Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 14:42
Static task
static1
Behavioral task
behavioral1
Sample
ccfd41c9ac7acffbeeee894ae84997e82fce0df7de84c53f25153019480f19a8.exe
Resource
win10v2004-20241007-en
General
-
Target
ccfd41c9ac7acffbeeee894ae84997e82fce0df7de84c53f25153019480f19a8.exe
-
Size
1.1MB
-
MD5
49f20ba05a2e8735318d804d3e7b4240
-
SHA1
ac2dc0060bb1ccf7f30f15f78a4e6c4b07b9186a
-
SHA256
ccfd41c9ac7acffbeeee894ae84997e82fce0df7de84c53f25153019480f19a8
-
SHA512
ae55c7bedfc5b94b5e1a2d1efac9c34cbb9aa88b8ff701072bf319fc325f94db71992bf81325188aa2ce3c5a433f7ee1b372e492307bfe8e4540fae09e184770
-
SSDEEP
24576:CyO5dapQFTFk3C5eay+scyZkxBZmGUdTXvWK:pwspQFTFkyibwmBdTe
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k1138511.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k1138511.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k1138511.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k1138511.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k1138511.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k1138511.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023ca4-54.dat family_redline behavioral1/memory/1428-56-0x00000000007F0000-0x000000000081A000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 3068 y1727941.exe 2120 y9573045.exe 1236 k1138511.exe 1428 l7042820.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k1138511.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k1138511.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ccfd41c9ac7acffbeeee894ae84997e82fce0df7de84c53f25153019480f19a8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y1727941.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y9573045.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y9573045.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k1138511.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l7042820.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ccfd41c9ac7acffbeeee894ae84997e82fce0df7de84c53f25153019480f19a8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y1727941.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1236 k1138511.exe 1236 k1138511.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1236 k1138511.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2436 wrote to memory of 3068 2436 ccfd41c9ac7acffbeeee894ae84997e82fce0df7de84c53f25153019480f19a8.exe 84 PID 2436 wrote to memory of 3068 2436 ccfd41c9ac7acffbeeee894ae84997e82fce0df7de84c53f25153019480f19a8.exe 84 PID 2436 wrote to memory of 3068 2436 ccfd41c9ac7acffbeeee894ae84997e82fce0df7de84c53f25153019480f19a8.exe 84 PID 3068 wrote to memory of 2120 3068 y1727941.exe 85 PID 3068 wrote to memory of 2120 3068 y1727941.exe 85 PID 3068 wrote to memory of 2120 3068 y1727941.exe 85 PID 2120 wrote to memory of 1236 2120 y9573045.exe 86 PID 2120 wrote to memory of 1236 2120 y9573045.exe 86 PID 2120 wrote to memory of 1236 2120 y9573045.exe 86 PID 2120 wrote to memory of 1428 2120 y9573045.exe 94 PID 2120 wrote to memory of 1428 2120 y9573045.exe 94 PID 2120 wrote to memory of 1428 2120 y9573045.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\ccfd41c9ac7acffbeeee894ae84997e82fce0df7de84c53f25153019480f19a8.exe"C:\Users\Admin\AppData\Local\Temp\ccfd41c9ac7acffbeeee894ae84997e82fce0df7de84c53f25153019480f19a8.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1727941.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1727941.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y9573045.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y9573045.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k1138511.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k1138511.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1236
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l7042820.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l7042820.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1428
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
749KB
MD5a04bec5266612898a643913613caa0bd
SHA1fe49779710b6c436e071e5d0fda6643a78e7a1d3
SHA2565c6b2761e1d0324be10ff53bff8257ffaa70a1a724a7d69c9a61fde608bedb28
SHA51255af492413568f516232390373b36a1214a043df6557f7bf9ed2363a435f29fc182a6ac431595da6124b94da359d4a27e1bb27f379d7d6aee75e08c04843a264
-
Filesize
304KB
MD5fa8b2a6d58293eb1343b7e16f9336e19
SHA18cbd8279bc48d96dfa1088e69e76af151bb9ee2e
SHA2560783f11e58eb2dd3bf4924f77df00369d62cb49b277cfab94e5f892b58a575b0
SHA512e1b11243d614ccc94ecfa9af3867b3528ba1ffc6f63461e6b1c430e09c57127a8c1eef6a713c7a3a7285c4eb40d0aa08fe76b10083366fe03a9c47accd4248f0
-
Filesize
183KB
MD575df6a4aaf5c63bc4f42ac5ec8ecc76a
SHA18d9da11aa11364c1b580b12faa446403f527ff83
SHA256d1d13ff4eabb541a9cfc225beeb1c27d9cd85c8f9849e8d0fece0a4503c63f05
SHA51272d34a4770cf9885993630f04e83831f4ded666af58cb705c7b1ca4cd7ca95911dec7247e4987c64afc13fee10bcf94fc913bd9a7790edb65c75b01a89bbe8fe
-
Filesize
145KB
MD588cd6b0ed0a007e9a031568a9636cd09
SHA101aa363d9fb5f2fdbc7b7e74dac9afd9a6b4763b
SHA256fe6b79f5d6df914b95cb3a87355d8b433965f7dde1bc1f7ff642c51b351fa462
SHA51217e21d9315f2eeb2a7a1d6036e45330702e980621b0cc914cf1e2ecf22f1d82e8c6f92870e1f4b177d9e5321b2adfbee688d0d8e711ab7d91cf7cde21c96ab1c