Analysis
-
max time kernel
122s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
10-02-2023 16:47
Static task
static1
Behavioral task
behavioral1
Sample
44053e25d9cb28c9da8d06b689ea6636bcfcb4d7949d0f19a3d5becfc9974376.exe
Resource
win10v2004-20220812-en
General
-
Target
44053e25d9cb28c9da8d06b689ea6636bcfcb4d7949d0f19a3d5becfc9974376.exe
-
Size
550KB
-
MD5
0aedf23ba56d130a30162ced1a662769
-
SHA1
17998ab64f9359e4b4879f5ef141cff895645715
-
SHA256
44053e25d9cb28c9da8d06b689ea6636bcfcb4d7949d0f19a3d5becfc9974376
-
SHA512
712d130776111a42a49c0457b7258d4445d75effd42017d8c618d911c3221da1927861b96235e1a1a05a9e8ef5608ac9087d43bc5ea3cc423fad84703fbf5c71
-
SSDEEP
12288:kMr7y90tBlOa95RVhSTeLcdxgMmXvsG2XuGeA8NOaeyWh5h:fymBlZdVYeLSmXvx2XuhjlWDh
Malware Config
Extracted
redline
fusa
193.233.20.12:4132
-
auth_value
a08b2f01bd2af756e38c5dd60e87e697
Extracted
redline
nocrypt
176.113.115.17:4132
-
auth_value
4fc7cda1ab5883a6197f20f517ce2a8c
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection cid82.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" cid82.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" cid82.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" cid82.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" cid82.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" cid82.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 5060 dsU74.exe 4944 aKx89.exe 1124 bmg32cY.exe 3332 cid82.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features cid82.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" cid82.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 44053e25d9cb28c9da8d06b689ea6636bcfcb4d7949d0f19a3d5becfc9974376.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 44053e25d9cb28c9da8d06b689ea6636bcfcb4d7949d0f19a3d5becfc9974376.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dsU74.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" dsU74.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4800 3332 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4944 aKx89.exe 4944 aKx89.exe 1124 bmg32cY.exe 1124 bmg32cY.exe 3332 cid82.exe 3332 cid82.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4944 aKx89.exe Token: SeDebugPrivilege 1124 bmg32cY.exe Token: SeDebugPrivilege 3332 cid82.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4276 wrote to memory of 5060 4276 44053e25d9cb28c9da8d06b689ea6636bcfcb4d7949d0f19a3d5becfc9974376.exe 78 PID 4276 wrote to memory of 5060 4276 44053e25d9cb28c9da8d06b689ea6636bcfcb4d7949d0f19a3d5becfc9974376.exe 78 PID 4276 wrote to memory of 5060 4276 44053e25d9cb28c9da8d06b689ea6636bcfcb4d7949d0f19a3d5becfc9974376.exe 78 PID 5060 wrote to memory of 4944 5060 dsU74.exe 79 PID 5060 wrote to memory of 4944 5060 dsU74.exe 79 PID 5060 wrote to memory of 4944 5060 dsU74.exe 79 PID 5060 wrote to memory of 1124 5060 dsU74.exe 88 PID 5060 wrote to memory of 1124 5060 dsU74.exe 88 PID 5060 wrote to memory of 1124 5060 dsU74.exe 88 PID 4276 wrote to memory of 3332 4276 44053e25d9cb28c9da8d06b689ea6636bcfcb4d7949d0f19a3d5becfc9974376.exe 89 PID 4276 wrote to memory of 3332 4276 44053e25d9cb28c9da8d06b689ea6636bcfcb4d7949d0f19a3d5becfc9974376.exe 89 PID 4276 wrote to memory of 3332 4276 44053e25d9cb28c9da8d06b689ea6636bcfcb4d7949d0f19a3d5becfc9974376.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\44053e25d9cb28c9da8d06b689ea6636bcfcb4d7949d0f19a3d5becfc9974376.exe"C:\Users\Admin\AppData\Local\Temp\44053e25d9cb28c9da8d06b689ea6636bcfcb4d7949d0f19a3d5becfc9974376.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dsU74.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dsU74.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\aKx89.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\aKx89.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4944
