Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 10:51
Static task
static1
Behavioral task
behavioral1
Sample
9fb2b2abe9182369cedf29de25ce92167b395093c263747e417dda8f4d3a4775.exe
Resource
win10v2004-20241007-en
General
-
Target
9fb2b2abe9182369cedf29de25ce92167b395093c263747e417dda8f4d3a4775.exe
-
Size
1.1MB
-
MD5
a4b3d94fa4d058ef10abf3a3391d9982
-
SHA1
0f1dba76f81814f9f8d5701e2ef824081015f5be
-
SHA256
9fb2b2abe9182369cedf29de25ce92167b395093c263747e417dda8f4d3a4775
-
SHA512
095aef6ddbfa89b0b73eb1745bb9d01ad125e94abf6c5cef784b2c306a048face02a0145469814ad31c613a5a4bfd353d8f48df63646d9d8a57787b03bc29370
-
SSDEEP
24576:EyHGfP2chxjpCQW7CFkmvDHAD6T4Et81VMMW2V:THG3J5+7CFkIAD6T4EOVt
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Signatures
-
Processes:
k6427279.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k6427279.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k6427279.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k6427279.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k6427279.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k6427279.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k6427279.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral1/files/0x0007000000023c89-54.dat family_redline behavioral1/memory/2652-56-0x0000000000280000-0x00000000002AA000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
Processes:
y1146570.exey7349411.exek6427279.exel6720111.exepid Process 4884 y1146570.exe 4540 y7349411.exe 3720 k6427279.exe 2652 l6720111.exe -
Processes:
k6427279.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k6427279.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k6427279.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
9fb2b2abe9182369cedf29de25ce92167b395093c263747e417dda8f4d3a4775.exey1146570.exey7349411.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9fb2b2abe9182369cedf29de25ce92167b395093c263747e417dda8f4d3a4775.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y1146570.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y7349411.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
9fb2b2abe9182369cedf29de25ce92167b395093c263747e417dda8f4d3a4775.exey1146570.exey7349411.exek6427279.exel6720111.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9fb2b2abe9182369cedf29de25ce92167b395093c263747e417dda8f4d3a4775.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y1146570.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y7349411.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k6427279.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l6720111.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
k6427279.exepid Process 3720 k6427279.exe 3720 k6427279.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
k6427279.exedescription pid Process Token: SeDebugPrivilege 3720 k6427279.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
9fb2b2abe9182369cedf29de25ce92167b395093c263747e417dda8f4d3a4775.exey1146570.exey7349411.exedescription pid Process procid_target PID 2188 wrote to memory of 4884 2188 9fb2b2abe9182369cedf29de25ce92167b395093c263747e417dda8f4d3a4775.exe 84 PID 2188 wrote to memory of 4884 2188 9fb2b2abe9182369cedf29de25ce92167b395093c263747e417dda8f4d3a4775.exe 84 PID 2188 wrote to memory of 4884 2188 9fb2b2abe9182369cedf29de25ce92167b395093c263747e417dda8f4d3a4775.exe 84 PID 4884 wrote to memory of 4540 4884 y1146570.exe 87 PID 4884 wrote to memory of 4540 4884 y1146570.exe 87 PID 4884 wrote to memory of 4540 4884 y1146570.exe 87 PID 4540 wrote to memory of 3720 4540 y7349411.exe 88 PID 4540 wrote to memory of 3720 4540 y7349411.exe 88 PID 4540 wrote to memory of 3720 4540 y7349411.exe 88 PID 4540 wrote to memory of 2652 4540 y7349411.exe 93 PID 4540 wrote to memory of 2652 4540 y7349411.exe 93 PID 4540 wrote to memory of 2652 4540 y7349411.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\9fb2b2abe9182369cedf29de25ce92167b395093c263747e417dda8f4d3a4775.exe"C:\Users\Admin\AppData\Local\Temp\9fb2b2abe9182369cedf29de25ce92167b395093c263747e417dda8f4d3a4775.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1146570.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1146570.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y7349411.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y7349411.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k6427279.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k6427279.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3720
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l6720111.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l6720111.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2652
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
748KB
MD5966dae0c730dc11d0c052cd27301afa3
SHA1d7a931902e8fb58b61aafd9d40ba35448fd30ce6
SHA256a0b0188ce636e8a6f691ccaf1e0a77190fc0b3cef37a76c5271f965eae7c6e68
SHA512027d3ecb39c721bb457a3ce8d1230cb28fd67649f28cd0de9cb76e0caea53cff3566f1583dad80cee925804aba1410c0d074b8417c0f5d695498515ba04b8818
-
Filesize
304KB
MD52c48b4299fe36948aeff1cbac0ee39bf
SHA17bba03d411dbab71b873b3627628da9a78e4e1b0
SHA256233b3141fc98d52aee003b4e512e584739e80cdab2a4dc15a33830ef49ce7d61
SHA5122201413a31413a300b585f3b9f8b7d91e1f9d9bf167d0a6dac546c5d53afdf1e75aab27f800decd6dc6476010c156d4dea3261539a117292ea8414e7d9cb01d5
-
Filesize
183KB
MD575df6a4aaf5c63bc4f42ac5ec8ecc76a
SHA18d9da11aa11364c1b580b12faa446403f527ff83
SHA256d1d13ff4eabb541a9cfc225beeb1c27d9cd85c8f9849e8d0fece0a4503c63f05
SHA51272d34a4770cf9885993630f04e83831f4ded666af58cb705c7b1ca4cd7ca95911dec7247e4987c64afc13fee10bcf94fc913bd9a7790edb65c75b01a89bbe8fe
-
Filesize
145KB
MD5c1bc32afcdccfba8e304c2fc95b04882
SHA1c0503ceb866c276fcb99ab43683f2b0ba2ccb2b5
SHA25608f2ee3b829ca26114ee1dc4c41519530e838e63da2815794c27274b4cc1c8d0
SHA5120e8522cf83ae0df9708da0140ccf899a4fb6ea96e915edf42b923e989f1337ff13a12fafffd8b650fb2a6c8f6a68ead9344809e24abf6b90ab9fb04eda33572e