Overview
overview
10Static
static
30d6ae7d3e5...46.exe
windows10-2004-x64
1014841ccb83...75.exe
windows10-2004-x64
1018e108c298...24.exe
windows7-x64
318e108c298...24.exe
windows10-2004-x64
102945802616...90.exe
windows10-2004-x64
103278025d1e...83.exe
windows10-2004-x64
103977873bc2...45.exe
windows10-2004-x64
103ee99efba0...30.exe
windows7-x64
33ee99efba0...30.exe
windows10-2004-x64
104111ebb7fa...25.exe
windows7-x64
34111ebb7fa...25.exe
windows10-2004-x64
105f784993eb...f4.exe
windows10-2004-x64
10614cff5590...9a.exe
windows10-2004-x64
106286d393c9...52.exe
windows7-x64
36286d393c9...52.exe
windows10-2004-x64
106db47e7857...ad.exe
windows10-2004-x64
10a0808edece...c8.exe
windows7-x64
3a0808edece...c8.exe
windows10-2004-x64
10a510057561...96.exe
windows10-2004-x64
10d5f7db4382...70.exe
windows10-2004-x64
10da4db9abb9...ce.exe
windows7-x64
3da4db9abb9...ce.exe
windows10-2004-x64
10ebfcc654cd...96.exe
windows10-2004-x64
10Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13-05-2024 11:47
Static task
static1
Behavioral task
behavioral1
Sample
0d6ae7d3e5be5821154ac1fc5dc59650e00747b98e72de05210778baeb492046.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
14841ccb83b8a3938282bf27ed0477e96b335c197b99c0745c4458eaaffd2675.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
18e108c298d2a23bcafda5d40c21ffd67b48c2f5429a8b8f5864e593a83eb424.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
18e108c298d2a23bcafda5d40c21ffd67b48c2f5429a8b8f5864e593a83eb424.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
29458026160d87414595e05c8bdd81a3b5dd948821f3acc4531a2399f9572790.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
3278025d1e04a04ac2f71eee12369519dc740aa56b0c1b1c3dcb1b7aabb05683.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
3977873bc268ae6753444ae27567678d7b4f321c373d4aacda1270a4232fd045.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral8
Sample
3ee99efba0a08acf1fb339b90e092de6608570d79e9eab1c5b99e8734c43eb30.exe
Resource
win7-20240221-en
Behavioral task
behavioral9
Sample
3ee99efba0a08acf1fb339b90e092de6608570d79e9eab1c5b99e8734c43eb30.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
4111ebb7fae57f66063a32adb1209c583eab0ef408bb86ce4daf6bf2884c1225.exe
Resource
win7-20240419-en
Behavioral task
behavioral11
Sample
4111ebb7fae57f66063a32adb1209c583eab0ef408bb86ce4daf6bf2884c1225.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
5f784993eb49400b6627e2bc0859e4246e62553f43f1479a65970f34a16765f4.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
614cff559007c756d485e21c8344fe2ac72354f9e4af563e870926f665edb39a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
6286d393c93044fd5b8363ccad5324fadfde3e3d9b340ec908941eab3fe90652.exe
Resource
win7-20231129-en
Behavioral task
behavioral15
Sample
6286d393c93044fd5b8363ccad5324fadfde3e3d9b340ec908941eab3fe90652.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
6db47e78576c4401e9d49332fe0479198b85c1913b8a65624e06be057a343bad.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
a0808edece606fc3c1a99c4b3de0d8a52146b27ab322c37bac9a2d6b917694c8.exe
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
a0808edece606fc3c1a99c4b3de0d8a52146b27ab322c37bac9a2d6b917694c8.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
a510057561b44d36bd440745b4ad2a685c2d3db022032dc54586c96a3cae4896.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
d5f7db438217721663938572626a0da7dca7a55289f9e3f27849dc176c1d7570.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
da4db9abb9d0cb7a316fb229c93429667dc9006f687abf34a56c3627b86536ce.exe
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
da4db9abb9d0cb7a316fb229c93429667dc9006f687abf34a56c3627b86536ce.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
ebfcc654cdacff2dc1478f389cd7a39a61745e5ac937eab5fbd8fe64700f3196.exe
Resource
win10v2004-20240426-en
General
-
Target
a510057561b44d36bd440745b4ad2a685c2d3db022032dc54586c96a3cae4896.exe
-
Size
769KB
-
MD5
bae0e7cc8632ec0d3567370dbd9c1888
-
SHA1
097e313faf79ed043a66e80f181303d3156291df
-
SHA256
a510057561b44d36bd440745b4ad2a685c2d3db022032dc54586c96a3cae4896
-
SHA512
a3f5598565af81f2c5c485dde39705011db7a1572ab437c43a73116c4063a5a6932842315ced8c4ac1aa6f2b64a0c162830143c098ce9c372517560c253fdd72
-
SSDEEP
12288:hMrvy90390YhABZS1mX5sMfUnpJrvfKMJjeFGKcBKjiNJ93UOEknWR4+:ayIPhABZQm1fGJLKM+GLBKjmnnNW++
Malware Config
Extracted
redline
