Analysis
-
max time kernel
125s -
max time network
143s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
19-08-2023 14:03
Static task
static1
Behavioral task
behavioral1
Sample
92a3d02de3d565d66a741a56571f96c5317ad26eb276d5f0f61d08a460e461a4.exe
Resource
win10-20230703-en
General
-
Target
92a3d02de3d565d66a741a56571f96c5317ad26eb276d5f0f61d08a460e461a4.exe
-
Size
1013KB
-
MD5
c5f74e9fc0d13d755b4f7a717e4df9db
-
SHA1
7fbddd16c96fd2ab4b591d0f1d769044955a517e
-
SHA256
92a3d02de3d565d66a741a56571f96c5317ad26eb276d5f0f61d08a460e461a4
-
SHA512
4116f2766fa0a5947a704b2f1fcba0f395f9ba07f25b2a41e59f27e5616d75a08db4f8c9a3328866010b4a21f960557bc3b9c87c0425d007c1376762c9fc9bf9
-
SSDEEP
24576:SyotZnvEVZMZxFzeoNoHXQgBaADY5ANJ8WkLu5z339WdV:5csVZNgo3fB05AN/5z3tW
Malware Config
Extracted
redline
jonka
77.91.124.73:19071
-
auth_value
c95bc30cd252fa6dff2a19fd78bfab4e
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a9557190.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a9557190.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a9557190.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a9557190.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a9557190.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 4812 v5817126.exe 2364 v7348554.exe 4572 v2891111.exe 2276 v9984553.exe 4172 a9557190.exe 3668 b9232342.exe 704 c1743446.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a9557190.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a9557190.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v9984553.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 92a3d02de3d565d66a741a56571f96c5317ad26eb276d5f0f61d08a460e461a4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v5817126.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v7348554.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v2891111.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4172 a9557190.exe 4172 a9557190.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4172 a9557190.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4980 wrote to memory of 4812 4980 92a3d02de3d565d66a741a56571f96c5317ad26eb276d5f0f61d08a460e461a4.exe 70 PID 4980 wrote to memory of 4812 4980 92a3d02de3d565d66a741a56571f96c5317ad26eb276d5f0f61d08a460e461a4.exe 70 PID 4980 wrote to memory of 4812 4980 92a3d02de3d565d66a741a56571f96c5317ad26eb276d5f0f61d08a460e461a4.exe 70 PID 4812 wrote to memory of 2364 4812 v5817126.exe 71 PID 4812 wrote to memory of 2364 4812 v5817126.exe 71 PID 4812 wrote to memory of 2364 4812 v5817126.exe 71 PID 2364 wrote to memory of 4572 2364 v7348554.exe 72 PID 2364 wrote to memory of 4572 2364 v7348554.exe 72 PID 2364 wrote to memory of 4572 2364 v7348554.exe 72 PID 4572 wrote to memory of 2276 4572 v2891111.exe 73 PID 4572 wrote to memory of 2276 4572 v2891111.exe 73 PID 4572 wrote to memory of 2276 4572 v2891111.exe 73 PID 2276 wrote to memory of 4172 2276 v9984553.exe 74 PID 2276 wrote to memory of 4172 2276 v9984553.exe 74 PID 2276 wrote to memory of 4172 2276 v9984553.exe 74 PID 2276 wrote to memory of 3668 2276 v9984553.exe 75 PID 2276 wrote to memory of 3668 2276 v9984553.exe 75 PID 2276 wrote to memory of 3668 2276 v9984553.exe 75 PID 4572 wrote to memory of 704 4572 v2891111.exe 76 PID 4572 wrote to memory of 704 4572 v2891111.exe 76 PID 4572 wrote to memory of 704 4572 v2891111.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\92a3d02de3d565d66a741a56571f96c5317ad26eb276d5f0f61d08a460e461a4.exe"C:\Users\Admin\AppData\Local\Temp\92a3d02de3d565d66a741a56571f96c5317ad26eb276d5f0f61d08a460e461a4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5817126.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5817126.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7348554.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7348554.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2891111.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2891111.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9984553.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9984553.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a9557190.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a9557190.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4172
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b9232342.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b9232342.exe6⤵
- Executes dropped EXE
PID:3668
