Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
02-02-2025 04:58
Static task
static1
Behavioral task
behavioral1
Sample
8c212d1fd762e63304a3c53e7adcd7df9c50222584b46128960ba886e1487b15.exe
Resource
win10v2004-20250129-en
General
-
Target
8c212d1fd762e63304a3c53e7adcd7df9c50222584b46128960ba886e1487b15.exe
-
Size
305KB
-
MD5
5f295c2d28b79f7af20c0b9d3b69faba
-
SHA1
e4664e7b1a15dbd2778a4e50fce1c4f4642d4245
-
SHA256
8c212d1fd762e63304a3c53e7adcd7df9c50222584b46128960ba886e1487b15
-
SHA512
c76267a8371a8a4883306f7aec74d9f41b1ff1da18d257e7b10d2e7a6ad10f60c059385528e194cdbc7c16cdbf9a1d333d73260c72c349910b3bf3b105eee555
-
SSDEEP
6144:Kry+bnr+Up0yN90QE0B1o+MEtE/SxTi7KKJFAIkCoFdUdm:FMrky90+BgII3AIkCorim
Malware Config
Extracted
redline
messi
185.161.248.75:4132
-
auth_value
b602b28664bb738e322d37baab91db28
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" a0077282.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a0077282.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a0077282.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a0077282.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a0077282.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a0077282.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a0077282.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a0077282.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications a0077282.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" a0077282.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x000a000000023b4d-47.dat family_redline behavioral1/memory/312-49-0x00000000001C0000-0x00000000001EA000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 2 IoCs
pid Process 4536 a0077282.exe 312 b2456359.exe -
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a0077282.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a0077282.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8c212d1fd762e63304a3c53e7adcd7df9c50222584b46128960ba886e1487b15.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8c212d1fd762e63304a3c53e7adcd7df9c50222584b46128960ba886e1487b15.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a0077282.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b2456359.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4536 a0077282.exe 4536 a0077282.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4536 a0077282.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2468 wrote to memory of 4536 2468 8c212d1fd762e63304a3c53e7adcd7df9c50222584b46128960ba886e1487b15.exe 83 PID 2468 wrote to memory of 4536 2468 8c212d1fd762e63304a3c53e7adcd7df9c50222584b46128960ba886e1487b15.exe 83 PID 2468 wrote to memory of 4536 2468 8c212d1fd762e63304a3c53e7adcd7df9c50222584b46128960ba886e1487b15.exe 83 PID 2468 wrote to memory of 312 2468 8c212d1fd762e63304a3c53e7adcd7df9c50222584b46128960ba886e1487b15.exe 87 PID 2468 wrote to memory of 312 2468 8c212d1fd762e63304a3c53e7adcd7df9c50222584b46128960ba886e1487b15.exe 87 PID 2468 wrote to memory of 312 2468 8c212d1fd762e63304a3c53e7adcd7df9c50222584b46128960ba886e1487b15.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c212d1fd762e63304a3c53e7adcd7df9c50222584b46128960ba886e1487b15.exe"C:\Users\Admin\AppData\Local\Temp\8c212d1fd762e63304a3c53e7adcd7df9c50222584b46128960ba886e1487b15.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\a0077282.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\a0077282.exe2⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4536
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\b2456359.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\b2456359.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:312
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
183KB
MD58fadd62919608dc5671c1de49e9c46f1
SHA1c8123b7db62c87d2eb9ff7b561edb0c78860dd37
SHA25607558a4d92b5bf537b76748d70ce107eddaf148dcd9d253d90ce96bc1dfa6ead
SHA512da652f29195d71b825f25b63318a1b38dfbb623219dae668d6e48cea29e339f4f262b68e5301bcbec68b8a13b03e64d35d0a50f6fa15066aff84dcb689a35a8e
-
Filesize
145KB
MD5a22c56399dc7e160465d005171771d71
SHA166ad3d57a11898b36e0ecf8842655d28e787be3f
SHA256c02e72adaf80168474a952796351fe167e134cc0855d884df219cbb5e2e9a179
SHA5129578e7bdf4225c4eff554d3f8a19e5391965c12718369d59cfc3a55c1875b42b895f211d273ad7f7ef20266f2c117a578c9a139ec695d3d5f82df8cd72495f33