Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-1703_x64 -
resource
win10-20230831-en -
resource tags
arch:x64arch:x86image:win10-20230831-enlocale:en-usos:windows10-1703-x64system -
submitted
02-09-2023 15:07
Static task
static1
Behavioral task
behavioral1
Sample
c1e34258f9e3d808ab6f5c56674f023c915d7e1ffbe89b1d2f4cb0c4ff8b1ec6.exe
Resource
win10-20230831-en
General
-
Target
c1e34258f9e3d808ab6f5c56674f023c915d7e1ffbe89b1d2f4cb0c4ff8b1ec6.exe
-
Size
938KB
-
MD5
f10236bd69422aa2b1ccd2ea35f8fc3b
-
SHA1
71e3a5a6af892d59a6e057a8f73a34890fdc70f7
-
SHA256
c1e34258f9e3d808ab6f5c56674f023c915d7e1ffbe89b1d2f4cb0c4ff8b1ec6
-
SHA512
ef23fd1cba60161c762ad858ee4fb0f483a36d4980e5ae0ab561d6b7b73f578547565db97648c397bf7c0dcf48c19704d8bae7e59ecb84d4a8a4d5bb6ab8f211
-
SSDEEP
24576:/yID6AwFTPJIQGZB6i071NRLax/741sQryu1pQm:KhFTPJIQVi071NZax/74iQhpQ
Malware Config
Extracted
redline
narik
77.91.124.82:19071
-
auth_value
07924f5ef90576eb64faea857b8ba3e5
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a9126653.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a9126653.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a9126653.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a9126653.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a9126653.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 2028 v6740818.exe 4732 v6348687.exe 5116 v6123525.exe 1032 v9531676.exe 3572 a9126653.exe 4784 b2191504.exe 3964 c7641853.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a9126653.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a9126653.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v6123525.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v9531676.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c1e34258f9e3d808ab6f5c56674f023c915d7e1ffbe89b1d2f4cb0c4ff8b1ec6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v6740818.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v6348687.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3572 a9126653.exe 3572 a9126653.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3572 a9126653.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1544 wrote to memory of 2028 1544 c1e34258f9e3d808ab6f5c56674f023c915d7e1ffbe89b1d2f4cb0c4ff8b1ec6.exe 70 PID 1544 wrote to memory of 2028 1544 c1e34258f9e3d808ab6f5c56674f023c915d7e1ffbe89b1d2f4cb0c4ff8b1ec6.exe 70 PID 1544 wrote to memory of 2028 1544 c1e34258f9e3d808ab6f5c56674f023c915d7e1ffbe89b1d2f4cb0c4ff8b1ec6.exe 70 PID 2028 wrote to memory of 4732 2028 v6740818.exe 71 PID 2028 wrote to memory of 4732 2028 v6740818.exe 71 PID 2028 wrote to memory of 4732 2028 v6740818.exe 71 PID 4732 wrote to memory of 5116 4732 v6348687.exe 72 PID 4732 wrote to memory of 5116 4732 v6348687.exe 72 PID 4732 wrote to memory of 5116 4732 v6348687.exe 72 PID 5116 wrote to memory of 1032 5116 v6123525.exe 73 PID 5116 wrote to memory of 1032 5116 v6123525.exe 73 PID 5116 wrote to memory of 1032 5116 v6123525.exe 73 PID 1032 wrote to memory of 3572 1032 v9531676.exe 74 PID 1032 wrote to memory of 3572 1032 v9531676.exe 74 PID 1032 wrote to memory of 3572 1032 v9531676.exe 74 PID 1032 wrote to memory of 4784 1032 v9531676.exe 75 PID 1032 wrote to memory of 4784 1032 v9531676.exe 75 PID 1032 wrote to memory of 4784 1032 v9531676.exe 75 PID 5116 wrote to memory of 3964 5116 v6123525.exe 76 PID 5116 wrote to memory of 3964 5116 v6123525.exe 76 PID 5116 wrote to memory of 3964 5116 v6123525.