Analysis
-
max time kernel
83s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
10-02-2023 20:24
Static task
static1
Behavioral task
behavioral1
Sample
94eb67a4dfb3781055f7797678445bd289bd4acca0e7d1a5c7c75542dbdd2eb6.exe
Resource
win10v2004-20220901-en
General
-
Target
94eb67a4dfb3781055f7797678445bd289bd4acca0e7d1a5c7c75542dbdd2eb6.exe
-
Size
551KB
-
MD5
d838110cb773123478decc152355eb11
-
SHA1
2bdf7c29aa54c0b506992dd301086b0dfd4193bf
-
SHA256
94eb67a4dfb3781055f7797678445bd289bd4acca0e7d1a5c7c75542dbdd2eb6
-
SHA512
271b620de0752f403f901e91d82d7496a5314a15429e0d4069d11ff05808b2e8baccf8e7f1393d50b8a4d21cff66397db872c5f54dfa78a4af135f87c77b6216
-
SSDEEP
12288:oMriy90zZsXDVXsbkq/3iLkyit+nlt0o:KyAZuVakqFyiEnj0o
Malware Config
Extracted
redline
fusa
193.233.20.12:4132
-
auth_value
a08b2f01bd2af756e38c5dd60e87e697
Extracted
redline
nocrypt
176.113.115.17:4132
-
auth_value
4fc7cda1ab5883a6197f20f517ce2a8c
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection cFy47.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" cFy47.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" cFy47.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" cFy47.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" cFy47.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" cFy47.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 4436 dJv99.exe 4460 aXP28.exe 1840 baw36oH.exe 3832 cFy47.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features cFy47.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" cFy47.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 94eb67a4dfb3781055f7797678445bd289bd4acca0e7d1a5c7c75542dbdd2eb6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 94eb67a4dfb3781055f7797678445bd289bd4acca0e7d1a5c7c75542dbdd2eb6.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dJv99.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" dJv99.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3176 3832 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4460 aXP28.exe 4460 aXP28.exe 1840 baw36oH.exe 1840 baw36oH.exe 3832 cFy47.exe 3832 cFy47.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4460 aXP28.exe Token: SeDebugPrivilege 1840 baw36oH.exe Token: SeDebugPrivilege 3832 cFy47.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4956 wrote to memory of 4436 4956 94eb67a4dfb3781055f7797678445bd289bd4acca0e7d1a5c7c75542dbdd2eb6.exe 81 PID 4956 wrote to memory of 4436 4956 94eb67a4dfb3781055f7797678445bd289bd4acca0e7d1a5c7c75542dbdd2eb6.exe 81 PID 4956 wrote to memory of 4436 4956 94eb67a4dfb3781055f7797678445bd289bd4acca0e7d1a5c7c75542dbdd2eb6.exe 81 PID 4436 wrote to memory of 4460 4436 dJv99.exe 82 PID 4436 wrote to memory of 4460 4436 dJv99.exe 82 PID 4436 wrote to memory of 4460 4436 dJv99.exe 82 PID 4436 wrote to memory of 1840 4436 dJv99.exe 83 PID 4436 wrote to memory of 1840 4436 dJv99.exe 83 PID 4436 wrote to memory of 1840 4436 dJv99.exe 83 PID 4956 wrote to memory of 3832 4956 94eb67a4dfb3781055f7797678445bd289bd4acca0e7d1a5c7c75542dbdd2eb6.exe 85 PID 4956 wrote to memory of 3832 4956 94eb67a4dfb3781055f7797678445bd289bd4acca0e7d1a5c7c75542dbdd2eb6.exe 85 PID 4956 wrote to memory of 3832 4956 94eb67a4dfb3781055f7797678445bd289bd4acca0e7d1a5c7c75542dbdd2eb6.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\94eb67a4dfb3781055f7797678445bd289bd4acca0e7d1a5c7c75542dbdd2eb6.exe"C:\Users\Admin\AppData\Local\Temp\94eb67a4dfb3781055f7797678445bd289bd4acca0e7d1a5c7c75542dbdd2eb6.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dJv99.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dJv99.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\aXP28.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\aXP28.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4460
