Analysis
-
max time kernel
161s -
max time network
187s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
10/02/2023, 18:46
Static task
static1
Behavioral task
behavioral1
Sample
d7b28740395b2996afdbb7b5a3059dd1c088416c6924723b4b8e8b7b3630aad2.exe
Resource
win10v2004-20221111-en
General
-
Target
d7b28740395b2996afdbb7b5a3059dd1c088416c6924723b4b8e8b7b3630aad2.exe
-
Size
550KB
-
MD5
93e512d649541ddbe2c36f5525e7ef35
-
SHA1
9cab0c043753c4ffa2190b795121f42c3caa647c
-
SHA256
d7b28740395b2996afdbb7b5a3059dd1c088416c6924723b4b8e8b7b3630aad2
-
SHA512
5bd9acd32a4b2570b5649939d14801319a3999a31118ddd1d91232571881e9933fddd756a34a85ef2126478e3ec6d538628f5556329d519e7548e4c2b4173066
-
SSDEEP
12288:6Mrcy905KEqHfFls0g0uBuqQMwVel8p8/zYq3:SyGsFlrg4wsE8A
Malware Config
Extracted
redline
fusa
193.233.20.12:4132
-
auth_value
a08b2f01bd2af756e38c5dd60e87e697
Extracted
redline
nocrypt
176.113.115.17:4132
-
auth_value
4fc7cda1ab5883a6197f20f517ce2a8c
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" cgx23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" cgx23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" cgx23.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection cgx23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" cgx23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" cgx23.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 3216 dQr72.exe 4384 aEK02.exe 4988 bxy26du.exe 216 cgx23.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features cgx23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" cgx23.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d7b28740395b2996afdbb7b5a3059dd1c088416c6924723b4b8e8b7b3630aad2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d7b28740395b2996afdbb7b5a3059dd1c088416c6924723b4b8e8b7b3630aad2.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dQr72.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" dQr72.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2776 216 WerFault.exe 82 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4384 aEK02.exe 4384 aEK02.exe 4988 bxy26du.exe 4988 bxy26du.exe 216 cgx23.exe 216 cgx23.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4384 aEK02.exe Token: SeDebugPrivilege 4988 bxy26du.exe Token: SeDebugPrivilege 216 cgx23.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1256 wrote to memory of 3216 1256 d7b28740395b2996afdbb7b5a3059dd1c088416c6924723b4b8e8b7b3630aad2.exe 79 PID 1256 wrote to memory of 3216 1256 d7b28740395b2996afdbb7b5a3059dd1c088416c6924723b4b8e8b7b3630aad2.exe 79 PID 1256 wrote to memory of 3216 1256 d7b28740395b2996afdbb7b5a3059dd1c088416c6924723b4b8e8b7b3630aad2.exe 79 PID 3216 wrote to memory of 4384 3216 dQr72.exe 80 PID 3216 wrote to memory of 4384 3216 dQr72.exe 80 PID 3216 wrote to memory of 4384 3216 dQr72.exe 80 PID 3216 wrote to memory of 4988 3216 dQr72.exe 81 PID 3216 wrote to memory of 4988 3216 dQr72.exe 81 PID 3216 wrote to memory of 4988 3216 dQr72.exe 81 PID 1256 wrote to memory of 216 1256 d7b28740395b2996afdbb7b5a3059dd1c088416c6924723b4b8e8b7b3630aad2.exe 82 PID 1256 wrote to memory of 216 1256 d7b28740395b2996afdbb7b5a3059dd1c088416c6924723b4b8e8b7b3630aad2.exe 82 PID 1256 wrote to memory of 216 1256 d7b28740395b2996afdbb7b5a3059dd1c088416c6924723b4b8e8b7b3630aad2.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\d7b28740395b2996afdbb7b5a3059dd1c088416c6924723b4b8e8b7b3630aad2.exe"C:\Users\Admin\AppData\Local\Temp\d7b28740395b2996afdbb7b5a3059dd1c088416c6924723b4b8e8b7b3630aad2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dQr72.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dQr72.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\aEK02.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\aEK02.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4384
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bxy26du.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bxy26du.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4988
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cgx23.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cgx23.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:216 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 216 -s 10843⤵
- Program crash
PID:2776
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 216 -ip 2161⤵PID:1820
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
427KB
MD5eab6b7b7be201cbd96e0428afdd6fd0e
SHA18a4666f183d392c8ace2ea31f7c027d2647c93a2
SHA25616fc123bea8b5ebc150d0700a8ca1146431f791fae8349efadef8932447d8f2c
SHA512f1138f8e8110ac2682d3b341bea6831d3e26d29510ee0c61d2f26d549d31a8549ae7d628bd3a8a61926e8a6667321f8f73e138334109b2c652bb6de38f3bf1b9
-
Filesize
427KB
MD5eab6b7b7be201cbd96e0428afdd6fd0e
SHA18a4666f183d392c8ace2ea31f7c027d2647c93a2
SHA25616fc123bea8b5ebc150d0700a8ca1146431f791fae8349efadef8932447d8f2c
SHA512f1138f8e8110ac2682d3b341bea6831d3e26d29510ee0c61d2f26d549d31a8549ae7d628bd3a8a61926e8a6667321f8f73e138334109b2c652bb6de38f3bf1b9
-
Filesize
202KB
MD5e22b664a50559198160070817421ace4
SHA12d94319710517f951453d731045f4e856685e0d4
SHA2569ebee00bb875e6e597713cc98af5f2189ccef7915ecf38662782b716e8b1b823
SHA512c3d20d814872d767bf9c7c0b181f1c2afbfe80e0b16aada00cbd958235958299055641563c5427597aba264cfb6de21fef00c9db28dda0131666204ae9ed96e7
-
Filesize
202KB
MD5e22b664a50559198160070817421ace4
SHA12d94319710517f951453d731045f4e856685e0d4
SHA2569ebee00bb875e6e597713cc98af5f2189ccef7915ecf38662782b716e8b1b823
SHA512c3d20d814872d767bf9c7c0b181f1c2afbfe80e0b16aada00cbd958235958299055641563c5427597aba264cfb6de21fef00c9db28dda0131666204ae9ed96e7
-
Filesize
175KB
MD5da6f3bef8abc85bd09f50783059964e3
SHA1a0f25f60ec1896c4c920ea397f40e6ce29724322
SHA256e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b
SHA5124d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec
-
Filesize
175KB
MD5da6f3bef8abc85bd09f50783059964e3
SHA1a0f25f60ec1896c4c920ea397f40e6ce29724322
SHA256e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b
SHA5124d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec
-
Filesize
175KB
MD530132c45c2305b287d96a3ad8158e9e3
SHA1c89477868792dbfc6abeb3016e4fcc542b01bea1
SHA2560cca99711baf600eb030bbfcf279faf74c564084e733df3d9e98bea3e4e2f45f
SHA5121f6ccbaf0787c9bc61f568c4398374426961fc73ed7ea38c75e27d7025a9df6f93ea111297a6a02acdeea52845067e222e681f278dc7278d834fbbb6be98b74e
-
Filesize
175KB
MD530132c45c2305b287d96a3ad8158e9e3
SHA1c89477868792dbfc6abeb3016e4fcc542b01bea1
SHA2560cca99711baf600eb030bbfcf279faf74c564084e733df3d9e98bea3e4e2f45f
SHA5121f6ccbaf0787c9bc61f568c4398374426961fc73ed7ea38c75e27d7025a9df6f93ea111297a6a02acdeea52845067e222e681f278dc7278d834fbbb6be98b74e