Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/01/2024, 03:32
Static task
static1
Behavioral task
behavioral1
Sample
3fc9c1a56f30cf18e75f458ba4470cee.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3fc9c1a56f30cf18e75f458ba4470cee.exe
Resource
win10v2004-20231215-en
General
-
Target
3fc9c1a56f30cf18e75f458ba4470cee.exe
-
Size
471KB
-
MD5
3fc9c1a56f30cf18e75f458ba4470cee
-
SHA1
4f79fa2f37e7c795a25b753df8c53b6d4cc46d28
-
SHA256
a455ea749bf2aa78f43ca6beb1fec983ca39b71e23ab8a951c6b3c0a23ae6b7c
-
SHA512
b3149d9a303c0260e0b1452d20c196bb94d8c7f3a44d6a4ed9870b015e61b33b45eada50646fc2c40784a15c0349dbd1475ac69a38160cb085a0a9c3aa0bc807
-
SSDEEP
6144:xYa0TXGrWVqIUgpXSRER+JTKasRLwnSmU2h0:xsX6KqpMXSER+JTHsRLwnSmUv
Malware Config
Extracted
redline
Lamborghini
45.88.3.176:17033
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 3fc9c1a56f30cf18e75f458ba4470cee.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 3fc9c1a56f30cf18e75f458ba4470cee.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 3fc9c1a56f30cf18e75f458ba4470cee.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 3fc9c1a56f30cf18e75f458ba4470cee.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/2872-22-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2872-23-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2872-26-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2872-31-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2872-29-0x0000000000400000-0x000000000041E000-memory.dmp family_redline -
SectopRAT payload 5 IoCs
resource yara_rule behavioral1/memory/2872-22-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2872-23-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2872-26-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2872-31-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2872-29-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths 3fc9c1a56f30cf18e75f458ba4470cee.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\3fc9c1a56f30cf18e75f458ba4470cee.exe = "0" 3fc9c1a56f30cf18e75f458ba4470cee.exe -
Nirsoft 1 IoCs
resource yara_rule behavioral1/files/0x0031000000015c7a-7.dat Nirsoft -
Executes dropped EXE 2 IoCs
pid Process 2380 AdvancedRun.exe 2016 AdvancedRun.exe -
Loads dropped DLL 4 IoCs
pid Process 828 3fc9c1a56f30cf18e75f458ba4470cee.exe 828 3fc9c1a56f30cf18e75f458ba4470cee.exe 2380 AdvancedRun.exe 2380 AdvancedRun.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 3fc9c1a56f30cf18e75f458ba4470cee.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Spynet\SubmitSamplesConsent = "0" 3fc9c1a56f30cf18e75f458ba4470cee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 3fc9c1a56f30cf18e75f458ba4470cee.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 3fc9c1a56f30cf18e75f458ba4470cee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths 3fc9c1a56f30cf18e75f458ba4470cee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions 3fc9c1a56f30cf18e75f458ba4470cee.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\3fc9c1a56f30cf18e75f458ba4470cee.exe = "0" 3fc9c1a56f30cf18e75f458ba4470cee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Real-Time Protection 3fc9c1a56f30cf18e75f458ba4470cee.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 828 set thread context of 2872 828 3fc9c1a56f30cf18e75f458ba4470cee.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2380 AdvancedRun.exe 2380 AdvancedRun.exe 2016 AdvancedRun.exe 2016 AdvancedRun.exe 2852 powershell.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 2380 AdvancedRun.exe Token: SeImpersonatePrivilege 2380 AdvancedRun.exe Token: SeDebugPrivilege 2016 AdvancedRun.exe Token: SeImpersonatePrivilege 2016 AdvancedRun.exe Token: SeDebugPrivilege 828 3fc9c1a56f30cf18e75f458ba4470cee.exe Token: SeDebugPrivilege 2872 3fc9c1a56f30cf18e75f458ba4470cee.exe Token: SeDebugPrivilege 2852 powershell.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 828 wrote to memory of 2380 828 3fc9c1a56f30cf18e75f458ba4470cee.exe 28 PID 828 wrote to memory of 2380 828 3fc9c1a56f30cf18e75f458ba4470cee.exe 28 PID 828 wrote to memory of 2380 828 3fc9c1a56f30cf18e75f458ba4470cee.exe 28 PID 828 wrote to memory of 2380 828 3fc9c1a56f30cf18e75f458ba4470cee.exe 28 PID 2380 wrote to memory of 2016 2380 AdvancedRun.exe 29 PID 2380 wrote to memory of 2016 2380 AdvancedRun.exe 29 PID 2380 wrote to memory of 2016 2380 AdvancedRun.exe 29 PID 2380 wrote to memory of 2016 2380 AdvancedRun.exe 29 PID 828 wrote to memory of 2852 828 3fc9c1a56f30cf18e75f458ba4470cee.exe 30 PID 828 wrote to memory of 2852 828 3fc9c1a56f30cf18e75f458ba4470cee.exe 30 PID 828 wrote to memory of 2852 828 3fc9c1a56f30cf18e75f458ba4470cee.exe 30 PID 828 wrote to memory of 2852 828 3fc9c1a56f30cf18e75f458ba4470cee.exe 30 PID 828 wrote to memory of 2872 828 3fc9c1a56f30cf18e75f458ba4470cee.exe 32 PID 828 wrote to memory of 2872 828 3fc9c1a56f30cf18e75f458ba4470cee.exe 32 PID 828 wrote to memory of 2872 828 3fc9c1a56f30cf18e75f458ba4470cee.exe 32 PID 828 wrote to memory of 2872 828 3fc9c1a56f30cf18e75f458ba4470cee.exe 32 PID 828 wrote to memory of 2872 828 3fc9c1a56f30cf18e75f458ba4470cee.exe 32 PID 828 wrote to memory of 2872 828 3fc9c1a56f30cf18e75f458ba4470cee.exe 32 PID 828 wrote to memory of 2872 828 3fc9c1a56f30cf18e75f458ba4470cee.exe 32 PID 828 wrote to memory of 2872 828 3fc9c1a56f30cf18e75f458ba4470cee.exe 32 PID 828 wrote to memory of 2872 828 3fc9c1a56f30cf18e75f458ba4470cee.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\3fc9c1a56f30cf18e75f458ba4470cee.exe"C:\Users\Admin\AppData\Local\Temp\3fc9c1a56f30cf18e75f458ba4470cee.exe"1⤵
- Modifies Windows Defender Real-time Protection settings
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Users\Admin\AppData\Local\Temp\a5e9b854-d98d-4c74-a37c-19aa6f68f0fa\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\a5e9b854-d98d-4c74-a37c-19aa6f68f0fa\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\a5e9b854-d98d-4c74-a37c-19aa6f68f0fa\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\a5e9b854-d98d-4c74-a37c-19aa6f68f0fa\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\a5e9b854-d98d-4c74-a37c-19aa6f68f0fa\AdvancedRun.exe" /SpecialRun 4101d8 23803⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2016
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\3fc9c1a56f30cf18e75f458ba4470cee.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2852
-
-
C:\Users\Admin\AppData\Local\Temp\3fc9c1a56f30cf18e75f458ba4470cee.exe"C:\Users\Admin\AppData\Local\Temp\3fc9c1a56f30cf18e75f458ba4470cee.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2872
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD517fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a