Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-06-2023 15:47
Static task
static1
Behavioral task
behavioral1
Sample
09811099.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
09811099.exe
Resource
win10v2004-20230220-en
General
-
Target
09811099.exe
-
Size
737KB
-
MD5
9968629604b0af2009ef3e43a792358f
-
SHA1
f535bd273a8c8f2d77c2fe35df5211ec7da3fe3c
-
SHA256
c696584fb5084e55156a6246b2ca1e8da0331253c283751408f64cf0a3061119
-
SHA512
5a7f071e5b7d6de7d2285b6109472bc335c108f7292967962193ab4159f365ad9c5b688f8e3849163daf8688861a0942b663dbb4052dce7efda582fe428ee13f
-
SSDEEP
12288:HMrNy90BT5JxRaLfMLXGvd3Lr/Dv3UM8wlimOAAhKeJJqkKxcoZ:GymxaL2Glbr/AtgcLhxqTZ
Malware Config
Extracted
redline
diza
83.97.73.126:19048
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k2514076.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection k2514076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k2514076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k2514076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k2514076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k2514076.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
pid Process 1088 y2133624.exe 1652 y4419937.exe 3944 y8575116.exe 3836 j7589791.exe 3504 k2514076.exe 4404 l5243724.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" k2514076.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y8575116.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" y8575116.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 09811099.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 09811099.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y2133624.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y2133624.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y4419937.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y4419937.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3836 set thread context of 4776 3836 j7589791.exe 90 -
Program crash 1 IoCs
pid pid_target Process procid_target 2352 3836 WerFault.exe 88 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4776 AppLaunch.exe 4776 AppLaunch.exe 3504 k2514076.exe 3504 k2514076.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4776 AppLaunch.exe Token: SeDebugPrivilege 3504 k2514076.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2392 wrote to memory of 1088 2392 09811099.exe 85 PID 2392 wrote to memory of 1088 2392 09811099.exe 85 PID 2392 wrote to memory of 1088 2392 09811099.exe 85 PID 1088 wrote to memory of 1652 1088 y2133624.exe 86 PID 1088 wrote to memory of 1652 1088 y2133624.exe 86 PID 1088 wrote to memory of 1652 1088 y2133624.exe 86 PID 1652 wrote to memory of 3944 1652 y4419937.exe 87 PID 1652 wrote to memory of 3944 1652 y4419937.exe 87 PID 1652 wrote to memory of 3944 1652 y4419937.exe 87 PID 3944 wrote to memory of 3836 3944 y8575116.exe 88 PID 3944 wrote to memory of 3836 3944 y8575116.exe 88 PID 3944 wrote to memory of 3836 3944 y8575116.exe 88 PID 3836 wrote to memory of 4776 3836 j7589791.exe 90 PID 3836 wrote to memory of 4776 3836 j7589791.exe 90 PID 3836 wrote to memory of 4776 3836 j7589791.exe 90 PID 3836 wrote to memory of 4776 3836 j7589791.exe 90 PID 3836 wrote to memory of 4776 3836 j7589791.exe 90 PID 3944 wrote to memory of 3504 3944 y8575116.exe 93 PID 3944 wrote to memory of 3504 3944 y8575116.exe 93 PID 1652 wrote to memory of 4404 1652 y4419937.exe 94 PID 1652 wrote to memory of 4404 1652 y4419937.exe 94 PID 1652 wrote to memory of 4404 1652 y4419937.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\09811099.exe"C:\Users\Admin\AppData\Local\Temp\09811099.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2133624.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2133624.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y4419937.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y4419937.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y8575116.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y8575116.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\j7589791.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\j7589791.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4776
