Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 01:01
Static task
static1
Behavioral task
behavioral1
Sample
f61e85b6e2580ab7ed1e7ecd1141d8ee531635513ba524cfaa54266c540b3261.exe
Resource
win10v2004-20241007-en
General
-
Target
f61e85b6e2580ab7ed1e7ecd1141d8ee531635513ba524cfaa54266c540b3261.exe
-
Size
875KB
-
MD5
72dff09113653c4f8785c7b0a3ae828a
-
SHA1
752dbf3ecca6600eda2da64eeff4478c3466153b
-
SHA256
f61e85b6e2580ab7ed1e7ecd1141d8ee531635513ba524cfaa54266c540b3261
-
SHA512
a0d740a63e5b1e1c532f45dc4f8d63147ca113c9cc0801df7b2e1d1ebde15559f853c94c155348c3ffb2beb157d3cf745d4f28c553ac0251d906cfa308338ba7
-
SSDEEP
24576:ryEyzdmXxNA+AeTXHS9BPM7ajY6DntxtZ:eE2dCxbLO0e
Malware Config
Extracted
redline
dimas
185.161.248.75:4132
-
auth_value
a5db9b1c53c704e612bccc93ccdb5539
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k1968914.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k1968914.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k1968914.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k1968914.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k1968914.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k1968914.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023c99-55.dat family_redline behavioral1/memory/1648-57-0x00000000001F0000-0x000000000021A000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 2724 y7890573.exe 2076 y6231208.exe 4768 k1968914.exe 1648 l2111893.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k1968914.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k1968914.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f61e85b6e2580ab7ed1e7ecd1141d8ee531635513ba524cfaa54266c540b3261.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y7890573.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y6231208.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y6231208.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k1968914.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l2111893.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f61e85b6e2580ab7ed1e7ecd1141d8ee531635513ba524cfaa54266c540b3261.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y7890573.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4768 k1968914.exe 4768 k1968914.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4768 k1968914.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4432 wrote to memory of 2724 4432 f61e85b6e2580ab7ed1e7ecd1141d8ee531635513ba524cfaa54266c540b3261.exe 83 PID 4432 wrote to memory of 2724 4432 f61e85b6e2580ab7ed1e7ecd1141d8ee531635513ba524cfaa54266c540b3261.exe 83 PID 4432 wrote to memory of 2724 4432 f61e85b6e2580ab7ed1e7ecd1141d8ee531635513ba524cfaa54266c540b3261.exe 83 PID 2724 wrote to memory of 2076 2724 y7890573.exe 84 PID 2724 wrote to memory of 2076 2724 y7890573.exe 84 PID 2724 wrote to memory of 2076 2724 y7890573.exe 84 PID 2076 wrote to memory of 4768 2076 y6231208.exe 85 PID 2076 wrote to memory of 4768 2076 y6231208.exe 85 PID 2076 wrote to memory of 4768 2076 y6231208.exe 85 PID 2076 wrote to memory of 1648 2076 y6231208.exe 102 PID 2076 wrote to memory of 1648 2076 y6231208.exe 102 PID 2076 wrote to memory of 1648 2076 y6231208.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\f61e85b6e2580ab7ed1e7ecd1141d8ee531635513ba524cfaa54266c540b3261.exe"C:\Users\Admin\AppData\Local\Temp\f61e85b6e2580ab7ed1e7ecd1141d8ee531635513ba524cfaa54266c540b3261.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7890573.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7890573.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6231208.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6231208.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k1968914.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k1968914.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4768
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l2111893.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l2111893.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1648
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
479KB
MD57e96ec9b4fa25c04586e45f0d0292db7
SHA12c9eaf7c47f931a3247c64b0f72bfe2eaf309a9e
SHA2564994eccebd65400d79f5dcd61e25f20e1dccf5968485ba650010be7b305853eb
SHA5129d70514b1d9fceee736c5a02abef097620587683084766f64b0060b5be4ac1305943153e7b354b4a02699a6f1af02879e6a6a22f6413f2c4f67111e309bec483
-
Filesize
307KB
MD56ed4e6ad2ccf3f34897c5f9156f95290
SHA1e5d7a902647e601818a525e2dd05dbe1465754b2
SHA25631f6af81ebd9572693a6e78bbce238eae5e3dae88ecb05ee50cb3dbf7cd6718b
SHA512d0521d851f2207992fd88c03a55c12ebeb79507e0973d5a3dc687e87bac2787e02a03cad7ec230383f353775606cbdca775f39c17d06a2c583b2606811878138
-
Filesize
185KB
MD53e630811e041742e84b8ea3e59c277d1
SHA18a9c6d88e0d8ce0bd9e03658fa832d238a5eccd1
SHA256960b92763e28e9b1ff62f7b8774351557c3abbf50adf9255ab5767b2851dd20b
SHA5128d8c4d270f3c4ed32a0dbd0d07e5bd67c8cee508870a8b0a814b17e3c6255e9439054b62cde1d9b293ac50ab37fc10c63cdeccb33f65e6197fd5e7327432685e
-
Filesize
145KB
MD5803a8ea545a6093d870153712ed2856e
SHA1229e5971324e302cabb1cd00ea80c7dd509b08d4
SHA2562684add532822480301014bb33ae0782e80b0b4a00286372adbe6356607818dd
SHA5128da7ad8420e01ad29d36b18ba22521c970f48ae35c193941b18d75b08d5da9e2836ad129b5cab676afda9f800d1593aabe56033a387f4830180494c56f0b8f6d