Analysis
-
max time kernel
142s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 23:48
Static task
static1
Behavioral task
behavioral1
Sample
191f918020c220afd3cfc0edb47fc42260208a69e1bd125636546c675c38ab7f.exe
Resource
win10v2004-20241007-en
General
-
Target
191f918020c220afd3cfc0edb47fc42260208a69e1bd125636546c675c38ab7f.exe
-
Size
1.1MB
-
MD5
b6459e30c1cf92b5eccdec46e538cbe5
-
SHA1
d0f4c7a4eab84f957db8dda4797c1d18f4887369
-
SHA256
191f918020c220afd3cfc0edb47fc42260208a69e1bd125636546c675c38ab7f
-
SHA512
90abf443dd6fb93d60e562b28f939d630a18f21e992db9a69c328212c377af7a64d0d66e5f0935c82ce47d88f010aa271498847f40bb8b69a9aad6296b5e6cc4
-
SSDEEP
24576:syAlWZPduwMUOrrvTUTZUxtvJorz0vyKPGHtMUimMd3slaTjgd:bA4ZP8UWvTU1UxZJYAvyKEpxMd80fg
Malware Config
Extracted
redline
dogma
185.161.248.75:4132
-
auth_value
d6c5d36e9aa03c956dc76aa0fcbe3639
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k5464705.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k5464705.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k5464705.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k5464705.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k5464705.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k5464705.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023c79-53.dat family_redline behavioral1/memory/2684-56-0x0000000000830000-0x000000000085A000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 4024 y4646077.exe 4996 y3766403.exe 2500 k5464705.exe 2684 l2612728.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k5464705.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k5464705.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y3766403.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 191f918020c220afd3cfc0edb47fc42260208a69e1bd125636546c675c38ab7f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y4646077.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k5464705.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l2612728.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 191f918020c220afd3cfc0edb47fc42260208a69e1bd125636546c675c38ab7f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y4646077.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y3766403.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2500 k5464705.exe 2500 k5464705.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2500 k5464705.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 540 wrote to memory of 4024 540 191f918020c220afd3cfc0edb47fc42260208a69e1bd125636546c675c38ab7f.exe 83 PID 540 wrote to memory of 4024 540 191f918020c220afd3cfc0edb47fc42260208a69e1bd125636546c675c38ab7f.exe 83 PID 540 wrote to memory of 4024 540 191f918020c220afd3cfc0edb47fc42260208a69e1bd125636546c675c38ab7f.exe 83 PID 4024 wrote to memory of 4996 4024 y4646077.exe 85 PID 4024 wrote to memory of 4996 4024 y4646077.exe 85 PID 4024 wrote to memory of 4996 4024 y4646077.exe 85 PID 4996 wrote to memory of 2500 4996 y3766403.exe 86 PID 4996 wrote to memory of 2500 4996 y3766403.exe 86 PID 4996 wrote to memory of 2500 4996 y3766403.exe 86 PID 4996 wrote to memory of 2684 4996 y3766403.exe 97 PID 4996 wrote to memory of 2684 4996 y3766403.exe 97 PID 4996 wrote to memory of 2684 4996 y3766403.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\191f918020c220afd3cfc0edb47fc42260208a69e1bd125636546c675c38ab7f.exe"C:\Users\Admin\AppData\Local\Temp\191f918020c220afd3cfc0edb47fc42260208a69e1bd125636546c675c38ab7f.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4646077.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4646077.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y3766403.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y3766403.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k5464705.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k5464705.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2500
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l2612728.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l2612728.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2684
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
750KB
MD561b22d4ed37240c14ef9dc9ce295d963
SHA106de23aed65d23b8b12483b6238509060a6ec0f2
SHA2560b8f755166a35924f101a3c28e7eaa9dc0441acaef3f1929419c7e7a06917c9f
SHA512e8a28a7957fa0b21547d540e45f789b94c14d790c46dbcf05f58545803be3cd8b7ebf4c2a8b0f49f3dd35f906f4977bcaf4d520429b99bdce44899cadc6b816d
-
Filesize
306KB
MD5b88c0c8a8d1d800fada4fdbc857bf582
SHA14b65a9b866cd700f7c236b274583ef95469304bf
SHA25697458fa24b9003474a543e1cf0544b6c5aac85172ec3458fac816a1884249691
SHA51267dd4e348c73ef60bf8bcfd7af76b4a18a06b321ab566aeeb3ee4b85aaf07c0eb9df9c80ba5c5605545e8e27c10ef0a9d02ac8b7fe0477489b3299141164caa2
-
Filesize
185KB
MD51a006b4828336aa2814eb2c9662c4c41
SHA15ca9ffafe667b8c5938ee18675c0270d179405ed
SHA256381ca981e3aba2f2bc4b44b7c3e46f7eaf4ee2a28d686d32094729480b9f52a8
SHA512124491c15d406112befafb3182403c370f25fcafe8c733f84c92eabffca5b6e16f58acc30dbe522e0973be05b13628be583310ca9648e7b2ca0ea5042e6618ea
-
Filesize
145KB
MD5caeab852844ff27ef19462f97bf2c8bc
SHA10d0e771bdf534d09ccbaee7d1fcf5d8fdf595eab
SHA256ec393e9974c692b9ffa1112ae345679e8f9848e39b3c3c24c1efe0012595c534
SHA5123d531065ec14be645ea6a78208974bd8cbf062e725df3d492f796e2c5a13cc2354c91900d49ea38e2612e44ddc83bf4be2f3eedbc0a4f36cf7966b81ed884198