Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 14:52
Static task
static1
Behavioral task
behavioral1
Sample
848b4118e71968a14ebb6062e66a439f9731a3b801c7fce71398a6221c8ea83a.exe
Resource
win10v2004-20241007-en
General
-
Target
848b4118e71968a14ebb6062e66a439f9731a3b801c7fce71398a6221c8ea83a.exe
-
Size
1.1MB
-
MD5
7a35578ed06af38c4fe8a0608d7ce4d4
-
SHA1
66cc7bde26c00df1d6f4764ec80e763d3d6071e3
-
SHA256
848b4118e71968a14ebb6062e66a439f9731a3b801c7fce71398a6221c8ea83a
-
SHA512
982576556dbb801c17e09ef9b50453a45075c7243a113f9f0ee28cf6533f63e418c8cb61568eb4c87bdfb06fb68f108fca0dda29ffc0fd7ff7769ccc1c6d4139
-
SSDEEP
24576:kyruxxdwFyMxhUKhjwE1g9upCYl7xcXQdFQN6QXwfl:zruxxiyMxOKuE1g9urCQzmX
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Signatures
-
Processes:
k4375337.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k4375337.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k4375337.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k4375337.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k4375337.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k4375337.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k4375337.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral1/files/0x0007000000023cb5-54.dat family_redline behavioral1/memory/5056-56-0x00000000009C0000-0x00000000009EA000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
Processes:
y3602752.exey8175386.exek4375337.exel4410080.exepid Process 2728 y3602752.exe 244 y8175386.exe 3240 k4375337.exe 5056 l4410080.exe -
Processes:
k4375337.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k4375337.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k4375337.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
848b4118e71968a14ebb6062e66a439f9731a3b801c7fce71398a6221c8ea83a.exey3602752.exey8175386.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 848b4118e71968a14ebb6062e66a439f9731a3b801c7fce71398a6221c8ea83a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y3602752.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y8175386.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
y8175386.exek4375337.exel4410080.exe848b4118e71968a14ebb6062e66a439f9731a3b801c7fce71398a6221c8ea83a.exey3602752.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y8175386.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k4375337.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l4410080.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 848b4118e71968a14ebb6062e66a439f9731a3b801c7fce71398a6221c8ea83a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y3602752.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
k4375337.exepid Process 3240 k4375337.exe 3240 k4375337.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
k4375337.exedescription pid Process Token: SeDebugPrivilege 3240 k4375337.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
848b4118e71968a14ebb6062e66a439f9731a3b801c7fce71398a6221c8ea83a.exey3602752.exey8175386.exedescription pid Process procid_target PID 4400 wrote to memory of 2728 4400 848b4118e71968a14ebb6062e66a439f9731a3b801c7fce71398a6221c8ea83a.exe 83 PID 4400 wrote to memory of 2728 4400 848b4118e71968a14ebb6062e66a439f9731a3b801c7fce71398a6221c8ea83a.exe 83 PID 4400 wrote to memory of 2728 4400 848b4118e71968a14ebb6062e66a439f9731a3b801c7fce71398a6221c8ea83a.exe 83 PID 2728 wrote to memory of 244 2728 y3602752.exe 84 PID 2728 wrote to memory of 244 2728 y3602752.exe 84 PID 2728 wrote to memory of 244 2728 y3602752.exe 84 PID 244 wrote to memory of 3240 244 y8175386.exe 86 PID 244 wrote to memory of 3240 244 y8175386.exe 86 PID 244 wrote to memory of 3240 244 y8175386.exe 86 PID 244 wrote to memory of 5056 244 y8175386.exe 96 PID 244 wrote to memory of 5056 244 y8175386.exe 96 PID 244 wrote to memory of 5056 244 y8175386.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\848b4118e71968a14ebb6062e66a439f9731a3b801c7fce71398a6221c8ea83a.exe"C:\Users\Admin\AppData\Local\Temp\848b4118e71968a14ebb6062e66a439f9731a3b801c7fce71398a6221c8ea83a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3602752.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3602752.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y8175386.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y8175386.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:244 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k4375337.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k4375337.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3240
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l4410080.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l4410080.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5056
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
751KB
MD5d8cead34ae4ae1579850a19f1aa5f550
SHA1555430cc640ea07b8ebbf1b35366272cd5ac8086
SHA2566da31368eb3a6dbed673b7d76fbaf1552fe9b10b02eebd8310f034ee9a340ffc
SHA512fdfd7e71b6ced297de524b1bb7d76733efa55967633211e6adefe194027feb92f83b47cff83edeeb39aa8148377229f65561a059d87f0f6bed0c6b6fec13aa37
-
Filesize
305KB
MD550cb4b5b715a0aa0b72adff07153bf86
SHA1eab446530b3ae243daf837ff73b9ddc133f0cafc
SHA2562551ebdf5e90f5e7aaf77f8ab9f93bb92b8bef90b5e5b944a02b0201d9ca4b8d
SHA51236a91b3654c746bad74d1b447375df602439363d8881e0f4d09302a1e1f9e1839a5f57cb00dd834e4dac9ee83bdf36709b81f12372b5a0cefdefed652b3ebcf8
-
Filesize
183KB
MD5d18dd7e957d8eab39abe21eefd498331
SHA12d7b11252dbb1ed8cefff8d63d447b0f697a0060
SHA25657f8f54609021997865fed724894ad76b78b39a48a51b47a1d97a92eb836c440
SHA512c383080be8f9fbb5fd313204cc47ca9ecca8b6148362aa5ef76c219217971184472d0c4be2f1d7e9c9fbee561079b34357346507ddb882d779b06741a5ad0581
-
Filesize
145KB
MD51d613b0a45f2038a1eed7949caf4ee17
SHA13b25d2544e6dfcd35673db6d4a138eb27ba7ee35
SHA256a257f21d91cb8e76d39b4947af52e25f4cf6bc6ae5e7a9df5a386e5a0b40e8fe
SHA512d142fb2d9c4a508664cf73feed8842fd4a8d01230751dbf44d3f569bf5c26f339415b47dacaf8adfe27bce82481134369afdad264aa7c0562a16278468376c8b