Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
02-09-2023 21:40
Static task
static1
Behavioral task
behavioral1
Sample
5f629b437246d8ec6086620d1d3c61f5d9dcfb352448e2f88a8aae996361a765.exe
Resource
win10v2004-20230831-en
General
-
Target
5f629b437246d8ec6086620d1d3c61f5d9dcfb352448e2f88a8aae996361a765.exe
-
Size
936KB
-
MD5
f0e0bbbfa57023d41eeb46c4a5cb3dbc
-
SHA1
b34788e8ed24df9d31642cbd9ca50f241d68ccfa
-
SHA256
5f629b437246d8ec6086620d1d3c61f5d9dcfb352448e2f88a8aae996361a765
-
SHA512
0d3d53bcd8a2929979fc2be47188a3f809c5de1910a0d6c5f3b560eb6a1da31a07bf914307dd9e334c1ea2b349f063316258d486df4b910b91aa6fa0d378da9e
-
SSDEEP
24576:MyhpdWQ9J3JrK1aHXNBjTFOy2SAFN+KZY4:7hvWQFrB7jT0HzjY
Malware Config
Extracted
redline
narik
77.91.124.82:19071
-
auth_value
07924f5ef90576eb64faea857b8ba3e5
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a9082356.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a9082356.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a9082356.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a9082356.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a9082356.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a9082356.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 3292 v2856206.exe 3332 v8050460.exe 2088 v7514760.exe 3960 v6568728.exe 976 a9082356.exe 3624 b6940357.exe 2232 c7637824.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a9082356.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a9082356.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v8050460.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v7514760.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v6568728.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5f629b437246d8ec6086620d1d3c61f5d9dcfb352448e2f88a8aae996361a765.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v2856206.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 976 a9082356.exe 976 a9082356.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 976 a9082356.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2708 wrote to memory of 3292 2708 5f629b437246d8ec6086620d1d3c61f5d9dcfb352448e2f88a8aae996361a765.exe 82 PID 2708 wrote to memory of 3292 2708 5f629b437246d8ec6086620d1d3c61f5d9dcfb352448e2f88a8aae996361a765.exe 82 PID 2708 wrote to memory of 3292 2708 5f629b437246d8ec6086620d1d3c61f5d9dcfb352448e2f88a8aae996361a765.exe 82 PID 3292 wrote to memory of 3332 3292 v2856206.exe 84 PID 3292 wrote to memory of 3332 3292 v2856206.exe 84 PID 3292 wrote to memory of 3332 3292 v2856206.exe 84 PID 3332 wrote to memory of 2088 3332 v8050460.exe 85 PID 3332 wrote to memory of 2088 3332 v8050460.exe 85 PID 3332 wrote to memory of 2088 3332 v8050460.exe 85 PID 2088 wrote to memory of 3960 2088 v7514760.exe 86 PID 2088 wrote to memory of 3960 2088 v7514760.exe 86 PID 2088 wrote to memory of 3960 2088 v7514760.exe 86 PID 3960 wrote to memory of 976 3960 v6568728.exe 87 PID 3960 wrote to memory of 976 3960 v6568728.exe 87 PID 3960 wrote to memory of 976 3960 v6568728.exe 87 PID 3960 wrote to memory of 3624 3960 v6568728.exe 88 PID 3960 wrote to memory of 3624 3960 v6568728.exe 88 PID 3960 wrote to memory of 3624 3960 v6568728.exe 88 PID 2088 wrote to memory of 2232 2088 v7514760.exe 89 PID 2088 wrote to memory of 2232 2088 v7514760.exe 89 PID 2088 wrote to memory of 2232 2088 v7514760.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f629b437246d8ec6086620d1d3c61f5d9dcfb352448e2f88a8aae996361a765.exe"C:\Users\Admin\AppData\Local\Temp\5f629b437246d8ec6086620d1d3c61f5d9dcfb352448e2f88a8aae996361a765.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2856206.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2856206.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8050460.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8050460.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7514760.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7514760.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v6568728.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v6568728.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a9082356.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a9082356.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:976
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b6940357.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b6940357.exe6⤵
- Executes dropped EXE
PID:3624