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bmg32cY.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bmg32cY.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1124
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cid82.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cid82.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3332 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3332 -s 10843⤵
- Program crash
PID:4800
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3332 -ip 33321⤵PID:4160
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
426KB
MD54ea7f0f83fe4de36b199d47ec932b492
SHA1c425ad2531d09f1e17af3d0231c738bc11274b51
SHA25695e152c0f8a9ece8429caf208a1f71afedbef3c37e23b3332a1d3dc7c3ebc6b3
SHA5125ca46ad6ba56fedbeb88cd2ce299eb15e3a5e14758d8b6112e252a01c459c6a335fc12710755296c27455057a241f07e3c66c17cc2f9c2047deee2c037ce7a22
-
Filesize
426KB
MD54ea7f0f83fe4de36b199d47ec932b492
SHA1c425ad2531d09f1e17af3d0231c738bc11274b51
SHA25695e152c0f8a9ece8429caf208a1f71afedbef3c37e23b3332a1d3dc7c3ebc6b3
SHA5125ca46ad6ba56fedbeb88cd2ce299eb15e3a5e14758d8b6112e252a01c459c6a335fc12710755296c27455057a241f07e3c66c17cc2f9c2047deee2c037ce7a22
-
Filesize
202KB
MD566c7ba5749d382af982ee18a5890e7ff
SHA1250212c63a071334166da7eb1594ba091416eae9
SHA256f723dc59ba50f96c1ee4eb99ba6653e2ac0ab661b064eaf5ab4608cc40f8f133
SHA51288ba7e6d827d077246bb7ff6d55bcbf8e13fc66d563ff5df1a13fd56f186770d7898a8b95e78f756632483e60cb7fe2e37375d3ebdfe32ab2bc6d6bf003f378c
-
Filesize
202KB
MD566c7ba5749d382af982ee18a5890e7ff
SHA1250212c63a071334166da7eb1594ba091416eae9
SHA256f723dc59ba50f96c1ee4eb99ba6653e2ac0ab661b064eaf5ab4608cc40f8f133
SHA51288ba7e6d827d077246bb7ff6d55bcbf8e13fc66d563ff5df1a13fd56f186770d7898a8b95e78f756632483e60cb7fe2e37375d3ebdfe32ab2bc6d6bf003f378c
-
Filesize
175KB
MD5da6f3bef8abc85bd09f50783059964e3
SHA1a0f25f60ec1896c4c920ea397f40e6ce29724322
SHA256e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b
SHA5124d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec
-
Filesize
175KB
MD5da6f3bef8abc85bd09f50783059964e3
SHA1a0f25f60ec1896c4c920ea397f40e6ce29724322
SHA256e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b
SHA5124d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec
-
Filesize
175KB
MD530132c45c2305b287d96a3ad8158e9e3
SHA1c89477868792dbfc6abeb3016e4fcc542b01bea1
SHA2560cca99711baf600eb030bbfcf279faf74c564084e733df3d9e98bea3e4e2f45f
SHA5121f6ccbaf0787c9bc61f568c4398374426961fc73ed7ea38c75e27d7025a9df6f93ea111297a6a02acdeea52845067e222e681f278dc7278d834fbbb6be98b74e
-
Filesize
175KB
MD530132c45c2305b287d96a3ad8158e9e3
SHA1c89477868792dbfc6abeb3016e4fcc542b01bea1
SHA2560cca99711baf600eb030bbfcf279faf74c564084e733df3d9e98bea3e4e2f45f
SHA5121f6ccbaf0787c9bc61f568c4398374426961fc73ed7ea38c75e27d7025a9df6f93ea111297a6a02acdeea52845067e222e681f278dc7278d834fbbb6be98b74e