Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 09:24
Static task
static1
Behavioral task
behavioral1
Sample
83748c818c6d448271b08bf44cf373257ba6fa2ab0ba9c87ddd2d414401795c9.exe
Resource
win10v2004-20241007-en
General
-
Target
83748c818c6d448271b08bf44cf373257ba6fa2ab0ba9c87ddd2d414401795c9.exe
-
Size
1.1MB
-
MD5
3e0f4afd44479f6e99ed4fec4233a312
-
SHA1
4b334d2ebc170bcda15254eb27b9b5e7e8c89a8e
-
SHA256
83748c818c6d448271b08bf44cf373257ba6fa2ab0ba9c87ddd2d414401795c9
-
SHA512
5e147953c8ef5f580afc5010b5d46bd2615cc6be5c226524ec01422569f3cc07a023d28096d12d2e84364f6141a4c037c7abf93749d268768526463a022e563d
-
SSDEEP
24576:Ryhi/V2qUrgZ6EFk59bkUebfJqWQvnmNHvxZ9jxi0C1:EFrgZ6EFkTbkUEJPQvn6HL9j80
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Signatures
-
Processes:
k2455047.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k2455047.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k2455047.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k2455047.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k2455047.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k2455047.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k2455047.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral1/files/0x0008000000023bcb-54.dat family_redline behavioral1/memory/2612-56-0x0000000000D00000-0x0000000000D2A000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
Processes:
y7839235.exey9605833.exek2455047.exel5373268.exepid Process 3868 y7839235.exe 1664 y9605833.exe 2636 k2455047.exe 2612 l5373268.exe -
Processes:
k2455047.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k2455047.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k2455047.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
y9605833.exe83748c818c6d448271b08bf44cf373257ba6fa2ab0ba9c87ddd2d414401795c9.exey7839235.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y9605833.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 83748c818c6d448271b08bf44cf373257ba6fa2ab0ba9c87ddd2d414401795c9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y7839235.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
y9605833.exek2455047.exel5373268.exe83748c818c6d448271b08bf44cf373257ba6fa2ab0ba9c87ddd2d414401795c9.exey7839235.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y9605833.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k2455047.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l5373268.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 83748c818c6d448271b08bf44cf373257ba6fa2ab0ba9c87ddd2d414401795c9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y7839235.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
k2455047.exepid Process 2636 k2455047.exe 2636 k2455047.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
k2455047.exedescription pid Process Token: SeDebugPrivilege 2636 k2455047.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
83748c818c6d448271b08bf44cf373257ba6fa2ab0ba9c87ddd2d414401795c9.exey7839235.exey9605833.exedescription pid Process procid_target PID 840 wrote to memory of 3868 840 83748c818c6d448271b08bf44cf373257ba6fa2ab0ba9c87ddd2d414401795c9.exe 84 PID 840 wrote to memory of 3868 840 83748c818c6d448271b08bf44cf373257ba6fa2ab0ba9c87ddd2d414401795c9.exe 84 PID 840 wrote to memory of 3868 840 83748c818c6d448271b08bf44cf373257ba6fa2ab0ba9c87ddd2d414401795c9.exe 84 PID 3868 wrote to memory of 1664 3868 y7839235.exe 85 PID 3868 wrote to memory of 1664 3868 y7839235.exe 85 PID 3868 wrote to memory of 1664 3868 y7839235.exe 85 PID 1664 wrote to memory of 2636 1664 y9605833.exe 87 PID 1664 wrote to memory of 2636 1664 y9605833.exe 87 PID 1664 wrote to memory of 2636 1664 y9605833.exe 87 PID 1664 wrote to memory of 2612 1664 y9605833.exe 95 PID 1664 wrote to memory of 2612 1664 y9605833.exe 95 PID 1664 wrote to memory of 2612 1664 y9605833.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\83748c818c6d448271b08bf44cf373257ba6fa2ab0ba9c87ddd2d414401795c9.exe"C:\Users\Admin\AppData\Local\Temp\83748c818c6d448271b08bf44cf373257ba6fa2ab0ba9c87ddd2d414401795c9.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7839235.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7839235.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y9605833.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y9605833.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k2455047.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k2455047.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2636
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l5373268.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l5373268.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2612
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
749KB
MD561de6c63a9350fc3f7c6232d05095790
SHA1c5e168a651bd828332d27b8241f3150bcd30491c
SHA256c2a78cc8cd8bbf1b70ab6b94260f9c7721df5561eab8f868f95bc62212561501
SHA5124b49f0b4003f8db21c88ecf81fad0da4153c8ea3629eb809ff2756bec31551a96c78e5c66d9b0a319e67be3872cfa5195c6ad61912eca76e68ee960666670a84
-
Filesize
304KB
MD572f66d7a0003852aa81954ef5d562e0d
SHA143596f7be88ca4d3e690a6255c66c32080ce9b81
SHA2560734c429474faed130f6a8027444c890c5eb2bbb9a4464500789ac0891188a28
SHA5128b4f1a34cd3180f7214f1911ca127b842584188687abc9508f5f0c2e8e7066dcba034e1d4e0d2be4619cb909786e1e76aaf8a3290e74461996d6f523a961832b
-
Filesize
183KB
MD575df6a4aaf5c63bc4f42ac5ec8ecc76a
SHA18d9da11aa11364c1b580b12faa446403f527ff83
SHA256d1d13ff4eabb541a9cfc225beeb1c27d9cd85c8f9849e8d0fece0a4503c63f05
SHA51272d34a4770cf9885993630f04e83831f4ded666af58cb705c7b1ca4cd7ca95911dec7247e4987c64afc13fee10bcf94fc913bd9a7790edb65c75b01a89bbe8fe
-
Filesize
145KB
MD50fa17710f25262cec4d71a121c3c0226
SHA13cddf2a146cfbe546f4924261aaf57a5d027e2c7
SHA2564e14619a691f6c8001169bfd1d194bdc88b2a2a4c9c800b40f655ffa5261d3c8
SHA512450981f7b934d1b552e5dd9d3400fe44d68692c01652c7b0ba78c9e12187525cb6d12fc636ab54873cc57de35e0cb79deaa154ef77f6c7c617ef454350594cc1