Analysis
-
max time kernel
130s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
27/08/2023, 03:06
Static task
static1
Behavioral task
behavioral1
Sample
0a5c96faf2f9692cd61acd87c4a8904a.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
0a5c96faf2f9692cd61acd87c4a8904a.exe
Resource
win10v2004-20230703-en
General
-
Target
0a5c96faf2f9692cd61acd87c4a8904a.exe
-
Size
673KB
-
MD5
0a5c96faf2f9692cd61acd87c4a8904a
-
SHA1
5bb618b80eac7823b0f32be3f75c804a2568cc5f
-
SHA256
696d56ece02f86a544b46d6a9395f2e817c93be972d0c57e7a16da35523a5b8d
-
SHA512
1c2f9d7d5eec8a7500beca4be6ddb11f18b75c96064efc7ac3112f124dcd5fba4c889a025a78d27f15cbda2cee18f0f4e4f7063d571797dd36d3940a325ecddf
-
SSDEEP
12288:9Mrmy9093T08Ofx7hR0rJ1sLZlJYO7L/zQSZxUAiYSdarAkyH:3yG08Opd+JuLlb7DzQ4ibagH
Malware Config
Extracted
redline
jonka
77.91.124.73:19071
-
auth_value
c95bc30cd252fa6dff2a19fd78bfab4e
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a7568855.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a7568855.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a7568855.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a7568855.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a7568855.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a7568855.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 4208 v5869328.exe 5076 v7146218.exe 3628 a7568855.exe 5024 b0294551.exe 3620 c2302149.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a7568855.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a7568855.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v5869328.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v7146218.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0a5c96faf2f9692cd61acd87c4a8904a.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 232 3628 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3628 a7568855.exe 3628 a7568855.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3628 a7568855.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4856 wrote to memory of 4208 4856 0a5c96faf2f9692cd61acd87c4a8904a.exe 83 PID 4856 wrote to memory of 4208 4856 0a5c96faf2f9692cd61acd87c4a8904a.exe 83 PID 4856 wrote to memory of 4208 4856 0a5c96faf2f9692cd61acd87c4a8904a.exe 83 PID 4208 wrote to memory of 5076 4208 v5869328.exe 84 PID 4208 wrote to memory of 5076 4208 v5869328.exe 84 PID 4208 wrote to memory of 5076 4208 v5869328.exe 84 PID 5076 wrote to memory of 3628 5076 v7146218.exe 85 PID 5076 wrote to memory of 3628 5076 v7146218.exe 85 PID 5076 wrote to memory of 3628 5076 v7146218.exe 85 PID 5076 wrote to memory of 5024 5076 v7146218.exe 97 PID 5076 wrote to memory of 5024 5076 v7146218.exe 97 PID 5076 wrote to memory of 5024 5076 v7146218.exe 97 PID 4208 wrote to memory of 3620 4208 v5869328.exe 98 PID 4208 wrote to memory of 3620 4208 v5869328.exe 98 PID 4208 wrote to memory of 3620 4208 v5869328.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a5c96faf2f9692cd61acd87c4a8904a.exe"C:\Users\Admin\AppData\Local\Temp\0a5c96faf2f9692cd61acd87c4a8904a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5869328.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5869328.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7146218.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7146218.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a7568855.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a7568855.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3628 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3628 -s 10885⤵
