Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05/11/2024, 03:04
Static task
static1
Behavioral task
behavioral1
Sample
b4cbaecefba3a0a16b3d64a98cc870572f02711e57a3e4126d4f955a18c529c3.exe
Resource
win10v2004-20241007-en
General
-
Target
b4cbaecefba3a0a16b3d64a98cc870572f02711e57a3e4126d4f955a18c529c3.exe
-
Size
1.1MB
-
MD5
111d7320fd6d663c9c87f5377cef5e64
-
SHA1
527da2bb39c02abefe3d94ed0561c4b0a5011255
-
SHA256
b4cbaecefba3a0a16b3d64a98cc870572f02711e57a3e4126d4f955a18c529c3
-
SHA512
614b0dcf2f653be63253887d601854196830deb9d93ee7a87fdc984740780e54f7d4df325991fc3c7175c9d564a40a9e9464232c8c719c5254665711c3b5eef2
-
SSDEEP
24576:EysiD43iIXtZWUHQFk/FuYxjmyQ4qbrQDYRDYb49Bgf866a1g:TsiD43rZxHQFk/FuK9G0T02fN6
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k9180891.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k9180891.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k9180891.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k9180891.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k9180891.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k9180891.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x000a000000023b85-54.dat family_redline behavioral1/memory/1192-56-0x0000000000250000-0x000000000027A000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 812 y2281606.exe 1768 y5197638.exe 4804 k9180891.exe 1192 l5847701.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k9180891.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k9180891.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y5197638.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b4cbaecefba3a0a16b3d64a98cc870572f02711e57a3e4126d4f955a18c529c3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y2281606.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4036 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b4cbaecefba3a0a16b3d64a98cc870572f02711e57a3e4126d4f955a18c529c3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y2281606.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y5197638.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k9180891.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l5847701.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4804 k9180891.exe 4804 k9180891.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4804 k9180891.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1032 wrote to memory of 812 1032 b4cbaecefba3a0a16b3d64a98cc870572f02711e57a3e4126d4f955a18c529c3.exe 84 PID 1032 wrote to memory of 812 1032 b4cbaecefba3a0a16b3d64a98cc870572f02711e57a3e4126d4f955a18c529c3.exe 84 PID 1032 wrote to memory of 812 1032 b4cbaecefba3a0a16b3d64a98cc870572f02711e57a3e4126d4f955a18c529c3.exe 84 PID 812 wrote to memory of 1768 812 y2281606.exe 85 PID 812 wrote to memory of 1768 812 y2281606.exe 85 PID 812 wrote to memory of 1768 812 y2281606.exe 85 PID 1768 wrote to memory of 4804 1768 y5197638.exe 86 PID 1768 wrote to memory of 4804 1768 y5197638.exe 86 PID 1768 wrote to memory of 4804 1768 y5197638.exe 86 PID 1768 wrote to memory of 1192 1768 y5197638.exe 95 PID 1768 wrote to memory of 1192 1768 y5197638.exe 95 PID 1768 wrote to memory of 1192 1768 y5197638.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4cbaecefba3a0a16b3d64a98cc870572f02711e57a3e4126d4f955a18c529c3.exe"C:\Users\Admin\AppData\Local\Temp\b4cbaecefba3a0a16b3d64a98cc870572f02711e57a3e4126d4f955a18c529c3.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2281606.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2281606.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y5197638.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y5197638.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k9180891.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k9180891.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4804
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l5847701.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l5847701.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1192
-
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4036
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
749KB
MD5b21adf506309c0ec230a06ee5230b3e2
SHA1735104302f850c4bc806d3979bfdb0a44eea8ece
SHA25686591ecbf1e133d0356f371b79934f512ba3d91477b1afe4d66943edd300bdba
SHA5125730eb916a662cd2b4f3e33050e12b5957270279cb5c4df675b0c46fa09e4212c8c0faa230c54c5bb8155bd7dedc31e6f02ed375464a88fb6f71a02b9fbef1c3
-
Filesize
304KB
MD5f1aae9ba10f45ab92d85df3870d96f58
SHA1bb8d4727bf920dd3fa66538efc6552d84f097523
SHA256b1a5e0acfd5c2a55994f0d2f8d3c7cfac0a9c8e08cc2299c14173a1241b10aea
SHA5120fc54c558e23cdbc38709d72581786e5504bef441a9d4e04eea81c5dd391a1c8c0a31236ca905517c3415fe50bb0719bdcb3cd80f3372041cfa6edcb0e5357a3
-
Filesize
183KB
MD575df6a4aaf5c63bc4f42ac5ec8ecc76a
SHA18d9da11aa11364c1b580b12faa446403f527ff83
SHA256d1d13ff4eabb541a9cfc225beeb1c27d9cd85c8f9849e8d0fece0a4503c63f05
SHA51272d34a4770cf9885993630f04e83831f4ded666af58cb705c7b1ca4cd7ca95911dec7247e4987c64afc13fee10bcf94fc913bd9a7790edb65c75b01a89bbe8fe
-
Filesize
145KB
MD570c97762c8938485e138c08fecb701f4
SHA1c2935795a83f0bf695d9feaf4e3caa8572b8fc6f
SHA256ecee59ef5a235356771cb172b3aeb0c522d6637b0d1a84d09e8ddfbb9691a4d9
SHA512a9b2ab38b1ccad12b02f3d08b065c37e9bfcaf084c5e372dfdf84fa9d1f64e9d13051aa6c148e82564eefb4fe3aa8722eee8d5baf800d57d4330ba8410f93cd6