Analysis
-
max time kernel
116s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
01-02-2025 23:17
Static task
static1
Behavioral task
behavioral1
Sample
664ac4c9ff82d8d92a4db78ad4e561275f0f8e4cfc64b2240896ebaef5ff27c2N.exe
Resource
win10v2004-20250129-en
General
-
Target
664ac4c9ff82d8d92a4db78ad4e561275f0f8e4cfc64b2240896ebaef5ff27c2N.exe
-
Size
305KB
-
MD5
021f8fd16d8adc206e585df6bb6ad0c0
-
SHA1
bca4a533e484080e2078293c4f444fbd689cc074
-
SHA256
664ac4c9ff82d8d92a4db78ad4e561275f0f8e4cfc64b2240896ebaef5ff27c2
-
SHA512
7e438c50a21de440fc819c59745e3896f27331afc8a752df5a7fa37a90f9f2bdf40341f65a7872af06441d01d0beed295cf53dc417b2b85b5f950ddac0b19717
-
SSDEEP
6144:Kry+bnr+Up0yN90QE0B1o+MEtE/SxTi7KKJFAIkCoFdUd:FMrky90+BgII3AIkCori
Malware Config
Extracted
redline
messi
185.161.248.75:4132
-
auth_value
b602b28664bb738e322d37baab91db28
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" a0077282.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a0077282.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a0077282.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a0077282.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a0077282.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a0077282.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a0077282.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a0077282.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications a0077282.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" a0077282.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023c8c-47.dat family_redline behavioral1/memory/3212-50-0x0000000000600000-0x000000000062A000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 2 IoCs
pid Process 2908 a0077282.exe 3212 b2456359.exe -
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a0077282.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a0077282.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 664ac4c9ff82d8d92a4db78ad4e561275f0f8e4cfc64b2240896ebaef5ff27c2N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b2456359.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 664ac4c9ff82d8d92a4db78ad4e561275f0f8e4cfc64b2240896ebaef5ff27c2N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a0077282.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2908 a0077282.exe 2908 a0077282.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2908 a0077282.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4220 wrote to memory of 2908 4220 664ac4c9ff82d8d92a4db78ad4e561275f0f8e4cfc64b2240896ebaef5ff27c2N.exe 86 PID 4220 wrote to memory of 2908 4220 664ac4c9ff82d8d92a4db78ad4e561275f0f8e4cfc64b2240896ebaef5ff27c2N.exe 86 PID 4220 wrote to memory of 2908 4220 664ac4c9ff82d8d92a4db78ad4e561275f0f8e4cfc64b2240896ebaef5ff27c2N.exe 86 PID 4220 wrote to memory of 3212 4220 664ac4c9ff82d8d92a4db78ad4e561275f0f8e4cfc64b2240896ebaef5ff27c2N.exe 87 PID 4220 wrote to memory of 3212 4220 664ac4c9ff82d8d92a4db78ad4e561275f0f8e4cfc64b2240896ebaef5ff27c2N.exe 87 PID 4220 wrote to memory of 3212 4220 664ac4c9ff82d8d92a4db78ad4e561275f0f8e4cfc64b2240896ebaef5ff27c2N.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\664ac4c9ff82d8d92a4db78ad4e561275f0f8e4cfc64b2240896ebaef5ff27c2N.exe"C:\Users\Admin\AppData\Local\Temp\664ac4c9ff82d8d92a4db78ad4e561275f0f8e4cfc64b2240896ebaef5ff27c2N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\a0077282.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\a0077282.exe2⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2908
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\b2456359.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\b2456359.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3212
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
183KB
MD58fadd62919608dc5671c1de49e9c46f1
SHA1c8123b7db62c87d2eb9ff7b561edb0c78860dd37
SHA25607558a4d92b5bf537b76748d70ce107eddaf148dcd9d253d90ce96bc1dfa6ead
SHA512da652f29195d71b825f25b63318a1b38dfbb623219dae668d6e48cea29e339f4f262b68e5301bcbec68b8a13b03e64d35d0a50f6fa15066aff84dcb689a35a8e
-
Filesize
145KB
MD5a22c56399dc7e160465d005171771d71
SHA166ad3d57a11898b36e0ecf8842655d28e787be3f
SHA256c02e72adaf80168474a952796351fe167e134cc0855d884df219cbb5e2e9a179
SHA5129578e7bdf4225c4eff554d3f8a19e5391965c12718369d59cfc3a55c1875b42b895f211d273ad7f7ef20266f2c117a578c9a139ec695d3d5f82df8cd72495f33