Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/11/2024, 02:30
Static task
static1
Behavioral task
behavioral1
Sample
6a3a0c7ebdf8b2c659cf22da296c4a8121e64123abc4f8383f2e6cccfe5c942e.exe
Resource
win10v2004-20241007-en
General
-
Target
6a3a0c7ebdf8b2c659cf22da296c4a8121e64123abc4f8383f2e6cccfe5c942e.exe
-
Size
772KB
-
MD5
723c46731434889ebf4131fc644b3a60
-
SHA1
47388a744e6c70213e53eab5a62cac414924f48f
-
SHA256
6a3a0c7ebdf8b2c659cf22da296c4a8121e64123abc4f8383f2e6cccfe5c942e
-
SHA512
1a3859b3e57dc41bdcda37a9a04fb6601e287b0e92c8d733ecd5aeda7bb24ef0b69572f920a657d0ab44d93a65003f21baf54fca98094a29e014ce716c79fc17
-
SSDEEP
24576:2yd7+PVlmm3JEvfqI7CerqbdTjNOPpiJOYb:FdiPSM6bqdTpOPpiv
Malware Config
Extracted
redline
misik
217.196.96.102:4132
-
auth_value
9133827666bc8f4b05339316460b08aa
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a3428185.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a3428185.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a3428185.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a3428185.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a3428185.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a3428185.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023ca8-54.dat family_redline behavioral1/memory/1648-56-0x0000000000D00000-0x0000000000D2E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 5104 v3674740.exe 2952 v7634471.exe 3508 a3428185.exe 1648 b6458812.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a3428185.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a3428185.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6a3a0c7ebdf8b2c659cf22da296c4a8121e64123abc4f8383f2e6cccfe5c942e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v3674740.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v7634471.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a3428185.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b6458812.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6a3a0c7ebdf8b2c659cf22da296c4a8121e64123abc4f8383f2e6cccfe5c942e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v3674740.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v7634471.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3508 a3428185.exe 3508 a3428185.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3508 a3428185.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2268 wrote to memory of 5104 2268 6a3a0c7ebdf8b2c659cf22da296c4a8121e64123abc4f8383f2e6cccfe5c942e.exe 83 PID 2268 wrote to memory of 5104 2268 6a3a0c7ebdf8b2c659cf22da296c4a8121e64123abc4f8383f2e6cccfe5c942e.exe 83 PID 2268 wrote to memory of 5104 2268 6a3a0c7ebdf8b2c659cf22da296c4a8121e64123abc4f8383f2e6cccfe5c942e.exe 83 PID 5104 wrote to memory of 2952 5104 v3674740.exe 84 PID 5104 wrote to memory of 2952 5104 v3674740.exe 84 PID 5104 wrote to memory of 2952 5104 v3674740.exe 84 PID 2952 wrote to memory of 3508 2952 v7634471.exe 86 PID 2952 wrote to memory of 3508 2952 v7634471.exe 86 PID 2952 wrote to memory of 3508 2952 v7634471.exe 86 PID 2952 wrote to memory of 1648 2952 v7634471.exe 95 PID 2952 wrote to memory of 1648 2952 v7634471.exe 95 PID 2952 wrote to memory of 1648 2952 v7634471.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a3a0c7ebdf8b2c659cf22da296c4a8121e64123abc4f8383f2e6cccfe5c942e.exe"C:\Users\Admin\AppData\Local\Temp\6a3a0c7ebdf8b2c659cf22da296c4a8121e64123abc4f8383f2e6cccfe5c942e.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3674740.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3674740.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7634471.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7634471.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a3428185.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a3428185.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3508
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b6458812.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b6458812.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1648
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
488KB
MD5d41a9e3d58078100d89f555423b17195
SHA13d2ea90eac44fbf413d051848bd7ede08e99322f
SHA256105c58ce985978fb5b665a7332477ab99ce81e2f0f85b03e820a5dcec062c32f
SHA5122409243479f7e08f941657212989cc658d513b799007d7b52e3932eac2a96df86eca3ee310c6940d256e3276310dc825e0e0cc42c42b162cfe128881aa83bba9
-
Filesize
316KB
MD5e30e685b5607f4845027aa17b6954273
SHA163e6823eb94431b80cf033d386edc5ac9a9755e8
SHA2561694e22f8c680c245b25fb624766a7b3850d3397bf9b19e5af2ce69d2ee2dcd3
SHA512765c22bca0ca6e72c05439eaf343edf74b2424970811059735210281a30a22457559beedc6d881dd5bdd1d8ce6527ee85a85454e79d0c716f1e20d3b27ce0cd2
-
Filesize
184KB
MD5849244ac726419050bf081eaf6ebca6b
SHA18baaeab5cf9ef3b78a498031f7973b7c521e8622
SHA256e1229b8110a795ff45acfaa373bafbfc089efb808aed4c29d047453e0e0cadf3
SHA512da63d7ee4efa93c9666347880bbc9311b4d794e0f975168641d12323e9976e23396b6e487e86abf45c6f59012a0d803fbbee44cc9ead804087ed5c1889723b45
-
Filesize
168KB
MD5f36e9cf6ae5de4bc91b754453e2f8bc5
SHA15c906fdb8beaa66084842863b56d89801f0a8a34
SHA2566211ac3c53952ec5c0ea48f96aaf02bbafc51920e157e35d06591f06a80e7b21
SHA5120e83c5fab97b80bf29f2f77752d05842e53303e80eda2ff45db7e1ce0229c0a23bb6aab1d3da16b5d44a2c394735720e4bc613f08f7ee01d3d7c4f2c4b852219