Overview
overview
10Static
static
313d2ddbb73...3e.exe
windows7-x64
313d2ddbb73...3e.exe
windows10-2004-x64
10248f6a88e2...75.exe
windows7-x64
3248f6a88e2...75.exe
windows10-2004-x64
103b3c25930d...c3.exe
windows10-2004-x64
105d4ab7321b...b1.exe
windows7-x64
35d4ab7321b...b1.exe
windows10-2004-x64
1064a91313eb...f3.exe
windows10-2004-x64
1078583cb35f...80.exe
windows10-2004-x64
107adf4e4d30...3b.exe
windows7-x64
37adf4e4d30...3b.exe
windows10-2004-x64
107eeb7d5105...82.exe
windows10-2004-x64
1085963051ec...13.exe
windows10-2004-x64
89b66df995...26.exe
windows7-x64
389b66df995...26.exe
windows10-2004-x64
108a339b5ec9...a4.exe
windows10-2004-x64
10948537d542...e0.exe
windows7-x64
3948537d542...e0.exe
windows10-2004-x64
109aaa505382...5d.exe
windows10-2004-x64
10a1fa8776d2...ff.exe
windows10-2004-x64
10a4673ac7aa...63.exe
windows7-x64
3a4673ac7aa...63.exe
windows10-2004-x64
10a6784f4b55...a5.exe
windows10-2004-x64
10c81bc7831e...44.exe
windows10-2004-x64
10db203dc135...0c.exe
windows7-x64
3db203dc135...0c.exe
windows10-2004-x64
10efd353ed4e...ec.exe
windows10-2004-x64
10Analysis
-
max time kernel
143s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13-05-2024 11:25
Static task
static1
Behavioral task
behavioral1
Sample
13d2ddbb73b782f7ef9b539d9c2f99d04cc83536205cbdf01fcfdbda6273b93e.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
13d2ddbb73b782f7ef9b539d9c2f99d04cc83536205cbdf01fcfdbda6273b93e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
248f6a88e25b649d9173c39e07ca411784d808570bec48e3d3681ea589460f75.exe
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
248f6a88e25b649d9173c39e07ca411784d808570bec48e3d3681ea589460f75.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
3b3c25930d8e5239354b72caa7636c9cd244db255f2dbdad867a4095441c91c3.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
5d4ab7321bf7b95b30cc71760a54f2de7172103b782fbdbcabcc012561d0f7b1.exe
Resource
win7-20240508-en
Behavioral task
behavioral7
Sample
5d4ab7321bf7b95b30cc71760a54f2de7172103b782fbdbcabcc012561d0f7b1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
64a91313eb50dddfb61c52017487fbcae9e2ebfc5426285d97ea6e073db0e1f3.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
78583cb35ffed4865b6cde068216b6ee82dff5cb11522d6b1b2e33d713a21f80.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
7adf4e4d30d94f50091e644399565b03649ebda511d61b6156728120df42193b.exe
Resource
win7-20240221-en
Behavioral task
behavioral11
Sample
7adf4e4d30d94f50091e644399565b03649ebda511d61b6156728120df42193b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
7eeb7d5105714891b20ada945a47c8b1144bfe9a5bfd2e9d3e958da52b062182.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
85963051ece1830904f1352feb417a21d0483c9ef3735855d49b257c6278df13.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
89b66df995df06c4b63c0874921e1da7192ea6c4fb2f7e991fb3bb68c2c25e26.exe
Resource
win7-20240508-en
Behavioral task
behavioral15
Sample
89b66df995df06c4b63c0874921e1da7192ea6c4fb2f7e991fb3bb68c2c25e26.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
8a339b5ec96af2011a66dc18e1650f9ce31815b69c4d565ca266ff41e286a1a4.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
948537d5425794f4ef3525416441d129812ac5d9ef9b35f1eacccf6948e60fe0.exe
Resource
win7-20240508-en
Behavioral task
behavioral18
Sample
948537d5425794f4ef3525416441d129812ac5d9ef9b35f1eacccf6948e60fe0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
9aaa50538204ad8ed2bed10632de494067e88887268d3beeb1f68815b03b325d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
a1fa8776d2234540b4b06a6175a58b01a25370868f808e796d7bcbfdfeacebff.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
a4673ac7aa51c8f5ddda3a7edbf21cc12faacbdd4a054ee01df67f27a5332b63.exe
Resource
win7-20231129-en
Behavioral task
behavioral22
Sample
a4673ac7aa51c8f5ddda3a7edbf21cc12faacbdd4a054ee01df67f27a5332b63.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
a6784f4b550acc54cc3376066858e706933e32e7c275b9b79acf346dc3cd3da5.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral24
Sample
c81bc7831eb8bf73d67379be4d3b03944fc18873944de10d1e02f9de54dfcc44.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral25
Sample
db203dc135d244a9cc17433853b7a56001547d4cad091ced993ce64e9ba1250c.exe
Resource
win7-20240215-en
Behavioral task
behavioral26
Sample
db203dc135d244a9cc17433853b7a56001547d4cad091ced993ce64e9ba1250c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
efd353ed4e0d760b81c28296fd5aa7a67776e8b003d5edc1e7479f6efd721dec.exe
Resource
win10v2004-20240508-en
General
-
Target
64a91313eb50dddfb61c52017487fbcae9e2ebfc5426285d97ea6e073db0e1f3.exe
-
Size
769KB
-
MD5
9bf6b90455cdafbc4f730e0d36e6f2f3
-
SHA1
1280c19116ee65594582d39b5f35693e843eb3cd
-
SHA256
64a91313eb50dddfb61c52017487fbcae9e2ebfc5426285d97ea6e073db0e1f3
-
SHA512
aa93787490febd0e91e0a64a3b04d825fcf474833e9199df6029a1ec9b7ad6b00b15cce125b70e3c89c6a09ed03a549e0abef07baebd82331d19afa5b003cfeb
-
SSDEEP