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c7637824.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c7637824.exe5⤵
- Executes dropped EXE
PID:2232
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
830KB
MD5f6926fda9b8443485b6ebe56ab022350
SHA13ef31a1c2526c3ac31aa78da85c9c9b20b996744
SHA256fa04a7601f1e0bd6f4723829e93278aa30cf611c7b99c986158796a81bc4353b
SHA5120d28c569ab1d17a80daa1cdbf073979e3852c7bcce3ee3faa8d02392be728d60ab8fd0f32ad8e862574bb493203b8e6423ecde1d93f102945fa3d69047d8ad07
-
Filesize
830KB
MD5f6926fda9b8443485b6ebe56ab022350
SHA13ef31a1c2526c3ac31aa78da85c9c9b20b996744
SHA256fa04a7601f1e0bd6f4723829e93278aa30cf611c7b99c986158796a81bc4353b
SHA5120d28c569ab1d17a80daa1cdbf073979e3852c7bcce3ee3faa8d02392be728d60ab8fd0f32ad8e862574bb493203b8e6423ecde1d93f102945fa3d69047d8ad07
-
Filesize
606KB
MD5d8f0c0f6c8678612984ca92d5a923985
SHA177408493119eaf599fe13fe3b47d88dde13eab52
SHA256e3eeff75e039057b1ec70cec7fa8988234b23fbe2b8298b68b0cc52292dd6933
SHA51294ed86ce2acce639f2202502cc7a764e571830b5ba93630d4d0a0a754140a32a6b313b90bc1ca9a881a2473a3d8d773322424b630e82b6d1366d2834159a6b9e
-
Filesize
606KB
MD5d8f0c0f6c8678612984ca92d5a923985
SHA177408493119eaf599fe13fe3b47d88dde13eab52
SHA256e3eeff75e039057b1ec70cec7fa8988234b23fbe2b8298b68b0cc52292dd6933
SHA51294ed86ce2acce639f2202502cc7a764e571830b5ba93630d4d0a0a754140a32a6b313b90bc1ca9a881a2473a3d8d773322424b630e82b6d1366d2834159a6b9e
-
Filesize
481KB
MD5e6f2801291ea9f0047840ae04b471c95
SHA1c1cbd9bddb34fd436d1c4949ad8c6ae5dc0fd9a7
SHA2561ce45dc39b37b7c45c95d63cc70f30480d342f900d6432141708633dccc47af4
SHA51223c2b3140e8994dcbc0c9fbc28e2b08bfa26ce1e3290c8d7df94b1fb3fccca3ee9bb320ea7450daf05328cc5d362c87b63d11931e46cdcd690224bc3cdc20fae
-
Filesize
481KB
MD5e6f2801291ea9f0047840ae04b471c95
SHA1c1cbd9bddb34fd436d1c4949ad8c6ae5dc0fd9a7
SHA2561ce45dc39b37b7c45c95d63cc70f30480d342f900d6432141708633dccc47af4
SHA51223c2b3140e8994dcbc0c9fbc28e2b08bfa26ce1e3290c8d7df94b1fb3fccca3ee9bb320ea7450daf05328cc5d362c87b63d11931e46cdcd690224bc3cdc20fae
-
Filesize
174KB
MD542571e02a8a0d53cb002ce05deacf4bd
SHA18397b7d02d2d53f233aff38cea762f4706324d27
SHA256f1642f41d9c32221d5398a154da26009aa6bbbf049f14163de90844a32352425
SHA512cd71fbf8d55f62647eddfd49a0e7788de2a18ed1d16a5a3864c03363c7c6c22fcae0dab497052b2825a11eceade39970a436522fff11cef161f9ea6d4b0d5ea2
-
Filesize
174KB
MD542571e02a8a0d53cb002ce05deacf4bd
SHA18397b7d02d2d53f233aff38cea762f4706324d27
SHA256f1642f41d9c32221d5398a154da26009aa6bbbf049f14163de90844a32352425
SHA512cd71fbf8d55f62647eddfd49a0e7788de2a18ed1d16a5a3864c03363c7c6c22fcae0dab497052b2825a11eceade39970a436522fff11cef161f9ea6d4b0d5ea2
-
Filesize
325KB
MD50a4cf5fd8c1f653e7548b2a9b2887291
SHA19c4726208a197b8280f3400dc1c8bd9be55c14cb
SHA256c619915d5140d33caa0e869b919074a6c94ed4d17779f236fdeb113f44936693
SHA512e98ff5cff164cf2fc0d98ead0c6e38dc267aa4e8de1652357960fffaf00f0f89d4e7deb32d76eacb44cd9b92973e70a719a57ae89b603da1c5c507f816bef767
-
Filesize
325KB
MD50a4cf5fd8c1f653e7548b2a9b2887291
SHA19c4726208a197b8280f3400dc1c8bd9be55c14cb
SHA256c619915d5140d33caa0e869b919074a6c94ed4d17779f236fdeb113f44936693
SHA512e98ff5cff164cf2fc0d98ead0c6e38dc267aa4e8de1652357960fffaf00f0f89d4e7deb32d76eacb44cd9b92973e70a719a57ae89b603da1c5c507f816bef767
-
Filesize
184KB
MD50fc812cf32b3d6f7592d79ce020f2b3e
SHA1110d6a457f2c0ee0f5b88d531f0413a6025a4f5c
SHA256ededfccd2bf870716ae6b64106e321e905832fd18fb02d008494a236060c5b50
SHA51267acca9d9b45342885a95fe00b39b16f9a0740067dfefdb44cc93716439c80baf9712b2ba4696014ae36e7fe66ff92f72cb05c7122c01fe037800acbe1e2dd22
-
Filesize
184KB
MD50fc812cf32b3d6f7592d79ce020f2b3e
SHA1110d6a457f2c0ee0f5b88d531f0413a6025a4f5c
SHA256ededfccd2bf870716ae6b64106e321e905832fd18fb02d008494a236060c5b50
SHA51267acca9d9b45342885a95fe00b39b16f9a0740067dfefdb44cc93716439c80baf9712b2ba4696014ae36e7fe66ff92f72cb05c7122c01fe037800acbe1e2dd22
-
Filesize
140KB
MD5cfdc581c377047a78b01f5d1a8a3b236
SHA19678a5b7eea88c90a38b3690e63573aa88d938b1
SHA25674cf987ebfd2ba1143080526c07afd0bd753f265c7c90738fcec2dea18720bac
SHA512254420dde135e7d5543a1b399dd3a185c76180d56e7b30b18b9587c9ba48350ef2179e422325f2f05335f698930b3f54b4167fc348fef82499541b4b68de315f
-
Filesize
140KB
MD5cfdc581c377047a78b01f5d1a8a3b236
SHA19678a5b7eea88c90a38b3690e63573aa88d938b1
SHA25674cf987ebfd2ba1143080526c07afd0bd753f265c7c90738fcec2dea18720bac
SHA512254420dde135e7d5543a1b399dd3a185c76180d56e7b30b18b9587c9ba48350ef2179e422325f2f05335f698930b3f54b4167fc348fef82499541b4b68de315f