Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:17
Static task
static1
Behavioral task
behavioral1
Sample
b5e7eebe80e0f986a50e3a63872d5abb0338a1d08e3bd0ceea7c252dc4384ea2.exe
Resource
win10v2004-20241007-en
General
-
Target
b5e7eebe80e0f986a50e3a63872d5abb0338a1d08e3bd0ceea7c252dc4384ea2.exe
-
Size
770KB
-
MD5
201a26f05697f3523efd6d871b65601d
-
SHA1
c2e289166082fda4ca780fdcffbf7e6dcb169cd8
-
SHA256
b5e7eebe80e0f986a50e3a63872d5abb0338a1d08e3bd0ceea7c252dc4384ea2
-
SHA512
d694e6d10f3354781230766fa0d081dd954981c95b6b31afef9b6c11b1f4b3d46b72203bb91ba7d4c4e3a99d49ffdb3cc2aacd98df9cca49cc08d0f42be365bd
-
SSDEEP
12288:HMrMy90E+mezIh3d52auzb3yWnpPaiqWINSTRJLbgzA:nyB/e+eamby0CiSNSTx
Malware Config
Extracted
redline
mixa
185.161.248.75:4132
-
auth_value
9d14534b25ac495ab25b59800acf3bb2
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a6909561.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a6909561.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a6909561.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a6909561.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a6909561.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a6909561.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x000a000000023b8a-54.dat family_redline behavioral1/memory/2320-56-0x0000000000C00000-0x0000000000C2E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 4540 v3008565.exe 2140 v8997710.exe 3884 a6909561.exe 2320 b7156476.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a6909561.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a6909561.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b5e7eebe80e0f986a50e3a63872d5abb0338a1d08e3bd0ceea7c252dc4384ea2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v3008565.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v8997710.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v8997710.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a6909561.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b7156476.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b5e7eebe80e0f986a50e3a63872d5abb0338a1d08e3bd0ceea7c252dc4384ea2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v3008565.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3884 a6909561.exe 3884 a6909561.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3884 a6909561.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3116 wrote to memory of 4540 3116 b5e7eebe80e0f986a50e3a63872d5abb0338a1d08e3bd0ceea7c252dc4384ea2.exe 83 PID 3116 wrote to memory of 4540 3116 b5e7eebe80e0f986a50e3a63872d5abb0338a1d08e3bd0ceea7c252dc4384ea2.exe 83 PID 3116 wrote to memory of 4540 3116 b5e7eebe80e0f986a50e3a63872d5abb0338a1d08e3bd0ceea7c252dc4384ea2.exe 83 PID 4540 wrote to memory of 2140 4540 v3008565.exe 84 PID 4540 wrote to memory of 2140 4540 v3008565.exe 84 PID 4540 wrote to memory of 2140 4540 v3008565.exe 84 PID 2140 wrote to memory of 3884 2140 v8997710.exe 86 PID 2140 wrote to memory of 3884 2140 v8997710.exe 86 PID 2140 wrote to memory of 3884 2140 v8997710.exe 86 PID 2140 wrote to memory of 2320 2140 v8997710.exe 96 PID 2140 wrote to memory of 2320 2140 v8997710.exe 96 PID 2140 wrote to memory of 2320 2140 v8997710.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5e7eebe80e0f986a50e3a63872d5abb0338a1d08e3bd0ceea7c252dc4384ea2.exe"C:\Users\Admin\AppData\Local\Temp\b5e7eebe80e0f986a50e3a63872d5abb0338a1d08e3bd0ceea7c252dc4384ea2.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3008565.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3008565.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8997710.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8997710.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a6909561.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a6909561.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3884
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7156476.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7156476.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2320
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
488KB
MD53461e2e9bf9c457784d8bb2fcaf83cba
SHA196be99545a2f5e80bf218e63bf2dbb764be4b48a
SHA2562fccde63155d6871d900cb7db09a2d2ddb328177e80ed7ef93ed49cc6e788172
SHA5128bba6d7848f9b15dbdf17d5dc00039dddbc9d9078b018bb6dff9ff65d0079cc37c4c37ca3cb0d69321e79205056609776eb03f28747d35d6c6c7d18ad60997b0
-
Filesize
316KB
MD55f7104c2daf21a5d38c78caabb67a961
SHA171b971df5521e73693e2f1511a143cf6f7ba38dc
SHA2569a6aca66926812cdffc6ef9e26162aa55e356341c2e8a762adfe0f0b7451d260
SHA5126c18d0edb32a94f73bbd3c137c6df7112f942b5ae8add0cb0ff26dbf8916c9b8e30a6128f5b691cee5a4bbd001cdbee9a1de7f9f72b6625585ff184ab0ce6e17
-
Filesize
184KB
MD5d4c640fb500618ad6c9fc5fe7d3e784d
SHA1850df0880e1685ce709b44afbbb365cab4f0fec4
SHA256a511ae2083565f7f66afa9902f2d6aaa5bdf56c8a148609bfe949880a74ff44b
SHA512a28a51e937a11c9d72f7450b86469609d972a1e65c176bf92a47922eaf9cf72d3a49f0d40702f6f22bfd3f2c9f9e36edfefecdd263e1d49f3546f44d4817cecd
-
Filesize
168KB
MD5b78bd4049c09ad47d4c53611c3baac4f
SHA1f6abd37dce2fec4f25ffd6ce0ad12c8db4d8fbb3
SHA256eb2ffb839b323a1ac2b735fddd388eb6eb6423bdbd82831c193a5fdaaea691d9
SHA512a9c1636ba94f2952e7114505cb210130bb44f08d4bf6679d7ff88e4ebb137272338c38f5f2d1b9e7bc300d201bfb8927004700b5f3b6d4432470a0dc9d072961