Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
21/08/2023, 09:38
Static task
static1
Behavioral task
behavioral1
Sample
9aee09bfd2877ea6d0fe1e2ab20afba70413f9e4403009bc848e6cff7aba62be.exe
Resource
win10-20230703-en
General
-
Target
9aee09bfd2877ea6d0fe1e2ab20afba70413f9e4403009bc848e6cff7aba62be.exe
-
Size
947KB
-
MD5
0fe0029514ce00d3fa982efeebc9e8f6
-
SHA1
db1ded8ea4c2d225bbf0573be840e9d2bad26382
-
SHA256
9aee09bfd2877ea6d0fe1e2ab20afba70413f9e4403009bc848e6cff7aba62be
-
SHA512
9611a29d68231967740408b4c65b879eaa7b3aea97cd190508272e9a68311bf9ab28457627d36c57c267cac7b73271d3d0cc6e73e889b67da889d4686802ad83
-
SSDEEP
24576:qywU0U7S/ttMOMBzPiICqhPX8lBLdUakiXmxdM0xPmiyJu:xF0U7S/2PDfKbJZkiX0PPmR
Malware Config
Extracted
redline
chang
77.91.124.73:19071
-
auth_value
92b880db64e691d6bb290d1536ce7688
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a9591912.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a9591912.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a9591912.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a9591912.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a9591912.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 8 IoCs
pid Process 1200 v4045749.exe 4068 v8498726.exe 4516 v0648701.exe 1044 v3010117.exe 3396 a9591912.exe 224 b8621321.exe 320 gN9tqk1wbFzfj4u.exe 4480 c1042007.exe -
Loads dropped DLL 1 IoCs
pid Process 224 b8621321.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a9591912.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a9591912.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9aee09bfd2877ea6d0fe1e2ab20afba70413f9e4403009bc848e6cff7aba62be.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v4045749.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v8498726.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v0648701.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v3010117.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4080 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3396 a9591912.exe 3396 a9591912.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3396 a9591912.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3416 wrote to memory of 1200 3416 9aee09bfd2877ea6d0fe1e2ab20afba70413f9e4403009bc848e6cff7aba62be.exe 70 PID 3416 wrote to memory of 1200 3416 9aee09bfd2877ea6d0fe1e2ab20afba70413f9e4403009bc848e6cff7aba62be.exe 70 PID 3416 wrote to memory of 1200 3416 9aee09bfd2877ea6d0fe1e2ab20afba70413f9e4403009bc848e6cff7aba62be.exe 70 PID 1200 wrote to memory of 4068 1200 v4045749.exe 71 PID 1200 wrote to memory of 4068 1200 v4045749.exe 71 PID 1200 wrote to memory of 4068 1200 v4045749.exe 71 PID 4068 wrote to memory of 4516 4068 v8498726.exe 72 PID 4068 wrote to memory of 4516 4068 v8498726.exe 72 PID 4068 wrote to memory of 4516 4068 v8498726.exe 72 PID 4516 wrote to memory of 1044 4516 v0648701.exe 73 PID 4516 wrote to memory of 1044 4516 v0648701.exe 73 PID 4516 wrote to memory of 1044 4516 v0648701.exe 73 PID 1044 wrote to memory of 3396 1044 v3010117.exe 74 PID 1044 wrote to memory of 3396 1044 v3010117.exe 74 PID 1044 wrote to memory of 3396 1044 v3010117.exe 74 PID 1044 wrote to memory of 224 1044 v3010117.exe 75 PID 1044 wrote to memory of 224 1044 v3010117.exe 75 PID 1044 wrote to memory of 224 1044 v3010117.exe 75 PID 224 wrote to memory of 320 224 b8621321.exe 76 PID 224 wrote to memory of 320 224 b8621321.exe 76 PID 224 wrote to memory of 320 224 b8621321.exe 76 PID 224 wrote to memory of 308 224 b8621321.exe 77 PID 224 wrote to memory of 308 224 b8621321.exe 77 PID 224 wrote to memory of 308 224 b8621321.exe 77 PID 4516 wrote to memory of 4480 4516 v0648701.exe 79 PID 4516 wrote to memory of 4480 4516 v0648701.exe 79 PID 4516 wrote to memory of 4480 4516 v0648701.exe 79 PID 308 wrote to memory of 4080 308 cmd.exe 80 PID 308 wrote to memory of 4080 308 cmd.exe 80 PID 308 wrote to memory of 4080 308 cmd.