Analysis
-
max time kernel
139s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
02/09/2023, 16:23
Static task
static1
Behavioral task
behavioral1
Sample
d30d8079fdec2eef006c114eff8c6968c9c243a7af6f93f9dda43a31991f16e6.exe
Resource
win10v2004-20230831-en
General
-
Target
d30d8079fdec2eef006c114eff8c6968c9c243a7af6f93f9dda43a31991f16e6.exe
-
Size
1.0MB
-
MD5
c24f2fe24be664417f13029dbf45342f
-
SHA1
3aa2ce5befca1e764a925287bc912b7f9649dff3
-
SHA256
d30d8079fdec2eef006c114eff8c6968c9c243a7af6f93f9dda43a31991f16e6
-
SHA512
0f6df9f973f84022fd0001a15df05d6f44943a9752aa30add11fa225e6119c96f4b8b9f5a2ebeb25f891110316ea9831692ed08b43a7a0e822d2bc798bdcd017
-
SSDEEP
24576:gyDTFq3m9BV7CbmPDt6SZReUIX1Xg/pQFAhXPM:nDZZBmqLb4UIwp8Ah
Malware Config
Extracted
redline
narik
77.91.124.82:19071
-
auth_value
07924f5ef90576eb64faea857b8ba3e5
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" q3018701.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" q3018701.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" q3018701.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" q3018701.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" q3018701.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection q3018701.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 4820 z8815806.exe 396 z3680674.exe 4304 z7432453.exe 1560 z1655556.exe 3828 q3018701.exe 1456 r8533371.exe 3304 s8813346.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features q3018701.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" q3018701.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z1655556.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d30d8079fdec2eef006c114eff8c6968c9c243a7af6f93f9dda43a31991f16e6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z8815806.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z3680674.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z7432453.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3828 q3018701.exe 3828 q3018701.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3828 q3018701.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 5100 wrote to memory of 4820 5100 d30d8079fdec2eef006c114eff8c6968c9c243a7af6f93f9dda43a31991f16e6.exe 88 PID 5100 wrote to memory of 4820 5100 d30d8079fdec2eef006c114eff8c6968c9c243a7af6f93f9dda43a31991f16e6.exe 88 PID 5100 wrote to memory of 4820 5100 d30d8079fdec2eef006c114eff8c6968c9c243a7af6f93f9dda43a31991f16e6.exe 88 PID 4820 wrote to memory of 396 4820 z8815806.exe 89 PID 4820 wrote to memory of 396 4820 z8815806.exe 89 PID 4820 wrote to memory of 396 4820 z8815806.exe 89 PID 396 wrote to memory of 4304 396 z3680674.exe 91 PID 396 wrote to memory of 4304 396 z3680674.exe 91 PID 396 wrote to memory of 4304 396 z3680674.exe 91 PID 4304 wrote to memory of 1560 4304 z7432453.exe 92 PID 4304 wrote to memory of 1560 4304 z7432453.exe 92 PID 4304 wrote to memory of 1560 4304 z7432453.exe 92 PID 1560 wrote to memory of 3828 1560 z1655556.exe 93 PID 1560 wrote to memory of 3828 1560 z1655556.exe 93 PID 1560 wrote to memory of 3828 1560 z1655556.exe 93 PID 1560 wrote to memory of 1456 1560 z1655556.exe 94 PID 1560 wrote to memory of 1456 1560 z1655556.exe 94 PID 1560 wrote to memory of 1456 1560 z1655556.exe 94 PID 4304 wrote to memory of 3304 4304 z7432453.exe 95 PID 4304 wrote to memory of 3304 4304 z7432453.exe 95 PID 4304 wrote to memory of 3304 4304 z7432453.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\d30d8079fdec2eef006c114eff8c6968c9c243a7af6f93f9dda43a31991f16e6.exe"C:\Users\Admin\AppData\Local\Temp\d30d8079fdec2eef006c114eff8c6968c9c243a7af6f93f9dda43a31991f16e6.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8815806.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8815806.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3680674.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3680674.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7432453.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7432453.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1655556.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1655556.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3018701.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3018701.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3828
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r8533371.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r8533371.exe6⤵
- Executes dropped EXE
PID:1456
