Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
08/02/2023, 10:51
Static task
static1
Behavioral task
behavioral1
Sample
8cb3607e7d8cea891f42eedddc06fbe0fed83ab86da022627d788a787a459fbe.exe
Resource
win10-20220812-en
General
-
Target
8cb3607e7d8cea891f42eedddc06fbe0fed83ab86da022627d788a787a459fbe.exe
-
Size
1024KB
-
MD5
dce411f878afe79c6a905ff4e7e94f9f
-
SHA1
0b166e6e8e3960ab693c1bb5a80a89064fefd6fb
-
SHA256
8cb3607e7d8cea891f42eedddc06fbe0fed83ab86da022627d788a787a459fbe
-
SHA512
2c5dd6525d1a93a4c8673fa86e76e69be85f693aaa9d170a56925da87a4a79db541254254980a269b61f5aa9cf5c733e21e82e84178b1998a77a41d5786735d0
-
SSDEEP
12288:QMr4y90dgDVyKdvSuWOx6FeJ9csSBx/zKgnEax7DQG82IqoKYWscUM+WxUaRtOLf:4yi+jSOke92HzKngc+vj+ypcLXrv
Malware Config
Extracted
redline
roma
193.233.20.7:4131
-
auth_value
f099c2cf92834dbc554a94e1456cf576
Extracted
redline
crypt
176.113.115.17:4132
-
auth_value
407e05c9b3a74d99a20f90b091547bd6
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" adWf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" adWf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" adWf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" adWf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" adWf.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/4160-340-0x0000000002590000-0x00000000025D6000-memory.dmp family_redline behavioral1/memory/4160-345-0x0000000004A60000-0x0000000004AA4000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 1456 dNPh.exe 2348 adWf.exe 4160 bNPg.exe 492 cNPm.exe 2368 bqEf.exe 3560 necr.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features adWf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" adWf.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8cb3607e7d8cea891f42eedddc06fbe0fed83ab86da022627d788a787a459fbe.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dNPh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" dNPh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce cNPm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" cNPm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 8cb3607e7d8cea891f42eedddc06fbe0fed83ab86da022627d788a787a459fbe.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3560 set thread context of 1924 3560 necr.exe 76 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2348 adWf.exe 2348 adWf.exe 4160 bNPg.exe 4160 bNPg.exe 2368 bqEf.exe 2368 bqEf.exe 1924 AppLaunch.exe 1924 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2348 adWf.exe Token: SeDebugPrivilege 4160 bNPg.exe Token: SeDebugPrivilege 2368 bqEf.exe Token: SeDebugPrivilege 1924 AppLaunch.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 3520 wrote to memory of 1456 3520 8cb3607e7d8cea891f42eedddc06fbe0fed83ab86da022627d788a787a459fbe.exe 67 PID 3520 wrote to memory of 1456 3520 8cb3607e7d8cea891f42eedddc06fbe0fed83ab86da022627d788a787a459fbe.exe 67 PID 3520 wrote to memory of 1456 3520 8cb3607e7d8cea891f42eedddc06fbe0fed83ab86da022627d788a787a459fbe.exe 67 PID 1456 wrote to memory of 2348 1456 dNPh.exe 68 PID 1456 wrote to memory of 2348 1456 dNPh.exe 68 PID 1456 wrote to memory of 2348 1456 dNPh.exe 68 PID 1456 wrote to memory of 4160 1456 dNPh.exe 69 PID 1456 wrote to memory of 4160 1456 dNPh.exe 69 PID 1456 wrote to memory of 4160 1456 dNPh.exe 69 PID 3520 wrote to memory of 492 3520 8cb3607e7d8cea891f42eedddc06fbe0fed83ab86da022627d788a787a459fbe.exe 71 PID 3520 wrote to memory of 492 3520 8cb3607e7d8cea891f42eedddc06fbe0fed83ab86da022627d788a787a459fbe.exe 71 PID 3520 wrote to memory of 492 3520 8cb3607e7d8cea891f42eedddc06fbe0fed83ab86da022627d788a787a459fbe.exe 71 PID 492 wrote to memory of 2368 492 cNPm.exe 72 PID 492 wrote to memory of 2368 492 cNPm.exe 72 PID 492 wrote to memory of 2368 492 cNPm.exe 72 PID 492 wrote to memory of 3560 492 cNPm.exe 74 PID 492 wrote to memory of 3560 492 cNPm.exe 74 PID 492 wrote to memory of 3560 492 cNPm.exe 74 PID 3560 wrote to memory of 1924 3560 necr.exe 76 PID 3560 wrote to memory of 1924 3560 necr.exe 76 PID 3560 wrote to memory of 1924 3560 necr.exe 76 PID 3560 wrote to memory of 1924 3560 necr.exe 76 PID 3560 wrote to memory of 1924 3560 necr.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\8cb3607e7d8cea891f42eedddc06fbe0fed83ab86da022627d788a787a459fbe.exe"C:\Users\Admin\AppData\Local\Temp\8cb3607e7d8cea891f42eedddc06fbe0fed83ab86da022627d788a787a459fbe.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dNPh.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dNPh.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\adWf.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\adWf.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2348
