Analysis
-
max time kernel
64s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
10/02/2023, 10:29
Static task
static1
General
-
Target
1814e09d69bd0f0492f24d6caec07990ec1d16cca8aeef57194ced484e0771cd.exe
-
Size
826KB
-
MD5
b2e80c9bfbe99cace95bc69777ccccf1
-
SHA1
f5d9be5e472cdc78b5a2886fb16b75e9a8aa0c9b
-
SHA256
1814e09d69bd0f0492f24d6caec07990ec1d16cca8aeef57194ced484e0771cd
-
SHA512
f2f3de98cc8b0add503bb461cdcd81f980d325fcdd1653046caa42016093ce0510f047d1d0156334eb7b6a5eb803c16453cb36c9b010e8315e7aabe9215b11a1
-
SSDEEP
12288:sMrwy90CkFGQhtySMW2BNRTWiUOQw6NH12RQvHMbbvaBByrndv3zSNTG:EyjkFXhtzMRBNRTWOLKvuWzyxv31
Malware Config
Extracted
redline
dubna
193.233.20.11:4131
-
auth_value
f324b1269094b7462e56bab025f032f4
Extracted
redline
romka
193.233.20.11:4131
-
auth_value
fcbb3247051f5290e8ac5b1a841af67b
Extracted
redline
crypt1
176.113.115.17:4132
-
auth_value
2e2ca7bbceaa9f98252a6f9fc0e6fa86
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" aSe35.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" aSe35.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" aSe35.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" aSe35.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" aSe35.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/4688-423-0x0000000002180000-0x00000000021C6000-memory.dmp family_redline behavioral1/memory/4688-428-0x0000000002310000-0x0000000002354000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 3292 dbZ54.exe 1096 dIf16.exe 3148 aSe35.exe 4576 bde55.exe 4688 cDy09.exe 2264 dkX64.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" aSe35.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1814e09d69bd0f0492f24d6caec07990ec1d16cca8aeef57194ced484e0771cd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1814e09d69bd0f0492f24d6caec07990ec1d16cca8aeef57194ced484e0771cd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dbZ54.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" dbZ54.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dIf16.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" dIf16.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2264 set thread context of 2372 2264 dkX64.exe 74 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3148 aSe35.exe 3148 aSe35.exe 4576 bde55.exe 4576 bde55.exe 4688 cDy09.exe 4688 cDy09.exe 2372 AppLaunch.exe 2372 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3148 aSe35.exe Token: SeDebugPrivilege 4576 bde55.exe Token: SeDebugPrivilege 4688 cDy09.exe Token: SeDebugPrivilege 2372 AppLaunch.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2692 wrote to memory of 3292 2692 1814e09d69bd0f0492f24d6caec07990ec1d16cca8aeef57194ced484e0771cd.exe 66 PID 2692 wrote to memory of 3292 2692 1814e09d69bd0f0492f24d6caec07990ec1d16cca8aeef57194ced484e0771cd.exe 66 PID 2692 wrote to memory of 3292 2692 1814e09d69bd0f0492f24d6caec07990ec1d16cca8aeef57194ced484e0771cd.exe 66 PID 3292 wrote to memory of 1096 3292 dbZ54.exe 67 PID 3292 wrote to memory of 1096 3292 dbZ54.exe 67 PID 3292 wrote to memory of 1096 3292 dbZ54.exe 67 PID 1096 wrote to memory of 3148 1096 dIf16.exe 68 PID 1096 wrote to memory of 3148 1096 dIf16.exe 68 PID 1096 wrote to memory of 4576 1096 dIf16.exe 69 PID 1096 wrote to memory of 4576 1096 dIf16.exe 69 PID 1096 wrote to memory of 4576 1096 dIf16.exe 69 PID 3292 wrote to memory of 4688 3292 dbZ54.exe 71 PID 3292 wrote to memory of 4688 3292 dbZ54.exe 71 PID 3292 wrote to memory of 4688 3292 dbZ54.exe 71 PID 2692 wrote to memory of 2264 2692 1814e09d69bd0f0492f24d6caec07990ec1d16cca8aeef57194ced484e0771cd.exe 72 PID 2692 wrote to memory of 2264 2692 1814e09d69bd0f0492f24d6caec07990ec1d16cca8aeef57194ced484e0771cd.exe 72 PID 2692 wrote to memory of 2264 2692 1814e09d69bd0f0492f24d6caec07990ec1d16cca8aeef57194ced484e0771cd.exe 72 PID 2264 wrote to memory of 2372 2264 dkX64.exe 74 PID 2264 wrote to memory of 2372 2264 dkX64.exe 74 PID 2264 wrote to memory of 2372 2264 dkX64.exe 74 PID 2264 wrote to memory of 2372 2264 dkX64.exe 74 PID 2264 wrote to memory of 2372 2264 dkX64.exe 74
Processes
-
