44e4e1ec95815aaa6d25a5ff3cd
SHA1ad7a1a73faa677adc1c5ddfab32fe6af070bd977
SHA256f35e633855fe2d8bc3ba4afaa949f35e63d645dfe1f17afa6de79efe851dfb11
SHA5125158bd75d29d21a33021d29a795208aaa231a0976fe037fab2bf04b8b0f5724343f30c32002b8236e1974bf1af87627c69fb06fbff0cf048440db4f958e80bd0
-
Filesize
377KB
MD546afa44e4e1ec95815aaa6d25a5ff3cd
SHA1ad7a1a73faa677adc1c5ddfab32fe6af070bd977
SHA256f35e633855fe2d8bc3ba4afaa949f35e63d645dfe1f17afa6de79efe851dfb11
SHA5125158bd75d29d21a33021d29a795208aaa231a0976fe037fab2bf04b8b0f5724343f30c32002b8236e1974bf1af87627c69fb06fbff0cf048440db4f958e80bd0
-
Filesize
206KB
MD5d0077dcfc462dd25521cff19de64ea59
SHA11781bf807c41aa3b3caf493e0503afd215f497de
SHA256852bd972e543f61432ff6ca4d3547649cf4b63e65b340153cb912a5ce639b896
SHA512381573feda29c8b7528814157c9dd4f84a3fae1e12a4b03dbebf78f0174e4b82cd88b2177b5c59d254d904ae1ad2453000dbf3b06329a2ced5b853c33c330456
-
Filesize
206KB
MD5d0077dcfc462dd25521cff19de64ea59
SHA11781bf807c41aa3b3caf493e0503afd215f497de
SHA256852bd972e543f61432ff6ca4d3547649cf4b63e65b340153cb912a5ce639b896
SHA512381573feda29c8b7528814157c9dd4f84a3fae1e12a4b03dbebf78f0174e4b82cd88b2177b5c59d254d904ae1ad2453000dbf3b06329a2ced5b853c33c330456
-
Filesize
13KB
MD5c8ffef0f74daf1371e0c34cda29dabb9
SHA1cbe06286918051ae45e5e11120b2cf49e00f7d86
SHA256b2d3f56be024f288423be750240b42312c6c97c5973caf58906f8196790f0d14
SHA512de01e3adf8255da86180aceeddec10690ce8f1c40bdc65d81023934bb73a8656ce9c65fd43fcae344ac01cad9ca55765dde5e636eeb95ee39d3e802851e10d66
-
Filesize
13KB
MD5c8ffef0f74daf1371e0c34cda29dabb9
SHA1cbe06286918051ae45e5e11120b2cf49e00f7d86
SHA256b2d3f56be024f288423be750240b42312c6c97c5973caf58906f8196790f0d14
SHA512de01e3adf8255da86180aceeddec10690ce8f1c40bdc65d81023934bb73a8656ce9c65fd43fcae344ac01cad9ca55765dde5e636eeb95ee39d3e802851e10d66
-
Filesize
172KB
MD57eb9e2e5f30e56c6929360ba44ea1085
SHA1b53421e7a9ec49ebacd48bc51c59904cb2452d47
SHA2568c497e715ba002c8d1fd66438f419bc5c99ca3ad06e2777c775c1a8bd663e491
SHA512e5b5f29a6a5c1b1d9f01bc1eb3154386407bdba825b72c225edc316b35c9545ec3e59b5c762fe84c44760dcf87da239f5098d0b03e5a7413a5bfde9329be674e
-
Filesize
172KB
MD57eb9e2e5f30e56c6929360ba44ea1085
SHA1b53421e7a9ec49ebacd48bc51c59904cb2452d47
SHA2568c497e715ba002c8d1fd66438f419bc5c99ca3ad06e2777c775c1a8bd663e491
SHA512e5b5f29a6a5c1b1d9f01bc1eb3154386407bdba825b72c225edc316b35c9545ec3e59b5c762fe84c44760dcf87da239f5098d0b03e5a7413a5bfde9329be674e