Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-11-2024 20:11
Static task
static1
Behavioral task
behavioral1
Sample
69d5046bc0b69b064eeffb4208ef30cd5d527d660c91bccab3f79610f201e3f7.exe
Resource
win10v2004-20241007-en
General
-
Target
69d5046bc0b69b064eeffb4208ef30cd5d527d660c91bccab3f79610f201e3f7.exe
-
Size
1.1MB
-
MD5
a3fd68414dbcf3a3e5d21dfcc9dd5048
-
SHA1
82c7568bd65bbb23858b9d4f013f3776db81aee1
-
SHA256
69d5046bc0b69b064eeffb4208ef30cd5d527d660c91bccab3f79610f201e3f7
-
SHA512
33641391d1f5b0b7d2f3a15800db4e1cc475f9d2c5f6bb8bfeb68b66236cf89eb49190b2749eba2ffe94793cebc054235aa886f2a39db89e60a07d9b7e487dff
-
SSDEEP
24576:ZyGqwwmfkZzAZAFkoJWemzXzaaAdm95xy4wnaqaZu:MGqufk6AFkO+zDaa6m9ny4+e
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k7496064.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k7496064.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k7496064.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k7496064.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k7496064.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k7496064.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023c7f-54.dat family_redline behavioral1/memory/5012-56-0x0000000000380000-0x00000000003AA000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 348 y4780143.exe 2648 y5623661.exe 1896 k7496064.exe 5012 l4237089.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k7496064.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k7496064.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 69d5046bc0b69b064eeffb4208ef30cd5d527d660c91bccab3f79610f201e3f7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y4780143.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y5623661.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y5623661.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k7496064.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l4237089.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 69d5046bc0b69b064eeffb4208ef30cd5d527d660c91bccab3f79610f201e3f7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y4780143.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1896 k7496064.exe 1896 k7496064.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1896 k7496064.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4376 wrote to memory of 348 4376 69d5046bc0b69b064eeffb4208ef30cd5d527d660c91bccab3f79610f201e3f7.exe 85 PID 4376 wrote to memory of 348 4376 69d5046bc0b69b064eeffb4208ef30cd5d527d660c91bccab3f79610f201e3f7.exe 85 PID 4376 wrote to memory of 348 4376 69d5046bc0b69b064eeffb4208ef30cd5d527d660c91bccab3f79610f201e3f7.exe 85 PID 348 wrote to memory of 2648 348 y4780143.exe 86 PID 348 wrote to memory of 2648 348 y4780143.exe 86 PID 348 wrote to memory of 2648 348 y4780143.exe 86 PID 2648 wrote to memory of 1896 2648 y5623661.exe 88 PID 2648 wrote to memory of 1896 2648 y5623661.exe 88 PID 2648 wrote to memory of 1896 2648 y5623661.exe 88 PID 2648 wrote to memory of 5012 2648 y5623661.exe 95 PID 2648 wrote to memory of 5012 2648 y5623661.exe 95 PID 2648 wrote to memory of 5012 2648 y5623661.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\69d5046bc0b69b064eeffb4208ef30cd5d527d660c91bccab3f79610f201e3f7.exe"C:\Users\Admin\AppData\Local\Temp\69d5046bc0b69b064eeffb4208ef30cd5d527d660c91bccab3f79610f201e3f7.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4780143.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4780143.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:348 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y5623661.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y5623661.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k7496064.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k7496064.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1896
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l4237089.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l4237089.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5012
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
749KB
MD59001a4e4cd7918dcf7663d28ab174af0
SHA1838a800d63322ce8cd9f3084853db6136a06ca46
SHA256dcc42802d6c822d427f050b124015719a070acb59a6a209690721e0f6c4d4a78
SHA5124f355ec0d2d11790a428e406e6a82bd03ecf0bfee006bdbd6b4944b0a158dee8f8b734da3f74ced63c07bfb3b7846b521cd2edd8523a86ec1797591bd746c7af
-
Filesize
304KB
MD5637dc9d02d158423cd0fd75477f074f9
SHA1e1ddbf1e8d8dc138ed84bac26b142640db9ac463
SHA256520adaa9734d1839fa1c9b0678631c01af48ca8db54a47bb4ab9f2f516f59e86
SHA5120acff872e863879e20d065a2d30971776da9d81f32b1cb9f367f6d978fdd785a96164265917c03c6c3524c892c5498d690bab1fcd05af7d1b5ada2528791d329
-
Filesize
183KB
MD575df6a4aaf5c63bc4f42ac5ec8ecc76a
SHA18d9da11aa11364c1b580b12faa446403f527ff83
SHA256d1d13ff4eabb541a9cfc225beeb1c27d9cd85c8f9849e8d0fece0a4503c63f05
SHA51272d34a4770cf9885993630f04e83831f4ded666af58cb705c7b1ca4cd7ca95911dec7247e4987c64afc13fee10bcf94fc913bd9a7790edb65c75b01a89bbe8fe
-
Filesize
145KB
MD54bb531ff128077e4f310a44f0a95faab
SHA19fc4195a2fd6d5dd193bed95413d81671ec02b08
SHA256c8ac41f13ac658a82f5bc70c85911e4132a02ee0c8a3c9785a49e11d985ba737
SHA5126e3d7927cab71e2e9ab21af160b49e0bf2b81259fbf105e2b85e07a06568d175f1837de1caf3fde461df65fd71e2d1b57f2e1a6863093e03de79b216ca60db7c