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3836 -s 1486⤵
- Program crash
PID:2352
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\k2514076.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\k2514076.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3504
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l5243724.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l5243724.exe4⤵
- Executes dropped EXE
PID:4404
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3836 -ip 38361⤵PID:4292
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
531KB
MD5348d3f5ef7fc94477649cc30df1e72e4
SHA1797066839be3c582f90765a18deadb0f4e569c10
SHA256a1dd48565b08de5c64505d72a48e23d721641592b8cade546a1239cb6cf52525
SHA512f4907171472854d177bca490e62ca1874f8e81f608d117b7c3fdc96b20cc5ede31a9c821a1d6702a1781fb3ea3b5572c489bbcab7fdf06c035788f89d5559aef
-
Filesize
531KB
MD5348d3f5ef7fc94477649cc30df1e72e4
SHA1797066839be3c582f90765a18deadb0f4e569c10
SHA256a1dd48565b08de5c64505d72a48e23d721641592b8cade546a1239cb6cf52525
SHA512f4907171472854d177bca490e62ca1874f8e81f608d117b7c3fdc96b20cc5ede31a9c821a1d6702a1781fb3ea3b5572c489bbcab7fdf06c035788f89d5559aef
-
Filesize
359KB
MD5b3fb0453c0286a5e5c0bffd88ac125c0
SHA1da26d2b2e61f8dd3d178bb956bed26c9325f704e
SHA2560ab78f332790f3ee1255f5c485c23676d44de35359f33f89b896e46550ea5103
SHA512a7f7e7c0fd456aea031b2c080f6b4a7c73d0d8fdb97faac6c04478e93f8ca8838a3f7605e5858bf5e16876340b273fd430725f236aa04b97a191400e11da410d
-
Filesize
359KB
MD5b3fb0453c0286a5e5c0bffd88ac125c0
SHA1da26d2b2e61f8dd3d178bb956bed26c9325f704e
SHA2560ab78f332790f3ee1255f5c485c23676d44de35359f33f89b896e46550ea5103
SHA512a7f7e7c0fd456aea031b2c080f6b4a7c73d0d8fdb97faac6c04478e93f8ca8838a3f7605e5858bf5e16876340b273fd430725f236aa04b97a191400e11da410d
-
Filesize
172KB
MD537656b8d1ada38e9cb62de9264ab2c5c
SHA1274b0e756180e5b25e9ed76a98c511ebed4821b3
SHA256b73bf7888d5ae3876f051289dbc5e42160b6023246aa7fedd07097f821635d84
SHA51266542906c03933689aeaa798163a58a13a8c85f68c1f2ed35cb22e1220db646cfbc6fa0fd3ac0c94db7ae761e03de53aa7f072fdf5370d94bc88640c9e50920e
-
Filesize
172KB
MD537656b8d1ada38e9cb62de9264ab2c5c
SHA1274b0e756180e5b25e9ed76a98c511ebed4821b3
SHA256b73bf7888d5ae3876f051289dbc5e42160b6023246aa7fedd07097f821635d84
SHA51266542906c03933689aeaa798163a58a13a8c85f68c1f2ed35cb22e1220db646cfbc6fa0fd3ac0c94db7ae761e03de53aa7f072fdf5370d94bc88640c9e50920e
-
Filesize
203KB
MD55fd738ac7cf7a144bec935fca4b26ded
SHA1a29f05a4aca015f9d7789c91fdb6c229ca8fee58
SHA2561d1055607540f387b993cdca3c21da90ff3c2dcbff16d4e25c6b3939d2ac4297
SHA512737b790d77da05547652eef1003e01f267f491d36d9df15cfaba483c35fa84e004bdaca7bc7d7a5667101f82d6abf92ddcaeceae135650a78452feff4fea5e16
-
Filesize
203KB
MD55fd738ac7cf7a144bec935fca4b26ded
SHA1a29f05a4aca015f9d7789c91fdb6c229ca8fee58
SHA2561d1055607540f387b993cdca3c21da90ff3c2dcbff16d4e25c6b3939d2ac4297
SHA512737b790d77da05547652eef1003e01f267f491d36d9df15cfaba483c35fa84e004bdaca7bc7d7a5667101f82d6abf92ddcaeceae135650a78452feff4fea5e16
-
Filesize
120KB
MD50143b81b956191a04f6d42e1ffce3942
SHA19b11d17c1be424384b55cab5d3ed99f9bd376726
SHA256c6665d7852dee446a69529528918ad19b5a43a68f6d6566ae727d9dfbe05c0f5
SHA5129355386ca7cc476904d8c3e84936e22e94eee2ad9d435efd011a1081f488b5ba37dbae663f075ca9793cd58d351869a3e8436eb19c0fe500b833bbb6c16a7912
-
Filesize
120KB
MD50143b81b956191a04f6d42e1ffce3942
SHA19b11d17c1be424384b55cab5d3ed99f9bd376726
SHA256c6665d7852dee446a69529528918ad19b5a43a68f6d6566ae727d9dfbe05c0f5
SHA5129355386ca7cc476904d8c3e84936e22e94eee2ad9d435efd011a1081f488b5ba37dbae663f075ca9793cd58d351869a3e8436eb19c0fe500b833bbb6c16a7912
-
Filesize
14KB
MD5d16bf3ddf75c422b042ccb9bcafc6fd3
SHA1c592fb480fa0fddf86ecb50d848ac4173d950214
SHA2562e3addfd795bc7e1ab11f85464282a1be9afdac2ff65aeb3505dcfd5091abe8f
SHA512cc559d6035277de612542052937eaed66feab2fd052438ac0eaab3f861e3b611a1ea1eb1bb9cba050d21bb8663492c3e6701fe93eb90650587e8bbdcedb0b0c9
-
Filesize
14KB
MD5d16bf3ddf75c422b042ccb9bcafc6fd3
SHA1c592fb480fa0fddf86ecb50d848ac4173d950214
SHA2562e3addfd795bc7e1ab11f85464282a1be9afdac2ff65aeb3505dcfd5091abe8f
SHA512cc559d6035277de612542052937eaed66feab2fd052438ac0eaab3f861e3b611a1ea1eb1bb9cba050d21bb8663492c3e6701fe93eb90650587e8bbdcedb0b0c9