Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 15:07
Static task
static1
Behavioral task
behavioral1
Sample
8811c70c333468024f208d2de581e0e8387653980fdc15cf7c6564c2dc134156.exe
Resource
win10v2004-20241007-en
General
-
Target
8811c70c333468024f208d2de581e0e8387653980fdc15cf7c6564c2dc134156.exe
-
Size
1.1MB
-
MD5
062c6511014f1aa596138ae8112058b3
-
SHA1
458a98f9be2697b2cdcc4ca382accdd5e4578bd5
-
SHA256
8811c70c333468024f208d2de581e0e8387653980fdc15cf7c6564c2dc134156
-
SHA512
b42dc96ec2ea2d43f389af9ec47eba8fa5796dab9c2ad3635bcf043b0b9377327ba4916471c50b7cf8267b6f95aa1a5a23f53c86ec6fecf92658886082558a71
-
SSDEEP
24576:LytjaKUU1ySw9FkZ61h45v0/Oovem1PB/n5SgkTGOU:+p9UU1y9FkZ61exjoBPBkiO
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k0591768.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k0591768.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k0591768.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k0591768.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k0591768.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k0591768.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x000a000000023b87-54.dat family_redline behavioral1/memory/780-56-0x0000000000590000-0x00000000005BA000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 2372 y2998180.exe 2128 y8925082.exe 5004 k0591768.exe 780 l3142054.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k0591768.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k0591768.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y8925082.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8811c70c333468024f208d2de581e0e8387653980fdc15cf7c6564c2dc134156.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y2998180.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l3142054.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8811c70c333468024f208d2de581e0e8387653980fdc15cf7c6564c2dc134156.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y2998180.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y8925082.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k0591768.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5004 k0591768.exe 5004 k0591768.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5004 k0591768.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 412 wrote to memory of 2372 412 8811c70c333468024f208d2de581e0e8387653980fdc15cf7c6564c2dc134156.exe 84 PID 412 wrote to memory of 2372 412 8811c70c333468024f208d2de581e0e8387653980fdc15cf7c6564c2dc134156.exe 84 PID 412 wrote to memory of 2372 412 8811c70c333468024f208d2de581e0e8387653980fdc15cf7c6564c2dc134156.exe 84 PID 2372 wrote to memory of 2128 2372 y2998180.exe 85 PID 2372 wrote to memory of 2128 2372 y2998180.exe 85 PID 2372 wrote to memory of 2128 2372 y2998180.exe 85 PID 2128 wrote to memory of 5004 2128 y8925082.exe 86 PID 2128 wrote to memory of 5004 2128 y8925082.exe 86 PID 2128 wrote to memory of 5004 2128 y8925082.exe 86 PID 2128 wrote to memory of 780 2128 y8925082.exe 94 PID 2128 wrote to memory of 780 2128 y8925082.exe 94 PID 2128 wrote to memory of 780 2128 y8925082.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\8811c70c333468024f208d2de581e0e8387653980fdc15cf7c6564c2dc134156.exe"C:\Users\Admin\AppData\Local\Temp\8811c70c333468024f208d2de581e0e8387653980fdc15cf7c6564c2dc134156.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2998180.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2998180.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y8925082.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y8925082.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k0591768.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k0591768.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5004
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l3142054.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l3142054.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:780
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
748KB
MD52789406c1f976bc9ab326a3b85344115
SHA1afc0598602ae160aafdec7aacbb6fd35ffa57828
SHA256a82063ed5b7cffae5351ad522376474be318912be0550c7f7506cd7b609bf8c9
SHA51286da5ae674c6c43e664046be479036b8e58d1758fa15b61e1ff477534fd4ab17b105ca249fa27a39fc643b2d02246ef1104ae5369ffc253908ff7f35280d430b
-
Filesize
304KB
MD5e223cdb80638a9ff7ec9c43276eaff3e
SHA1d477db4ad013eed4698cfc7e97f99597d78591a3
SHA2563aae4372db32ef08b6d99d5f23419fe4a9692f0ad811fd417329ea7f5f8227de
SHA512060dc13264ac5fac1fed8ea6ca2b6fbdb71f57a2309aad581833d60b69fd56b9ed5574537b5b2c9d52ee3a696bf21fea58b07a66fc0a1af55329559e628a3dfa
-
Filesize
183KB
MD575df6a4aaf5c63bc4f42ac5ec8ecc76a
SHA18d9da11aa11364c1b580b12faa446403f527ff83
SHA256d1d13ff4eabb541a9cfc225beeb1c27d9cd85c8f9849e8d0fece0a4503c63f05
SHA51272d34a4770cf9885993630f04e83831f4ded666af58cb705c7b1ca4cd7ca95911dec7247e4987c64afc13fee10bcf94fc913bd9a7790edb65c75b01a89bbe8fe
-
Filesize
145KB
MD577636bf4f10df3cc5ec24ea3d592d1a3
SHA143cfd545926169ce72f7a43f9308afcd1369a7e7
SHA256ff96e56a6795d8bd1892ad47f44806c481b3b3d85ba06e8361aed3bf7ed3ecd8
SHA512c640705ab5565c7e7c45348bb8d55bf01cfcbf6df99a80fda608db8bd1f12d8e6637b5a818cac7609b827ed1e234cb9515501c13b0817f74de58312def716a48