Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-11-2024 02:03
Static task
static1
Behavioral task
behavioral1
Sample
4c900573993862c4d460d3e6090514da84aa3d08cf439cff41b90655620db9b1.exe
Resource
win10v2004-20241007-en
General
-
Target
4c900573993862c4d460d3e6090514da84aa3d08cf439cff41b90655620db9b1.exe
-
Size
1.1MB
-
MD5
7bdb2d08182b4f2da77d04d7f7e19a82
-
SHA1
a28a0f73f723dfcc9a2086290512a8f6f950cdca
-
SHA256
4c900573993862c4d460d3e6090514da84aa3d08cf439cff41b90655620db9b1
-
SHA512
01329b6dc46423d8a8c1a712cbee6202c2569103cb7839dec8bc7a910140ce3aefc864bc78f9f266691efd182856dddd8a67854291f94c134b8823685ebc51cf
-
SSDEEP
24576:9ywp34KW/BtBsdC9iVFkOSLb8zaLew1DJpECmRzNAhF5poCt:YMVEms9iVFkOWb8S/J5mRziRpD
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k8651301.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k8651301.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k8651301.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k8651301.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k8651301.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k8651301.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x000a000000023b6e-54.dat family_redline behavioral1/memory/3924-56-0x0000000000280000-0x00000000002AA000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 740 y8973665.exe 4936 y4659353.exe 1628 k8651301.exe 3924 l4216508.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k8651301.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k8651301.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4c900573993862c4d460d3e6090514da84aa3d08cf439cff41b90655620db9b1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y8973665.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y4659353.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y8973665.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y4659353.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k8651301.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l4216508.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4c900573993862c4d460d3e6090514da84aa3d08cf439cff41b90655620db9b1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1628 k8651301.exe 1628 k8651301.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1628 k8651301.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4148 wrote to memory of 740 4148 4c900573993862c4d460d3e6090514da84aa3d08cf439cff41b90655620db9b1.exe 85 PID 4148 wrote to memory of 740 4148 4c900573993862c4d460d3e6090514da84aa3d08cf439cff41b90655620db9b1.exe 85 PID 4148 wrote to memory of 740 4148 4c900573993862c4d460d3e6090514da84aa3d08cf439cff41b90655620db9b1.exe 85 PID 740 wrote to memory of 4936 740 y8973665.exe 86 PID 740 wrote to memory of 4936 740 y8973665.exe 86 PID 740 wrote to memory of 4936 740 y8973665.exe 86 PID 4936 wrote to memory of 1628 4936 y4659353.exe 87 PID 4936 wrote to memory of 1628 4936 y4659353.exe 87 PID 4936 wrote to memory of 1628 4936 y4659353.exe 87 PID 4936 wrote to memory of 3924 4936 y4659353.exe 93 PID 4936 wrote to memory of 3924 4936 y4659353.exe 93 PID 4936 wrote to memory of 3924 4936 y4659353.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c900573993862c4d460d3e6090514da84aa3d08cf439cff41b90655620db9b1.exe"C:\Users\Admin\AppData\Local\Temp\4c900573993862c4d460d3e6090514da84aa3d08cf439cff41b90655620db9b1.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8973665.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8973665.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y4659353.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y4659353.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k8651301.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k8651301.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1628
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l4216508.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l4216508.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3924
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
748KB
MD5a39e87b56aac36b22a0548f884019617
SHA11df429fd566c64fabe2d84d7f9a928d20013cfd1
SHA256e43843755cf8364cc82399ebdded87d5981382b0c7448b3235571b7733412a0b
SHA51256e379b6b547f331124b416c6cdb3befe9f05e6693d080a37f35a517a259dccc00d14c473df5f1a81f6999ab5018a163e0e42989e44afa1cb190132af87ab7a5
-
Filesize
304KB
MD5ce09fb222f0df0d9b593cc711928c981
SHA147ba5171a6a114ae1a8e6c8c8c7538c1185ec0d1
SHA2561cc2a8d4b8b8ec90840a0f458da8232a42efbbcc7fa787bf091c2f368a48f392
SHA51237fccebdd67aaff47b0fcabe6d8f42dcc4e567fb9ed4ce026acbc711a41ee8f89e35dc32d233652c83c2a0b7a31cff51b8729e70b353d807875ba55efa36fd9f
-
Filesize
183KB
MD575df6a4aaf5c63bc4f42ac5ec8ecc76a
SHA18d9da11aa11364c1b580b12faa446403f527ff83
SHA256d1d13ff4eabb541a9cfc225beeb1c27d9cd85c8f9849e8d0fece0a4503c63f05
SHA51272d34a4770cf9885993630f04e83831f4ded666af58cb705c7b1ca4cd7ca95911dec7247e4987c64afc13fee10bcf94fc913bd9a7790edb65c75b01a89bbe8fe
-
Filesize
145KB
MD5a55b82a17e30b6474da00231d551248e
SHA1dc76e914c4b5fb6703037416ad97aabcabd575bd
SHA256cb0b5d15c901d4796f10e2a355873da257d3d2edf257496add3a0a3425b7e6f6
SHA512fe3538e9efffa03c9ebe1fbb20dd5cb4e90058c50b7c1c7118f47a673a505489b9b4cf67de02b5a4c5dcb1da731a5518157f9dcc6da122f87d9816130e6bd3ae