Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 16:59
Static task
static1
Behavioral task
behavioral1
Sample
430098ac4c3d5041a8a2f7ff151a148db61f07eccac7f2f640386574ac4f57c2.exe
Resource
win10v2004-20241007-en
General
-
Target
430098ac4c3d5041a8a2f7ff151a148db61f07eccac7f2f640386574ac4f57c2.exe
-
Size
1.1MB
-
MD5
049e24379b92f63ee3b12ab3e4a97237
-
SHA1
60118ab476ad60139f5c4d282609e041a7528121
-
SHA256
430098ac4c3d5041a8a2f7ff151a148db61f07eccac7f2f640386574ac4f57c2
-
SHA512
aae41e4d3bc957e543d4013b35cb1ca66a11191c52a3985482450819a561989f7956fc8cea8648b77d827c0ddadeaccd62eb75f67e01ea71360925257929d778
-
SSDEEP
24576:3ykAw+oiEcgHcpFkH/jva74B1x7Q53Ltom9Fs+d:C6t1HcpFkH7q4B1xQ9L79O+
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Signatures
-
Processes:
k2821078.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k2821078.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k2821078.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k2821078.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k2821078.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k2821078.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k2821078.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l6747059.exe family_redline behavioral1/memory/4336-56-0x0000000000320000-0x000000000034A000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
Processes:
y8352875.exey1503191.exek2821078.exel6747059.exepid process 880 y8352875.exe 1348 y1503191.exe 2040 k2821078.exe 4336 l6747059.exe -
Processes:
k2821078.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k2821078.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k2821078.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
430098ac4c3d5041a8a2f7ff151a148db61f07eccac7f2f640386574ac4f57c2.exey8352875.exey1503191.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 430098ac4c3d5041a8a2f7ff151a148db61f07eccac7f2f640386574ac4f57c2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y8352875.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y1503191.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
430098ac4c3d5041a8a2f7ff151a148db61f07eccac7f2f640386574ac4f57c2.exey8352875.exey1503191.exek2821078.exel6747059.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 430098ac4c3d5041a8a2f7ff151a148db61f07eccac7f2f640386574ac4f57c2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y8352875.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y1503191.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k2821078.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l6747059.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
k2821078.exepid process 2040 k2821078.exe 2040 k2821078.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
k2821078.exedescription pid process Token: SeDebugPrivilege 2040 k2821078.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
430098ac4c3d5041a8a2f7ff151a148db61f07eccac7f2f640386574ac4f57c2.exey8352875.exey1503191.exedescription pid process target process PID 3088 wrote to memory of 880 3088 430098ac4c3d5041a8a2f7ff151a148db61f07eccac7f2f640386574ac4f57c2.exe y8352875.exe PID 3088 wrote to memory of 880 3088 430098ac4c3d5041a8a2f7ff151a148db61f07eccac7f2f640386574ac4f57c2.exe y8352875.exe PID 3088 wrote to memory of 880 3088 430098ac4c3d5041a8a2f7ff151a148db61f07eccac7f2f640386574ac4f57c2.exe y8352875.exe PID 880 wrote to memory of 1348 880 y8352875.exe y1503191.exe PID 880 wrote to memory of 1348 880 y8352875.exe y1503191.exe PID 880 wrote to memory of 1348 880 y8352875.exe y1503191.exe PID 1348 wrote to memory of 2040 1348 y1503191.exe k2821078.exe PID 1348 wrote to memory of 2040 1348 y1503191.exe k2821078.exe PID 1348 wrote to memory of 2040 1348 y1503191.exe k2821078.exe PID 1348 wrote to memory of 4336 1348 y1503191.exe l6747059.exe PID 1348 wrote to memory of 4336 1348 y1503191.exe l6747059.exe PID 1348 wrote to memory of 4336 1348 y1503191.exe l6747059.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\430098ac4c3d5041a8a2f7ff151a148db61f07eccac7f2f640386574ac4f57c2.exe"C:\Users\Admin\AppData\Local\Temp\430098ac4c3d5041a8a2f7ff151a148db61f07eccac7f2f640386574ac4f57c2.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8352875.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8352875.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y1503191.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y1503191.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k2821078.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k2821078.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2040
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l6747059.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l6747059.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4336
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
748KB
MD5ea7945837d7d8991aec67fa3ff664f44
SHA12dde669aa20f921563e3adb947a037df4ee6597e
SHA2567dfb66c1388744894f02d081ea019e5613aae2f179f1bcc3571cc34deaba0e78
SHA5121584dddc9535c1ff02d80f1509b84b542ebf0ad9290405236e2df09a1dca6ea09adc91c552d7457ddf64c581a7c040b4e2b7956182e664a2b778aa508d4fa19b
-
Filesize
304KB
MD55c361ee4ac05bc3f86b5fb569fb21042
SHA1fb8ef157662930236678c8e72046890669d749f6
SHA256fc537a1d51dea2020dd5e616d69ff9aab0be335db439edfb994c50c2cecbbc09
SHA512a08c6286933a90aaf56b80cc7887014e8adebebc17827cc6c8767b684d518e3d1b551546ee9c73b54d83497be90c7f511d30996092a653d5ae1e9ce1eccfd2a8
-
Filesize
183KB
MD575df6a4aaf5c63bc4f42ac5ec8ecc76a
SHA18d9da11aa11364c1b580b12faa446403f527ff83
SHA256d1d13ff4eabb541a9cfc225beeb1c27d9cd85c8f9849e8d0fece0a4503c63f05
SHA51272d34a4770cf9885993630f04e83831f4ded666af58cb705c7b1ca4cd7ca95911dec7247e4987c64afc13fee10bcf94fc913bd9a7790edb65c75b01a89bbe8fe
-
Filesize
145KB
MD5338380923918a2222b4063e6e1864304
SHA19ec8e1bf45c59274776b74f84a08a592174df2cc
SHA25673b4b22767f34fcdff0658c907d22c7bbeac70e81d21b88ddbd11fe34014368b
SHA51293ce24b9a9d17ec863948f2055579bc78226808578bc7646608bdff019cc6219c27daddfec447e0e029dcd86b11fffc9119ff609adbcf73a3638b7b15adbc658