Analysis
-
max time kernel
182s -
max time network
211s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
10/02/2023, 10:32
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20221111-en
General
-
Target
file.exe
-
Size
783KB
-
MD5
806d990edc91fe7cb95ea2e6b86e3533
-
SHA1
540b81b1a4375d9658bf3cd9d0af15ba790ec15b
-
SHA256
77bc01a4eede5bca41a64a18e338570895b9989d7fa21ae94c8998e7e1ff3fa9
-
SHA512
c2296bf0d9502d5cc17380a9822c48e9960c2a982b6e25fd58f5be9eb0bb3417e253e6ad5412b72fa0c190d11891a8613048518fc41fff988a209ef54dfbb934
-
SSDEEP
12288:QMrqy902iD5s9DZThWA3E83N8ClrHamLikFF7HMlqwDL6ztBgEtN:qy+D5s99FWAzdlr93S5cgED
Malware Config
Extracted
redline
dubna
193.233.20.11:4131
-
auth_value
f324b1269094b7462e56bab025f032f4
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" aJv86.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" aJv86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection aJv86.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" aJv86.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" aJv86.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" aJv86.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 4272 fBa28El.exe 904 fIW85uX.exe 332 aJv86.exe 3640 bOV38pa.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" aJv86.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fBa28El.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" fBa28El.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fIW85uX.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" fIW85uX.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 332 aJv86.exe 332 aJv86.exe 3640 bOV38pa.exe 3640 bOV38pa.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 332 aJv86.exe Token: SeDebugPrivilege 3640 bOV38pa.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4084 wrote to memory of 4272 4084 file.exe 81 PID 4084 wrote to memory of 4272 4084 file.exe 81 PID 4084 wrote to memory of 4272 4084 file.exe 81 PID 4272 wrote to memory of 904 4272 fBa28El.exe 82 PID 4272 wrote to memory of 904 4272 fBa28El.exe 82 PID 4272 wrote to memory of 904 4272 fBa28El.exe 82 PID 904 wrote to memory of 332 904 fIW85uX.exe 83 PID 904 wrote to memory of 332 904 fIW85uX.exe 83 PID 904 wrote to memory of 3640 904 fIW85uX.exe 84 PID 904 wrote to memory of 3640 904 fIW85uX.exe 84 PID 904 wrote to memory of 3640 904 fIW85uX.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fBa28El.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fBa28El.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fIW85uX.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fIW85uX.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\aJv86.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\aJv86.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:332
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bOV38pa.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bOV38pa.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3640
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
596KB
MD51990cf46256750b7807371ed69a52d7b
SHA1998970a9a365e8e57ff659626bc3d50f64c2c114
SHA2567424ea8227de81a6fdb81bc2bc70297434b28dbb4bdc4348c6dc3c0137aeebfd
SHA512a469f3a8bb0260a52156d5cdf55cf4f7fc02644a3211d7f33bfbb707528377f6e851a887692b9c6c19a7a83dca5adda0823f52993b634d771cfb249319df1c39
-
Filesize
596KB
MD51990cf46256750b7807371ed69a52d7b
SHA1998970a9a365e8e57ff659626bc3d50f64c2c114
SHA2567424ea8227de81a6fdb81bc2bc70297434b28dbb4bdc4348c6dc3c0137aeebfd
SHA512a469f3a8bb0260a52156d5cdf55cf4f7fc02644a3211d7f33bfbb707528377f6e851a887692b9c6c19a7a83dca5adda0823f52993b634d771cfb249319df1c39
-
Filesize
202KB
MD5072ef2b6a1859be1d92e839fc163c9a8
SHA13493a14a4afe7af533efa8f0762a655e3eaf5f5d
SHA256fef40d702359e7d4c237f9bfeb6818c2dc6eb9630c14a22976cdb7e7308b30b2
SHA5127df81311ec71b5106cc86a4243ea0a4ee60a54521918885ca390543d8805727142297c5a9550bea986d35b24c4489c7f89aca6071355aeaa2678640d69bc6e1f
-
Filesize
202KB
MD5072ef2b6a1859be1d92e839fc163c9a8
SHA13493a14a4afe7af533efa8f0762a655e3eaf5f5d
SHA256fef40d702359e7d4c237f9bfeb6818c2dc6eb9630c14a22976cdb7e7308b30b2
SHA5127df81311ec71b5106cc86a4243ea0a4ee60a54521918885ca390543d8805727142297c5a9550bea986d35b24c4489c7f89aca6071355aeaa2678640d69bc6e1f
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
175KB
MD5ef8079cf160510d0da7162bc08f753d8
SHA1e786cc8bee83e4a37433ddccf9d3540e1f6533fe
SHA256a6416ca607f03e7d02dd9c8b546113c71f421c0ba8438dafb941d25f8cf2c9e6
SHA512959b08126358527b794a276f6e9f818250f888d9f108b46766f6c2e50186acc8f406acbeb94ca97b5f0e329b27f3851003446715d5d040b5c0fef4010011a2c3
-
Filesize
175KB
MD5ef8079cf160510d0da7162bc08f753d8
SHA1e786cc8bee83e4a37433ddccf9d3540e1f6533fe
SHA256a6416ca607f03e7d02dd9c8b546113c71f421c0ba8438dafb941d25f8cf2c9e6
SHA512959b08126358527b794a276f6e9f818250f888d9f108b46766f6c2e50186acc8f406acbeb94ca97b5f0e329b27f3851003446715d5d040b5c0fef4010011a2c3