Analysis
-
max time kernel
47s -
max time network
178s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
11-02-2023 04:48
Static task
static1
Behavioral task
behavioral1
Sample
a38fdb6d0bd07228d99b5ec5b6f71fcef825cbd638ae028864952bada16f2c5c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a38fdb6d0bd07228d99b5ec5b6f71fcef825cbd638ae028864952bada16f2c5c.exe
Resource
win10-20220901-en
General
-
Target
a38fdb6d0bd07228d99b5ec5b6f71fcef825cbd638ae028864952bada16f2c5c.exe
-
Size
550KB
-
MD5
f2b4f55b10f1b93f69a69f6a7a7ee052
-
SHA1
703df74d9b2f3a068e55a923abcfcbc4f82a2062
-
SHA256
a38fdb6d0bd07228d99b5ec5b6f71fcef825cbd638ae028864952bada16f2c5c
-
SHA512
c45dc7b155dc1868f58a26a11f4aeb83c53c26320e9846ad4c4c5745223930c873cdba2e9a8af8d4bf249e51fe1b2ff0ad1b224a685d4e81bcb479dc1c9b7244
-
SSDEEP
12288:QMrIy90vhozQN1NRm+WbGjhVZRfCh5PMO+9q0dhM3WjBWC:IyChooOTbGZ45P4f+W9WC
Malware Config
Extracted
redline
fusa
193.233.20.12:4132
-
auth_value
a08b2f01bd2af756e38c5dd60e87e697
Extracted
redline
nocrypt
176.113.115.17:4132
-
auth_value
4fc7cda1ab5883a6197f20f517ce2a8c
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dCu87.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" dCu87.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dCu87.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" dCu87.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dCu87.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 4412 nWJ52.exe 5044 bEL62.exe 4216 cvv40QP.exe 3200 dCu87.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features dCu87.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" dCu87.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nWJ52.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a38fdb6d0bd07228d99b5ec5b6f71fcef825cbd638ae028864952bada16f2c5c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a38fdb6d0bd07228d99b5ec5b6f71fcef825cbd638ae028864952bada16f2c5c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce nWJ52.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5044 bEL62.exe 5044 bEL62.exe 4216 cvv40QP.exe 4216 cvv40QP.exe 3200 dCu87.exe 3200 dCu87.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5044 bEL62.exe Token: SeDebugPrivilege 4216 cvv40QP.exe Token: SeDebugPrivilege 3200 dCu87.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3052 wrote to memory of 4412 3052 a38fdb6d0bd07228d99b5ec5b6f71fcef825cbd638ae028864952bada16f2c5c.exe 34 PID 3052 wrote to memory of 4412 3052 a38fdb6d0bd07228d99b5ec5b6f71fcef825cbd638ae028864952bada16f2c5c.exe 34 PID 3052 wrote to memory of 4412 3052 a38fdb6d0bd07228d99b5ec5b6f71fcef825cbd638ae028864952bada16f2c5c.exe 34 PID 4412 wrote to memory of 5044 4412 nWJ52.exe 50 PID 4412 wrote to memory of 5044 4412 nWJ52.exe 50 PID 4412 wrote to memory of 5044 4412 nWJ52.exe 50 PID 4412 wrote to memory of 4216 4412 nWJ52.exe 69 PID 4412 wrote to memory of 4216 4412 nWJ52.exe 69 PID 4412 wrote to memory of 4216 4412 nWJ52.exe 69 PID 3052 wrote to memory of 3200 3052 a38fdb6d0bd07228d99b5ec5b6f71fcef825cbd638ae028864952bada16f2c5c.exe 70 PID 3052 wrote to memory of 3200 3052 a38fdb6d0bd07228d99b5ec5b6f71fcef825cbd638ae028864952bada16f2c5c.exe 70 PID 3052 wrote to memory of 3200 3052 a38fdb6d0bd07228d99b5ec5b6f71fcef825cbd638ae028864952bada16f2c5c.