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s8813346.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s8813346.exe5⤵
- Executes dropped EXE
PID:3304
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
933KB
MD594ddd284894c47a00d9bfc54a908d2a8
SHA15107497fc11765d06095ab0598ac2ffb85b96f36
SHA2563baa461b72d516ce617b72499dd5751e0b38475159acac78c51be8d3746c9d87
SHA5121ca7a424fa4cd64f7983a319ef1f72601910ad93cc29e1b6c8b2f4ab036aee325011a1ad1d74ef6d246e5b340947f2498bf89848ed15533f5ab68cadfb206119
-
Filesize
933KB
MD594ddd284894c47a00d9bfc54a908d2a8
SHA15107497fc11765d06095ab0598ac2ffb85b96f36
SHA2563baa461b72d516ce617b72499dd5751e0b38475159acac78c51be8d3746c9d87
SHA5121ca7a424fa4cd64f7983a319ef1f72601910ad93cc29e1b6c8b2f4ab036aee325011a1ad1d74ef6d246e5b340947f2498bf89848ed15533f5ab68cadfb206119
-
Filesize
707KB
MD522d31977bea8221d23ced1f5b237a77d
SHA1182bef9c1225a87139e022924cc67f80278579cb
SHA2569b1e9adab581b45b67cbd3d275450dd9895872afad6ffbfbac1b67be17dbfcdb
SHA5122f75e725016adedc66c6330fe4d53de3471e8aff5d9f4bffc3482c688bdbfe63ff6cb9a711ee897f2ceb60e387925ab948b5bed274df10767f114b6399a489db
-
Filesize
707KB
MD522d31977bea8221d23ced1f5b237a77d
SHA1182bef9c1225a87139e022924cc67f80278579cb
SHA2569b1e9adab581b45b67cbd3d275450dd9895872afad6ffbfbac1b67be17dbfcdb
SHA5122f75e725016adedc66c6330fe4d53de3471e8aff5d9f4bffc3482c688bdbfe63ff6cb9a711ee897f2ceb60e387925ab948b5bed274df10767f114b6399a489db
-
Filesize
481KB
MD5d8dbc8083c241e2401c30d15de509f1d
SHA1cda221560cc2eb4187dee33a99d401ee4fcfa6a1
SHA2565cd67bdf1de1c0c723e51cebd24053440a76deafdae62239b8fa134bb720e3b1
SHA512703d7f7de8f713038c24c079654a2586cf05ca62b95a05303c1b936c3540766e475caa6679956ce6ccae071986e5d0423faa46fb35518df1fd92abec01249b07
-
Filesize
481KB
MD5d8dbc8083c241e2401c30d15de509f1d
SHA1cda221560cc2eb4187dee33a99d401ee4fcfa6a1
SHA2565cd67bdf1de1c0c723e51cebd24053440a76deafdae62239b8fa134bb720e3b1
SHA512703d7f7de8f713038c24c079654a2586cf05ca62b95a05303c1b936c3540766e475caa6679956ce6ccae071986e5d0423faa46fb35518df1fd92abec01249b07
-
Filesize
174KB
MD52a2a17647a898b3e7cb2168890dc1dc3
SHA115fbb5a23a97ffd55cbbb785de4de59b9094fe52
SHA2560b5af7ab3dd548108216f1fe78f29f2075080eb367c2af3c9c9f4dff038275dc
SHA5125e198613804986b9a1bae4d542898d478b3dc8df069283ff277ca4784ef1a2e6e7dfbaf30830f122c80fbf20849aef27b1d00ef1ce71981f8a41affa8f99e7d0
-
Filesize
174KB
MD52a2a17647a898b3e7cb2168890dc1dc3
SHA115fbb5a23a97ffd55cbbb785de4de59b9094fe52
SHA2560b5af7ab3dd548108216f1fe78f29f2075080eb367c2af3c9c9f4dff038275dc
SHA5125e198613804986b9a1bae4d542898d478b3dc8df069283ff277ca4784ef1a2e6e7dfbaf30830f122c80fbf20849aef27b1d00ef1ce71981f8a41affa8f99e7d0
-
Filesize
325KB
MD5a5a12893d8d91f82dae31765416aecee
SHA189c068480d124ca6bf4e51767affa0eed8882338
SHA2561fb60f2d7de55943d13e95b6b2d0461c9d8cdd60356259b5b421eb919034baae
SHA51283cead7ede67c960b011664450527c1d087e27a753bf84958084a77c68348922d25e6467e0406062735df56489b1036d90585cb0f5f6d54d62da8d7d17dda602
-
Filesize
325KB
MD5a5a12893d8d91f82dae31765416aecee
SHA189c068480d124ca6bf4e51767affa0eed8882338
SHA2561fb60f2d7de55943d13e95b6b2d0461c9d8cdd60356259b5b421eb919034baae
SHA51283cead7ede67c960b011664450527c1d087e27a753bf84958084a77c68348922d25e6467e0406062735df56489b1036d90585cb0f5f6d54d62da8d7d17dda602
-
Filesize
184KB
MD5171f05edd8303e14277c9cec8e322c5d
SHA16f54bff2cc83cd2f532a704736f4d06dedabb82a
SHA25681977acabc010c182f5bac08bd64a944f2f0fdce68f0c7daf62354fcf24704c5
SHA5120775d47f8a40de8ded7973c69e5c9ce03fccee8e5dc2a9e90b3958cc18c82dbc045d9769ad1c9cd0c7f535638e93e9b26e6f72eb62e6f2397bc83e761bf4f9c5
-
Filesize
184KB
MD5171f05edd8303e14277c9cec8e322c5d
SHA16f54bff2cc83cd2f532a704736f4d06dedabb82a
SHA25681977acabc010c182f5bac08bd64a944f2f0fdce68f0c7daf62354fcf24704c5
SHA5120775d47f8a40de8ded7973c69e5c9ce03fccee8e5dc2a9e90b3958cc18c82dbc045d9769ad1c9cd0c7f535638e93e9b26e6f72eb62e6f2397bc83e761bf4f9c5
-
Filesize
141KB
MD538c544e8816670abd1d0b9e0a17aef1a
SHA19cbee1fd7a2284a6ce20ec7cd93ddf8486d7ff47
SHA25627c2d571f616933ffa30b6b2adec75d87b4310682a13eb497ea1dd7dfbe5695e
SHA512f063736f482c7f5171401cfc940afcd421b621bcc3af5a078dbfb3d92d112abb5a40a7d84e57204a9edebf47d038501d42bb8915eaac0bee02803efd12c89e0b
-
Filesize
141KB
MD538c544e8816670abd1d0b9e0a17aef1a
SHA19cbee1fd7a2284a6ce20ec7cd93ddf8486d7ff47
SHA25627c2d571f616933ffa30b6b2adec75d87b4310682a13eb497ea1dd7dfbe5695e
SHA512f063736f482c7f5171401cfc940afcd421b621bcc3af5a078dbfb3d92d112abb5a40a7d84e57204a9edebf47d038501d42bb8915eaac0bee02803efd12c89e0b