Analysis
-
max time kernel
116s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
07-02-2025 21:10
Static task
static1
Behavioral task
behavioral1
Sample
fa068feb8d5b0988ddba148457fb4a3db8139fa43b82725e3d8e14a5cc34be29.exe
Resource
win10v2004-20250207-en
General
-
Target
fa068feb8d5b0988ddba148457fb4a3db8139fa43b82725e3d8e14a5cc34be29.exe
-
Size
1.1MB
-
MD5
262b0ec07fe74a40449871fb9e4985d6
-
SHA1
e5b31608396e9ecef689dc3b62819b6e191888dd
-
SHA256
fa068feb8d5b0988ddba148457fb4a3db8139fa43b82725e3d8e14a5cc34be29
-
SHA512
8fadd261e18d57cae1ffc9c18eeadfd2a84093cb5ff20f2708fbbae297a790f6e4ada6fbf659fd58325b770793f4cb3d75c9d6856845da17772eab5046f8d928
-
SSDEEP
24576:ry/z5gO9Uuw8AdvXGxew1RErjZ/F0NpTx4XqEKo5p64cfgWbbk5/aW:eb5goUuh2GkljxF0NT4aED5p6DfgAQ3
Malware Config
Extracted
redline
muza
185.161.248.75:4132
-
auth_value
99f39e1ac98e0c0a729ab27594e72bc3
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" a7920945.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a7920945.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a7920945.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a7920945.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a7920945.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a7920945.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a7920945.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a7920945.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications a7920945.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" a7920945.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023e1f-54.dat family_redline behavioral1/memory/3024-56-0x0000000000A40000-0x0000000000A6A000-memory.dmp family_redline -
Redline family
-
Downloads MZ/PE file 1 IoCs
flow pid Process 33 5016 Process not Found -
Executes dropped EXE 4 IoCs
pid Process 1124 v2310932.exe 1800 v8057458.exe 3084 a7920945.exe 3024 b4662342.exe -
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a7920945.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a7920945.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fa068feb8d5b0988ddba148457fb4a3db8139fa43b82725e3d8e14a5cc34be29.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v2310932.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v8057458.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fa068feb8d5b0988ddba148457fb4a3db8139fa43b82725e3d8e14a5cc34be29.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v2310932.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v8057458.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a7920945.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b4662342.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1352 MicrosoftEdgeUpdate.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3084 a7920945.exe 3084 a7920945.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3084 a7920945.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2320 wrote to memory of 1124 2320 fa068feb8d5b0988ddba148457fb4a3db8139fa43b82725e3d8e14a5cc34be29.exe 86 PID 2320 wrote to memory of 1124 2320 fa068feb8d5b0988ddba148457fb4a3db8139fa43b82725e3d8e14a5cc34be29.exe 86 PID 2320 wrote to memory of 1124 2320 fa068feb8d5b0988ddba148457fb4a3db8139fa43b82725e3d8e14a5cc34be29.exe 86 PID 1124 wrote to memory of 1800 1124 v2310932.exe 89 PID 1124 wrote to memory of 1800 1124 v2310932.exe 89 PID 1124 wrote to memory of 1800 1124 v2310932.exe 89 PID 1800 wrote to memory of 3084 1800 v8057458.exe 90 PID 1800 wrote to memory of 3084 1800 v8057458.exe 90 PID 1800 wrote to memory of 3084 1800 v8057458.exe 90 PID 1800 wrote to memory of 3024 1800 v8057458.exe 92 PID 1800 wrote to memory of 3024 1800 v8057458.exe 92 PID 1800 wrote to memory of 3024 1800 v8057458.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa068feb8d5b0988ddba148457fb4a3db8139fa43b82725e3d8e14a5cc34be29.exe"C:\Users\Admin\AppData\Local\Temp\fa068feb8d5b0988ddba148457fb4a3db8139fa43b82725e3d8e14a5cc34be29.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2310932.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2310932.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8057458.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8057458.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a7920945.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a7920945.exe4⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3084
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4662342.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4662342.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3024
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7NkU5MjdEREQtQkZFOS00NzkwLThDNzYtQkJCMTA1NkY2RTgzfSIgdXNlcmlkPSJ7MkE4QUUxN0MtNUE0Ri00NjE1LUE1NDMtM0Y1NzZBOEJCRUY1fSIgaW5zdGFsbHNvdXJjZT0ibGltaXRlZCIgcmVxdWVzdGlkPSJ7QzgwREZFRDEtMUMwMS00N0NBLUI4QkItNUJBRTQwOTU1OEFEfSIgZGVkdXA9ImNyIiBkb21haW5qb2luZWQ9IjAiPjxodyBsb2dpY2FsX2NwdXM9IjIiIHBoeXNtZW1vcnk9IjQiIGRpc2tfdHlwZT0iMiIgc3NlPSIxIiBzc2UyPSIxIiBzc2UzPSIxIiBzc3NlMz0iMSIgc3NlNDE9IjEiIHNzZTQyPSIxIiBhdng9IjEiLz48b3MgcGxhdGZvcm09IndpbiIgdmVyc2lvbj0iMTAuMC4xOTA0MS4xMjg4IiBzcD0iIiBhcmNoPSJ4NjQiIHByb2R1Y3RfdHlwZT0iNDgiIGlzX3dpcD0iMCIgaXNfaW5fbG9ja2Rvd25fbW9kZT0iMCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiZxdW90O0UreGJBejZZNnNVMTI4OWJTNnFsNFZSTGJramZCVUdUTUpzanJIcjQ0aUk9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIxIiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDU4NjAiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODIxNjMwOTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MjU3NTk0NTM2Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:1352
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
750KB
MD584c0c013aff4270389cb93efe09959e5
SHA1d62fc2d218d6bf352aade5557d5276fe57ffc798
SHA2564cfdf811f8251494e758c0931dcf49db8935bd90778654fdacfc210966ea9923
SHA512269ac61a1cd8e7bdbbd40701e483496748b047a5978ca007d93dd626cfcc25caf5a6399994cd8a4634b3dc51941b81a73461dd02904260f3d725369882622cfe
-
Filesize
305KB
MD50a3ed645f02d4a0a95a1c0121ae6b23c
SHA168dec0414e4d0307e1e664afe0b3e591755243f1
SHA2561ac0036e420521da4363ee9c4c44e84fced826c6a50e170e9cf3236cc56ba6d7
SHA512392261956c849e50b7de7dfc25fc7770fc37b1b86b2079925c3a8d9f9c6a0b2e842987a7490f67dca1af1298f2796aa14fb9c24ecfaff7e68b3daa02c2b72ac5
-
Filesize
185KB
MD5eea08c3020ccd71273543603ad72730b
SHA1bde3cfbb61a90eea643d280250b5ea9af706062b
SHA2562514cf22259e3d2e32ea1203390e8539b007a627d6408b718ac0e448932b0ca6
SHA512d2dd005dcaca0d458f443ae589b0de87d482d5235a9019f4f58294a8172985284e67eea3216de2f43c93556e2553cd8993b501a134ab5e7aafb58de161e2f944
-
Filesize
145KB
MD537af27ee250e85b17b626f8f920f7e5a
SHA1ee2f2279deb157540aed7a0347c6b7512f6eda55
SHA2569909e23f91f3a0b2dd2945d720c2ed6294e9bb17c5730e43b520d241688acb9c
SHA51225b6fb85ecd5a13f7ae36ced3d4f64ebb4e5c5bf08ff021d61d8afb44ab4c8223fd153d0b81ba3fda2d31b21eeddfbe2af34f0e48415a116e2f02e1f1986ea76