Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05/11/2024, 14:11
Static task
static1
Behavioral task
behavioral1
Sample
6acca80260b47c20c6681665eefb0025e8ae3ef61546735ebab36a1d6e35d03e.exe
Resource
win10v2004-20241007-en
General
-
Target
6acca80260b47c20c6681665eefb0025e8ae3ef61546735ebab36a1d6e35d03e.exe
-
Size
1.1MB
-
MD5
1508e81310227f63b5d4550734d38251
-
SHA1
8694a7dbf6d3fbef6874cfd05dd1275aeb4f6fbb
-
SHA256
6acca80260b47c20c6681665eefb0025e8ae3ef61546735ebab36a1d6e35d03e
-
SHA512
6f8d858f6c1c2c9c16ccbc6172be5c966f8ff820f23d453b5726f58ca394e7d64ab42216bc42953c548ed7361c9b77800e968361f1a1a6c44e5b8dd3af336732
-
SSDEEP
24576:ZyqrMQea0Ep0gVJFk1T2DUfuhhOqNLoUBUA9Rk:MqoQDugVJFkl2DU2hosLouUAX
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k1936059.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k1936059.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k1936059.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k1936059.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k1936059.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k1936059.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x000a000000023b90-54.dat family_redline behavioral1/memory/3052-56-0x0000000000760000-0x000000000078A000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 4940 y7373940.exe 4800 y5435367.exe 2952 k1936059.exe 3052 l8119411.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k1936059.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k1936059.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6acca80260b47c20c6681665eefb0025e8ae3ef61546735ebab36a1d6e35d03e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y7373940.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y5435367.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6acca80260b47c20c6681665eefb0025e8ae3ef61546735ebab36a1d6e35d03e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y7373940.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y5435367.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k1936059.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l8119411.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2952 k1936059.exe 2952 k1936059.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2952 k1936059.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3356 wrote to memory of 4940 3356 6acca80260b47c20c6681665eefb0025e8ae3ef61546735ebab36a1d6e35d03e.exe 84 PID 3356 wrote to memory of 4940 3356 6acca80260b47c20c6681665eefb0025e8ae3ef61546735ebab36a1d6e35d03e.exe 84 PID 3356 wrote to memory of 4940 3356 6acca80260b47c20c6681665eefb0025e8ae3ef61546735ebab36a1d6e35d03e.exe 84 PID 4940 wrote to memory of 4800 4940 y7373940.exe 85 PID 4940 wrote to memory of 4800 4940 y7373940.exe 85 PID 4940 wrote to memory of 4800 4940 y7373940.exe 85 PID 4800 wrote to memory of 2952 4800 y5435367.exe 86 PID 4800 wrote to memory of 2952 4800 y5435367.exe 86 PID 4800 wrote to memory of 2952 4800 y5435367.exe 86 PID 4800 wrote to memory of 3052 4800 y5435367.exe 95 PID 4800 wrote to memory of 3052 4800 y5435367.exe 95 PID 4800 wrote to memory of 3052 4800 y5435367.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\6acca80260b47c20c6681665eefb0025e8ae3ef61546735ebab36a1d6e35d03e.exe"C:\Users\Admin\AppData\Local\Temp\6acca80260b47c20c6681665eefb0025e8ae3ef61546735ebab36a1d6e35d03e.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7373940.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7373940.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y5435367.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y5435367.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k1936059.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k1936059.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2952
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l8119411.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l8119411.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3052
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
748KB
MD51527dfb63aa26baa66451bf7ce4ee8a7
SHA1f14ee3f27d15d99c1a73e340f2856ea949660f43
SHA25608f98b3366b17236777a5251c50806cc2c93e943b18dadcfddcd3d7502b56b47
SHA512d37fbdcf2956a4fcc26847e0d2c18cb756092c692fc2ecf24efeee067b186c75ff1494cb24ad3691e0d1b60e928ed7a47f21f92db02199cf618af8036baec224
-
Filesize
304KB
MD5a65be2c5af747f36157d0b759edb097d
SHA1cc586b716f7f739124cf8d66b434762a083c2b09
SHA256427a59273ab70da7e4324ec22e6f1c1d002f800c7bc4b1ac0f191808e0bd82f9
SHA5121920d00d03e1157593f4cb42022cd4edc83321f2b7850f0dd99349f57611219dae18fd3fe4b4c713a18ab2964095fab9a91c932f1495f5c4bfb5e5f3cea796ae
-
Filesize
183KB
MD575df6a4aaf5c63bc4f42ac5ec8ecc76a
SHA18d9da11aa11364c1b580b12faa446403f527ff83
SHA256d1d13ff4eabb541a9cfc225beeb1c27d9cd85c8f9849e8d0fece0a4503c63f05
SHA51272d34a4770cf9885993630f04e83831f4ded666af58cb705c7b1ca4cd7ca95911dec7247e4987c64afc13fee10bcf94fc913bd9a7790edb65c75b01a89bbe8fe
-
Filesize
145KB
MD5f384a5868a614ee6cf96a524720f659d
SHA1bf45e79a4eb906cd42aece88cabc4886b38fda5c
SHA2569eb0cec749cbf1bd5c879708456ac8bedca349bf9542f52e26692cb581b178e6
SHA512d4f8093547c1338099edd5169d98ba17b8b5bd44d549f29cb8930ac936e55f95ec3cc9f3854e1619e8002958a0a088d7f08c4be74d526b20dc0d7a2aa6900966