Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
10-02-2023 23:03
Static task
static1
General
-
Target
4e53245dab6c6907bbef1e4dc596cdc91baa0407e5880275d5ad7f542b64324b.exe
-
Size
839KB
-
MD5
8b87170ff3999152c9e4a31f3a1af9e0
-
SHA1
606b2398916d53696ab32d494ff96b662e95dcfc
-
SHA256
4e53245dab6c6907bbef1e4dc596cdc91baa0407e5880275d5ad7f542b64324b
-
SHA512
875ab6e1b350b801b14437373a16f55f097c3bed1ecbd3d1bf56ebd22f5ec2c6989741ac21de43dd158f66c36d4a250e2a3ea4eee890b26dbe22c26356ece000
-
SSDEEP
12288:WMrry9060V6EVq03sOs01Df04/sHOMrvefNHqigCq7FGzzZNYpA+M:JyuVrls01704kHOM6oCI0zz9z
Malware Config
Extracted
redline
crypt1
176.113.115.17:4132
-
auth_value
2e2ca7bbceaa9f98252a6f9fc0e6fa86
Extracted
redline
romik
193.233.20.12:4132
-
auth_value
8fb78d2889ba0ca42678b59b884e88ff
Extracted
redline
dunm
193.233.20.12:4132
-
auth_value
352959e3707029296ec94306d74e2334
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sYW44.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sYW44.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sYW44.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sYW44.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sYW44.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/5012-445-0x00000000022B0000-0x00000000022F6000-memory.dmp family_redline behavioral1/memory/5012-451-0x0000000002500000-0x0000000002544000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 4044 dDU03.exe 3636 ddL52.exe 3740 dWn47.exe 5012 lSG31.exe 548 naF51.exe 3816 sYW44.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sYW44.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4e53245dab6c6907bbef1e4dc596cdc91baa0407e5880275d5ad7f542b64324b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4e53245dab6c6907bbef1e4dc596cdc91baa0407e5880275d5ad7f542b64324b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dDU03.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" dDU03.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ddL52.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ddL52.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3740 set thread context of 4404 3740 dWn47.exe 70 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4404 AppLaunch.exe 4404 AppLaunch.exe 5012 lSG31.exe 5012 lSG31.exe 548 naF51.exe 548 naF51.exe 3816 sYW44.exe 3816 sYW44.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 5012 lSG31.exe Token: SeDebugPrivilege 4404 AppLaunch.exe Token: SeDebugPrivilege 548 naF51.exe Token: SeDebugPrivilege 3816 sYW44.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 4556 wrote to memory of 4044 4556 4e53245dab6c6907bbef1e4dc596cdc91baa0407e5880275d5ad7f542b64324b.exe 66 PID 4556 wrote to memory of 4044 4556 4e53245dab6c6907bbef1e4dc596cdc91baa0407e5880275d5ad7f542b64324b.exe 66 PID 4556 wrote to memory of 4044 4556 4e53245dab6c6907bbef1e4dc596cdc91baa0407e5880275d5ad7f542b64324b.exe 66 PID 4044 wrote to memory of 3636 4044 dDU03.exe 67 PID 4044 wrote to memory of 3636 4044 dDU03.exe 67 PID 4044 wrote to memory of 3636 4044 dDU03.exe 67 PID 3636 wrote to memory of 3740 3636 ddL52.exe 68 PID 3636 wrote to memory of 3740 3636 ddL52.exe 68 PID 3636 wrote to memory of 3740 3636 ddL52.exe 68 PID 3740 wrote to memory of 4404 3740 dWn47.exe 70 PID 3740 wrote to memory of 4404 3740 dWn47.exe 70 PID 3740 wrote to memory of 4404 3740 dWn47.exe 70 PID 3740 wrote to memory of 4404 3740 dWn47.exe 70 PID 3740 wrote to memory of 4404 3740 dWn47.exe 70 PID 3636 wrote to memory of 5012 3636 ddL52.exe 71 PID 3636 wrote to memory of 5012 3636 ddL52.exe 71 PID 3636 wrote to memory of 5012 3636 ddL52.exe 71 PID 4044 wrote to memory of 548 4044 dDU03.exe 73 PID 4044 wrote to memory of 548 4044 dDU03.exe 73 PID 4044 wrote to memory of 548 4044 dDU03.exe 73 PID 4556 wrote to memory of 3816 4556 4e53245dab6c6907bbef1e4dc596cdc91baa0407e5880275d5ad7f542b64324b.exe 74 PID 4556 wrote to memory of 3816 4556 4e53245dab6c6907bbef1e4dc596cdc91baa0407e5880275d5ad7f542b64324b.exe 74
