Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/06/2023, 12:42
Static task
static1
Behavioral task
behavioral1
Sample
1455c02724f01860990caf7a8253ad58b32ad2b9ffb955c36205fc82473e222d.exe
Resource
win10v2004-20230220-en
General
-
Target
1455c02724f01860990caf7a8253ad58b32ad2b9ffb955c36205fc82473e222d.exe
-
Size
585KB
-
MD5
662bf19ee4d2d7012a4a992e481de2e0
-
SHA1
af801f5aba409e74a33df5d25411c4007ee7ca41
-
SHA256
1455c02724f01860990caf7a8253ad58b32ad2b9ffb955c36205fc82473e222d
-
SHA512
622e93a3321e0299b2d97163d31c5bddba42f442a2e8fc54d0d60ebf8c9195e3079e0e9293e2738d2992e2a2884b7f50c2e4ed3bd3434c980ba309430f203aef
-
SSDEEP
12288:QMrYy90QUTjhPtkCU+XWOBZhUTnBkmpCNI36YNWR:YylUTJXdBiWmpCNI36Ek
Malware Config
Extracted
redline
diza
83.97.73.126:19048
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection k2173268.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k2173268.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k2173268.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k2173268.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k2173268.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k2173268.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 1312 y6273343.exe 4368 y7422388.exe 1352 k2173268.exe 1880 l7452627.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" k2173268.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1455c02724f01860990caf7a8253ad58b32ad2b9ffb955c36205fc82473e222d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1455c02724f01860990caf7a8253ad58b32ad2b9ffb955c36205fc82473e222d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y6273343.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y6273343.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y7422388.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y7422388.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 1352 k2173268.exe 1352 k2173268.exe 1880 l7452627.exe 1880 l7452627.exe 1880 l7452627.exe 1880 l7452627.exe 1880 l7452627.exe 1880 l7452627.exe 1880 l7452627.exe 1880 l7452627.exe 1880 l7452627.exe 1880 l7452627.exe 1880 l7452627.exe 1880 l7452627.exe 1880 l7452627.exe 1880 l7452627.exe 1880 l7452627.exe 1880 l7452627.exe 1880 l7452627.exe 1880 l7452627.exe 1880 l7452627.exe 1880 l7452627.exe 1880 l7452627.exe 1880 l7452627.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1352 k2173268.exe Token: SeDebugPrivilege 1880 l7452627.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3612 wrote to memory of 1312 3612 1455c02724f01860990caf7a8253ad58b32ad2b9ffb955c36205fc82473e222d.exe 83 PID 3612 wrote to memory of 1312 3612 1455c02724f01860990caf7a8253ad58b32ad2b9ffb955c36205fc82473e222d.exe 83 PID 3612 wrote to memory of 1312 3612 1455c02724f01860990caf7a8253ad58b32ad2b9ffb955c36205fc82473e222d.exe 83 PID 1312 wrote to memory of 4368 1312 y6273343.exe 84 PID 1312 wrote to memory of 4368 1312 y6273343.exe 84 PID 1312 wrote to memory of 4368 1312 y6273343.exe 84 PID 4368 wrote to memory of 1352 4368 y7422388.exe 85 PID 4368 wrote to memory of 1352 4368 y7422388.exe 85 PID 4368 wrote to memory of 1880 4368 y7422388.exe 86 PID 4368 wrote to memory of 1880 4368 y7422388.exe 86 PID 4368 wrote to memory of 1880 4368 y7422388.