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\a38fdb6d0bd07228d99b5ec5b6f71fcef825cbd638ae028864952bada16f2c5c.exe"C:\Users\Admin\AppData\Local\Temp\a38fdb6d0bd07228d99b5ec5b6f71fcef825cbd638ae028864952bada16f2c5c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nWJ52.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nWJ52.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bEL62.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bEL62.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5044
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cvv40QP.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cvv40QP.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4216
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dCu87.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dCu87.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3200
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
427KB
MD523257501015b3d427b1d6a92ae250445
SHA183e3e4a159318286539795be53dc31b652a99d45
SHA256f8ee1e826db5ed90144a6a46b88b89b2e1efddd9b6af331386dfc3ceb054985d
SHA5121a67fb05b7ec8031b1d32a230525c813ad56cf2be0428c3dcf3ae431ec1e01fb7fc602155f19fe0ec79dea9aa9ae539678cccf6d7f734b5d6e1b5238f4b572b5
-
Filesize
427KB
MD523257501015b3d427b1d6a92ae250445
SHA183e3e4a159318286539795be53dc31b652a99d45
SHA256f8ee1e826db5ed90144a6a46b88b89b2e1efddd9b6af331386dfc3ceb054985d
SHA5121a67fb05b7ec8031b1d32a230525c813ad56cf2be0428c3dcf3ae431ec1e01fb7fc602155f19fe0ec79dea9aa9ae539678cccf6d7f734b5d6e1b5238f4b572b5
-
Filesize
202KB
MD573b44e75461c53d3667242037cad5dbb
SHA1ee95e6e754c936c6522e991d3fa268275ba5a5a6
SHA256aa90c4ff4d3da4237743445441d5d5c9ce636e26d8040201aeff479e165185cc
SHA512b0424eab99c785bcb2cd56e6f6f156bf30f814455f940dceab6eae938874193be1bed0359e5c3dbe9bb328a5bf314c400c7e36477e1e3cdb386039726af4c614
-
Filesize
202KB
MD573b44e75461c53d3667242037cad5dbb
SHA1ee95e6e754c936c6522e991d3fa268275ba5a5a6
SHA256aa90c4ff4d3da4237743445441d5d5c9ce636e26d8040201aeff479e165185cc
SHA512b0424eab99c785bcb2cd56e6f6f156bf30f814455f940dceab6eae938874193be1bed0359e5c3dbe9bb328a5bf314c400c7e36477e1e3cdb386039726af4c614
-
Filesize
175KB
MD5da6f3bef8abc85bd09f50783059964e3
SHA1a0f25f60ec1896c4c920ea397f40e6ce29724322
SHA256e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b
SHA5124d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec
-
Filesize
175KB
MD5da6f3bef8abc85bd09f50783059964e3
SHA1a0f25f60ec1896c4c920ea397f40e6ce29724322
SHA256e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b
SHA5124d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec
-
Filesize
175KB
MD530132c45c2305b287d96a3ad8158e9e3
SHA1c89477868792dbfc6abeb3016e4fcc542b01bea1
SHA2560cca99711baf600eb030bbfcf279faf74c564084e733df3d9e98bea3e4e2f45f
SHA5121f6ccbaf0787c9bc61f568c4398374426961fc73ed7ea38c75e27d7025a9df6f93ea111297a6a02acdeea52845067e222e681f278dc7278d834fbbb6be98b74e
-
Filesize
175KB
MD530132c45c2305b287d96a3ad8158e9e3
SHA1c89477868792dbfc6abeb3016e4fcc542b01bea1
SHA2560cca99711baf600eb030bbfcf279faf74c564084e733df3d9e98bea3e4e2f45f
SHA5121f6ccbaf0787c9bc61f568c4398374426961fc73ed7ea38c75e27d7025a9df6f93ea111297a6a02acdeea52845067e222e681f278dc7278d834fbbb6be98b74e