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\9aee09bfd2877ea6d0fe1e2ab20afba70413f9e4403009bc848e6cff7aba62be.exe"C:\Users\Admin\AppData\Local\Temp\9aee09bfd2877ea6d0fe1e2ab20afba70413f9e4403009bc848e6cff7aba62be.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4045749.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4045749.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8498726.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8498726.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0648701.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0648701.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3010117.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3010117.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a9591912.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a9591912.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3396
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b8621321.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b8621321.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Users\Admin\AppData\Local\Temp\gN9tqk1wbFzfj4u.exe"C:\Users\Admin\AppData\Local\Temp\gN9tqk1wbFzfj4u.exe"7⤵
- Executes dropped EXE
PID:320
-
-
C:\Windows\SysWOW64\cmd.exe/c schtasks /create /F /sc minute /mo 15 /tr "C:\Users\Admin\AppData\Local\Temp\gN9tqk1wbFzfj4u.exe" /tn "\WindowsAppPool\gN9tqk1wbFzfj4u"7⤵
- Suspicious use of WriteProcessMemory
PID:308 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /F /sc minute /mo 15 /tr "C:\Users\Admin\AppData\Local\Temp\gN9tqk1wbFzfj4u.exe" /tn "\WindowsAppPool\gN9tqk1wbFzfj4u"8⤵
- Creates scheduled task(s)
PID:4080
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c1042007.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c1042007.exe5⤵
- Executes dropped EXE
PID:4480
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
832KB
MD5243dca0d63badfa15c67cf60c26b51e3
SHA11a14457a32796bb74ca668d691503deebba05050
SHA256f5a4b21344cbce2c124b7e87190db3a6fddfd9543c0ed4c4e02c98ab2b3e7175
SHA512b78d57e57e441ee506aec82d9780d04d1b967dc8095df09af86e2ab0affc793dca9e7b93f33dc85e4894354d42667c41067d88d1d8ea8545d1704b2ab1efadae
-
Filesize
832KB
MD5243dca0d63badfa15c67cf60c26b51e3
SHA11a14457a32796bb74ca668d691503deebba05050
SHA256f5a4b21344cbce2c124b7e87190db3a6fddfd9543c0ed4c4e02c98ab2b3e7175
SHA512b78d57e57e441ee506aec82d9780d04d1b967dc8095df09af86e2ab0affc793dca9e7b93f33dc85e4894354d42667c41067d88d1d8ea8545d1704b2ab1efadae
-
Filesize
605KB
MD591b6bdb5e580e01806c7ef6041305413
SHA14ca7af6e5cb2d6b967f3e0ed8d8bc86e7a174cf7
SHA2561fdea72b26e29408ecde33c8a44b6d7c33d375a281f2e4fa9d15c2fa84d2df99
SHA5128e547e8e18d2ebb019f1423178c105d338f9b8eebba050ba6254736e432f081f30a7310a9719dfe6594babee8df2b3ef187f7eaa8603595385c5f0b2f3d30917
-
Filesize
605KB
MD591b6bdb5e580e01806c7ef6041305413
SHA14ca7af6e5cb2d6b967f3e0ed8d8bc86e7a174cf7
SHA2561fdea72b26e29408ecde33c8a44b6d7c33d375a281f2e4fa9d15c2fa84d2df99
SHA5128e547e8e18d2ebb019f1423178c105d338f9b8eebba050ba6254736e432f081f30a7310a9719dfe6594babee8df2b3ef187f7eaa8603595385c5f0b2f3d30917
-
Filesize
481KB
MD585438593527f254e72c2507c392a16c0
SHA187d3ec2d841284493feb432c7ad58106b95f2a17
SHA256d74169ae373b50b86e711b7862ea2708506ecb0b87e6b689de1bbbf58a6bddc6
SHA51292f143cc92d32b1e5f2457ac2ad5731f744121f933b2172ed8ffd454ec7d052eb19d2b7d222cc0fc6f86246c76e93bba145d23b75e8a76b60a6af02bbbb808ac
-
Filesize
481KB
MD585438593527f254e72c2507c392a16c0
SHA187d3ec2d841284493feb432c7ad58106b95f2a17
SHA256d74169ae373b50b86e711b7862ea2708506ecb0b87e6b689de1bbbf58a6bddc6