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bNPg.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bNPg.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4160
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cNPm.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cNPm.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:492 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bqEf.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bqEf.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2368
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\necr.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\necr.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1924
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
563KB
MD5b8bff4138b049340cd84cfff9703c10b
SHA126fc0199428e29af2e49c009ce0c28f2adb107ad
SHA256dd434f8af5ef7a4faabbca6e633992d2d9f91af9ebdc3ca4690bbce5c3ba2cec
SHA512081e2651d236b25f417b5cb9e7e0a7f069ee432c610fb9fcfb82329148b97b4fb4a48fa48a3dcb6afc2e574719e9f1d0f5100735698d9cda0eaba2df3f096f74
-
Filesize
563KB
MD5b8bff4138b049340cd84cfff9703c10b
SHA126fc0199428e29af2e49c009ce0c28f2adb107ad
SHA256dd434f8af5ef7a4faabbca6e633992d2d9f91af9ebdc3ca4690bbce5c3ba2cec
SHA512081e2651d236b25f417b5cb9e7e0a7f069ee432c610fb9fcfb82329148b97b4fb4a48fa48a3dcb6afc2e574719e9f1d0f5100735698d9cda0eaba2df3f096f74
-
Filesize
574KB
MD525cd7c7087d4921e011fd6d2e8b7542a
SHA1ed3eeeab34fd2fb40ae2d1a7fe42e14da26949d1
SHA2561d3ef8acfc5653f064d4d926f0385b2199590d313c9b90d36cb8113f1e348189
SHA512f88fb60bb21ad36bcdeb7cbc24ee844578879da4199d06a1b7a0e6a403837698d2a6c9bc09d1f917e91433f2b660cfe60d814a27223bdd2edbdb1f2dcbfab94f
-
Filesize
574KB
MD525cd7c7087d4921e011fd6d2e8b7542a
SHA1ed3eeeab34fd2fb40ae2d1a7fe42e14da26949d1
SHA2561d3ef8acfc5653f064d4d926f0385b2199590d313c9b90d36cb8113f1e348189
SHA512f88fb60bb21ad36bcdeb7cbc24ee844578879da4199d06a1b7a0e6a403837698d2a6c9bc09d1f917e91433f2b660cfe60d814a27223bdd2edbdb1f2dcbfab94f
-
Filesize
355KB
MD5680e0da94ffa2c8e9bf5e3d8c0a7e037
SHA1c92f95c14c05b174a1b4d008a10bae81223eb2ee
SHA2566763ad9d9ca7bab99bccc9cf7cd753b573d2c88a0024c5ab358432e0b0072820
SHA5124eb812eeb16cd20752ff8780a703837937f33b7c4cf6fab212cec3720e22bd16eec162e99482c98dbed685317f901b39943156798740ec90052cbdb22ce68b29
-
Filesize
355KB
MD5680e0da94ffa2c8e9bf5e3d8c0a7e037
SHA1c92f95c14c05b174a1b4d008a10bae81223eb2ee
SHA2566763ad9d9ca7bab99bccc9cf7cd753b573d2c88a0024c5ab358432e0b0072820
SHA5124eb812eeb16cd20752ff8780a703837937f33b7c4cf6fab212cec3720e22bd16eec162e99482c98dbed685317f901b39943156798740ec90052cbdb22ce68b29
-
Filesize
414KB
MD5dc4cb11b49fe018c85ad7dbd0eb00a8d
SHA1395243a4fa695c34e8a6781305aaad5205f1f410
SHA2561037ae3260a6fd78c9f1346ac43bf2928ba12207a6686730395cdedec6c13fc7
SHA512539daace3bad97f415be50cc8f5248e2e794bdfeffd8b0c208149d74fa6aa447a48ea2a9b14a362fb54fec2d9e1dca3cb579ae81aa0520f4106e6efd20aff5db
-
Filesize
414KB
MD5dc4cb11b49fe018c85ad7dbd0eb00a8d
SHA1395243a4fa695c34e8a6781305aaad5205f1f410
SHA2561037ae3260a6fd78c9f1346ac43bf2928ba12207a6686730395cdedec6c13fc7
SHA512539daace3bad97f415be50cc8f5248e2e794bdfeffd8b0c208149d74fa6aa447a48ea2a9b14a362fb54fec2d9e1dca3cb579ae81aa0520f4106e6efd20aff5db
-
Filesize
414KB
MD5dc4cb11b49fe018c85ad7dbd0eb00a8d
SHA1395243a4fa695c34e8a6781305aaad5205f1f410
SHA2561037ae3260a6fd78c9f1346ac43bf2928ba12207a6686730395cdedec6c13fc7
SHA512539daace3bad97f415be50cc8f5248e2e794bdfeffd8b0c208149d74fa6aa447a48ea2a9b14a362fb54fec2d9e1dca3cb579ae81aa0520f4106e6efd20aff5db
-
Filesize
414KB
MD5dc4cb11b49fe018c85ad7dbd0eb00a8d
SHA1395243a4fa695c34e8a6781305aaad5205f1f410
SHA2561037ae3260a6fd78c9f1346ac43bf2928ba12207a6686730395cdedec6c13fc7
SHA512539daace3bad97f415be50cc8f5248e2e794bdfeffd8b0c208149d74fa6aa447a48ea2a9b14a362fb54fec2d9e1dca3cb579ae81aa0520f4106e6efd20aff5db
-
Filesize
283KB
MD5457dcca2cfa8e1592521e4bc580d2097
SHA1de855fa7934126fd1cde834b752999ebe79e367f
SHA25654ce28a037eea87448e65bc25f8d3a38ddd4b4679516cc59899b77150aa46fcc
SHA512d15709dd44e184612a86e7201c78887771e7cc062e8b4daf83c5bbf1d6dd74320e8c5058cde295d412d8e5b135f8686f8ed56aa9aa2a439b022319e6723bb752
-
Filesize
283KB
MD5457dcca2cfa8e1592521e4bc580d2097
SHA1de855fa7934126fd1cde834b752999ebe79e367f
SHA25654ce28a037eea87448e65bc25f8d3a38ddd4b4679516cc59899b77150aa46fcc
SHA512d15709dd44e184612a86e7201c78887771e7cc062e8b4daf83c5bbf1d6dd74320e8c5058cde295d412d8e5b135f8686f8ed56aa9aa2a439b022319e6723bb752