Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 02:40
Static task
static1
Behavioral task
behavioral1
Sample
99ef893b0c73f2b7df685ef05d07ce24cec85871624fa4f4e0cfa842efd6fe9a.exe
Resource
win10v2004-20241007-en
General
-
Target
99ef893b0c73f2b7df685ef05d07ce24cec85871624fa4f4e0cfa842efd6fe9a.exe
-
Size
1.1MB
-
MD5
357de6a1dfbb69b5eddeb32c1b38000b
-
SHA1
0bc1e13df4a26aca58e01bd9338190135b09e881
-
SHA256
99ef893b0c73f2b7df685ef05d07ce24cec85871624fa4f4e0cfa842efd6fe9a
-
SHA512
fea53af844826fe57a0b87b8c19c3b59a785a8a544b057d4578349028c6a7c684b9778533811d092ac895ebf2343ef1cf284403526620186767741a224809122
-
SSDEEP
24576:wySJILOP4DhcOHGEgg9L+Yco9KcgMjJ0Hbt4bX4Bv:3SJILZlcKGEgg9a4KcuHZ4bXY
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k6790416.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k6790416.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k6790416.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k6790416.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k6790416.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k6790416.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023cd1-55.dat family_redline behavioral1/memory/3472-56-0x00000000006D0000-0x00000000006FA000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 2116 y2367468.exe 4564 y8533003.exe 2328 k6790416.exe 3472 l6211290.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k6790416.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k6790416.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 99ef893b0c73f2b7df685ef05d07ce24cec85871624fa4f4e0cfa842efd6fe9a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y2367468.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y8533003.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 99ef893b0c73f2b7df685ef05d07ce24cec85871624fa4f4e0cfa842efd6fe9a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y2367468.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y8533003.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k6790416.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l6211290.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2328 k6790416.exe 2328 k6790416.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2328 k6790416.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1412 wrote to memory of 2116 1412 99ef893b0c73f2b7df685ef05d07ce24cec85871624fa4f4e0cfa842efd6fe9a.exe 84 PID 1412 wrote to memory of 2116 1412 99ef893b0c73f2b7df685ef05d07ce24cec85871624fa4f4e0cfa842efd6fe9a.exe 84 PID 1412 wrote to memory of 2116 1412 99ef893b0c73f2b7df685ef05d07ce24cec85871624fa4f4e0cfa842efd6fe9a.exe 84 PID 2116 wrote to memory of 4564 2116 y2367468.exe 85 PID 2116 wrote to memory of 4564 2116 y2367468.exe 85 PID 2116 wrote to memory of 4564 2116 y2367468.exe 85 PID 4564 wrote to memory of 2328 4564 y8533003.exe 87 PID 4564 wrote to memory of 2328 4564 y8533003.exe 87 PID 4564 wrote to memory of 2328 4564 y8533003.exe 87 PID 4564 wrote to memory of 3472 4564 y8533003.exe 93 PID 4564 wrote to memory of 3472 4564 y8533003.exe 93 PID 4564 wrote to memory of 3472 4564 y8533003.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\99ef893b0c73f2b7df685ef05d07ce24cec85871624fa4f4e0cfa842efd6fe9a.exe"C:\Users\Admin\AppData\Local\Temp\99ef893b0c73f2b7df685ef05d07ce24cec85871624fa4f4e0cfa842efd6fe9a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2367468.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2367468.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y8533003.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y8533003.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k6790416.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k6790416.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2328
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l6211290.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l6211290.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3472
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
749KB
MD5c8920e62129e7c1cfd8e160adacfcda9
SHA1afb2906dceb269c40f296938c8b3ec51d8fb2a59
SHA25671f88c171018795955329f8182700e387ec2821b65e331e4ec89f775bc7ddfd4
SHA512232b6c1aaadb20ac2e775d99d586b5328a65126ec02485d2c17cef8e5ec8262cfb933ee8c18bc6f9ba340f70d2598277ac871d319cbb9c1371ccb8c4a91b2043
-
Filesize
305KB
MD5ca8f42fa25e24fcb8a48b6fa128b07de
SHA107634ddd89e854c3a61771abe5db84f49387d4f0
SHA2564c81838441ba5030f4eb085b35066c57eb69a31904407d886c1a4712221b2be6
SHA512ef49ebb3c2098c5f99306a89367b7eafda3ecf896ebedf4ed85dbf6f4cf8d1563458f380d5dc8a76db51d660609f9caf102a6057358036118e5464c5999acc12
-
Filesize
183KB
MD5d18dd7e957d8eab39abe21eefd498331
SHA12d7b11252dbb1ed8cefff8d63d447b0f697a0060
SHA25657f8f54609021997865fed724894ad76b78b39a48a51b47a1d97a92eb836c440
SHA512c383080be8f9fbb5fd313204cc47ca9ecca8b6148362aa5ef76c219217971184472d0c4be2f1d7e9c9fbee561079b34357346507ddb882d779b06741a5ad0581
-
Filesize
145KB
MD5935a99f734b790ab6f4504d67b1273b6
SHA1ac954133f4e6110d72004b4a806a5566aa269bb4
SHA256c8ea2e40bfd8edee8d52594bdf62df2e5f934de7e988bf2c26b210951c666299
SHA512313724a52cebee2863fe99895d3c8182bb9862147cccdc9e89967f024c27f8a5a82d76dd23f05c650304ba63e7fc4881e2612fba0d6cd893eb07fbfea42e6af4