Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
07-06-2023 14:26
Static task
static1
Behavioral task
behavioral1
Sample
9f9a8f03e100f12030d73b34f62944c8b851eb04c06a0f9da98afd7245020e1c.exe
Resource
win10v2004-20230221-en
General
-
Target
9f9a8f03e100f12030d73b34f62944c8b851eb04c06a0f9da98afd7245020e1c.exe
-
Size
723KB
-
MD5
e01d061e764b307a186b15bb8742f2ba
-
SHA1
609e349a94960cf57e396f53de2c0a3485051f5e
-
SHA256
9f9a8f03e100f12030d73b34f62944c8b851eb04c06a0f9da98afd7245020e1c
-
SHA512
c8c0120ab4880541c49a14234ae3ec1e572d01b778c4ab6c6feba95d58254b0c8587c985d82ff628fe54f438379bc2accada65d270869170087f49c263d851c6
-
SSDEEP
12288:jMr5y90jseUfar5kQFlQW5mXI2m14FFozVtuFBLSIJyOywRbfI8TM+qR:6yknrrRmXI2c4FF2CB27OJRbfI8TMh
Malware Config
Extracted
redline
diza
83.97.73.129:19068
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k7961037.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k7961037.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection k7961037.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k7961037.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k7961037.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k7961037.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/files/0x0003000000000737-174.dat family_redline behavioral1/files/0x0003000000000737-175.dat family_redline behavioral1/memory/4496-176-0x0000000000DD0000-0x0000000000E00000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 4672 y6250742.exe 2696 y6355252.exe 1340 y2034899.exe 3592 j3766281.exe 216 k7961037.exe 4496 l4349255.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" k7961037.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y6250742.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y6250742.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y6355252.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y6355252.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y2034899.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" y2034899.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9f9a8f03e100f12030d73b34f62944c8b851eb04c06a0f9da98afd7245020e1c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9f9a8f03e100f12030d73b34f62944c8b851eb04c06a0f9da98afd7245020e1c.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3592 set thread context of 4464 3592 j3766281.exe 91 -
Program crash 1 IoCs
pid pid_target Process procid_target 4676 3592 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4464 AppLaunch.exe 4464 AppLaunch.exe 216 k7961037.exe 216 k7961037.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4464 AppLaunch.exe Token: SeDebugPrivilege 216 k7961037.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 3484 wrote to memory of 4672 3484 9f9a8f03e100f12030d73b34f62944c8b851eb04c06a0f9da98afd7245020e1c.exe 86 PID 3484 wrote to memory of 4672 3484 9f9a8f03e100f12030d73b34f62944c8b851eb04c06a0f9da98afd7245020e1c.exe 86 PID 3484 wrote to memory of 4672 3484 9f9a8f03e100f12030d73b34f62944c8b851eb04c06a0f9da98afd7245020e1c.exe 86 PID 4672 wrote to memory of 2696 4672 y6250742.exe 87 PID 4672 wrote to memory of 2696 4672 y6250742.exe 87 PID 4672 wrote to memory of 2696 4672 y6250742.exe 87 PID 2696 wrote to memory of 1340 2696 y6355252.exe 88 PID 2696 wrote to memory of 1340 2696 y6355252.exe 88 PID 2696 wrote to memory of 1340 2696 y6355252.exe 88 PID 1340 wrote to memory of 3592 1340 y2034899.exe 89 PID 1340 wrote to memory of 3592 1340 y2034899.exe 89 PID 1340 wrote to memory of 3592 1340 y2034899.exe 89 PID 3592 wrote to memory of 4464 3592 j3766281.exe 91 PID 3592 wrote to memory of 4464 3592 j3766281.exe 91 PID 3592 wrote to memory of 4464 3592 j3766281.exe 91 PID 3592 wrote to memory of 4464 3592 j3766281.exe 91 PID 3592 wrote to memory of 4464 3592 j3766281.exe 91 PID 1340 wrote to memory of 216 1340 y2034899.exe 94 PID 1340 wrote to memory of 216 1340 y2034899.exe 94 PID 2696 wrote to memory of 4496 2696 y6355252.exe 95 PID 2696 wrote to memory of 4496 2696 y6355252.exe 95 PID 2696 wrote to memory of 4496 2696 y6355252.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f9a8f03e100f12030d73b34f62944c8b851eb04c06a0f9da98afd7245020e1c.exe"C:\Users\Admin\AppData\Local\Temp\9f9a8f03e100f12030d73b34f62944c8b851eb04c06a0f9da98afd7245020e1c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6250742.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6250742.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6355252.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6355252.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y2034899.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y2034899.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\j3766281.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\j3766281.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3592 -s 1366⤵
