Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-11-2024 11:41
Static task
static1
Behavioral task
behavioral1
Sample
45533f0e97d182027461de3421456a7bef5b37315d494b4c1b6139f0cc7c7945.exe
Resource
win10v2004-20241007-en
General
-
Target
45533f0e97d182027461de3421456a7bef5b37315d494b4c1b6139f0cc7c7945.exe
-
Size
1.1MB
-
MD5
49c33b85a84e9821d5674350710c92b8
-
SHA1
2791f5b5c3cbcdb1a1b735ca89c07b6db3de033a
-
SHA256
45533f0e97d182027461de3421456a7bef5b37315d494b4c1b6139f0cc7c7945
-
SHA512
88cb5343d0fbf28ec013888e46b105920bbac8bf87c9081ba47046bd388e2ff9f0dde43dcbbb46b6bef705e3cdbf562f95f0dc018f2374ef85758ae8155d0da4
-
SSDEEP
24576:byWduDG1KS/hWuFkptd6NFfxjNQwvrERMK8xuECxiD:OquDGUSouFkrkNPNGxw9Cx
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Signatures
-
Processes:
k8122202.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k8122202.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k8122202.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k8122202.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k8122202.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k8122202.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k8122202.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l5950845.exe family_redline behavioral1/memory/3904-56-0x0000000000670000-0x000000000069A000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
Processes:
y8535676.exey5277261.exek8122202.exel5950845.exepid process 1348 y8535676.exe 1056 y5277261.exe 628 k8122202.exe 3904 l5950845.exe -
Processes:
k8122202.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k8122202.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k8122202.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
y5277261.exe45533f0e97d182027461de3421456a7bef5b37315d494b4c1b6139f0cc7c7945.exey8535676.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y5277261.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 45533f0e97d182027461de3421456a7bef5b37315d494b4c1b6139f0cc7c7945.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y8535676.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
y8535676.exey5277261.exek8122202.exel5950845.exe45533f0e97d182027461de3421456a7bef5b37315d494b4c1b6139f0cc7c7945.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y8535676.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y5277261.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k8122202.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l5950845.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 45533f0e97d182027461de3421456a7bef5b37315d494b4c1b6139f0cc7c7945.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
k8122202.exepid process 628 k8122202.exe 628 k8122202.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
k8122202.exedescription pid process Token: SeDebugPrivilege 628 k8122202.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
45533f0e97d182027461de3421456a7bef5b37315d494b4c1b6139f0cc7c7945.exey8535676.exey5277261.exedescription pid process target process PID 4040 wrote to memory of 1348 4040 45533f0e97d182027461de3421456a7bef5b37315d494b4c1b6139f0cc7c7945.exe y8535676.exe PID 4040 wrote to memory of 1348 4040 45533f0e97d182027461de3421456a7bef5b37315d494b4c1b6139f0cc7c7945.exe y8535676.exe PID 4040 wrote to memory of 1348 4040 45533f0e97d182027461de3421456a7bef5b37315d494b4c1b6139f0cc7c7945.exe y8535676.exe PID 1348 wrote to memory of 1056 1348 y8535676.exe y5277261.exe PID 1348 wrote to memory of 1056 1348 y8535676.exe y5277261.exe PID 1348 wrote to memory of 1056 1348 y8535676.exe y5277261.exe PID 1056 wrote to memory of 628 1056 y5277261.exe k8122202.exe PID 1056 wrote to memory of 628 1056 y5277261.exe k8122202.exe PID 1056 wrote to memory of 628 1056 y5277261.exe k8122202.exe PID 1056 wrote to memory of 3904 1056 y5277261.exe l5950845.exe PID 1056 wrote to memory of 3904 1056 y5277261.exe l5950845.exe PID 1056 wrote to memory of 3904 1056 y5277261.exe l5950845.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\45533f0e97d182027461de3421456a7bef5b37315d494b4c1b6139f0cc7c7945.exe"C:\Users\Admin\AppData\Local\Temp\45533f0e97d182027461de3421456a7bef5b37315d494b4c1b6139f0cc7c7945.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8535676.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8535676.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y5277261.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y5277261.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k8122202.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k8122202.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:628
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l5950845.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l5950845.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3904
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
749KB
MD533ddcb2feb3afa90f5a66e71b42d3b88
SHA178584737fdbcfd2875cec29eab9522c499cfc7fd
SHA2561c55e95e56211602a924174bee584d8794122c854c2117bb0455793e92e9af07
SHA5123e364ede8a8d8f2596b5f614c43c341cf126dae9d33305e223d0dd58dd24f22be561ecf961ee35368779d79f4bd8b81716fbd20bf7d635220818e4e3dfe10d30
-
Filesize
304KB
MD5fe7ebf2396deb143ea3635086df611f9
SHA1abe837773a384eb07fcf19f99550e5608bfd169e
SHA256cd3ce0b580e066ee5c66cdaf74cf49045c58484aeaed197175b7e6c152d37079
SHA5129c9a05bb406ef956d72dd6f489d70283d73e7667a976e05242c8dbd38117a43275e1cc3234cfb608f207f5678f212fe84fe313f77cbd86fbe6394c9a870a4e94
-
Filesize
183KB
MD575df6a4aaf5c63bc4f42ac5ec8ecc76a
SHA18d9da11aa11364c1b580b12faa446403f527ff83
SHA256d1d13ff4eabb541a9cfc225beeb1c27d9cd85c8f9849e8d0fece0a4503c63f05
SHA51272d34a4770cf9885993630f04e83831f4ded666af58cb705c7b1ca4cd7ca95911dec7247e4987c64afc13fee10bcf94fc913bd9a7790edb65c75b01a89bbe8fe
-
Filesize
145KB
MD5b3dcd804e5f238e4568a442e237378b7
SHA1bdc4b9cc999807f5643551393ee06a8f5415c3b1
SHA256e93225163a61b5f9356b67a788d4a8c664930298ae0cce326ebabce7c8eac8f2
SHA512f670a3c2b11f216ab86dc6661149691a7b6ad0bce50a4e0530aa7f7bdbf096b98c83c26396fc96405b18e3d019c898ef87f6e3bbd3b4d9a8e2e1931f0333a2ff