12288:BMrKy90IjoIdwRsoHBc9xklpmHUpBjdJ7pT2cDoLX3Ehmg/3acxtJxJ0:Ly0IdwPhcM3P5drMLcFJ0
Malware Config
Extracted
redline
mixa
185.161.248.75:4132
-
auth_value
9d14534b25ac495ab25b59800acf3bb2
Signatures
-
Processes:
a3942167.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a3942167.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a3942167.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a3942167.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a3942167.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a3942167.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a3942167.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral8/files/0x000700000002324c-54.dat family_redline behavioral8/memory/3796-56-0x00000000004A0000-0x00000000004CE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
v2615825.exev0466746.exea3942167.exeb6072127.exepid Process 2220 v2615825.exe 2752 v0466746.exe 4068 a3942167.exe 3796 b6072127.exe -
Processes:
a3942167.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a3942167.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a3942167.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
64a91313eb50dddfb61c52017487fbcae9e2ebfc5426285d97ea6e073db0e1f3.exev2615825.exev0466746.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 64a91313eb50dddfb61c52017487fbcae9e2ebfc5426285d97ea6e073db0e1f3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v2615825.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v0466746.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
a3942167.exepid Process 4068 a3942167.exe 4068 a3942167.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
a3942167.exedescription pid Process Token: SeDebugPrivilege 4068 a3942167.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
64a91313eb50dddfb61c52017487fbcae9e2ebfc5426285d97ea6e073db0e1f3.exev2615825.exev0466746.exedescription pid Process procid_target PID 1720 wrote to memory of 2220 1720 64a91313eb50dddfb61c52017487fbcae9e2ebfc5426285d97ea6e073db0e1f3.exe 91 PID 1720 wrote to memory of 2220 1720 64a91313eb50dddfb61c52017487fbcae9e2ebfc5426285d97ea6e073db0e1f3.exe 91 PID 1720 wrote to memory of 2220 1720 64a91313eb50dddfb61c52017487fbcae9e2ebfc5426285d97ea6e073db0e1f3.exe 91 PID 2220 wrote to memory of 2752 2220 v2615825.exe 92 PID 2220 wrote to memory of 2752 2220 v2615825.exe 92 PID 2220 wrote to memory of 2752 2220 v2615825.exe 92 PID 2752 wrote to memory of 4068 2752 v0466746.exe 93 PID 2752 wrote to memory of 4068 2752 v0466746.exe 93 PID 2752 wrote to memory of 4068 2752 v0466746.exe 93 PID 2752 wrote to memory of 3796 2752 v0466746.exe 94 PID 2752 wrote to memory of 3796 2752 v0466746.exe 94 PID 2752 wrote to memory of 3796 2752 v0466746.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\64a91313eb50dddfb61c52017487fbcae9e2ebfc5426285d97ea6e073db0e1f3.exe"C:\Users\Admin\AppData\Local\Temp\64a91313eb50dddfb61c52017487fbcae9e2ebfc5426285d97ea6e073db0e1f3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2615825.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2615825.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0466746.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0466746.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a3942167.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a3942167.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4068
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b6072127.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b6072127.exe4⤵
- Executes dropped EXE
PID:3796
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=2232 --field-trial-handle=2284,i,15722001240173834669,15048020084704567542,262144 --variations-seed-version /prefetch:81⤵PID:3516
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
488KB
MD569f5e440580ae1897024b43da76a46f9
SHA10ab8b16fb09db75011a66bcac3b2fd1b03c022d8
SHA256d84ea774e7c0e371244596d0cf1e99a25d5cc572eadc16ed0724e9366dc64dae
SHA512d1bf5fbe24a19c55eee4210c938b83a699d033dd28fd895671189e41c41a5b874f5af5a91b61a118257aab4589338115602215198673d5590b202ea5b64407b8
-
Filesize
316KB
MD52f3f3933a88c5548f0f53de0c045744c
SHA14a6a2e1e012452533c92a8c0106a13c22bc78195
SHA2568c9f0fa0be3118f84dc4af8a50fa0b11a785e5014b63d362193e6a262a8fb066
SHA512c82a6cfe58f8a8b67592c08bdf3f1b14f77ec97ef276e5611d6135b8b9892166ce39d27d3251cc4c154f62b9a639c25896569a637a35a255dc9d3e71cc2879b9
-
Filesize
184KB
MD5d4c640fb500618ad6c9fc5fe7d3e784d
SHA1850df0880e1685ce709b44afbbb365cab4f0fec4
SHA256a511ae2083565f7f66afa9902f2d6aaa5bdf56c8a148609bfe949880a74ff44b
SHA512a28a51e937a11c9d72f7450b86469609d972a1e65c176bf92a47922eaf9cf72d3a49f0d40702f6f22bfd3f2c9f9e36edfefecdd263e1d49f3546f44d4817cecd
-
Filesize
168KB
MD518f0522e81339408016047163095662d
SHA12057577e206a4145a74a4c24bc11b1aeca84353d
SHA2564aa922fae468293dbca3b2c9fff775be892427f913698bb55e6b559623585715
SHA512df479febf0f93836d624f623b35777cc712a7ce3180ff4ebe961110c1b691522884aa0a890768f1dd87ff354e9093f749bf38345f1857f5f60ba3899172470cd