Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:32
Static task
static1
Behavioral task
behavioral1
Sample
3f0e3605dace186bc1d64852888fadad95a0748fd6cccd82e19c0e2fed57e393.exe
Resource
win10v2004-20241007-en
General
-
Target
3f0e3605dace186bc1d64852888fadad95a0748fd6cccd82e19c0e2fed57e393.exe
-
Size
1.1MB
-
MD5
af9a6a1b60fabdb413d72279c8508cb1
-
SHA1
372ae4a3aed493de31f2524e456eacbc9501b213
-
SHA256
3f0e3605dace186bc1d64852888fadad95a0748fd6cccd82e19c0e2fed57e393
-
SHA512
01aaa9242fcce304e1005f88b6908136dfed0f782e67964b2d3ffa4353bddde5b992cdc7fa281c203a052669a0fb086afa54441721cebdf1dd9da4958f57eba4
-
SSDEEP
24576:iyHrwsUBFkBqTPRqlK8LiTISvk1NcZljNMhgVDzI:JL1UBFkBqrRgjLiTISvYWNmcz
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k4297828.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k4297828.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k4297828.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k4297828.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k4297828.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k4297828.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023cb7-54.dat family_redline behavioral1/memory/3192-56-0x00000000000A0000-0x00000000000CA000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 2328 y9652005.exe 612 y7700046.exe 3444 k4297828.exe 3192 l8603190.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k4297828.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k4297828.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3f0e3605dace186bc1d64852888fadad95a0748fd6cccd82e19c0e2fed57e393.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y9652005.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y7700046.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3184 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3f0e3605dace186bc1d64852888fadad95a0748fd6cccd82e19c0e2fed57e393.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y9652005.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y7700046.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k4297828.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l8603190.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3444 k4297828.exe 3444 k4297828.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3444 k4297828.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 100 wrote to memory of 2328 100 3f0e3605dace186bc1d64852888fadad95a0748fd6cccd82e19c0e2fed57e393.exe 83 PID 100 wrote to memory of 2328 100 3f0e3605dace186bc1d64852888fadad95a0748fd6cccd82e19c0e2fed57e393.exe 83 PID 100 wrote to memory of 2328 100 3f0e3605dace186bc1d64852888fadad95a0748fd6cccd82e19c0e2fed57e393.exe 83 PID 2328 wrote to memory of 612 2328 y9652005.exe 85 PID 2328 wrote to memory of 612 2328 y9652005.exe 85 PID 2328 wrote to memory of 612 2328 y9652005.exe 85 PID 612 wrote to memory of 3444 612 y7700046.exe 86 PID 612 wrote to memory of 3444 612 y7700046.exe 86 PID 612 wrote to memory of 3444 612 y7700046.exe 86 PID 612 wrote to memory of 3192 612 y7700046.exe 93 PID 612 wrote to memory of 3192 612 y7700046.exe 93 PID 612 wrote to memory of 3192 612 y7700046.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f0e3605dace186bc1d64852888fadad95a0748fd6cccd82e19c0e2fed57e393.exe"C:\Users\Admin\AppData\Local\Temp\3f0e3605dace186bc1d64852888fadad95a0748fd6cccd82e19c0e2fed57e393.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:100 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9652005.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9652005.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y7700046.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y7700046.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:612 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k4297828.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k4297828.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3444
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l8603190.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l8603190.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3192
-
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3184
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
749KB
MD587196c29bc8f64827ec575a277fcfe26
SHA17b5b909a4d4d94910621a3c25bf5a95aac2219cf
SHA2569f8dc95bb95272a2f5002ad09a004bdfc869e6daf52a63157ecbf0c170490c8d
SHA512476f12110c5b3cb04c4916bde8be75278b055f06d58383eb1d22dff63ab883fef21a6214cef8fc44e89a1eb89036405a1727a4cd0f8f12c8efd06e3909042789
-
Filesize
304KB
MD5938608a08fadb3b25a1c2946a6b37e72
SHA1f5c14daddaf541228cfc200dd67f452ddb194675
SHA256b8319127a2b4c082c59ff7b5d8039766ae350fab478e6cf26bf9d592e4a4e140
SHA51253fd6c30f1c3901b29bf4c3740e48d65345887dd6f71b3fb715f60895c5b4abc78f2b8718b1add2da86192745871b442d262f512a2b07a5aabdacc3360b4aa9f
-
Filesize
183KB
MD575df6a4aaf5c63bc4f42ac5ec8ecc76a
SHA18d9da11aa11364c1b580b12faa446403f527ff83
SHA256d1d13ff4eabb541a9cfc225beeb1c27d9cd85c8f9849e8d0fece0a4503c63f05
SHA51272d34a4770cf9885993630f04e83831f4ded666af58cb705c7b1ca4cd7ca95911dec7247e4987c64afc13fee10bcf94fc913bd9a7790edb65c75b01a89bbe8fe
-
Filesize
145KB
MD5cff8bde964f901d9f8c4d9697c2a5800
SHA16a3769ab098a979a4b338bd3652312a3f7308de1
SHA2569014187b073668018e115bec5f11709d0e7df3cccb520c3097d0b9cb420f9d9e
SHA512cc9652137b0caff6b70001149e937172f865e28c643506748ad24d7520dc2386476f35f45453ceafbb82daf9174d85e70d4af1849e5defdf9e0c48dcb8214af4