Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 07:24
Static task
static1
Behavioral task
behavioral1
Sample
0a219d81c1390fb28a01821873f7191e470d1dce57a352d84d9023f21b6ce2d6.exe
Resource
win10v2004-20241007-en
General
-
Target
0a219d81c1390fb28a01821873f7191e470d1dce57a352d84d9023f21b6ce2d6.exe
-
Size
1.1MB
-
MD5
29a60a73b71010c9370df68692f4b360
-
SHA1
d070590b17d00a08ed9a42bbd04ee0cfaa984f05
-
SHA256
0a219d81c1390fb28a01821873f7191e470d1dce57a352d84d9023f21b6ce2d6
-
SHA512
cb020a4e33fd599847b02074626d8bda848f95c3c770f99d5d97eecda1b64df2a1d645270543acc735382e4f08f47172f58a6048d6b801bfa1772eb61710ed90
-
SSDEEP
24576:Tyzt2ORC7Jr+Fk/p7pXyUp+TtL6aQVfjdBctqbXgKupamng:mh2O07V+FkBNMnQJjditqDgP
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k4871917.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k4871917.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k4871917.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k4871917.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k4871917.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k4871917.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023c6d-54.dat family_redline behavioral1/memory/4244-56-0x0000000000B10000-0x0000000000B3A000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 4068 y9927822.exe 3788 y6419641.exe 3212 k4871917.exe 4244 l9627298.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k4871917.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k4871917.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y6419641.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0a219d81c1390fb28a01821873f7191e470d1dce57a352d84d9023f21b6ce2d6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y9927822.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l9627298.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0a219d81c1390fb28a01821873f7191e470d1dce57a352d84d9023f21b6ce2d6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y9927822.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y6419641.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k4871917.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3212 k4871917.exe 3212 k4871917.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3212 k4871917.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3232 wrote to memory of 4068 3232 0a219d81c1390fb28a01821873f7191e470d1dce57a352d84d9023f21b6ce2d6.exe 83 PID 3232 wrote to memory of 4068 3232 0a219d81c1390fb28a01821873f7191e470d1dce57a352d84d9023f21b6ce2d6.exe 83 PID 3232 wrote to memory of 4068 3232 0a219d81c1390fb28a01821873f7191e470d1dce57a352d84d9023f21b6ce2d6.exe 83 PID 4068 wrote to memory of 3788 4068 y9927822.exe 85 PID 4068 wrote to memory of 3788 4068 y9927822.exe 85 PID 4068 wrote to memory of 3788 4068 y9927822.exe 85 PID 3788 wrote to memory of 3212 3788 y6419641.exe 86 PID 3788 wrote to memory of 3212 3788 y6419641.exe 86 PID 3788 wrote to memory of 3212 3788 y6419641.exe 86 PID 3788 wrote to memory of 4244 3788 y6419641.exe 96 PID 3788 wrote to memory of 4244 3788 y6419641.exe 96 PID 3788 wrote to memory of 4244 3788 y6419641.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a219d81c1390fb28a01821873f7191e470d1dce57a352d84d9023f21b6ce2d6.exe"C:\Users\Admin\AppData\Local\Temp\0a219d81c1390fb28a01821873f7191e470d1dce57a352d84d9023f21b6ce2d6.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9927822.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9927822.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6419641.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6419641.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k4871917.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k4871917.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3212
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l9627298.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l9627298.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4244
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
749KB
MD541fe9e162e8781ac220343775c9644e6
SHA113f87c9eb1e0ccd2870cacde99ffa70babf9ae1e
SHA25650a2f52e3dab66e55bede94d551f170f3b26c573052c4e404e84c5136da5b8dc
SHA512aef8b41e639a37cc0d5733e978ba1185a8061f01fc00fb31e4b4ec52f68b6e3379971a0e6d108470e6ce71cafcd2699ec709eb3f54da9d0f29d8f87ed27a76f3
-
Filesize
304KB
MD5a75c9ce0e9d290a2ebd1b3d6ae761396
SHA1ba870de6d38955f71ec872337dd149e7136c992b
SHA2561e58de3f4351d0ff087ae2a78ee7c615e6c53838baf181ebe0ce954db5dab333
SHA512a7eb1474065b67f9bfe590390502260b26ea4139a3c9e6b000a2acf6d9a36f9b77c53a8f65ee097f45e29d295a4c1607a5c5c7733a7a6bbeba74adb81168f419
-
Filesize
183KB
MD575df6a4aaf5c63bc4f42ac5ec8ecc76a
SHA18d9da11aa11364c1b580b12faa446403f527ff83
SHA256d1d13ff4eabb541a9cfc225beeb1c27d9cd85c8f9849e8d0fece0a4503c63f05
SHA51272d34a4770cf9885993630f04e83831f4ded666af58cb705c7b1ca4cd7ca95911dec7247e4987c64afc13fee10bcf94fc913bd9a7790edb65c75b01a89bbe8fe
-
Filesize
145KB
MD5ff0ebf9290afe62130e6a496fb58b809
SHA1fd1dc0de636323704deae99d06827a85b32fda2b
SHA256cfff5ae6e82cd7d7cbd287739aeff8579326e3c73b93dae382855678f38715d2
SHA512988c201a23ca06e2c147e869ee1038ea2e883d4a31d1207959e3cd91c1cb2eb948188a7804cc8eb016b29711e12971a83491dd1dc331def5c358fb70e828cc27