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\baw36oH.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\baw36oH.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1840
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cFy47.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cFy47.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3832 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3832 -s 10843⤵
- Program crash
PID:3176
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3832 -ip 38321⤵PID:2100
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
427KB
MD50c87b90de994371b24beb289ca177975
SHA1a8d63494cd9372a0cb408c414fc0de7e277e2f5b
SHA25665135f1312b6dcd8db495ab0c61f516c46c2afe5e5ef5de76b4b58adfd264edb
SHA5129248a9d20964c8a798be1f188ef5170125da10c4dee4c295f98c75e8409beddaa64cf101d349a30e40bdafbfba56aebe541e6094a2946d2c249c34a0c7955edd
-
Filesize
427KB
MD50c87b90de994371b24beb289ca177975
SHA1a8d63494cd9372a0cb408c414fc0de7e277e2f5b
SHA25665135f1312b6dcd8db495ab0c61f516c46c2afe5e5ef5de76b4b58adfd264edb
SHA5129248a9d20964c8a798be1f188ef5170125da10c4dee4c295f98c75e8409beddaa64cf101d349a30e40bdafbfba56aebe541e6094a2946d2c249c34a0c7955edd
-
Filesize
202KB
MD5301a6dfca15b519ea4f513ee9cba86a0
SHA10837b2abbf3eddfe8358998b0efc8a908af1e25a
SHA256589c49c5789f9830bb3b89ba4db4416d810614dd82d6e31a721a703844d696bb
SHA5122a294f2c87ff32ea11661b184b88fd1fc9cdec93374540f9f5ddafa672058e4ca8059bcdcfb8e2de4a639dc65d21b3581ee5cf80990dd4ca795c9c066a40f358
-
Filesize
202KB
MD5301a6dfca15b519ea4f513ee9cba86a0
SHA10837b2abbf3eddfe8358998b0efc8a908af1e25a
SHA256589c49c5789f9830bb3b89ba4db4416d810614dd82d6e31a721a703844d696bb
SHA5122a294f2c87ff32ea11661b184b88fd1fc9cdec93374540f9f5ddafa672058e4ca8059bcdcfb8e2de4a639dc65d21b3581ee5cf80990dd4ca795c9c066a40f358
-
Filesize
175KB
MD5da6f3bef8abc85bd09f50783059964e3
SHA1a0f25f60ec1896c4c920ea397f40e6ce29724322
SHA256e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b
SHA5124d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec
-
Filesize
175KB
MD5da6f3bef8abc85bd09f50783059964e3
SHA1a0f25f60ec1896c4c920ea397f40e6ce29724322
SHA256e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b
SHA5124d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec
-
Filesize
175KB
MD530132c45c2305b287d96a3ad8158e9e3
SHA1c89477868792dbfc6abeb3016e4fcc542b01bea1
SHA2560cca99711baf600eb030bbfcf279faf74c564084e733df3d9e98bea3e4e2f45f
SHA5121f6ccbaf0787c9bc61f568c4398374426961fc73ed7ea38c75e27d7025a9df6f93ea111297a6a02acdeea52845067e222e681f278dc7278d834fbbb6be98b74e
-
Filesize
175KB
MD530132c45c2305b287d96a3ad8158e9e3
SHA1c89477868792dbfc6abeb3016e4fcc542b01bea1
SHA2560cca99711baf600eb030bbfcf279faf74c564084e733df3d9e98bea3e4e2f45f
SHA5121f6ccbaf0787c9bc61f568c4398374426961fc73ed7ea38c75e27d7025a9df6f93ea111297a6a02acdeea52845067e222e681f278dc7278d834fbbb6be98b74e