Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 00:51
Static task
static1
Behavioral task
behavioral1
Sample
faa660f445be1f8f28ffaa3b9ce31029b711bf9b5023a7dc2d557bfd739bccba.exe
Resource
win10v2004-20241007-en
General
-
Target
faa660f445be1f8f28ffaa3b9ce31029b711bf9b5023a7dc2d557bfd739bccba.exe
-
Size
769KB
-
MD5
24385bf816bd9e6ca61ba6cd8a4fc993
-
SHA1
1e4fece9b89d609e1dcd80dc9ed720c290820fbd
-
SHA256
faa660f445be1f8f28ffaa3b9ce31029b711bf9b5023a7dc2d557bfd739bccba
-
SHA512
b3cd6ebb5790bbcb7d3c97246d2b52ea5cf2a99677be3ac425be659c8fa706281eeed9480edf9bec074d5a6d74f1db99bb8af5a582b8b53718ceccb8191e2c54
-
SSDEEP
24576:Cy5fP8XsfSM1QSYtpkM2+pzNC7dcHTKnR3d:pVPMsfS+PkzacHTm3
Malware Config
Extracted
redline
debro
185.161.248.75:4132
-
auth_value
18c2c191aebfde5d1787ec8d805a01a8
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k1402504.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k1402504.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k1402504.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k1402504.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k1402504.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k1402504.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x000a000000023b80-54.dat family_redline behavioral1/memory/4960-56-0x0000000000DD0000-0x0000000000DFE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 1540 y7200011.exe 3652 y9947472.exe 2608 k1402504.exe 4960 l6003578.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k1402504.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k1402504.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y7200011.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y9947472.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" faa660f445be1f8f28ffaa3b9ce31029b711bf9b5023a7dc2d557bfd739bccba.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k1402504.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l6003578.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language faa660f445be1f8f28ffaa3b9ce31029b711bf9b5023a7dc2d557bfd739bccba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y7200011.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y9947472.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2608 k1402504.exe 2608 k1402504.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2608 k1402504.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2700 wrote to memory of 1540 2700 faa660f445be1f8f28ffaa3b9ce31029b711bf9b5023a7dc2d557bfd739bccba.exe 83 PID 2700 wrote to memory of 1540 2700 faa660f445be1f8f28ffaa3b9ce31029b711bf9b5023a7dc2d557bfd739bccba.exe 83 PID 2700 wrote to memory of 1540 2700 faa660f445be1f8f28ffaa3b9ce31029b711bf9b5023a7dc2d557bfd739bccba.exe 83 PID 1540 wrote to memory of 3652 1540 y7200011.exe 85 PID 1540 wrote to memory of 3652 1540 y7200011.exe 85 PID 1540 wrote to memory of 3652 1540 y7200011.exe 85 PID 3652 wrote to memory of 2608 3652 y9947472.exe 86 PID 3652 wrote to memory of 2608 3652 y9947472.exe 86 PID 3652 wrote to memory of 2608 3652 y9947472.exe 86 PID 3652 wrote to memory of 4960 3652 y9947472.exe 94 PID 3652 wrote to memory of 4960 3652 y9947472.exe 94 PID 3652 wrote to memory of 4960 3652 y9947472.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\faa660f445be1f8f28ffaa3b9ce31029b711bf9b5023a7dc2d557bfd739bccba.exe"C:\Users\Admin\AppData\Local\Temp\faa660f445be1f8f28ffaa3b9ce31029b711bf9b5023a7dc2d557bfd739bccba.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7200011.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7200011.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y9947472.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y9947472.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k1402504.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k1402504.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2608
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l6003578.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l6003578.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4960
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
488KB
MD511b60010828597547dfb3a9d667daebc
SHA13eb6b743ac6583278604a281d26d8d23892fc6e1
SHA256aec1754d3bc7f0ec89781c494d1a0525c8b12f23f5cb4fe2587a517166337c8e
SHA5128e5cf7c962a55e9a130e4d7d48797b8ba68deb80621beead2455f283ad872b1fcb914778910414fc5a85307886d8113c4ee6dfc0808887759348b1a80b404c43
-
Filesize
316KB
MD513bde58452527868ea4414f04d4aca35
SHA1901680b247acc9ac35b84d5cc750692ed509b0dd
SHA25644c48f772d692d1e20cf042fb7b9e829e650e37878b578ced6ef5adcfc3ab6b1
SHA512f1a1b3693fa842c914a503527990a20fdc99064f7757393862bca6e66b583ab2b44b3947e223b407da17d8c0d1ca68907e5a354c333a0ca1b05c4759db495a43
-
Filesize
185KB
MD558272e60e21e4d152cc5c507cab47f90
SHA15c46e28493efe6fb871537f58b946283c468c9ef
SHA256b405d49ef90237e74b55dcf348328df4cedec157cc8dfd68b01d7909ca9b512a
SHA512b9fded016aff1292613351c85cfbdcbd71c93b6f5c2be373ecb8219738128c0b42300f4448491bb459be86eff4b056a06c09aec1454224658df405a8f80de993
-
Filesize
168KB
MD55feee4fbdabb09b2d231d960b0763d6d
SHA159246ea4e0846acb9baa6294ad28bbe4497950ad
SHA256ce64eb1998d790e60bea6bee631a9676289cb689be2aded0d8ed218f3407968b
SHA5126ad1474aa3536c32cc865a2ecb64964a1db9b12697685a21c88f8067b5a8e7eaa36fc96e636cad0e16206e78f9fb9d202c4dba2b3fcd4ae04b5c0af3b8425ab2