Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 23:32
Static task
static1
Behavioral task
behavioral1
Sample
d947b533d06ba7324b0c3eacb1334f4ebe66c74995b16cb15c7a8a22f7ab3b10.exe
Resource
win10v2004-20241007-en
General
-
Target
d947b533d06ba7324b0c3eacb1334f4ebe66c74995b16cb15c7a8a22f7ab3b10.exe
-
Size
1.1MB
-
MD5
343052f390d293ecabe995a70836c0dd
-
SHA1
6444fa46a5047447304638cf64eedbbab630060c
-
SHA256
d947b533d06ba7324b0c3eacb1334f4ebe66c74995b16cb15c7a8a22f7ab3b10
-
SHA512
1258817059c1bd1b86fd87dd6f5995d4e39e2391c362789655956ca05a9a545ec5be5c241722b0a6521fe270da10b3eb4766fb6c980dc46380ae102f5628ee7f
-
SSDEEP
24576:uyTSI0CHFCgFktR/LwVMsv9D5vKzx2QNg+m:9GykgFkr/LjsvmxD
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Signatures
-
Processes:
k1913178.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k1913178.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k1913178.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k1913178.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k1913178.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k1913178.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k1913178.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l6634860.exe family_redline behavioral1/memory/4236-56-0x0000000000360000-0x000000000038A000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
Processes:
y0811930.exey6140389.exek1913178.exel6634860.exepid process 1944 y0811930.exe 740 y6140389.exe 1472 k1913178.exe 4236 l6634860.exe -
Processes:
k1913178.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k1913178.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k1913178.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
d947b533d06ba7324b0c3eacb1334f4ebe66c74995b16cb15c7a8a22f7ab3b10.exey0811930.exey6140389.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d947b533d06ba7324b0c3eacb1334f4ebe66c74995b16cb15c7a8a22f7ab3b10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y0811930.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y6140389.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
d947b533d06ba7324b0c3eacb1334f4ebe66c74995b16cb15c7a8a22f7ab3b10.exey0811930.exey6140389.exek1913178.exel6634860.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d947b533d06ba7324b0c3eacb1334f4ebe66c74995b16cb15c7a8a22f7ab3b10.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y0811930.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y6140389.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k1913178.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l6634860.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
k1913178.exepid process 1472 k1913178.exe 1472 k1913178.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
k1913178.exedescription pid process Token: SeDebugPrivilege 1472 k1913178.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
d947b533d06ba7324b0c3eacb1334f4ebe66c74995b16cb15c7a8a22f7ab3b10.exey0811930.exey6140389.exedescription pid process target process PID 3132 wrote to memory of 1944 3132 d947b533d06ba7324b0c3eacb1334f4ebe66c74995b16cb15c7a8a22f7ab3b10.exe y0811930.exe PID 3132 wrote to memory of 1944 3132 d947b533d06ba7324b0c3eacb1334f4ebe66c74995b16cb15c7a8a22f7ab3b10.exe y0811930.exe PID 3132 wrote to memory of 1944 3132 d947b533d06ba7324b0c3eacb1334f4ebe66c74995b16cb15c7a8a22f7ab3b10.exe y0811930.exe PID 1944 wrote to memory of 740 1944 y0811930.exe y6140389.exe PID 1944 wrote to memory of 740 1944 y0811930.exe y6140389.exe PID 1944 wrote to memory of 740 1944 y0811930.exe y6140389.exe PID 740 wrote to memory of 1472 740 y6140389.exe k1913178.exe PID 740 wrote to memory of 1472 740 y6140389.exe k1913178.exe PID 740 wrote to memory of 1472 740 y6140389.exe k1913178.exe PID 740 wrote to memory of 4236 740 y6140389.exe l6634860.exe PID 740 wrote to memory of 4236 740 y6140389.exe l6634860.exe PID 740 wrote to memory of 4236 740 y6140389.exe l6634860.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d947b533d06ba7324b0c3eacb1334f4ebe66c74995b16cb15c7a8a22f7ab3b10.exe"C:\Users\Admin\AppData\Local\Temp\d947b533d06ba7324b0c3eacb1334f4ebe66c74995b16cb15c7a8a22f7ab3b10.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0811930.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0811930.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6140389.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6140389.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k1913178.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k1913178.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1472
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l6634860.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l6634860.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4236
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
749KB
MD54d9d3178f655891e86b45af7050c2b86
SHA151af9ac90499f5720d89fed68f220acc82818c26
SHA256f4a2b482286206b654225874df44aa379fa5d6903bcb1692c234149c87f23d0a
SHA5127756239644252588bc705d381bd9066a71322ede080026ea705c434c2d1383a44b84f6e498fedf1615463fffee35c3a57204d9f837f34cffe65a3a13a267b1a3
-
Filesize
304KB
MD592ba990bc987ac1969fe38d777385e2f
SHA102f9c805856ec4d99228ffc9cf7d5e64363772fc
SHA2563468c9e83910147d68754e267c6029cf002ca4f6d11880b312dc3d51cbfb7bb0
SHA512517cc23b91b0925d0e2fd92463aea53347a59d6687230ddec700d9bdd2ff161b48749dba75d9a1b00dddb36c74efc866b76aa8fe64f79d95d95a58854650580e
-
Filesize
183KB
MD575df6a4aaf5c63bc4f42ac5ec8ecc76a
SHA18d9da11aa11364c1b580b12faa446403f527ff83
SHA256d1d13ff4eabb541a9cfc225beeb1c27d9cd85c8f9849e8d0fece0a4503c63f05
SHA51272d34a4770cf9885993630f04e83831f4ded666af58cb705c7b1ca4cd7ca95911dec7247e4987c64afc13fee10bcf94fc913bd9a7790edb65c75b01a89bbe8fe
-
Filesize
145KB
MD5ccb3343985135d42f8bd6de99ea46aa2
SHA121cdcb89a4b94836d8d9897b595159911aae3c81
SHA25633aed69d7c76f37770ee4f58b7450133bda5fbd3f56ba6ff96e9f4e10a5b49e8
SHA5124bbddce9a170765d352d5204cba4b1f2c2bff3e6d16279029797289f485340417061a2eef024a623c290bba0348775ad0ee866a3aa7eb9d542b4b02d2ea71096