Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 04:57
Static task
static1
Behavioral task
behavioral1
Sample
36b7a62cdfe99a43ea18366cfa66b288a7677d03e111771acd67d65e8ff01001.exe
Resource
win10v2004-20241007-en
General
-
Target
36b7a62cdfe99a43ea18366cfa66b288a7677d03e111771acd67d65e8ff01001.exe
-
Size
1.1MB
-
MD5
c0f84f4d52df81c0502a576ac95b6d19
-
SHA1
14df9c77d9804be68e20801f3216fc113b443291
-
SHA256
36b7a62cdfe99a43ea18366cfa66b288a7677d03e111771acd67d65e8ff01001
-
SHA512
95d9950425df767cc5372bd18d827951c6d316575500f5c5386f6877eee48c247cf4e3f7d9bd787bc6acb3ee3220d22c3f2150325349cc7c5ed632c3970932cb
-
SSDEEP
24576:CyamvbjU4WqQeFkGjTlIHRhN1sgsFSYbguqgz3azECVaL:pN/UTeFkYMhLsvbgcTazNV
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Signatures
-
Processes:
k0257017.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k0257017.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k0257017.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k0257017.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k0257017.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k0257017.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k0257017.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l4543574.exe family_redline behavioral1/memory/3416-56-0x0000000000A60000-0x0000000000A8A000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
Processes:
y6567574.exey6929577.exek0257017.exel4543574.exepid process 1580 y6567574.exe 2748 y6929577.exe 3428 k0257017.exe 3416 l4543574.exe -
Processes:
k0257017.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k0257017.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k0257017.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
36b7a62cdfe99a43ea18366cfa66b288a7677d03e111771acd67d65e8ff01001.exey6567574.exey6929577.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 36b7a62cdfe99a43ea18366cfa66b288a7677d03e111771acd67d65e8ff01001.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y6567574.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y6929577.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 4980 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
36b7a62cdfe99a43ea18366cfa66b288a7677d03e111771acd67d65e8ff01001.exey6567574.exey6929577.exek0257017.exel4543574.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36b7a62cdfe99a43ea18366cfa66b288a7677d03e111771acd67d65e8ff01001.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y6567574.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y6929577.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k0257017.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l4543574.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
k0257017.exepid process 3428 k0257017.exe 3428 k0257017.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
k0257017.exedescription pid process Token: SeDebugPrivilege 3428 k0257017.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
36b7a62cdfe99a43ea18366cfa66b288a7677d03e111771acd67d65e8ff01001.exey6567574.exey6929577.exedescription pid process target process PID 2500 wrote to memory of 1580 2500 36b7a62cdfe99a43ea18366cfa66b288a7677d03e111771acd67d65e8ff01001.exe y6567574.exe PID 2500 wrote to memory of 1580 2500 36b7a62cdfe99a43ea18366cfa66b288a7677d03e111771acd67d65e8ff01001.exe y6567574.exe PID 2500 wrote to memory of 1580 2500 36b7a62cdfe99a43ea18366cfa66b288a7677d03e111771acd67d65e8ff01001.exe y6567574.exe PID 1580 wrote to memory of 2748 1580 y6567574.exe y6929577.exe PID 1580 wrote to memory of 2748 1580 y6567574.exe y6929577.exe PID 1580 wrote to memory of 2748 1580 y6567574.exe y6929577.exe PID 2748 wrote to memory of 3428 2748 y6929577.exe k0257017.exe PID 2748 wrote to memory of 3428 2748 y6929577.exe k0257017.exe PID 2748 wrote to memory of 3428 2748 y6929577.exe k0257017.exe PID 2748 wrote to memory of 3416 2748 y6929577.exe l4543574.exe PID 2748 wrote to memory of 3416 2748 y6929577.exe l4543574.exe PID 2748 wrote to memory of 3416 2748 y6929577.exe l4543574.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\36b7a62cdfe99a43ea18366cfa66b288a7677d03e111771acd67d65e8ff01001.exe"C:\Users\Admin\AppData\Local\Temp\36b7a62cdfe99a43ea18366cfa66b288a7677d03e111771acd67d65e8ff01001.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6567574.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6567574.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6929577.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6929577.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k0257017.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k0257017.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3428
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l4543574.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l4543574.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3416
-
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4980
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
748KB
MD5ef001a58babe8caf6f66f5e9e865de30
SHA1dcb254fb4686c4b9b8f3ed14018c7e652cb3cfaf
SHA2560f8ec577adf22ecd6378798f1268ec8fb93aecc321951403c6af35589ffb1b1e
SHA512e1b279a9439d630d2629d27364fbd05848b9520a2fde7bb2d2f8600ceffe884bf1813262f3a9d843d373d2d176e1f7ec2d7babe9f1e3758f72ca9a12ddd8065a
-
Filesize
304KB
MD57d800371eb25c4f0e45717431a79b375
SHA151dbe07f473a8c10a1eb06de07c067cecb5dfdb2
SHA256e03f4c79fa83464a70aae0a096fa73e40eeb3464f052f12aa5522737c4434231
SHA5123a875539c9dc2556c0ab8b612919552fa234e1111950fe28f5825a2b8941472d509c1abd6e498bbc7fd34f11ad35b5028aec1163a2667ccf05c5b715d9d3dccb
-
Filesize
183KB
MD575df6a4aaf5c63bc4f42ac5ec8ecc76a
SHA18d9da11aa11364c1b580b12faa446403f527ff83
SHA256d1d13ff4eabb541a9cfc225beeb1c27d9cd85c8f9849e8d0fece0a4503c63f05
SHA51272d34a4770cf9885993630f04e83831f4ded666af58cb705c7b1ca4cd7ca95911dec7247e4987c64afc13fee10bcf94fc913bd9a7790edb65c75b01a89bbe8fe
-
Filesize
145KB
MD50a09d377d98028cdc11077ce53b4e5ab
SHA10e7f45fccafcc28b41f3457aa281804a21193eec
SHA2568ca0d4e4eb66112753b81f09641e551c42f2dc338e62dd5de4a25df6ac43e3a4
SHA5123e0b69f8773486ddb658676883401260790e42fdf1a54d711c6ece69eccf995a43970f8f3e9334faf7c8ab8ad9a778884dbd042df7c2cf4345da5ef906ccc513