SHA51292f143cc92d32b1e5f2457ac2ad5731f744121f933b2172ed8ffd454ec7d052eb19d2b7d222cc0fc6f86246c76e93bba145d23b75e8a76b60a6af02bbbb808ac
-
Filesize
174KB
MD59ba7294901ee7bfd987eec9b9bf58afd
SHA1cabf436a1e976d621f4a8de05875740fb7e70290
SHA25691a9017363591aeec95a921c4f5cd3989ce980650a9ad78ebfd8e52ca9a8132d
SHA5129b8517994e4492cfa5029602808e285a9554586b59328896c9b789a5d9d9f0144cb1f9fdcdd15daebe338c28bf349e2c1a4efac1bc7b85fadba6e3380f94f61b
-
Filesize
174KB
MD59ba7294901ee7bfd987eec9b9bf58afd
SHA1cabf436a1e976d621f4a8de05875740fb7e70290
SHA25691a9017363591aeec95a921c4f5cd3989ce980650a9ad78ebfd8e52ca9a8132d
SHA5129b8517994e4492cfa5029602808e285a9554586b59328896c9b789a5d9d9f0144cb1f9fdcdd15daebe338c28bf349e2c1a4efac1bc7b85fadba6e3380f94f61b
-
Filesize
174KB
MD59ba7294901ee7bfd987eec9b9bf58afd
SHA1cabf436a1e976d621f4a8de05875740fb7e70290
SHA25691a9017363591aeec95a921c4f5cd3989ce980650a9ad78ebfd8e52ca9a8132d
SHA5129b8517994e4492cfa5029602808e285a9554586b59328896c9b789a5d9d9f0144cb1f9fdcdd15daebe338c28bf349e2c1a4efac1bc7b85fadba6e3380f94f61b
-
Filesize
326KB
MD57ed0f09d90c23f39a81051bf8af1a76e
SHA18ef84658d7309fa394d2abb076efffb281310cbb
SHA2563d1c8b73e0a344ac667cd65ed257c8e702ac83e3f090256ae447929fbdfae0a2
SHA512237a221fab3c76623976611529fd97b007d0c0afe5de2e9c1e26cf820377c2db44251db9bb96c616afb8aa63003e064e7605242a396a91b0b2b6f92577b6f120
-
Filesize
326KB
MD57ed0f09d90c23f39a81051bf8af1a76e
SHA18ef84658d7309fa394d2abb076efffb281310cbb
SHA2563d1c8b73e0a344ac667cd65ed257c8e702ac83e3f090256ae447929fbdfae0a2
SHA512237a221fab3c76623976611529fd97b007d0c0afe5de2e9c1e26cf820377c2db44251db9bb96c616afb8aa63003e064e7605242a396a91b0b2b6f92577b6f120
-
Filesize
184KB
MD5c965808bebccb91d1d42083cbdf8c5d2
SHA16ded95e8ad70deb17b3fafed9ddced4b40a7e461
SHA256b3b196ca751d54a726a045370cf201481b6eb6d5ca6e2733c32b9423f286a4b1
SHA51262fe87ebc81b7735a1b99dd9284dd0e48b2ac790ecf36b253dfb7afd572db42e21c8a172a51b98238d54b7df34d96b33ec699a0cff184bac545873710fab4cfe
-
Filesize
184KB
MD5c965808bebccb91d1d42083cbdf8c5d2
SHA16ded95e8ad70deb17b3fafed9ddced4b40a7e461
SHA256b3b196ca751d54a726a045370cf201481b6eb6d5ca6e2733c32b9423f286a4b1
SHA51262fe87ebc81b7735a1b99dd9284dd0e48b2ac790ecf36b253dfb7afd572db42e21c8a172a51b98238d54b7df34d96b33ec699a0cff184bac545873710fab4cfe
-
Filesize
140KB
MD5d8eb228094d1ef62a3987f1555782a8b
SHA1a01410bc56ba520297086b39ccee524294a4d610
SHA2562947a5434d230afe7f8b6ddc018e34a880ca6d2c527ecf9314731e6e336168e7
SHA51209871f4a0eeb62cc20598c48a8475f4857757ce0c96cc6936b0ebaa20637ee3d8695eb42f28382d03e13a6eeec2fc150f1ae916cdf06821313326f496cd2a7ec
-
Filesize
140KB
MD5d8eb228094d1ef62a3987f1555782a8b
SHA1a01410bc56ba520297086b39ccee524294a4d610
SHA2562947a5434d230afe7f8b6ddc018e34a880ca6d2c527ecf9314731e6e336168e7
SHA51209871f4a0eeb62cc20598c48a8475f4857757ce0c96cc6936b0ebaa20637ee3d8695eb42f28382d03e13a6eeec2fc150f1ae916cdf06821313326f496cd2a7ec
-
Filesize
174KB
MD5ba7ccc72aa67637e5edb5af9bbe211ac
SHA1929978860f7dd30263c428a305f532e3c3a5f2c6
SHA256ea177be5cced9b3bf25d2680785cf51cfa6c53262082011af489d95128380638
SHA51208bc55fb78a0e291a3af4d1dda50841e8c64869816a86c5c7db277d3057e5d3bf75aff829e4f6065ba3b10beab40d225a3950fcda531f2869ffde41559bac9e6
-
Filesize
174KB
MD5ba7ccc72aa67637e5edb5af9bbe211ac
SHA1929978860f7dd30263c428a305f532e3c3a5f2c6
SHA256ea177be5cced9b3bf25d2680785cf51cfa6c53262082011af489d95128380638
SHA51208bc55fb78a0e291a3af4d1dda50841e8c64869816a86c5c7db277d3057e5d3bf75aff829e4f6065ba3b10beab40d225a3950fcda531f2869ffde41559bac9e6
-
Filesize
778KB
MD5ca426ad13949eb03954cf6af14ed9ccb
SHA1f5f46048711a3b10fdd243d450f38c70b2bda65d
SHA256383f6a8aac6ecde29d4cbde8e31be84a528892cc7295985f1c877fdfbe9e2a2f
SHA51242494f56d3cd9048b7f912e907bbedf1db140d45834e1f5f79957d6453ea0468f97fe7de6e0e5f4d494cb5eff9a7c5b9005e9a506f82a1d7dcd18f5c3790dee1