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\1455c02724f01860990caf7a8253ad58b32ad2b9ffb955c36205fc82473e222d.exe"C:\Users\Admin\AppData\Local\Temp\1455c02724f01860990caf7a8253ad58b32ad2b9ffb955c36205fc82473e222d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6273343.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6273343.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y7422388.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y7422388.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k2173268.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k2173268.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1352
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l7452627.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l7452627.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1880
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD5e5566671a09ab4c079b3b205001dcdb0
SHA1f7d7fb5d22b22d5828c850569381c52745d6932a
SHA256106b6771ec7785e3dc1c7e84a1746da0abb34cb609098e28e1e65e625078f147
SHA5129b5fb54768ed50b0a6716bc0858abbfa2d61f1ce0f1bc9565ac4bc0ee5e04d15f9208469ea8a26ca5cc73a2fce8a8a3b64edd4b8ebb0fd9dce1b0249eafa4529
-
Filesize
377KB
MD5e5566671a09ab4c079b3b205001dcdb0
SHA1f7d7fb5d22b22d5828c850569381c52745d6932a
SHA256106b6771ec7785e3dc1c7e84a1746da0abb34cb609098e28e1e65e625078f147
SHA5129b5fb54768ed50b0a6716bc0858abbfa2d61f1ce0f1bc9565ac4bc0ee5e04d15f9208469ea8a26ca5cc73a2fce8a8a3b64edd4b8ebb0fd9dce1b0249eafa4529
-
Filesize
206KB
MD55b03e98f70a829b5c7609450a931fd8f
SHA1ed626d4d668cc2f5bb13a04bffa05481cc1e2380
SHA256aa2b356019b3b2d39c086a0f9bba0358b44c5f92dfbc87923ce3506033a3e88a
SHA512a120d2b2d444c535eb0d722415588f06938191bd0048bfea280d96eee161e6198aaf578288ffbd0a4999bca30e22b770c56aab95cf3f924a88a247a105b7a2b3
-
Filesize
206KB
MD55b03e98f70a829b5c7609450a931fd8f
SHA1ed626d4d668cc2f5bb13a04bffa05481cc1e2380
SHA256aa2b356019b3b2d39c086a0f9bba0358b44c5f92dfbc87923ce3506033a3e88a
SHA512a120d2b2d444c535eb0d722415588f06938191bd0048bfea280d96eee161e6198aaf578288ffbd0a4999bca30e22b770c56aab95cf3f924a88a247a105b7a2b3
-
Filesize
13KB
MD5da360dfb6d6ef212e1f4137f21ba6074
SHA16d22357ccf1642f7709e0b06e2cfacd40aae2d6d
SHA2560128d2b156e79df42f248301641f7857e2e293336959e2b56c469e3a42450f3d
SHA512cbb7fc6c0ff5601fdf2a57350ef39b6c81d0886e237818d10f9e9a4e6eefa0340a5973eff1a6ad8b3bb9c8d661c00ffd7c09c62d1de52d9bfa91a4ef70bc4aed
-
Filesize
13KB
MD5da360dfb6d6ef212e1f4137f21ba6074
SHA16d22357ccf1642f7709e0b06e2cfacd40aae2d6d
SHA2560128d2b156e79df42f248301641f7857e2e293336959e2b56c469e3a42450f3d
SHA512cbb7fc6c0ff5601fdf2a57350ef39b6c81d0886e237818d10f9e9a4e6eefa0340a5973eff1a6ad8b3bb9c8d661c00ffd7c09c62d1de52d9bfa91a4ef70bc4aed
-
Filesize
172KB
MD5128791d4ea48a33d45c844582d3111a1
SHA18cb355d49848f92ef53e0793717177bf8736b7c4
SHA256955b870ca5c3a7fedb340586fd51091da7270c5c49f0716040b2a4a5da622832
SHA5125fd74c2e3b350d25b37084e6c07c7ec804d34136b80460d8b3aa8d97ed6155d104a47a1640a04c14b41f5e26bea0f4d714342553f39d9e1d9558d836f8f491e9
-
Filesize
172KB
MD5128791d4ea48a33d45c844582d3111a1
SHA18cb355d49848f92ef53e0793717177bf8736b7c4
SHA256955b870ca5c3a7fedb340586fd51091da7270c5c49f0716040b2a4a5da622832
SHA5125fd74c2e3b350d25b37084e6c07c7ec804d34136b80460d8b3aa8d97ed6155d104a47a1640a04c14b41f5e26bea0f4d714342553f39d9e1d9558d836f8f491e9