- Program crash
PID:4676
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\k7961037.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\k7961037.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:216
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l4349255.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l4349255.exe4⤵
- Executes dropped EXE
PID:4496
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3592 -ip 35921⤵PID:1488
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
524KB
MD5cf8ea11ef34e04c984f1134456cfe1ec
SHA158299c40306e7432c2183730ffa2057aa2940e4f
SHA256136eaefe22f1fd2d5fc059c90b7ba0cd624e23ce7d620ba70931b723a408df40
SHA512bb594896284e698ced321006bf8cf85014b78af0fdf3c1135aca06bb5493045c478ef3f8193cb6924d66bca359a6bfb73e622db82e07a6981df6ed1962436730
-
Filesize
524KB
MD5cf8ea11ef34e04c984f1134456cfe1ec
SHA158299c40306e7432c2183730ffa2057aa2940e4f
SHA256136eaefe22f1fd2d5fc059c90b7ba0cd624e23ce7d620ba70931b723a408df40
SHA512bb594896284e698ced321006bf8cf85014b78af0fdf3c1135aca06bb5493045c478ef3f8193cb6924d66bca359a6bfb73e622db82e07a6981df6ed1962436730
-
Filesize
352KB
MD54962b93ba2a6b0a2d8d1c5b2d362e0a9
SHA102d03b2463dc71e8fec126b0ca6b2ed9b22e7f37
SHA25611d230335e0ce121441edb13e823602af75e69dbde3d3c0b0c320bcc2d8c8d49
SHA512d168e737fe7f68920ca5ebbc96c2bd671da9411e0818de83a288c88144d0f3b36a79ff0a4b99319f0325128f2e546a8aa97757974d92db47b7156d28d198b8fb
-
Filesize
352KB
MD54962b93ba2a6b0a2d8d1c5b2d362e0a9
SHA102d03b2463dc71e8fec126b0ca6b2ed9b22e7f37
SHA25611d230335e0ce121441edb13e823602af75e69dbde3d3c0b0c320bcc2d8c8d49
SHA512d168e737fe7f68920ca5ebbc96c2bd671da9411e0818de83a288c88144d0f3b36a79ff0a4b99319f0325128f2e546a8aa97757974d92db47b7156d28d198b8fb
-
Filesize
172KB
MD5aa7d7c70f1f5e0905c309ebc1b6ccb7c
SHA102811f162ece6260138eaa27e44bd88c482ca870
SHA25652e4f967117a629fcff91b2f35949dc70c2bd904c0b0223c1bc95fb283f9ae12
SHA512e7e284afd49309dcd5a61a4066aed68594c11cd10242d5c23740fb8542ebec634705fbcd6a9b4acf38d5d059954fc657ee869431eff4f95249c1111fa4a1412b
-
Filesize
172KB
MD5aa7d7c70f1f5e0905c309ebc1b6ccb7c
SHA102811f162ece6260138eaa27e44bd88c482ca870
SHA25652e4f967117a629fcff91b2f35949dc70c2bd904c0b0223c1bc95fb283f9ae12
SHA512e7e284afd49309dcd5a61a4066aed68594c11cd10242d5c23740fb8542ebec634705fbcd6a9b4acf38d5d059954fc657ee869431eff4f95249c1111fa4a1412b
-
Filesize
197KB
MD5d72dab9f677625eea911cee31687d14e
SHA12c60339aa12acad47cd886085d1caf2e61bb8df7
SHA2560bde3dd339a9d36e87bb07ebed436d77908803bf60f72979e0faeff66edd04aa
SHA512fb0d5bbad4b7acec064e12c5b43ef89338eae2ee54aa0e4ffc3c9233e0d94fdff447426ae4cd8fe86c03fcd263813f8b6b979a1cbcbca55359abc9de844887a5
-
Filesize
197KB
MD5d72dab9f677625eea911cee31687d14e
SHA12c60339aa12acad47cd886085d1caf2e61bb8df7
SHA2560bde3dd339a9d36e87bb07ebed436d77908803bf60f72979e0faeff66edd04aa
SHA512fb0d5bbad4b7acec064e12c5b43ef89338eae2ee54aa0e4ffc3c9233e0d94fdff447426ae4cd8fe86c03fcd263813f8b6b979a1cbcbca55359abc9de844887a5
-
Filesize
100KB
MD584b05ade2d01f249b7014de75d6a74ac
SHA184d8d4b382b39e9183da17e2154d1b17ea763795
SHA256f763bc0b464c28d2f4115b0865f2793bb91dc042e6f27074b68e3fb92b21c079
SHA512b5755dd1ab2177f61db6c900be318286f932c5e19c298c5a10eb3c204e3705e222cde1b8634ccc1e6bec79a8926290e4b67497afaf8f685c22816b12f5c67897
-
Filesize
100KB
MD584b05ade2d01f249b7014de75d6a74ac
SHA184d8d4b382b39e9183da17e2154d1b17ea763795
SHA256f763bc0b464c28d2f4115b0865f2793bb91dc042e6f27074b68e3fb92b21c079
SHA512b5755dd1ab2177f61db6c900be318286f932c5e19c298c5a10eb3c204e3705e222cde1b8634ccc1e6bec79a8926290e4b67497afaf8f685c22816b12f5c67897
-
Filesize
11KB
MD5d0c6e9f85c4b7bf0319c0601999b41f7
SHA1cb002d18a27e52cad8a227c5d9b330df8fbfb359
SHA2569b54b66523adbb1590dd20f1ff406c83ca68c03af8300da2777f032f9e97f998
SHA512b8719f06f9b468a4952c92cfe979e76abf394fbbd813f47ae50c945ae93d4b0d297116ac7daf3d26af1cd544f0eb689c09c043370f5c6615cfae68ae7270a418
-
Filesize
11KB
MD5d0c6e9f85c4b7bf0319c0601999b41f7
SHA1cb002d18a27e52cad8a227c5d9b330df8fbfb359
SHA2569b54b66523adbb1590dd20f1ff406c83ca68c03af8300da2777f032f9e97f998
SHA512b8719f06f9b468a4952c92cfe979e76abf394fbbd813f47ae50c945ae93d4b0d297116ac7daf3d26af1cd544f0eb689c09c043370f5c6615cfae68ae7270a418