Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 13:38
Static task
static1
Behavioral task
behavioral1
Sample
c538730e4a76a33af6e56ffcd8fde615fa5003ce7164dbb0527fd38924659ed2.exe
Resource
win10v2004-20241007-en
General
-
Target
c538730e4a76a33af6e56ffcd8fde615fa5003ce7164dbb0527fd38924659ed2.exe
-
Size
1.1MB
-
MD5
734d5c6de2a90c1cb9a277de49c6056b
-
SHA1
2703adb2643c72a0b6e70f7eeb11fc8e73539776
-
SHA256
c538730e4a76a33af6e56ffcd8fde615fa5003ce7164dbb0527fd38924659ed2
-
SHA512
af3cb918843239781f147114601d7129f767dd409d9f1a8361644f905c2378f8f5ec999baeefce3858d64a48f00d9b0ed2629041f7230b83f75d3cceb0acb840
-
SSDEEP
24576:qyFuSgO9UAl3jfiFkDnWKR2Fh6n8vze+5D/dgL6L4KnadU5g:xFu1O9UOjfiFkDWKILe+5D+L68KnaG
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Signatures
-
Processes:
k2465319.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k2465319.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k2465319.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k2465319.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k2465319.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k2465319.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k2465319.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral1/files/0x0007000000023ceb-54.dat family_redline behavioral1/memory/4628-56-0x0000000000D90000-0x0000000000DBA000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
Processes:
y1601082.exey6193474.exek2465319.exel9581358.exepid Process 4092 y1601082.exe 2156 y6193474.exe 1860 k2465319.exe 4628 l9581358.exe -
Processes:
k2465319.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k2465319.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k2465319.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
y6193474.exec538730e4a76a33af6e56ffcd8fde615fa5003ce7164dbb0527fd38924659ed2.exey1601082.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y6193474.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c538730e4a76a33af6e56ffcd8fde615fa5003ce7164dbb0527fd38924659ed2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y1601082.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
y6193474.exek2465319.exel9581358.exec538730e4a76a33af6e56ffcd8fde615fa5003ce7164dbb0527fd38924659ed2.exey1601082.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y6193474.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k2465319.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l9581358.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c538730e4a76a33af6e56ffcd8fde615fa5003ce7164dbb0527fd38924659ed2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y1601082.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
k2465319.exepid Process 1860 k2465319.exe 1860 k2465319.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
k2465319.exedescription pid Process Token: SeDebugPrivilege 1860 k2465319.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
c538730e4a76a33af6e56ffcd8fde615fa5003ce7164dbb0527fd38924659ed2.exey1601082.exey6193474.exedescription pid Process procid_target PID 2252 wrote to memory of 4092 2252 c538730e4a76a33af6e56ffcd8fde615fa5003ce7164dbb0527fd38924659ed2.exe 85 PID 2252 wrote to memory of 4092 2252 c538730e4a76a33af6e56ffcd8fde615fa5003ce7164dbb0527fd38924659ed2.exe 85 PID 2252 wrote to memory of 4092 2252 c538730e4a76a33af6e56ffcd8fde615fa5003ce7164dbb0527fd38924659ed2.exe 85 PID 4092 wrote to memory of 2156 4092 y1601082.exe 86 PID 4092 wrote to memory of 2156 4092 y1601082.exe 86 PID 4092 wrote to memory of 2156 4092 y1601082.exe 86 PID 2156 wrote to memory of 1860 2156 y6193474.exe 87 PID 2156 wrote to memory of 1860 2156 y6193474.exe 87 PID 2156 wrote to memory of 1860 2156 y6193474.exe 87 PID 2156 wrote to memory of 4628 2156 y6193474.exe 98 PID 2156 wrote to memory of 4628 2156 y6193474.exe 98 PID 2156 wrote to memory of 4628 2156 y6193474.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\c538730e4a76a33af6e56ffcd8fde615fa5003ce7164dbb0527fd38924659ed2.exe"C:\Users\Admin\AppData\Local\Temp\c538730e4a76a33af6e56ffcd8fde615fa5003ce7164dbb0527fd38924659ed2.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1601082.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1601082.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6193474.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6193474.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k2465319.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k2465319.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1860
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l9581358.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l9581358.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4628
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
750KB
MD5406570fa9372fc514549c192aaf60e3c
SHA168883be96790fb202f03a9db793b19053af93863
SHA2564f9d0bc0f4ed58a60eb368bb12cf479bc5888864f4d1f2f31788e82ddeff05d8
SHA512fec2c29ad5b650fabb7ac7bec9499557f6d5e07f941bd503193fb13cb7b0a7721dd556415c4a2ad6eafb3a79c5131ded8bbc1b0543d567c4e197c79156c2cd3c
-
Filesize
304KB
MD564ceec218f01b1b05f4558d85648f98e
SHA195f75e2c70f2d1d9de384a7e75dc246e8911b531
SHA2566b11e2be19fe7b129c4d9b4c52e7e014d9b65550ccd5037b07aea40c06c7690b
SHA512a46cebb03d395063fbdb926f29ee89e0713df036e3c9e4ab9890ab80ef02db68e60a253b0278c348406c1778f51f5edf814417953e12df53e1c655409c788ec5
-
Filesize
183KB
MD575df6a4aaf5c63bc4f42ac5ec8ecc76a
SHA18d9da11aa11364c1b580b12faa446403f527ff83
SHA256d1d13ff4eabb541a9cfc225beeb1c27d9cd85c8f9849e8d0fece0a4503c63f05
SHA51272d34a4770cf9885993630f04e83831f4ded666af58cb705c7b1ca4cd7ca95911dec7247e4987c64afc13fee10bcf94fc913bd9a7790edb65c75b01a89bbe8fe
-
Filesize
145KB
MD52a490205a842eba517518bab160d0607
SHA1152b6ed86d9c97e918ec2cd24916fdd3c6f22282
SHA2566136e31cd3803c1c04d7cf9b80149719f144da94f5e6ec06ee2faa0ea69e7723
SHA512df3e3680edaf006625f6abd9efbd03472bda9a5dc9cf9cc8fa58d31a8dfe8eb6a5538e8d853e4573ac290a89ad63b8d0020e858822ef056f65ebf78ba7a7854d