Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 23:57
Static task
static1
Behavioral task
behavioral1
Sample
e43c161ce3fca02aacc3de6553fbac800ceceb3e4c5ec09224db0c419bc36ad2.exe
Resource
win10v2004-20241007-en
General
-
Target
e43c161ce3fca02aacc3de6553fbac800ceceb3e4c5ec09224db0c419bc36ad2.exe
-
Size
1.1MB
-
MD5
c31e9349b22897713ed5711d3c86ca8a
-
SHA1
1f60d3f0b63b09fcf809a8d7d83a9017bc2eb80d
-
SHA256
e43c161ce3fca02aacc3de6553fbac800ceceb3e4c5ec09224db0c419bc36ad2
-
SHA512
bf6c3ca40b470fcff31fb8a181fbdcfc5039256456ab3d095c20e35ab831ef358034e42cf99e3428ce53e32966e0619de720c5517e72e31ec57ad41b95bd80b2
-
SSDEEP
24576:/yeWwFPH27hiEMVo3RQiN3FyvmQ/l+bFvl/HeyynJatTa8V:KRwFHEMVoBh17QyHeyka9a
Malware Config
Extracted
redline
masta
185.161.248.75:4132
-
auth_value
57f23b6b74d0f680c5a0c8ac9f52bd75
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a6667213.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a6667213.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a6667213.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a6667213.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a6667213.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a6667213.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023cce-54.dat family_redline behavioral1/memory/5056-56-0x0000000000830000-0x000000000085A000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 4968 v1797132.exe 4376 v4620032.exe 1092 a6667213.exe 5056 b1040187.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a6667213.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a6667213.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e43c161ce3fca02aacc3de6553fbac800ceceb3e4c5ec09224db0c419bc36ad2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v1797132.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v4620032.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b1040187.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e43c161ce3fca02aacc3de6553fbac800ceceb3e4c5ec09224db0c419bc36ad2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v1797132.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v4620032.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a6667213.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1092 a6667213.exe 1092 a6667213.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1092 a6667213.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2572 wrote to memory of 4968 2572 e43c161ce3fca02aacc3de6553fbac800ceceb3e4c5ec09224db0c419bc36ad2.exe 85 PID 2572 wrote to memory of 4968 2572 e43c161ce3fca02aacc3de6553fbac800ceceb3e4c5ec09224db0c419bc36ad2.exe 85 PID 2572 wrote to memory of 4968 2572 e43c161ce3fca02aacc3de6553fbac800ceceb3e4c5ec09224db0c419bc36ad2.exe 85 PID 4968 wrote to memory of 4376 4968 v1797132.exe 86 PID 4968 wrote to memory of 4376 4968 v1797132.exe 86 PID 4968 wrote to memory of 4376 4968 v1797132.exe 86 PID 4376 wrote to memory of 1092 4376 v4620032.exe 87 PID 4376 wrote to memory of 1092 4376 v4620032.exe 87 PID 4376 wrote to memory of 1092 4376 v4620032.exe 87 PID 4376 wrote to memory of 5056 4376 v4620032.exe 94 PID 4376 wrote to memory of 5056 4376 v4620032.exe 94 PID 4376 wrote to memory of 5056 4376 v4620032.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\e43c161ce3fca02aacc3de6553fbac800ceceb3e4c5ec09224db0c419bc36ad2.exe"C:\Users\Admin\AppData\Local\Temp\e43c161ce3fca02aacc3de6553fbac800ceceb3e4c5ec09224db0c419bc36ad2.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1797132.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1797132.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4620032.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4620032.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a6667213.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a6667213.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1092
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1040187.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1040187.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5056
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
750KB
MD51cc93bc35c1cb83b81c1c3f66105b73b
SHA1f193e42cba1e44eb7453579ed5374ec0ea13a364
SHA2569f704df2d090f38379eea2ab6709ee680aad4cb8e58b74a4ebef26c11ac70814
SHA512036ef20c98d6500228ac202b6d8c333b594739efc2e1704433624cff11db11761126d222b9204f4711e02283c0c9cdb3d4c2f1ae5fa5e56cbeccdeb5646e2338
-
Filesize
305KB
MD5f44b15db3b3010e06df00a2be29458cb
SHA1a985df4a5aa2824732bdc615cc856eadda7fa882
SHA2562adcbf7d02fb4997339d916c7d468c1b3807ce12125ce8240710592b8f535cf6
SHA51219cde18ce7d5b50f21bbe33331e0cc097704f4bdf9013b6dd175a2ee46f96c56b83a7eea721d09728f0b0cfd050760a56f4f7c4f1a9d5c7945b8e602f60169e7
-
Filesize
183KB
MD5d18dd7e957d8eab39abe21eefd498331
SHA12d7b11252dbb1ed8cefff8d63d447b0f697a0060
SHA25657f8f54609021997865fed724894ad76b78b39a48a51b47a1d97a92eb836c440
SHA512c383080be8f9fbb5fd313204cc47ca9ecca8b6148362aa5ef76c219217971184472d0c4be2f1d7e9c9fbee561079b34357346507ddb882d779b06741a5ad0581
-
Filesize
145KB
MD5f549fc7dead5905b5ccf8898dd17773c
SHA138d70807ea6c27642126e93662c2daf173695982
SHA25665861e8f54a2422e61d7db500b890db8d2c19d3abdd8e384e55c192e528bd474
SHA51286ae977656fc2d37c96e4092e4f05f2046d6beb8c7c7af665136bd6aa073f397f2b73a4007a3563eec76dbf9a95d67fcf09c7275e76c426b5e722415d079df95