Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:32
Static task
static1
Behavioral task
behavioral1
Sample
2030d8cc51c7bff0d4873ce7734c61651354ccc30776caaf0dee704fb9e4caf1.exe
Resource
win10v2004-20241007-en
General
-
Target
2030d8cc51c7bff0d4873ce7734c61651354ccc30776caaf0dee704fb9e4caf1.exe
-
Size
488KB
-
MD5
7690760f675a39293bde075cd8738e88
-
SHA1
d36859a3b712246af9eac2ef14257afc6624b9e0
-
SHA256
2030d8cc51c7bff0d4873ce7734c61651354ccc30776caaf0dee704fb9e4caf1
-
SHA512
7083c43ce6e1bf4764b1e0fc1c580760ab440cbbf5f44151127f80fd826c6c7d9fabbe9b4399996c17759d713104463aa0390f3b6c41834c98174e25d11ac0e2
-
SSDEEP
12288:3Mrvy90+Q6xXneoW7JSo5Ksjze3UI+DeQRA:MyxeoWMo5hzoJ+DfA
Malware Config
Extracted
redline
mauga
217.196.96.102:4132
-
auth_value
36f5411cf117f54076fbbb9ea0631fee
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a1813235.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a1813235.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a1813235.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a1813235.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a1813235.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a1813235.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x000a000000023b8a-54.dat family_redline behavioral1/memory/4416-55-0x00000000005A0000-0x00000000005CE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3952 v7777742.exe 452 a1813235.exe 4416 b6882169.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a1813235.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a1813235.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2030d8cc51c7bff0d4873ce7734c61651354ccc30776caaf0dee704fb9e4caf1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v7777742.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2944 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1813235.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b6882169.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2030d8cc51c7bff0d4873ce7734c61651354ccc30776caaf0dee704fb9e4caf1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v7777742.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 452 a1813235.exe 452 a1813235.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 452 a1813235.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1908 wrote to memory of 3952 1908 2030d8cc51c7bff0d4873ce7734c61651354ccc30776caaf0dee704fb9e4caf1.exe 84 PID 1908 wrote to memory of 3952 1908 2030d8cc51c7bff0d4873ce7734c61651354ccc30776caaf0dee704fb9e4caf1.exe 84 PID 1908 wrote to memory of 3952 1908 2030d8cc51c7bff0d4873ce7734c61651354ccc30776caaf0dee704fb9e4caf1.exe 84 PID 3952 wrote to memory of 452 3952 v7777742.exe 85 PID 3952 wrote to memory of 452 3952 v7777742.exe 85 PID 3952 wrote to memory of 452 3952 v7777742.exe 85 PID 3952 wrote to memory of 4416 3952 v7777742.exe 92 PID 3952 wrote to memory of 4416 3952 v7777742.exe 92 PID 3952 wrote to memory of 4416 3952 v7777742.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\2030d8cc51c7bff0d4873ce7734c61651354ccc30776caaf0dee704fb9e4caf1.exe"C:\Users\Admin\AppData\Local\Temp\2030d8cc51c7bff0d4873ce7734c61651354ccc30776caaf0dee704fb9e4caf1.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7777742.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7777742.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a1813235.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a1813235.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:452
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b6882169.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b6882169.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4416
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2944
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
316KB
MD57500efff8eb557fdebb6cfa532eb5a43
SHA126a05e36b4bf2d5e80601c55a4c6ce6ab93ccfda
SHA25663f38cecde6257549adc1c9b4f40c38f3cf29c4da5f61b645c436ba386adcc41
SHA512217c4f6d9407274bd3eb26f6d962db2caad082e106cd9499c98b544e43613aa61f8d57657bab29ac4e9c06f451f406fe2e39ec9e8c72edf02e0a4717fb7abf3e
-
Filesize
184KB
MD5a4d82b44894c1659048238446bf83dd3
SHA1e52cfddd63d8ce121f33e61601e5f4d4a9c18b7f
SHA256d52e429938831e422716c4ae8ca2bef4923be76777ad2640e1ec0b0293e50af0
SHA51223416b09977da10f532eaa7a8db44051f1e8fff8612af47c442fbd1d28bee358b4580b22f8f0e29054bde680c640737e34617d5a7367a93acc787f0bc1264fa3
-
Filesize
168KB
MD5a6faaa03e65634c81b318703e8bb402d
SHA1e4d58290b523e428b3462e95393c568b92fc4660
SHA256965deacca3407dc644e48212c1f9e7d7e6a9941257c62eb78365cc45788b0eea
SHA5127679f6ace9570fad45636ea53fe77374663b9bb4709482d5cdab703eb5e7be9c14c027c5a5511177626f7c46f61fd3df8ee931490eb4302c7314c14fb9a9b2ec