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c1743446.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c1743446.exe5⤵
- Executes dropped EXE
PID:704
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
898KB
MD5fdadb11ef083bf295400525672de4193
SHA112a680873c7e098fc3cc1fd1950f9e96df4f9865
SHA256a1493a3aef384408fb102248f13aa3232457e46383563e2adbf2bf504c8c4604
SHA5122e66363ceaa18e6c55f2222d33ffcb8a4e73f9f48c36c1937047a358eb0bbf7482e7f930628161dc848c829fdaa5961df6470db65f1769c38bf24ffa81098b72
-
Filesize
898KB
MD5fdadb11ef083bf295400525672de4193
SHA112a680873c7e098fc3cc1fd1950f9e96df4f9865
SHA256a1493a3aef384408fb102248f13aa3232457e46383563e2adbf2bf504c8c4604
SHA5122e66363ceaa18e6c55f2222d33ffcb8a4e73f9f48c36c1937047a358eb0bbf7482e7f930628161dc848c829fdaa5961df6470db65f1769c38bf24ffa81098b72
-
Filesize
672KB
MD59b12fcc21abb947bc857ecdc7c88ed79
SHA150312c3616557fdb47076c201111daa895b44467
SHA256c7f82b2f5357471b8694a2ffd5ad1461bc3e1cc697f78f6b6b1e6a343b37b596
SHA51258fd94618b0845f3b5cbfe9c50f3a6ba7f210f622eb467544dd1be8f1a4e26f0c6373c915583bbf9c9cfe31774e53267fd2d0db5418d8018f12b333ba90d0164
-
Filesize
672KB
MD59b12fcc21abb947bc857ecdc7c88ed79
SHA150312c3616557fdb47076c201111daa895b44467
SHA256c7f82b2f5357471b8694a2ffd5ad1461bc3e1cc697f78f6b6b1e6a343b37b596
SHA51258fd94618b0845f3b5cbfe9c50f3a6ba7f210f622eb467544dd1be8f1a4e26f0c6373c915583bbf9c9cfe31774e53267fd2d0db5418d8018f12b333ba90d0164
-
Filesize
547KB
MD517fa57c46e30918b354e0cdb80fa2d76
SHA15b25ffa46a55a4df271a4dd44d0ed124c1b7b3a4
SHA256933e05241fc1f7298764f8e5367998862a517c429352382508ba44593c4ca710
SHA5122afba2a3f8526f1104fd1c27ba0b767c8c5e33785aa2e5f652d992aba0bb30c48c2053159d46fe594bedb6f64b276d4fecb023c98c6284ccf15ff7e07781077c
-
Filesize
547KB
MD517fa57c46e30918b354e0cdb80fa2d76
SHA15b25ffa46a55a4df271a4dd44d0ed124c1b7b3a4
SHA256933e05241fc1f7298764f8e5367998862a517c429352382508ba44593c4ca710
SHA5122afba2a3f8526f1104fd1c27ba0b767c8c5e33785aa2e5f652d992aba0bb30c48c2053159d46fe594bedb6f64b276d4fecb023c98c6284ccf15ff7e07781077c
-
Filesize
174KB
MD52873b8b66a547327aef437fc48099ffd
SHA17fb523346dc975c538e5d27b1cd657c39b267d42
SHA256d1cad7ca6edfcb9fccce2ef66023d1b652c6adcfc5ec6589034876e9d754d6ff
SHA512c73ce31d8b4a7ff4f44f5cef0789afe12a0942cb59e9d6d5fe0797923f27afad59572eadeb6905672a3d7b27fe75316eac5d76714ecc4da74f014c6ec23a80e7
-
Filesize
174KB
MD52873b8b66a547327aef437fc48099ffd
SHA17fb523346dc975c538e5d27b1cd657c39b267d42
SHA256d1cad7ca6edfcb9fccce2ef66023d1b652c6adcfc5ec6589034876e9d754d6ff
SHA512c73ce31d8b4a7ff4f44f5cef0789afe12a0942cb59e9d6d5fe0797923f27afad59572eadeb6905672a3d7b27fe75316eac5d76714ecc4da74f014c6ec23a80e7
-
Filesize
391KB
MD5571c00be7b9cbfcdcee50fd15ad7f21f
SHA114a84fdb23d030a3fafbb14b159f0d58501c7189
SHA2569e93b1f5db93155fd97d419f698c5dd4210e4a01b1aa8a841c6e5540c277fe1d
SHA5128e047739a2c25f3feb3efc885d5651201685fde7d29762f4eb2bca1344a4953dee8e5f68ab525f8389eb1101750dd8465b4af392e7421b687f0bd3c4dd9e7f7e
-
Filesize
391KB
MD5571c00be7b9cbfcdcee50fd15ad7f21f
SHA114a84fdb23d030a3fafbb14b159f0d58501c7189
SHA2569e93b1f5db93155fd97d419f698c5dd4210e4a01b1aa8a841c6e5540c277fe1d
SHA5128e047739a2c25f3feb3efc885d5651201685fde7d29762f4eb2bca1344a4953dee8e5f68ab525f8389eb1101750dd8465b4af392e7421b687f0bd3c4dd9e7f7e
-
Filesize
268KB
MD58790fb715f1a652c4d549a98533bda82
SHA11308b9102bb330dcf40f5fddedc15332cb434e68
SHA2564779838631e661f0c609646b52c0429c82f952c99b28103ed05fcffc778782f7
SHA512249a214dee583b10d6303330aff421cbb73e92e9fdb05cbffbb52635ca17f21e2ab13fa06dcb578bd9a158353e5212f356d4aae4832dd1ebe891abf7a51a64b4
-
Filesize
268KB
MD58790fb715f1a652c4d549a98533bda82
SHA11308b9102bb330dcf40f5fddedc15332cb434e68
SHA2564779838631e661f0c609646b52c0429c82f952c99b28103ed05fcffc778782f7
SHA512249a214dee583b10d6303330aff421cbb73e92e9fdb05cbffbb52635ca17f21e2ab13fa06dcb578bd9a158353e5212f356d4aae4832dd1ebe891abf7a51a64b4
-
Filesize
140KB
MD504cba969879eb44387e53ed42f474ffc
SHA15232c20370e125f0bb1f5bdd858253f492125483
SHA256119c842d3037762fc6de08df5927d13b70055dcbaa9b08813b8b699cca05ae4a
SHA512946da0fc06917a482c0fa41af6706dcf1a87ff926c3a765e4bb9bc90479bc682ea16d325cf66877505514b5a5e2f08e700bfa5a050fc986b76e4163370672dc8
-
Filesize
140KB
MD504cba969879eb44387e53ed42f474ffc
SHA15232c20370e125f0bb1f5bdd858253f492125483
SHA256119c842d3037762fc6de08df5927d13b70055dcbaa9b08813b8b699cca05ae4a
SHA512946da0fc06917a482c0fa41af6706dcf1a87ff926c3a765e4bb9bc90479bc682ea16d325cf66877505514b5a5e2f08e700bfa5a050fc986b76e4163370672dc8