Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/11/2024, 02:37
Static task
static1
Behavioral task
behavioral1
Sample
5fc6ca1cf97e1b777cd1e3ee9f32fb41d22bba80bc52c6f03c01eb0004ec4d73.exe
Resource
win10v2004-20241007-en
General
-
Target
5fc6ca1cf97e1b777cd1e3ee9f32fb41d22bba80bc52c6f03c01eb0004ec4d73.exe
-
Size
873KB
-
MD5
082c7c942c1f3643dac175b9ff966984
-
SHA1
a8dc1675219ade3f81632fc157d9d4c2c55d3190
-
SHA256
5fc6ca1cf97e1b777cd1e3ee9f32fb41d22bba80bc52c6f03c01eb0004ec4d73
-
SHA512
93f932d4e102897df36e180ce30ce717184351e69b3fa5639a6870ca4c7df7fde1943f95de1ba1a4f010562614b607436f195e1201827c8f62845771c5d24283
-
SSDEEP
24576:5yBgGooUeTk2Ysi9aAvCAIo17eG29Alri:smG5UeAsh8IoVeGOY
Malware Config
Extracted
redline
mixer
185.161.248.75:4132
-
auth_value
3668eba4f0cb1021a9e9ed55e76ed85e
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a8541407.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a8541407.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a8541407.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a8541407.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a8541407.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a8541407.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023c69-54.dat family_redline behavioral1/memory/2924-56-0x0000000000E70000-0x0000000000E9A000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 2432 v3258603.exe 2988 v1613377.exe 1220 a8541407.exe 2924 b7026833.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a8541407.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a8541407.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5fc6ca1cf97e1b777cd1e3ee9f32fb41d22bba80bc52c6f03c01eb0004ec4d73.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v3258603.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v1613377.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5fc6ca1cf97e1b777cd1e3ee9f32fb41d22bba80bc52c6f03c01eb0004ec4d73.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v3258603.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v1613377.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a8541407.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b7026833.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1220 a8541407.exe 1220 a8541407.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1220 a8541407.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2432 2040 5fc6ca1cf97e1b777cd1e3ee9f32fb41d22bba80bc52c6f03c01eb0004ec4d73.exe 85 PID 2040 wrote to memory of 2432 2040 5fc6ca1cf97e1b777cd1e3ee9f32fb41d22bba80bc52c6f03c01eb0004ec4d73.exe 85 PID 2040 wrote to memory of 2432 2040 5fc6ca1cf97e1b777cd1e3ee9f32fb41d22bba80bc52c6f03c01eb0004ec4d73.exe 85 PID 2432 wrote to memory of 2988 2432 v3258603.exe 86 PID 2432 wrote to memory of 2988 2432 v3258603.exe 86 PID 2432 wrote to memory of 2988 2432 v3258603.exe 86 PID 2988 wrote to memory of 1220 2988 v1613377.exe 88 PID 2988 wrote to memory of 1220 2988 v1613377.exe 88 PID 2988 wrote to memory of 1220 2988 v1613377.exe 88 PID 2988 wrote to memory of 2924 2988 v1613377.exe 94 PID 2988 wrote to memory of 2924 2988 v1613377.exe 94 PID 2988 wrote to memory of 2924 2988 v1613377.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\5fc6ca1cf97e1b777cd1e3ee9f32fb41d22bba80bc52c6f03c01eb0004ec4d73.exe"C:\Users\Admin\AppData\Local\Temp\5fc6ca1cf97e1b777cd1e3ee9f32fb41d22bba80bc52c6f03c01eb0004ec4d73.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3258603.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3258603.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1613377.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1613377.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a8541407.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a8541407.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1220
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7026833.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7026833.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2924
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
477KB
MD5e8694197ef769e29a786f2dadcd09954
SHA1ffb352b884ffcb57501343d429e5edc4dc2001f6
SHA2567fb6e2550d7471d4b84a6eb4ba454be1116a43b5c251861093bfe035880c7bb2
SHA512fcd6724de7f0607a073559d967944b8cf34e9e60b574077274e13696e1c59e1c1127dfb5ad82b7bab943fd686879b3993c71c67ccafd9235aa15da8329ecb547
-
Filesize
306KB
MD525c0186a75d113ced2a4c25d30dd25df
SHA187ad6c553d7127df7d6deb17358413f0af9d5225
SHA256ad828d172697850a4001f4200920bf6cd5d6c4a777e42958eb594da3a0bbd6fd
SHA512ee80cb88121df035e9124ef10a941bcb7f4305290e77b73bfd3dd45a048f729d5385975d069028e4b0b7c74e852b5dd5567aeec32bf812ed968cb66107be107b
-
Filesize
184KB
MD5d4c640fb500618ad6c9fc5fe7d3e784d
SHA1850df0880e1685ce709b44afbbb365cab4f0fec4
SHA256a511ae2083565f7f66afa9902f2d6aaa5bdf56c8a148609bfe949880a74ff44b
SHA512a28a51e937a11c9d72f7450b86469609d972a1e65c176bf92a47922eaf9cf72d3a49f0d40702f6f22bfd3f2c9f9e36edfefecdd263e1d49f3546f44d4817cecd
-
Filesize
145KB
MD585a564c9c7ae51b8f0c7d9e8b556ede5
SHA12f76fd3d45c946f42569a5996945ef4422dc97ec
SHA256e815557ba4bc8adfb265999369ca70bfd318aca10f6417c1d107965b347822fd
SHA5128f11a3e79cee6ebf29080a95549d223252274e49e3cfc294071b4e7bce32da4843684cb308318a91f4e3eaecd01e72be7e9040d47a5fad1a3d33c7a87e1bc498