Analysis
-
max time kernel
142s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-11-2024 15:12
Static task
static1
Behavioral task
behavioral1
Sample
14f4293b18cf8d61d17c27453a0421e672a070bf35c6df5160b9f561d21222b0.exe
Resource
win10v2004-20241007-en
General
-
Target
14f4293b18cf8d61d17c27453a0421e672a070bf35c6df5160b9f561d21222b0.exe
-
Size
1.1MB
-
MD5
93679766a90f415e60b01e5450cd8885
-
SHA1
87647a3d1259facb6d6e2819aeba4b835c5da813
-
SHA256
14f4293b18cf8d61d17c27453a0421e672a070bf35c6df5160b9f561d21222b0
-
SHA512
e64b7456a9ff2b89b53a9a1905f96b9c5bbe2a7c6fd325fed1cb4451bbcd51e9aa8886f068db53a6a417aef0b200901e1a13a7daaca596d0daf269e1a80a89d8
-
SSDEEP
24576:3yTn1sxHPnTmbFk/PmiHF2kwS7jbAd7pFMc2xHg0JAr:CTn1sxHPibFk/Pmw2Mjb0oHk
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k8351015.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k8351015.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k8351015.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k8351015.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k8351015.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k8351015.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x000a000000023b6b-54.dat family_redline behavioral1/memory/1812-56-0x00000000000E0000-0x000000000010A000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 420 y9268411.exe 3616 y1459612.exe 1308 k8351015.exe 1812 l0495563.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k8351015.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k8351015.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 14f4293b18cf8d61d17c27453a0421e672a070bf35c6df5160b9f561d21222b0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y9268411.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y1459612.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4040 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 14f4293b18cf8d61d17c27453a0421e672a070bf35c6df5160b9f561d21222b0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y9268411.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y1459612.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k8351015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l0495563.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1308 k8351015.exe 1308 k8351015.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1308 k8351015.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3024 wrote to memory of 420 3024 14f4293b18cf8d61d17c27453a0421e672a070bf35c6df5160b9f561d21222b0.exe 85 PID 3024 wrote to memory of 420 3024 14f4293b18cf8d61d17c27453a0421e672a070bf35c6df5160b9f561d21222b0.exe 85 PID 3024 wrote to memory of 420 3024 14f4293b18cf8d61d17c27453a0421e672a070bf35c6df5160b9f561d21222b0.exe 85 PID 420 wrote to memory of 3616 420 y9268411.exe 86 PID 420 wrote to memory of 3616 420 y9268411.exe 86 PID 420 wrote to memory of 3616 420 y9268411.exe 86 PID 3616 wrote to memory of 1308 3616 y1459612.exe 87 PID 3616 wrote to memory of 1308 3616 y1459612.exe 87 PID 3616 wrote to memory of 1308 3616 y1459612.exe 87 PID 3616 wrote to memory of 1812 3616 y1459612.exe 94 PID 3616 wrote to memory of 1812 3616 y1459612.exe 94 PID 3616 wrote to memory of 1812 3616 y1459612.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\14f4293b18cf8d61d17c27453a0421e672a070bf35c6df5160b9f561d21222b0.exe"C:\Users\Admin\AppData\Local\Temp\14f4293b18cf8d61d17c27453a0421e672a070bf35c6df5160b9f561d21222b0.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9268411.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9268411.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:420 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y1459612.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y1459612.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k8351015.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k8351015.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1308
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l0495563.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l0495563.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1812
-
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4040
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
749KB
MD5cd82172bd95984a5c8c91a15ceb87891
SHA142602dd78f17ec5fe7ce554749597559480d76c7
SHA2561fece660c9408ab186fd5590fdf4abe76fc8eac719b331c3b04091fcd2c9aefd
SHA512e714a715372b645c7ac25c77cd21948b780eb5cff0997022bbccc3ffa507c7ec20ea0fb5c2f07356f7f23e692b5fa464cee530c6d4c5e43da33759e091a9dc35
-
Filesize
304KB
MD5ec082e5b19dcf2c865337d6024df4268
SHA10aa271f2576c559240118b403f273f18c8d2c985
SHA256e9b8ea5b057d17cb71193c8fc577e92f8cadb12b2444639a3cf66c89f67b9dfb
SHA512cadb5fa82a2e567411f97933af546ca70a9f57e17792cc33237a4b5fc41a2effcee96c634a513cd7b44eaa787d185f660674716ea4bed2a07e1e93ab83835a81
-
Filesize
183KB
MD575df6a4aaf5c63bc4f42ac5ec8ecc76a
SHA18d9da11aa11364c1b580b12faa446403f527ff83
SHA256d1d13ff4eabb541a9cfc225beeb1c27d9cd85c8f9849e8d0fece0a4503c63f05
SHA51272d34a4770cf9885993630f04e83831f4ded666af58cb705c7b1ca4cd7ca95911dec7247e4987c64afc13fee10bcf94fc913bd9a7790edb65c75b01a89bbe8fe
-
Filesize
145KB
MD53023b17408567b07653257f034f0f10d
SHA19b7e8e33bb2a32349c09caf65172ee7217f22d15
SHA25609dfbd367615ee2e930afbdfcc94c74648073876a01f3d56e592b0b0feb3b5fc
SHA512529e831ab0d314bdbf08541860ae964969a77c501995c2cc2c4c555aa9f559225b745bac6a0792e60c60ba7654a9ac62c3999fe9a0c90faccb467a4aa3b84201