Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-1703_x64 -
resource
win10-20230831-en -
resource tags
arch:x64arch:x86image:win10-20230831-enlocale:en-usos:windows10-1703-x64system -
submitted
02-09-2023 20:17
Static task
static1
Behavioral task
behavioral1
Sample
bf099b7aae78cbe094f65bab062e7a21bb99afcca765971de66cda78fffc5786.exe
Resource
win10-20230831-en
General
-
Target
bf099b7aae78cbe094f65bab062e7a21bb99afcca765971de66cda78fffc5786.exe
-
Size
1.0MB
-
MD5
10e8346eb7cd98635ea3ce6274677745
-
SHA1
7f798a781384597725943e133521567725a1853b
-
SHA256
bf099b7aae78cbe094f65bab062e7a21bb99afcca765971de66cda78fffc5786
-
SHA512
5ebda2e3f0b205b9b2211374f592785bfb0ea530ba9cde5e6ba7eb69ed836ec5129c7f6232700cf0a677758c62ce593f6df8f54e85bc5d6bc372ff29067668c3
-
SSDEEP
24576:byx6r5GqFo9Zq4JagSvUbx/FlAi2iFdrnZUA:OxAQqO9AIal4doNidU
Malware Config
Extracted
redline
narik
77.91.124.82:19071
-
auth_value
07924f5ef90576eb64faea857b8ba3e5
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" q1340451.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" q1340451.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" q1340451.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" q1340451.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" q1340451.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 3856 z1611271.exe 4536 z1359321.exe 3068 z1973366.exe 208 z2087890.exe 3008 q1340451.exe 2196 r6646479.exe 1496 s9329710.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features q1340451.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" q1340451.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z1973366.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z2087890.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bf099b7aae78cbe094f65bab062e7a21bb99afcca765971de66cda78fffc5786.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z1611271.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z1359321.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3008 q1340451.exe 3008 q1340451.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3008 q1340451.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4104 wrote to memory of 3856 4104 bf099b7aae78cbe094f65bab062e7a21bb99afcca765971de66cda78fffc5786.exe 70 PID 4104 wrote to memory of 3856 4104 bf099b7aae78cbe094f65bab062e7a21bb99afcca765971de66cda78fffc5786.exe 70 PID 4104 wrote to memory of 3856 4104 bf099b7aae78cbe094f65bab062e7a21bb99afcca765971de66cda78fffc5786.exe 70 PID 3856 wrote to memory of 4536 3856 z1611271.exe 71 PID 3856 wrote to memory of 4536 3856 z1611271.exe 71 PID 3856 wrote to memory of 4536 3856 z1611271.exe 71 PID 4536 wrote to memory of 3068 4536 z1359321.exe 72 PID 4536 wrote to memory of 3068 4536 z1359321.exe 72 PID 4536 wrote to memory of 3068 4536 z1359321.exe 72 PID 3068 wrote to memory of 208 3068 z1973366.exe 73 PID 3068 wrote to memory of 208 3068 z1973366.exe 73 PID 3068 wrote to memory of 208 3068 z1973366.exe 73 PID 208 wrote to memory of 3008 208 z2087890.exe 74 PID 208 wrote to memory of 3008 208 z2087890.exe 74 PID 208 wrote to memory of 3008 208 z2087890.exe 74 PID 208 wrote to memory of 2196 208 z2087890.exe 75 PID 208 wrote to memory of 2196 208 z2087890.exe 75 PID 208 wrote to memory of 2196 208 z2087890.exe 75 PID 3068 wrote to memory of 1496 3068 z1973366.exe 76 PID 3068 wrote to memory of 1496 3068 z1973366.exe 76 PID 3068 wrote to memory of 1496 3068 z1973366.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf099b7aae78cbe094f65bab062e7a21bb99afcca765971de66cda78fffc5786.exe"C:\Users\Admin\AppData\Local\Temp\bf099b7aae78cbe094f65bab062e7a21bb99afcca765971de66cda78fffc5786.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1611271.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1611271.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1359321.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1359321.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1973366.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1973366.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2087890.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2087890.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1340451.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1340451.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3008
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6646479.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6646479.exe6⤵
- Executes dropped EXE
PID:2196