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e53245dab6c6907bbef1e4dc596cdc91baa0407e5880275d5ad7f542b64324b.exe"C:\Users\Admin\AppData\Local\Temp\4e53245dab6c6907bbef1e4dc596cdc91baa0407e5880275d5ad7f542b64324b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dDU03.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dDU03.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ddL52.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ddL52.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dWn47.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dWn47.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4404
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\lSG31.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\lSG31.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5012
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\naF51.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\naF51.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:548
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sYW44.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sYW44.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3816
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
735KB
MD592c28bdb6c273bdeb72e707c7f19d1ea
SHA1e2fa90a0817b17fd0e3a03544781fa570cdef9d6
SHA256fd9fefb7f0fb8e9c03a35cacdcc01852fe8d127a96e2ffe3464447e07437b08a
SHA512cba72293059238c44142f001b6b8d7a978645668d0fac9f2d2bf5b020ea77ac9b703f2fcce87bc663cace7b49b89ecf39b90c31b9c02bf4ed29d13ea8d3fdb3f
-
Filesize
735KB
MD592c28bdb6c273bdeb72e707c7f19d1ea
SHA1e2fa90a0817b17fd0e3a03544781fa570cdef9d6
SHA256fd9fefb7f0fb8e9c03a35cacdcc01852fe8d127a96e2ffe3464447e07437b08a
SHA512cba72293059238c44142f001b6b8d7a978645668d0fac9f2d2bf5b020ea77ac9b703f2fcce87bc663cace7b49b89ecf39b90c31b9c02bf4ed29d13ea8d3fdb3f
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
589KB
MD5e1d9026694ed73beb542d42be9543817
SHA1476e3c1f66c8e6ea203df56f9b0a962d9ded5d9f
SHA256f5d6e518f0655f0fa920c9393d439491344cfde10b660ab8dd8eed1c9c1d100e
SHA51291b910ebc5eba5610cb54028a75bb550e6bdb13e8628abef1fe253dd244795ed57e906616be9ee8b63eab8829402116026f1b3b9cf957330055a068b7df2b2c7
-
Filesize
589KB
MD5e1d9026694ed73beb542d42be9543817
SHA1476e3c1f66c8e6ea203df56f9b0a962d9ded5d9f
SHA256f5d6e518f0655f0fa920c9393d439491344cfde10b660ab8dd8eed1c9c1d100e
SHA51291b910ebc5eba5610cb54028a75bb550e6bdb13e8628abef1fe253dd244795ed57e906616be9ee8b63eab8829402116026f1b3b9cf957330055a068b7df2b2c7
-
Filesize
175KB
MD569f79e05d0c83aee310d9adfe5aa7f2b
SHA1485c490180380051a14316564fbda07723be11b1
SHA256c41dc7f6cc752595337cd7f209f923b43b061b201c6ab4dc02151afb90cd66e2
SHA512f1789a74aeb83867c37ddeadcd06cddfc1454a94fcc122b35d67b0309b46742b9a6611e4c3e583baa90a3fd456e45c75ae5f1a206f6e4500c1f3f8ddf5e47b42
-
Filesize
175KB
MD569f79e05d0c83aee310d9adfe5aa7f2b
SHA1485c490180380051a14316564fbda07723be11b1
SHA256c41dc7f6cc752595337cd7f209f923b43b061b201c6ab4dc02151afb90cd66e2
SHA512f1789a74aeb83867c37ddeadcd06cddfc1454a94fcc122b35d67b0309b46742b9a6611e4c3e583baa90a3fd456e45c75ae5f1a206f6e4500c1f3f8ddf5e47b42
-
Filesize
277KB
MD53bc6ecb7d1f35f3171383f88879659b7
SHA1e82887b3d6ab38ae3b8880d6c904244495dcf0cc
SHA256c95f1ca2230edb615f3365e4c3ad09e4e1940a2c554eaf27c0df2d5bc4fc1068
SHA512709eb1c1c322c70a2a377324fa1766bfff9a3e1d37db04da240aaab36317d813b6f32f5c0d0a3f8d30f196f132985fce0ec030d5783df3c7bff76a4ccfb4431c
-
Filesize
277KB
MD53bc6ecb7d1f35f3171383f88879659b7
SHA1e82887b3d6ab38ae3b8880d6c904244495dcf0cc
SHA256c95f1ca2230edb615f3365e4c3ad09e4e1940a2c554eaf27c0df2d5bc4fc1068
SHA512709eb1c1c322c70a2a377324fa1766bfff9a3e1d37db04da240aaab36317d813b6f32f5c0d0a3f8d30f196f132985fce0ec030d5783df3c7bff76a4ccfb4431c
-
Filesize
485KB
MD52ccd01c92399fe932126e1ce38c62565
SHA1316e0ec4f0c22a6eb4095cfb03ddb9a38aed8cdc
SHA25642cfcf278f98d0cb0268be1fbc5eb602dd06a83deca627e3b46942dcb678a6ed
SHA512acdad4be559fa272111a72647f8f7c7501de42192b570520a91695d170c41b6d62f7cdb99b583a106514a648ba7b27ede0095028b965502fd7ba7c5e32c01aa5
-
Filesize
485KB
MD52ccd01c92399fe932126e1ce38c62565
SHA1316e0ec4f0c22a6eb4095cfb03ddb9a38aed8cdc
SHA25642cfcf278f98d0cb0268be1fbc5eb602dd06a83deca627e3b46942dcb678a6ed
SHA512acdad4be559fa272111a72647f8f7c7501de42192b570520a91695d170c41b6d62f7cdb99b583a106514a648ba7b27ede0095028b965502fd7ba7c5e32c01aa5