- Program crash
PID:232
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b0294551.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b0294551.exe4⤵
- Executes dropped EXE
PID:5024
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2302149.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2302149.exe3⤵
- Executes dropped EXE
PID:3620
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3628 -ip 36281⤵PID:3424
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
548KB
MD51cf289fabbe00432b373e42694460b86
SHA1a05729e9b55496c7849e89da4c9ebb1f555a6e67
SHA256be6195035f6f1ba47dc7950ac201cbf574a04a1915fde32ec19fabc64a33d7d6
SHA51207ef4957165830298f845edc3ced8f50492070d1f89bc4cb9ce4edb37a7afb37e7f71f08f13af7e4e75aa3f248c27e773e9c19bdb42204d3fa9c82832cb3ca48
-
Filesize
548KB
MD51cf289fabbe00432b373e42694460b86
SHA1a05729e9b55496c7849e89da4c9ebb1f555a6e67
SHA256be6195035f6f1ba47dc7950ac201cbf574a04a1915fde32ec19fabc64a33d7d6
SHA51207ef4957165830298f845edc3ced8f50492070d1f89bc4cb9ce4edb37a7afb37e7f71f08f13af7e4e75aa3f248c27e773e9c19bdb42204d3fa9c82832cb3ca48
-
Filesize
174KB
MD52873b8b66a547327aef437fc48099ffd
SHA17fb523346dc975c538e5d27b1cd657c39b267d42
SHA256d1cad7ca6edfcb9fccce2ef66023d1b652c6adcfc5ec6589034876e9d754d6ff
SHA512c73ce31d8b4a7ff4f44f5cef0789afe12a0942cb59e9d6d5fe0797923f27afad59572eadeb6905672a3d7b27fe75316eac5d76714ecc4da74f014c6ec23a80e7
-
Filesize
174KB
MD52873b8b66a547327aef437fc48099ffd
SHA17fb523346dc975c538e5d27b1cd657c39b267d42
SHA256d1cad7ca6edfcb9fccce2ef66023d1b652c6adcfc5ec6589034876e9d754d6ff
SHA512c73ce31d8b4a7ff4f44f5cef0789afe12a0942cb59e9d6d5fe0797923f27afad59572eadeb6905672a3d7b27fe75316eac5d76714ecc4da74f014c6ec23a80e7
-
Filesize
392KB
MD52846a5cf314e4a29acc962231f8ce079
SHA19d4117afb5819dd0a857fdcdaa1c90b4b7335b07
SHA256692caed83eca24987aa5b5b072c4ba48ef4b5222869af6576ab4f2535b0492b1
SHA51269538917236ca63709a9703e9c3c7700a25228cf7025979c75e36283df11605e831b38069c0c35fe645d9a9fddec9016be2cd9ad2df19abe533ff306590afe78
-
Filesize
392KB
MD52846a5cf314e4a29acc962231f8ce079
SHA19d4117afb5819dd0a857fdcdaa1c90b4b7335b07
SHA256692caed83eca24987aa5b5b072c4ba48ef4b5222869af6576ab4f2535b0492b1
SHA51269538917236ca63709a9703e9c3c7700a25228cf7025979c75e36283df11605e831b38069c0c35fe645d9a9fddec9016be2cd9ad2df19abe533ff306590afe78
-
Filesize
273KB
MD54ef838f3afb1719e10ee504ec33ac107
SHA1645db8e88f39f6e57c8bd1f01b30df91269aa776
SHA25691e79343da711b962986548f17356c16560f52f2aced82289209ae5ec61483d2
SHA512a0c0e8facaafea57e7d3f74de10184731afed838e7b445574b4f3080aca9aeda9d0f3df94ac3f2819cde7a70f96862df1ed7755d9d5732e8b7391abdfde1f314
-
Filesize
273KB
MD54ef838f3afb1719e10ee504ec33ac107
SHA1645db8e88f39f6e57c8bd1f01b30df91269aa776
SHA25691e79343da711b962986548f17356c16560f52f2aced82289209ae5ec61483d2
SHA512a0c0e8facaafea57e7d3f74de10184731afed838e7b445574b4f3080aca9aeda9d0f3df94ac3f2819cde7a70f96862df1ed7755d9d5732e8b7391abdfde1f314
-
Filesize
140KB
MD58d5f17011509ea2a6f1334430c6fa664
SHA1dcae78973384c3b600af0f4c045b61cf62310907
SHA256566508cf56b529db924eeb1f99e33d7281088ec66655242fd5136ce4a25892ea
SHA5126e8f05ae41a27e865281819981aca8f5d2af9d4f86c089ca413db88bb4811504f19c7a2ed87698c91b8ba77aeb3752172064757591efed097f4ff250d18e27da
-
Filesize
140KB
MD58d5f17011509ea2a6f1334430c6fa664
SHA1dcae78973384c3b600af0f4c045b61cf62310907
SHA256566508cf56b529db924eeb1f99e33d7281088ec66655242fd5136ce4a25892ea
SHA5126e8f05ae41a27e865281819981aca8f5d2af9d4f86c089ca413db88bb4811504f19c7a2ed87698c91b8ba77aeb3752172064757591efed097f4ff250d18e27da