Overview
overview
10Static
static
307ebb70eb0...5f.exe
windows7-x64
307ebb70eb0...5f.exe
windows10-2004-x64
100b4bb67302...ca.exe
windows10-2004-x64
90fbb8ff4cb...49.exe
windows10-2004-x64
10108e20eafa...c7.exe
windows7-x64
3108e20eafa...c7.exe
windows10-2004-x64
101522207077...0f.exe
windows10-2004-x64
1023fcf9bc69...25.exe
windows10-2004-x64
102ca9135451...23.exe
windows7-x64
32ca9135451...23.exe
windows10-2004-x64
1042f53acaac...33.exe
windows10-2004-x64
1045af188d23...c0.exe
windows10-2004-x64
1082fa18f52c...32.exe
windows7-x64
382fa18f52c...32.exe
windows10-2004-x64
108672d19897...4f.exe
windows10-2004-x64
108ceedf9abd...f7.exe
windows10-2004-x64
1099cc81196c...15.exe
windows7-x64
399cc81196c...15.exe
windows10-2004-x64
10a2aa61942b...83.exe
windows7-x64
3a2aa61942b...83.exe
windows10-2004-x64
10c467adbd48...9e.exe
windows10-2004-x64
10f7dfe59831...a0.exe
windows10-2004-x64
10fc29a80a1c...7d.exe
windows10-2004-x64
10fdc14a13fe...6d.exe
windows7-x64
fdc14a13fe...6d.exe
windows10-2004-x64
Analysis
-
max time kernel
142s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
13-05-2024 10:00
Static task
static1
Behavioral task
behavioral1
Sample
07ebb70eb02d84c732bd46e5b46e84abf9aa23a5b1f307bbd9247381b0bd075f.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
07ebb70eb02d84c732bd46e5b46e84abf9aa23a5b1f307bbd9247381b0bd075f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
0b4bb67302386646ed679bf7dbfd9e44d9c5eb985f2c043ef415113edb2b2eca.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
0fbb8ff4cb39375b064e85f8aef7950a25795f035ac41fb2e1af59b5bf042d49.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
108e20eafa34f2b549a14e6780b7a0479474d59c97c41c728d0a2d851e0fd1c7.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
108e20eafa34f2b549a14e6780b7a0479474d59c97c41c728d0a2d851e0fd1c7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
1522207077e3aee47dc9624ce4766267091ae87f7e349887943791322b38480f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
23fcf9bc69ee1c0d5089103821b4a531b975fae897eba7a91861452d69803225.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
2ca913545183cade199d442f191ec899bc998b01a3aac8ad506c95f995b6a423.exe
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
2ca913545183cade199d442f191ec899bc998b01a3aac8ad506c95f995b6a423.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
42f53acaac143c0dc23d3b1f603e96b42301e6fe138cc5cbee3f2db8f619ba33.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
45af188d235d1046544f5d37f950851a088373ba96053250f62b51f24faf22c0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
82fa18f52c10283bc449dce7ab0c71346c6fdc17c9fa67f8c63939216010d632.exe
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
82fa18f52c10283bc449dce7ab0c71346c6fdc17c9fa67f8c63939216010d632.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
8672d19897720829ca8e3d11e92f295b615d0fb57d0ae1c17f1358f55bcdc74f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
8ceedf9abd5ab64ee87ff77e364bebcf1f92bae8cce4dbdd5e39e548446350f7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
99cc81196caa729f2e35b124dfb021fe9203a2023c94b1fb01a466af49ced615.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
99cc81196caa729f2e35b124dfb021fe9203a2023c94b1fb01a466af49ced615.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
a2aa61942bae116f8c855fda0e9a991dba92b3a1e2f147aee0e7e2be1bdea383.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
a2aa61942bae116f8c855fda0e9a991dba92b3a1e2f147aee0e7e2be1bdea383.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
c467adbd485a649a7ae2b7f63d49aaa84868c2b05a43f328f7e2377a5126099e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral22
Sample
f7dfe59831b88cf2cf291d2b9f3ccd94964abeb10a6e137c4bc2206c9a9346a0.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral23
Sample
fc29a80a1c0ea6d57ecb3f789dcbe2b8e849edb11597f13dbeea0b0dedb5237d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral24
Sample
fdc14a13fe0a1c3e8b74ad9d3c308ec1c42b514df6637d61f31610c48b9cd56d.exe
Resource
win7-20240215-en
Behavioral task
behavioral25
Sample
fdc14a13fe0a1c3e8b74ad9d3c308ec1c42b514df6637d61f31610c48b9cd56d.exe