mixa
185.161.248.75:4132
-
auth_value
9d14534b25ac495ab25b59800acf3bb2
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a8785240.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a8785240.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a8785240.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a8785240.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a8785240.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a8785240.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral19/files/0x0007000000023571-54.dat family_redline behavioral19/memory/1668-56-0x0000000000130000-0x000000000015E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3652 v2752601.exe 2772 v0295313.exe 1152 a8785240.exe 1668 b5257898.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a8785240.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a8785240.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a510057561b44d36bd440745b4ad2a685c2d3db022032dc54586c96a3cae4896.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v2752601.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v0295313.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1152 a8785240.exe 1152 a8785240.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1152 a8785240.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4820 wrote to memory of 3652 4820 a510057561b44d36bd440745b4ad2a685c2d3db022032dc54586c96a3cae4896.exe 90 PID 4820 wrote to memory of 3652 4820 a510057561b44d36bd440745b4ad2a685c2d3db022032dc54586c96a3cae4896.exe 90 PID 4820 wrote to memory of 3652 4820 a510057561b44d36bd440745b4ad2a685c2d3db022032dc54586c96a3cae4896.exe 90 PID 3652 wrote to memory of 2772 3652 v2752601.exe 91 PID 3652 wrote to memory of 2772 3652 v2752601.exe 91 PID 3652 wrote to memory of 2772 3652 v2752601.exe 91 PID 2772 wrote to memory of 1152 2772 v0295313.exe 93 PID 2772 wrote to memory of 1152 2772 v0295313.exe 93 PID 2772 wrote to memory of 1152 2772 v0295313.exe 93 PID 2772 wrote to memory of 1668 2772 v0295313.exe 99 PID 2772 wrote to memory of 1668 2772 v0295313.exe 99 PID 2772 wrote to memory of 1668 2772 v0295313.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\a510057561b44d36bd440745b4ad2a685c2d3db022032dc54586c96a3cae4896.exe"C:\Users\Admin\AppData\Local\Temp\a510057561b44d36bd440745b4ad2a685c2d3db022032dc54586c96a3cae4896.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2752601.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2752601.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0295313.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0295313.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a8785240.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a8785240.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1152
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5257898.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5257898.exe4⤵
- Executes dropped EXE
PID:1668
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4020,i,7012731823941922179,12386606396608877869,262144 --variations-seed-version --mojo-platform-channel-handle=4068 /prefetch:81⤵PID:4184
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
488KB
MD5fa694f09ad9cbc795cf5847c2aad65ca
SHA182c92871b9455cf04223964abf1e99cc611fe9cd
SHA25608cbe5ab70ca678ca3ae75e50cfad977ef28f6f68ea4f2aed97db697d832e82c
SHA51260f6ad53e2b13cc98874f625402df92c0d1278a50c479bcd703ce25b45d8eec747b1df972bc0b1a9bfa2df1fc5e75dfddcd38ba039f95d6a2fe23746cc5660f3
-
Filesize
316KB
MD5473f819209e2b739e186e49c007b0500
SHA1a0a9d81885ff41dd92727df0edea5f8956d3cc9b
SHA256ea47879989afdae64e6a2fd1bdd521ed8a7eee7611d92cfa24311d7f31d22c93
SHA51254401da33c393750646bd884ec253603b8cfb358b66ac8da6676c06d37d14cbcc89b84656a903bded8b8f3b50e024ebfbb7411635f715c275c7d6c9bafa92a13
-
Filesize
184KB
MD5d4c640fb500618ad6c9fc5fe7d3e784d
SHA1850df0880e1685ce709b44afbbb365cab4f0fec4
SHA256a511ae2083565f7f66afa9902f2d6aaa5bdf56c8a148609bfe949880a74ff44b
SHA512a28a51e937a11c9d72f7450b86469609d972a1e65c176bf92a47922eaf9cf72d3a49f0d40702f6f22bfd3f2c9f9e36edfefecdd263e1d49f3546f44d4817cecd
-
Filesize
168KB
MD59c82d0e3f5532b2d92d444d089b0e2f4
SHA102ed918b046380208e03890940ed2c183537cb27
SHA25674e2e262a4e787bb8bc5f79088998cec212ea46227691c8a9e8dc93578ac09f9
SHA5126368b124156b610a5b83fcae9b10236eae42f7777da753a506c65519352990f032af8e7737b9a024e5a5581991a66ba7f3876699a112c8b61730400b0f10726c