Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 00:36
Static task
static1
Behavioral task
behavioral1
Sample
4c02148972e6c9df5357b6c7956cae6436f8d25860324a14f969591a7dfe4923.exe
Resource
win10v2004-20241007-en
General
-
Target
4c02148972e6c9df5357b6c7956cae6436f8d25860324a14f969591a7dfe4923.exe
-
Size
1.1MB
-
MD5
6eac5894eb55b3b13c856bc6875f1682
-
SHA1
dd3668f5e5388c9634da9188126408e7d2632459
-
SHA256
4c02148972e6c9df5357b6c7956cae6436f8d25860324a14f969591a7dfe4923
-
SHA512
578f5cc66126c259b33fe0fda7d62b713e9c047bb8f2f4ae5b4bdbb84b9d3ef2b60570546bf6c907ddfdf90d54a8048736c218b4f33c40862a4b6dd56b1bb71f
-
SSDEEP
24576:zyiNYwFYNeSEEg94AI44tBl2KoXkAfL6rzxWK0i:GGYNVEEg9ruefLQZ
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k1722132.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k1722132.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k1722132.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k1722132.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k1722132.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k1722132.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023cc5-54.dat family_redline behavioral1/memory/1192-56-0x00000000005B0000-0x00000000005DA000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 3052 y2667804.exe 244 y6210539.exe 3912 k1722132.exe 1192 l4309069.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k1722132.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k1722132.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4c02148972e6c9df5357b6c7956cae6436f8d25860324a14f969591a7dfe4923.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y2667804.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y6210539.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4c02148972e6c9df5357b6c7956cae6436f8d25860324a14f969591a7dfe4923.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y2667804.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y6210539.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k1722132.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l4309069.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3912 k1722132.exe 3912 k1722132.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3912 k1722132.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1108 wrote to memory of 3052 1108 4c02148972e6c9df5357b6c7956cae6436f8d25860324a14f969591a7dfe4923.exe 83 PID 1108 wrote to memory of 3052 1108 4c02148972e6c9df5357b6c7956cae6436f8d25860324a14f969591a7dfe4923.exe 83 PID 1108 wrote to memory of 3052 1108 4c02148972e6c9df5357b6c7956cae6436f8d25860324a14f969591a7dfe4923.exe 83 PID 3052 wrote to memory of 244 3052 y2667804.exe 84 PID 3052 wrote to memory of 244 3052 y2667804.exe 84 PID 3052 wrote to memory of 244 3052 y2667804.exe 84 PID 244 wrote to memory of 3912 244 y6210539.exe 85 PID 244 wrote to memory of 3912 244 y6210539.exe 85 PID 244 wrote to memory of 3912 244 y6210539.exe 85 PID 244 wrote to memory of 1192 244 y6210539.exe 96 PID 244 wrote to memory of 1192 244 y6210539.exe 96 PID 244 wrote to memory of 1192 244 y6210539.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c02148972e6c9df5357b6c7956cae6436f8d25860324a14f969591a7dfe4923.exe"C:\Users\Admin\AppData\Local\Temp\4c02148972e6c9df5357b6c7956cae6436f8d25860324a14f969591a7dfe4923.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2667804.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2667804.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6210539.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6210539.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:244 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k1722132.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k1722132.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3912
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l4309069.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l4309069.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1192
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
748KB
MD560f0958862abd31ff790b3372541992b
SHA17846532d4a2febcbbfbae0328dc6d38be0873b3a
SHA2563af759c2f292e094c819ce0e2ff10e2a53d3a2ed242a752edb2781b918c76e68
SHA5121d0d058cee40b46bd8b7e74813e6de3ebb3e027bf0f3e504326350bc6b8c8245b785e70f815fab605dce63a4586a85a94a0195d22b6475c7825f182f564e9a36
-
Filesize
305KB
MD53c5216c9a7bf4bf047be62145778fce6
SHA1d42bd7dceaf09362b79d1976fec452d6ce46c1c6
SHA2563e65259040c03a940ad88247ff4b44828d43881e63ce936801c3ae06b0719633
SHA512ce0996051a4a8159dbf739548bf55d8cf9a79e257723e2bb1032fd646cfc4251bfe9856a1e8f2dbe6aaf9ac0b9780dcdc7bfec74bd3b12921edddd681b622ae6
-
Filesize
183KB
MD5d18dd7e957d8eab39abe21eefd498331
SHA12d7b11252dbb1ed8cefff8d63d447b0f697a0060
SHA25657f8f54609021997865fed724894ad76b78b39a48a51b47a1d97a92eb836c440
SHA512c383080be8f9fbb5fd313204cc47ca9ecca8b6148362aa5ef76c219217971184472d0c4be2f1d7e9c9fbee561079b34357346507ddb882d779b06741a5ad0581
-
Filesize
145KB
MD5afb94b51c2389bbed23878a30f698e89
SHA12dd8bbd6565aae5266320c971bb2492680bd64c5
SHA256876524fcbaab32aae8bacc5b26c9a32c1613385871aca46380429402d6ccbd80
SHA5128f95cbe9d44b237de2ebe44571af59f3bfaa22f5565b4ec2d7d828fc599f0853117c28ce82e44de8fb23b8eae808fa874a37e3306409308a357e78aa53786cc7