Resource
win10v2004-20240426-en
General
-
Target
f7dfe59831b88cf2cf291d2b9f3ccd94964abeb10a6e137c4bc2206c9a9346a0.exe
-
Size
488KB
-
MD5
f43eefd57a11c5a5596c3eefb9898432
-
SHA1
0af5c7a3ba4038a905aa626808bfa60fc3ec11de
-
SHA256
f7dfe59831b88cf2cf291d2b9f3ccd94964abeb10a6e137c4bc2206c9a9346a0
-
SHA512
d458d3dc0c997f929c5b26f34f9a2ca5df0996aec6ccf907819f711d65d747433bfbe7f0d52b59a0562b528008b2e92c32b3e84ea05471bc53519cc1de158957
-
SSDEEP
6144:KVy+bnr+sp0yN90QEBSK3101Hn8GH7dyN4Xa6yVrJCae0Kb1E8OB/QKaJlo6LVtC:DMr8y90DSaY8i7MxVwazKlOZLa8CDAj
Malware Config
Extracted
redline
debro
185.161.248.75:4132
-
auth_value
18c2c191aebfde5d1787ec8d805a01a8
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k5289717.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k5289717.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k5289717.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k5289717.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k5289717.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k5289717.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral22/memory/2300-53-0x00000000006A0000-0x00000000006CE000-memory.dmp family_redline behavioral22/files/0x0007000000023457-52.dat family_redline -
Executes dropped EXE 3 IoCs
pid Process 4376 y9098696.exe 1908 k5289717.exe 2300 l4940133.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k5289717.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k5289717.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f7dfe59831b88cf2cf291d2b9f3ccd94964abeb10a6e137c4bc2206c9a9346a0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y9098696.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1908 k5289717.exe 1908 k5289717.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1908 k5289717.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3132 wrote to memory of 4376 3132 f7dfe59831b88cf2cf291d2b9f3ccd94964abeb10a6e137c4bc2206c9a9346a0.exe 85 PID 3132 wrote to memory of 4376 3132 f7dfe59831b88cf2cf291d2b9f3ccd94964abeb10a6e137c4bc2206c9a9346a0.exe 85 PID 3132 wrote to memory of 4376 3132 f7dfe59831b88cf2cf291d2b9f3ccd94964abeb10a6e137c4bc2206c9a9346a0.exe 85 PID 4376 wrote to memory of 1908 4376 y9098696.exe 86 PID 4376 wrote to memory of 1908 4376 y9098696.exe 86 PID 4376 wrote to memory of 1908 4376 y9098696.exe 86 PID 4376 wrote to memory of 2300 4376 y9098696.exe 98 PID 4376 wrote to memory of 2300 4376 y9098696.exe 98 PID 4376 wrote to memory of 2300 4376 y9098696.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7dfe59831b88cf2cf291d2b9f3ccd94964abeb10a6e137c4bc2206c9a9346a0.exe"C:\Users\Admin\AppData\Local\Temp\f7dfe59831b88cf2cf291d2b9f3ccd94964abeb10a6e137c4bc2206c9a9346a0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9098696.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9098696.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k5289717.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k5289717.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1908
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l4940133.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l4940133.exe3⤵
- Executes dropped EXE
PID:2300
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
316KB
MD53f28a220d555d7f84763f4fe14c5e30e
SHA16844171e7db3af8480e85c49732e8e26c0fea7fc
SHA256a467111c1a7dd3af8188b3fd8536d689b84b136a58f62e8366f78d309b1bad4b
SHA5127ede895705631dfabdf2fb5a700495ed6aa265328c9d51edabbccaf8e1ed60661dfabba15c2e667191e02ec9694299fbb88a0a5c236b5590f28c0ec648aef08c
-
Filesize
184KB
MD5d4c640fb500618ad6c9fc5fe7d3e784d
SHA1850df0880e1685ce709b44afbbb365cab4f0fec4
SHA256a511ae2083565f7f66afa9902f2d6aaa5bdf56c8a148609bfe949880a74ff44b
SHA512a28a51e937a11c9d72f7450b86469609d972a1e65c176bf92a47922eaf9cf72d3a49f0d40702f6f22bfd3f2c9f9e36edfefecdd263e1d49f3546f44d4817cecd
-
Filesize
168KB
MD5aae32866ea7168f696bbf5708e1f34b3
SHA1ea4bae2e6d032dd41693f6b0816be1bdf5ab0530
SHA256936ad9a6d9ad9debf5b12515698968901e4601066119d668b8cba558d9ccd56c
SHA51285cfbf84831de3ce667f267896c9803eb4a81fcfc0d961ca364f85a237b28aee29e345bed3b6bad8626000045a264db023464da0d79ed3f75a2c5f5461363066