Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 05:25
Static task
static1
Behavioral task
behavioral1
Sample
d1963c0f85eed798b72d9646a93f3b3f1ca69ff14e054b317eb41b6fda5dbb8a.exe
Resource
win10v2004-20241007-en
General
-
Target
d1963c0f85eed798b72d9646a93f3b3f1ca69ff14e054b317eb41b6fda5dbb8a.exe
-
Size
1.1MB
-
MD5
b06f42c50b1a731741c4804e02d0796d
-
SHA1
1e0e90db4d232a432f99ffe7830662f3970044aa
-
SHA256
d1963c0f85eed798b72d9646a93f3b3f1ca69ff14e054b317eb41b6fda5dbb8a
-
SHA512
0f3fa4a9345ea741a0aecd73d9decfab4f71910035c416740a6c1288c54e3248be030c981b2f687d7879b26610889eea00b9591568c4e924842e5ee3e82b6b9b
-
SSDEEP
24576:GyjXXYMsxZZFkszKVH1+hG8fpSmTeVzlx+M1QnTF:VjXXMZFks6+Q0Qlx+L
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k8609419.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k8609419.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k8609419.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k8609419.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k8609419.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k8609419.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023bf8-54.dat family_redline behavioral1/memory/4536-56-0x0000000000F90000-0x0000000000FBA000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 3464 y1916598.exe 4384 y8509937.exe 212 k8609419.exe 4536 l5804859.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k8609419.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k8609419.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d1963c0f85eed798b72d9646a93f3b3f1ca69ff14e054b317eb41b6fda5dbb8a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y1916598.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y8509937.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y1916598.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y8509937.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k8609419.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l5804859.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d1963c0f85eed798b72d9646a93f3b3f1ca69ff14e054b317eb41b6fda5dbb8a.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 212 k8609419.exe 212 k8609419.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 212 k8609419.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4896 wrote to memory of 3464 4896 d1963c0f85eed798b72d9646a93f3b3f1ca69ff14e054b317eb41b6fda5dbb8a.exe 83 PID 4896 wrote to memory of 3464 4896 d1963c0f85eed798b72d9646a93f3b3f1ca69ff14e054b317eb41b6fda5dbb8a.exe 83 PID 4896 wrote to memory of 3464 4896 d1963c0f85eed798b72d9646a93f3b3f1ca69ff14e054b317eb41b6fda5dbb8a.exe 83 PID 3464 wrote to memory of 4384 3464 y1916598.exe 84 PID 3464 wrote to memory of 4384 3464 y1916598.exe 84 PID 3464 wrote to memory of 4384 3464 y1916598.exe 84 PID 4384 wrote to memory of 212 4384 y8509937.exe 86 PID 4384 wrote to memory of 212 4384 y8509937.exe 86 PID 4384 wrote to memory of 212 4384 y8509937.exe 86 PID 4384 wrote to memory of 4536 4384 y8509937.exe 97 PID 4384 wrote to memory of 4536 4384 y8509937.exe 97 PID 4384 wrote to memory of 4536 4384 y8509937.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1963c0f85eed798b72d9646a93f3b3f1ca69ff14e054b317eb41b6fda5dbb8a.exe"C:\Users\Admin\AppData\Local\Temp\d1963c0f85eed798b72d9646a93f3b3f1ca69ff14e054b317eb41b6fda5dbb8a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1916598.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1916598.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y8509937.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y8509937.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k8609419.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k8609419.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:212
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l5804859.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l5804859.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4536
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
749KB
MD5614c2237a2b3269b6e244f3174b56980
SHA1625fb8ef4537b8d399dc72eacc507ef774111cb9
SHA256144b35b00d6181510091e2ae25f2e26ef586b7fe0f3a2c050477640c63e520da
SHA512511dd2b0f07959807377c10f94136028f8cdac1ed0e2e097ca9e2aa8f41c344bd77f2b09da6a3038e89aefe4c6e1449d522f35ba3a561124a3fe7cfc9684752f
-
Filesize
304KB
MD5c04a959a519f17c33a3e1c5c84d0debd
SHA132f4c7c3dd5154646a4e1250cefcae1c5f283faf
SHA2567d466bb98375ffc657ca8566734d0275b32736f73b8b3952953f281de09ac7a1
SHA5120ad606b0d76bed152bfb21022e1d66af81223620837d495b47c2032c245d6471eeac9ab8eb522d8fe5b1eacf2bae8ccd5f50f98facbdbc61b9ee245c24f96f53
-
Filesize
183KB
MD575df6a4aaf5c63bc4f42ac5ec8ecc76a
SHA18d9da11aa11364c1b580b12faa446403f527ff83
SHA256d1d13ff4eabb541a9cfc225beeb1c27d9cd85c8f9849e8d0fece0a4503c63f05
SHA51272d34a4770cf9885993630f04e83831f4ded666af58cb705c7b1ca4cd7ca95911dec7247e4987c64afc13fee10bcf94fc913bd9a7790edb65c75b01a89bbe8fe
-
Filesize
145KB
MD5b9061cf3cabb8a1f3f42d7bcd4818b75
SHA1dbc877656056b66b2f63ef7d32376fb2fe5f1b88
SHA256e9dc4a31b6f949a64ef050d8da74f8e9c0cac5af592f636b8c61d1ef6e883af3
SHA5121de29d8863ee2618f02432c389574202d0fef1ea099c53a7136ba4d9e995f16720d2feadd814207fc295e121b402c2c6dee7523a94d273ab4a450ea1cf0f20e0