Analysis
-
max time kernel
116s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
08-02-2025 00:19
Static task
static1
Behavioral task
behavioral1
Sample
807d3d0819b6de19ae75c283cea664d8f8668e26992a66f152750cb4006faf59N.exe
Resource
win10v2004-20250207-en
General
-
Target
807d3d0819b6de19ae75c283cea664d8f8668e26992a66f152750cb4006faf59N.exe
-
Size
305KB
-
MD5
5c24587733cc0d4f5c3678f1c0d33270
-
SHA1
ccbf39baf7d376cb8034835e863167b2368b598d
-
SHA256
807d3d0819b6de19ae75c283cea664d8f8668e26992a66f152750cb4006faf59
-
SHA512
811e983bfcc299e0967b7121e97fb8cbbf3f7ebf7952dc2b04cd832dfc420db9c0619084f53c1434f1ff8a34a81a5c50bba05e04fb716ee9f4e16406d812715d
-
SSDEEP
6144:KNy+bnr+Qp0yN90QENBc1K9QBiwyhULM/0/J/uClXItQi98e7kXuzz/K:vMrIy90nq1WQB+i/B/lYtMmK
Malware Config
Extracted
redline
muza
185.161.248.75:4132
-
auth_value
99f39e1ac98e0c0a729ab27594e72bc3
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" a5678607.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a5678607.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a5678607.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a5678607.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a5678607.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a5678607.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a5678607.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a5678607.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications a5678607.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" a5678607.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023e07-47.dat family_redline behavioral1/memory/2580-50-0x00000000009A0000-0x00000000009CA000-memory.dmp family_redline -
Redline family
-
Downloads MZ/PE file 1 IoCs
flow pid Process 31 1928 Process not Found -
Executes dropped EXE 2 IoCs
pid Process 3540 a5678607.exe 2580 b7265291.exe -
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a5678607.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a5678607.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 807d3d0819b6de19ae75c283cea664d8f8668e26992a66f152750cb4006faf59N.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 807d3d0819b6de19ae75c283cea664d8f8668e26992a66f152750cb4006faf59N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a5678607.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b7265291.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4408 MicrosoftEdgeUpdate.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3540 a5678607.exe 3540 a5678607.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3540 a5678607.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4900 wrote to memory of 3540 4900 807d3d0819b6de19ae75c283cea664d8f8668e26992a66f152750cb4006faf59N.exe 86 PID 4900 wrote to memory of 3540 4900 807d3d0819b6de19ae75c283cea664d8f8668e26992a66f152750cb4006faf59N.exe 86 PID 4900 wrote to memory of 3540 4900 807d3d0819b6de19ae75c283cea664d8f8668e26992a66f152750cb4006faf59N.exe 86 PID 4900 wrote to memory of 2580 4900 807d3d0819b6de19ae75c283cea664d8f8668e26992a66f152750cb4006faf59N.exe 90 PID 4900 wrote to memory of 2580 4900 807d3d0819b6de19ae75c283cea664d8f8668e26992a66f152750cb4006faf59N.exe 90 PID 4900 wrote to memory of 2580 4900 807d3d0819b6de19ae75c283cea664d8f8668e26992a66f152750cb4006faf59N.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\807d3d0819b6de19ae75c283cea664d8f8668e26992a66f152750cb4006faf59N.exe"C:\Users\Admin\AppData\Local\Temp\807d3d0819b6de19ae75c283cea664d8f8668e26992a66f152750cb4006faf59N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\a5678607.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\a5678607.exe2⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3540
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\b7265291.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\b7265291.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2580
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIxIiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDU5ODUiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODQ0NDQzNjAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI0OTExMTIxMDIzIi8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:4408
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
185KB
MD5d35dd01de0b97ea05b1e9b08d32c5e0c
SHA11b0c8df17eaa12c00be520147a81881372f32718
SHA256ce9bc8132dbcb980ee7abf4b676526e06d6df9fcb75ef2f638eba0064705d2ac
SHA512d484bc261243ea11ee0b33f0ed7ab58da5e4510b85222d26bf9a70a975a2d9864c6808115e370dc2569a60532c329d47025144b2210013ece331f870cf025dd7
-
Filesize
145KB
MD5ef64d773363e66abc7f5dabf1b36d8c4
SHA1a13c83d215983928b29a096a369380b2dc24a3f9
SHA2563db09dcf0e953608cd9ab2d35ce6a1c4d28bb48957f27a6a661aa092f0133642
SHA5122dd14ebb4ba5d46ff16e848cebcb414c5d7317412b197004776310e7b25bbb6c8a7415262ed883d5927e6b58c629bf43f5278fd4272bc3222fab859ba83ebba5