C:\Users\Admin\AppData\Local\Temp\1814e09d69bd0f0492f24d6caec07990ec1d16cca8aeef57194ced484e0771cd.exe"C:\Users\Admin\AppData\Local\Temp\1814e09d69bd0f0492f24d6caec07990ec1d16cca8aeef57194ced484e0771cd.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dbZ54.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dbZ54.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dIf16.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dIf16.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\aSe35.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\aSe35.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3148
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bde55.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bde55.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4576
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cDy09.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cDy09.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4688
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dkX64.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dkX64.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2372
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
596KB
MD5190dda039c96bc8c780ab5d0e505ce02
SHA184443bbffaf71290b21cf9b3502924fa7ae1c104
SHA256f02d642278a334bfe673c1c530100eb6240857104d5c13c2ff636c4f760a75a8
SHA512f4f47d257fef88af0e137cbb32410d17ec37a8e6eddafc7f37d2ba462af79b6ef7de8b256781d826d724e4937c07a27bff09b3ddd283a6893024b91510d42c5e
-
Filesize
596KB
MD5190dda039c96bc8c780ab5d0e505ce02
SHA184443bbffaf71290b21cf9b3502924fa7ae1c104
SHA256f02d642278a334bfe673c1c530100eb6240857104d5c13c2ff636c4f760a75a8
SHA512f4f47d257fef88af0e137cbb32410d17ec37a8e6eddafc7f37d2ba462af79b6ef7de8b256781d826d724e4937c07a27bff09b3ddd283a6893024b91510d42c5e
-
Filesize
277KB
MD53bc6ecb7d1f35f3171383f88879659b7
SHA1e82887b3d6ab38ae3b8880d6c904244495dcf0cc
SHA256c95f1ca2230edb615f3365e4c3ad09e4e1940a2c554eaf27c0df2d5bc4fc1068
SHA512709eb1c1c322c70a2a377324fa1766bfff9a3e1d37db04da240aaab36317d813b6f32f5c0d0a3f8d30f196f132985fce0ec030d5783df3c7bff76a4ccfb4431c
-
Filesize
277KB
MD53bc6ecb7d1f35f3171383f88879659b7
SHA1e82887b3d6ab38ae3b8880d6c904244495dcf0cc
SHA256c95f1ca2230edb615f3365e4c3ad09e4e1940a2c554eaf27c0df2d5bc4fc1068
SHA512709eb1c1c322c70a2a377324fa1766bfff9a3e1d37db04da240aaab36317d813b6f32f5c0d0a3f8d30f196f132985fce0ec030d5783df3c7bff76a4ccfb4431c
-
Filesize
456KB
MD538843698815444b78bb8a73cb2a55e1c
SHA1823d3bca57c0ef79b64b736e0b856b15eb8a1427
SHA256d08806d5eb85a075c3ca96312bc79db64be887550a4a66d9faa89317ad9beff3
SHA51286ec0f5bc0fed715b9e9298c6c75ac97fca05e9cee217f9452c50dc54eda35c7099fa2cd751a501036068d1455632d86d5e33b126767626bafd641e4b9d0b57f
-
Filesize
456KB
MD538843698815444b78bb8a73cb2a55e1c
SHA1823d3bca57c0ef79b64b736e0b856b15eb8a1427
SHA256d08806d5eb85a075c3ca96312bc79db64be887550a4a66d9faa89317ad9beff3
SHA51286ec0f5bc0fed715b9e9298c6c75ac97fca05e9cee217f9452c50dc54eda35c7099fa2cd751a501036068d1455632d86d5e33b126767626bafd641e4b9d0b57f
-
Filesize
202KB
MD514be906e10b84153cbc67b2e18e16657
SHA16cab4c50453fefdf416af9c783a4eed0b150d1b9
SHA256bf8b687385453562669fa10e758adf58138a9ca473a1348fa9e94d2224e57258
SHA512c679a5f7bec77cb8b973d6aad3133c973cc28b02368ea46f88e6301f77b5edee147bb91202221508e400cad49045f6550456f9185dd403a7cd71b5a8d2b8bbc7
-
Filesize
202KB
MD514be906e10b84153cbc67b2e18e16657
SHA16cab4c50453fefdf416af9c783a4eed0b150d1b9
SHA256bf8b687385453562669fa10e758adf58138a9ca473a1348fa9e94d2224e57258
SHA512c679a5f7bec77cb8b973d6aad3133c973cc28b02368ea46f88e6301f77b5edee147bb91202221508e400cad49045f6550456f9185dd403a7cd71b5a8d2b8bbc7
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
175KB
MD5ef8079cf160510d0da7162bc08f753d8
SHA1e786cc8bee83e4a37433ddccf9d3540e1f6533fe
SHA256a6416ca607f03e7d02dd9c8b546113c71f421c0ba8438dafb941d25f8cf2c9e6
SHA512959b08126358527b794a276f6e9f818250f888d9f108b46766f6c2e50186acc8f406acbeb94ca97b5f0e329b27f3851003446715d5d040b5c0fef4010011a2c3
-
Filesize
175KB
MD5ef8079cf160510d0da7162bc08f753d8
SHA1e786cc8bee83e4a37433ddccf9d3540e1f6533fe
SHA256a6416ca607f03e7d02dd9c8b546113c71f421c0ba8438dafb941d25f8cf2c9e6
SHA512959b08126358527b794a276f6e9f818250f888d9f108b46766f6c2e50186acc8f406acbeb94ca97b5f0e329b27f3851003446715d5d040b5c0fef4010011a2c3