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1e34258f9e3d808ab6f5c56674f023c915d7e1ffbe89b1d2f4cb0c4ff8b1ec6.exe"C:\Users\Admin\AppData\Local\Temp\c1e34258f9e3d808ab6f5c56674f023c915d7e1ffbe89b1d2f4cb0c4ff8b1ec6.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6740818.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6740818.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6348687.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6348687.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6123525.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6123525.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9531676.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9531676.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a9126653.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a9126653.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3572
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b2191504.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b2191504.exe6⤵
- Executes dropped EXE
PID:4784
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c7641853.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c7641853.exe5⤵
- Executes dropped EXE
PID:3964
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
833KB
MD5c09529c37f58bf7ad89e7d5e1fe65f38
SHA113171f59b13ec784764d71bf67bf9c8439eb323d
SHA2566d7b6c00d70aa6677461582b5f38bd0d46272c58a6086d2543183dfe41b93ebe
SHA5126a63efdd4edbb8019843e358f437fdca2e3d0843c3806849608874f179dd0cc88546321a0b4ec5be04568f937730f56acd3e05c852c008247b44fcd31bdb3e6f
-
Filesize
833KB
MD5c09529c37f58bf7ad89e7d5e1fe65f38
SHA113171f59b13ec784764d71bf67bf9c8439eb323d
SHA2566d7b6c00d70aa6677461582b5f38bd0d46272c58a6086d2543183dfe41b93ebe
SHA5126a63efdd4edbb8019843e358f437fdca2e3d0843c3806849608874f179dd0cc88546321a0b4ec5be04568f937730f56acd3e05c852c008247b44fcd31bdb3e6f
-
Filesize
606KB
MD547b3cc1c826474874638d7c8bd30b17b
SHA1f4ca63239e931e6d230bb3ee22a36c3f45a2f897
SHA2561ff4f1344289e7043900a094d38673cdd1b130a02385f07dca0883d9066393eb
SHA512d8d153669b6b14fa6e8a59352f53ca81446b654cf283c0bcf08f27e10177b2fa2b194cb5bfca4d359a5f2fcdd5d0f8558f6faa4707ccfb6f11aca83c72fdeb11
-
Filesize
606KB
MD547b3cc1c826474874638d7c8bd30b17b
SHA1f4ca63239e931e6d230bb3ee22a36c3f45a2f897
SHA2561ff4f1344289e7043900a094d38673cdd1b130a02385f07dca0883d9066393eb
SHA512d8d153669b6b14fa6e8a59352f53ca81446b654cf283c0bcf08f27e10177b2fa2b194cb5bfca4d359a5f2fcdd5d0f8558f6faa4707ccfb6f11aca83c72fdeb11
-
Filesize
482KB
MD547c1ee9b3cbfc17581c746cf406db98f
