Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2024 18:06
Static task
static1
Behavioral task
behavioral1
Sample
c551a44b8006f79fc9e974a653618cc29408cb2da20f06b9477b1d44665bc8de.exe
Resource
win10v2004-20241007-en
General
-
Target
c551a44b8006f79fc9e974a653618cc29408cb2da20f06b9477b1d44665bc8de.exe
-
Size
770KB
-
MD5
f712ba8c4457a7b1f5b75b9eb66023a0
-
SHA1
4201554d45faab946cff8b5327d5b8491ef31cad
-
SHA256
c551a44b8006f79fc9e974a653618cc29408cb2da20f06b9477b1d44665bc8de
-
SHA512
112d97aebe90d4080df2f0a92785a342609a473b708e5ab8e3fc4e3dadab014e59d4b87ba0531678d11e495a914059d1c60a914c854e565f863da9e483dddc82
-
SSDEEP
24576:2ySrK08SNLXZRMlDVM0cWzor+s0muZ3Vv:FP0fNLpiV5XzoKsduZ3Z
Malware Config
Extracted
redline
mixa
185.161.248.75:4132
-
auth_value
9d14534b25ac495ab25b59800acf3bb2
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a2148909.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a2148909.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a2148909.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a2148909.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a2148909.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a2148909.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x000a000000023b81-54.dat family_redline behavioral1/memory/2748-56-0x0000000000A30000-0x0000000000A5E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 1260 v3560595.exe 3100 v4122372.exe 3668 a2148909.exe 2748 b3728096.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a2148909.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a2148909.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c551a44b8006f79fc9e974a653618cc29408cb2da20f06b9477b1d44665bc8de.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v3560595.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v4122372.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c551a44b8006f79fc9e974a653618cc29408cb2da20f06b9477b1d44665bc8de.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v3560595.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v4122372.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a2148909.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b3728096.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3668 a2148909.exe 3668 a2148909.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3668 a2148909.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4232 wrote to memory of 1260 4232 c551a44b8006f79fc9e974a653618cc29408cb2da20f06b9477b1d44665bc8de.exe 83 PID 4232 wrote to memory of 1260 4232 c551a44b8006f79fc9e974a653618cc29408cb2da20f06b9477b1d44665bc8de.exe 83 PID 4232 wrote to memory of 1260 4232 c551a44b8006f79fc9e974a653618cc29408cb2da20f06b9477b1d44665bc8de.exe 83 PID 1260 wrote to memory of 3100 1260 v3560595.exe 84 PID 1260 wrote to memory of 3100 1260 v3560595.exe 84 PID 1260 wrote to memory of 3100 1260 v3560595.exe 84 PID 3100 wrote to memory of 3668 3100 v4122372.exe 85 PID 3100 wrote to memory of 3668 3100 v4122372.exe 85 PID 3100 wrote to memory of 3668 3100 v4122372.exe 85 PID 3100 wrote to memory of 2748 3100 v4122372.exe 94 PID 3100 wrote to memory of 2748 3100 v4122372.exe 94 PID 3100 wrote to memory of 2748 3100 v4122372.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\c551a44b8006f79fc9e974a653618cc29408cb2da20f06b9477b1d44665bc8de.exe"C:\Users\Admin\AppData\Local\Temp\c551a44b8006f79fc9e974a653618cc29408cb2da20f06b9477b1d44665bc8de.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3560595.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3560595.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4122372.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4122372.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a2148909.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a2148909.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3668
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3728096.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3728096.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2748
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
488KB
MD56c83dccf7068c5e4823e2f3b6f909023
SHA1964b1d259fb408f4876fc6850117af14b7564ed5
SHA256ff1be372fd874893378538a2cb5bd3dd6d43bd1ee291ea8cc491091cf9010666
SHA512f1b09bcf5153e211a442333d1c040d835616ee022225a32ec5e1678df8edd67bf047f81893168d13caaffdd01d9bfce00b23f61effd8518b801b59ceec0a90de
-
Filesize
316KB
MD5b4bdc012fea5596aae2172c4e8f489bb
SHA1e5d7f7d5604321872aa2a93e7424482ee97bd905
SHA256de2b9236995c77b16ab4012a918178b75292e38536f266e67d011563cdf26ccb
SHA512cc49baeb0890e7e7e5eac58215cfa2c0d3e8436687ba6f176a40bb2af1d4ec28a4fc4201579f8d8d30e8fe11def52865f47f63335868544f88c3e9a409a1f15b
-
Filesize
185KB
MD5f0163b510cf2717a206039be22861d2c
SHA176a69295ea8aca57c550fd38c45a9d7d0c058618
SHA2562709065630f3ca2b27ed588d1dc5c6a045284ce16917f123ca1db257a6d1cb6c
SHA5126c8f3f56bd751f1e842bd5c45f60d0f6acbeeab6e5331d401f9bc9ce8ab3b6565c10f1eafc5cc0cc3ccdb24ee97aaa2a093d3d5df15ce00c62350745729df1e4
-
Filesize
168KB
MD5897f9dc9a025756215d04ff3437df610
SHA13ff245a31c220d02c179d9d8dd0945094d5ea512
SHA256d6d5f4bba03d23d90f211f9f442541f08a84b80d5b99ce67e0e971bda66ec084
SHA51239fe57d28711667b320c0a9c2393759d898e39813de581ad673900f3b36eff229cad963f73a84864c699b0322b67f96127c2eb726103137eb3402b3c3d491bbe