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s9329710.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s9329710.exe5⤵
- Executes dropped EXE
PID:1496
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
934KB
MD54922b564d61af060049d9c8d41437888
SHA1539d1746843495095168292b0e87e05f8f2ef1f3
SHA256b751acbccb76fda2cd037fd9854c5a8b27f804a652355d6ac92c861d5ef70883
SHA512a8d4c65069bff78d598d8252d0dbea28677c945c0ef9b70c74dcc97aeb3306c96644a93d5bdc90b336a2b3ff1fe0de8eacc5e4449d56d3ffc30f8dd2149db551
-
Filesize
934KB
MD54922b564d61af060049d9c8d41437888
SHA1539d1746843495095168292b0e87e05f8f2ef1f3
SHA256b751acbccb76fda2cd037fd9854c5a8b27f804a652355d6ac92c861d5ef70883
SHA512a8d4c65069bff78d598d8252d0dbea28677c945c0ef9b70c74dcc97aeb3306c96644a93d5bdc90b336a2b3ff1fe0de8eacc5e4449d56d3ffc30f8dd2149db551
-
Filesize
708KB
MD52e561bdf9a07e78487ce5561a671089c
SHA11855408fb52fc397094faea1ca3748a8e3c3796f
SHA2565d47095332efaf95d9e6a1307eb8f6456dc7b663a4719e29c0c8265a70a82369
SHA512937a8e8a6463882778b36b4e4550c595694f99195bb9931804029343c5a16a1ee72e16f75bf7e42e89caaf5e2997d0b3c6142903fae2d229bd61305febbadd7a
-
Filesize
708KB
MD52e561bdf9a07e78487ce5561a671089c
SHA11855408fb52fc397094faea1ca3748a8e3c3796f
SHA2565d47095332efaf95d9e6a1307eb8f6456dc7b663a4719e29c0c8265a70a82369
SHA512937a8e8a6463882778b36b4e4550c595694f99195bb9931804029343c5a16a1ee72e16f75bf7e42e89caaf5e2997d0b3c6142903fae2d229bd61305febbadd7a
-
Filesize
482KB
MD522453f375b3eb34b1dd5bfd960144b32
SHA13f6bbe079b0f4c263cff9ab4cab6ced44b49fc14
SHA2564ce1096201c7b1d0d83d15ba7ff748c4533776538fdbdb4270650477366305fa
SHA512a45da525b3f144879eeaf49431aae96300164b19dbf88750956703fa78056c1fe3f32effae490fb3ca474161fc83a26e94470a971b4e1d6626a9a19b224644ac
-
Filesize
482KB
MD522453f375b3eb34b1dd5bfd960144b32
SHA13f6bbe079b0f4c263cff9ab4cab6ced44b49fc14
SHA2564ce1096201c7b1d0d83d15ba7ff748c4533776538fdbdb4270650477366305fa
SHA512a45da525b3f144879eeaf49431aae96300164b19dbf88750956703fa78056c1fe3f32effae490fb3ca474161fc83a26e94470a971b4e1d6626a9a19b224644ac
-
Filesize
174KB
MD5baaa94707add4f6021150b3ccb139d89
SHA1ed52ce4403d7d6bddb093e82634e44837dfc08de
SHA2562f947fae4d2fd4c5d8b3cb62394e9c378a3a1db54ce7a9c5756f4829dd829d6b
SHA5127f0f9db897818d42733fc4ee4b1a0d998f5dae34220b526b8ee0ee40e1bba7aad68b888c6d090d0fb7188d8289d9e98c7d56ed5e62d08fffa29c36dd9f705405
-
Filesize
174KB
MD5baaa94707add4f6021150b3ccb139d89
SHA1ed52ce4403d7d6bddb093e82634e44837dfc08de
SHA2562f947fae4d2fd4c5d8b3cb62394e9c378a3a1db54ce7a9c5756f4829dd829d6b
SHA5127f0f9db897818d42733fc4ee4b1a0d998f5dae34220b526b8ee0ee40e1bba7aad68b888c6d090d0fb7188d8289d9e98c7d56ed5e62d08fffa29c36dd9f705405
-
Filesize
325KB
MD5dfcd8e79e99f8d7a59930bcb7a7685aa
SHA1489a98da029012d0dc5c30947def1d3e9e089bee
SHA2569726086c092b7c60c3b4b713e6f89955ffc5297a8e68c4a50e0b3215c4dd829e
SHA512f1468423ce9beec230303e7758f0d5bc581d4f3154149f7b5f30d55c824d58208dfa78f746ed042ae01cb6c1404c2be225273b80c2e96f655adcfbf6df968faa
-
Filesize
325KB
MD5dfcd8e79e99f8d7a59930bcb7a7685aa
SHA1489a98da029012d0dc5c30947def1d3e9e089bee
SHA2569726086c092b7c60c3b4b713e6f89955ffc5297a8e68c4a50e0b3215c4dd829e
SHA512f1468423ce9beec230303e7758f0d5bc581d4f3154149f7b5f30d55c824d58208dfa78f746ed042ae01cb6c1404c2be225273b80c2e96f655adcfbf6df968faa
-
Filesize
184KB
MD549c9e13352ce04b5836be01236b851cd
SHA141846feb72daa105d4437fb4ff39f4d0e667876c
SHA25670080e5171cdcd096a9c9494e00c392a31e676deb53a0190a91887c504aacd1f
SHA512b198fe9caaa3c7dd30d1fa8acd4481f15cc080546ec65b39b4371148f451b752667d06d31a9fb30c3b8560c90c5a9f9a19e7b86fdb58b1cbf02f224665a3f1c2
-
Filesize
184KB
MD549c9e13352ce04b5836be01236b851cd
SHA141846feb72daa105d4437fb4ff39f4d0e667876c
SHA25670080e5171cdcd096a9c9494e00c392a31e676deb53a0190a91887c504aacd1f
SHA512b198fe9caaa3c7dd30d1fa8acd4481f15cc080546ec65b39b4371148f451b752667d06d31a9fb30c3b8560c90c5a9f9a19e7b86fdb58b1cbf02f224665a3f1c2
-
Filesize
140KB
MD5b658d2c87494d8927f89b3cb691e1c31
SHA154525e4019512f62b520fd09f53c94fb66d6c193
SHA2566c24f5af9a5c7bb7e4b892c4695bf9faa7bf0996fdd8eba1d1f16e6a87c4165a
SHA51268094a5918013b6105c8f2839cedc232c039597fff03108ade88ecc6a370026feff98bd609f2825faca769c667f367908e925bb8f3e31f5f42458e47c0564786
-
Filesize
140KB
MD5b658d2c87494d8927f89b3cb691e1c31
SHA154525e4019512f62b520fd09f53c94fb66d6c193
SHA2566c24f5af9a5c7bb7e4b892c4695bf9faa7bf0996fdd8eba1d1f16e6a87c4165a
SHA51268094a5918013b6105c8f2839cedc232c039597fff03108ade88ecc6a370026feff98bd609f2825faca769c667f367908e925bb8f3e31f5f42458e47c0564786