SHA19f699a79c13f425a7ce673c50a702da6b2d20335
SHA25682fd1dc5e079c0f7b9508d6a2f63630bacb3e9896ab9b3eea70a2f3516b10eed
SHA512c2bcda3e3479d367c9d0635852cbd7abf80beed9f63d2b9b87bc26772b64f360e7831908c7a022d39e00e1cc231ab76794f35167d8b509ec42081afbdc865522
-
Filesize
482KB
MD547c1ee9b3cbfc17581c746cf406db98f
SHA19f699a79c13f425a7ce673c50a702da6b2d20335
SHA25682fd1dc5e079c0f7b9508d6a2f63630bacb3e9896ab9b3eea70a2f3516b10eed
SHA512c2bcda3e3479d367c9d0635852cbd7abf80beed9f63d2b9b87bc26772b64f360e7831908c7a022d39e00e1cc231ab76794f35167d8b509ec42081afbdc865522
-
Filesize
174KB
MD5505d199257b1bb38c602dbc2fa9c2699
SHA1a94ffd6f16b11af89ae01201a5570eb3e402f9bb
SHA2566979f49c0dc088f7cef529d15f951b72ba4b777b62352a4243a13a54561abb5c
SHA5126aace5fcaf72c475bc87c18ac920bca734168b16e27d48d2383c8d1864fb673f4bdcc1fabf0cbc252b7fb8abc5cc6b3d9faad72d0d16356119b4514b9eef58fa
-
Filesize
174KB
MD5505d199257b1bb38c602dbc2fa9c2699
SHA1a94ffd6f16b11af89ae01201a5570eb3e402f9bb
SHA2566979f49c0dc088f7cef529d15f951b72ba4b777b62352a4243a13a54561abb5c
SHA5126aace5fcaf72c475bc87c18ac920bca734168b16e27d48d2383c8d1864fb673f4bdcc1fabf0cbc252b7fb8abc5cc6b3d9faad72d0d16356119b4514b9eef58fa
-
Filesize
325KB
MD5a41d3e8f4ac9d535ce09ff0feae0c011
SHA1a74c11c1d33c4baae4e901783e0c6749a4b4903a
SHA2566c47d30cf0c69ce85d4ef1f37ee9a326caaa582ba3a75adf6ebe12b269690b2c
SHA5123a18aee984c8278b81a7b08e5eadb958b743a8a71714a8e1959474fd0e397c7f124014387f407715742b24f59fd86388192ca414b5f079a9becccfd9a2582dd1
-
Filesize
325KB
MD5a41d3e8f4ac9d535ce09ff0feae0c011
SHA1a74c11c1d33c4baae4e901783e0c6749a4b4903a
SHA2566c47d30cf0c69ce85d4ef1f37ee9a326caaa582ba3a75adf6ebe12b269690b2c
SHA5123a18aee984c8278b81a7b08e5eadb958b743a8a71714a8e1959474fd0e397c7f124014387f407715742b24f59fd86388192ca414b5f079a9becccfd9a2582dd1
-
Filesize
184KB
MD5d913b51729e8e5e169b428d0ac8a5491
SHA1909a5acf60a24a423dc1828f902a942f1c6c37ef
SHA256d10156924ce423b2d9283a3792c8273605693fe19f486c3594104ab09125a68a
SHA5120d3d9509cdc5f910224501f1613bd66a6041a0ecc4a64eae42b7bcc46fc314dd10fa657bbb701eb48ee92c66e699c7ee1d01fc24d099ac5e790a7a4fffd0b69f
-
Filesize
184KB
MD5d913b51729e8e5e169b428d0ac8a5491
SHA1909a5acf60a24a423dc1828f902a942f1c6c37ef
SHA256d10156924ce423b2d9283a3792c8273605693fe19f486c3594104ab09125a68a
SHA5120d3d9509cdc5f910224501f1613bd66a6041a0ecc4a64eae42b7bcc46fc314dd10fa657bbb701eb48ee92c66e699c7ee1d01fc24d099ac5e790a7a4fffd0b69f
-
Filesize
141KB
MD58a1dc9ab14e0342fc714837662d1e9ef
SHA1fbb9c0e0be3cc1f05c6e6e8473bd0c06c0d756d0
SHA2560b53cbf085fbc7ed42a33559ecc3f67f418d60d25516bf1a56c683c70337c026
SHA5122a811c2a3d4000f54c102af3a9fa598b7e6f3e892bd3def1d56c0485a86226d9029929e595e7677504330b9929a81d643f9ebd33fceda3e3b690a4eeba921399
-
Filesize
141KB
MD58a1dc9ab14e0342fc714837662d1e9ef
SHA1fbb9c0e0be3cc1f05c6e6e8473bd0c06c0d756d0
SHA2560b53cbf085fbc7ed42a33559ecc3f67f418d60d25516bf1a56c683c70337c026
SHA5122a811c2a3d4000f54c102af3a9fa598b7e6f3e892bd3def1d56c0485a86226d9029929e595e7677504330b9929a81d643f9ebd33fceda3e3b690a4eeba921399