Analysis
-
max time kernel
205s -
max time network
214s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
11/02/2023, 07:13
Static task
static1
Behavioral task
behavioral1
Sample
d670418ed396e5c336d57cf7e6cb3ab411015ac961faeb3607afd5d29603bf09.exe
Resource
win10v2004-20221111-en
General
-
Target
d670418ed396e5c336d57cf7e6cb3ab411015ac961faeb3607afd5d29603bf09.exe
-
Size
550KB
-
MD5
1033b72e8acf1c90a1dcfb8fe866cb9e
-
SHA1
dc5f3ba1de7d1b488ea38f43f9c63c1e6ed6b69c
-
SHA256
d670418ed396e5c336d57cf7e6cb3ab411015ac961faeb3607afd5d29603bf09
-
SHA512
296f6ca6706fc2e98f1b8cb8831a59b2bf3f2779402bb1ce8b9ff0017eda2062d4148048904f0cf31825281192ab2f0f99d21fa2c78b64fb71d22ef72a1490e4
-
SSDEEP
12288:JMrpy90PL+UVe0s0PCS+j5t5WpjvpZ3jVvomPlQs:Iy4LDVCS+NqfjV5
Malware Config
Extracted
redline
fusa
193.233.20.12:4132
-
auth_value
a08b2f01bd2af756e38c5dd60e87e697
Extracted
redline
nocrypt
176.113.115.17:4132
-
auth_value
4fc7cda1ab5883a6197f20f517ce2a8c
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection dZD87.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dZD87.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" dZD87.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dZD87.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" dZD87.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dZD87.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 788 ncI83.exe 4512 bcG86.exe 2580 czG96oG.exe 2872 dZD87.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features dZD87.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" dZD87.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d670418ed396e5c336d57cf7e6cb3ab411015ac961faeb3607afd5d29603bf09.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d670418ed396e5c336d57cf7e6cb3ab411015ac961faeb3607afd5d29603bf09.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ncI83.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ncI83.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1112 2872 WerFault.exe 83 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4512 bcG86.exe 4512 bcG86.exe 2580 czG96oG.exe 2580 czG96oG.exe 2872 dZD87.exe 2872 dZD87.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4512 bcG86.exe Token: SeDebugPrivilege 2580 czG96oG.exe Token: SeDebugPrivilege 2872 dZD87.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3504 wrote to memory of 788 3504 d670418ed396e5c336d57cf7e6cb3ab411015ac961faeb3607afd5d29603bf09.exe 80 PID 3504 wrote to memory of 788 3504 d670418ed396e5c336d57cf7e6cb3ab411015ac961faeb3607afd5d29603bf09.exe 80 PID 3504 wrote to memory of 788 3504 d670418ed396e5c336d57cf7e6cb3ab411015ac961faeb3607afd5d29603bf09.exe 80 PID 788 wrote to memory of 4512 788 ncI83.exe 81 PID 788 wrote to memory of 4512 788 ncI83.exe 81 PID 788 wrote to memory of 4512 788 ncI83.exe 81 PID 788 wrote to memory of 2580 788 ncI83.exe 82 PID 788 wrote to memory of 2580 788 ncI83.exe 82 PID 788 wrote to memory of 2580 788 ncI83.exe 82 PID 3504 wrote to memory of 2872 3504 d670418ed396e5c336d57cf7e6cb3ab411015ac961faeb3607afd5d29603bf09.exe 83 PID 3504 wrote to memory of 2872 3504 d670418ed396e5c336d57cf7e6cb3ab411015ac961faeb3607afd5d29603bf09.exe 83 PID 3504 wrote to memory of 2872 3504 d670418ed396e5c336d57cf7e6cb3ab411015ac961faeb3607afd5d29603bf09.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\d670418ed396e5c336d57cf7e6cb3ab411015ac961faeb3607afd5d29603bf09.exe"C:\Users\Admin\AppData\Local\Temp\d670418ed396e5c336d57cf7e6cb3ab411015ac961faeb3607afd5d29603bf09.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ncI83.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ncI83.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bcG86.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bcG86.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4512
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\czG96oG.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\czG96oG.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2580
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dZD87.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dZD87.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2872 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2872 -s 10843⤵
- Program crash
PID:1112
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2872 -ip 28721⤵PID:2800
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
423KB
MD57f14c915dbebec4c03ca065b9258626c
SHA104361ee6fe924e9395e826fe40149c535e7bf9c9
SHA256cab802ade8841200f555adc3678e1a442101b4f454b6d18d98424797434d0b27
SHA51236e1b891c975658153f2b10f42536894a464a7fe434daf78642a6aba5296e55c92b2d162a1ead053cded9b9156d7c901d4730833f1d536a2dd09282808c86d40
-
Filesize
423KB
MD57f14c915dbebec4c03ca065b9258626c
SHA104361ee6fe924e9395e826fe40149c535e7bf9c9
SHA256cab802ade8841200f555adc3678e1a442101b4f454b6d18d98424797434d0b27
SHA51236e1b891c975658153f2b10f42536894a464a7fe434daf78642a6aba5296e55c92b2d162a1ead053cded9b9156d7c901d4730833f1d536a2dd09282808c86d40
-
Filesize
202KB
MD580be60e29f7547b8dc5aea89145da8d8
SHA164be30f5c55e72426cfdc2d5b952d5e6cd29add8
SHA256ca9f89d67e693bc814245d6d209927ac7189b11e7478227835108c8eeb8bc4cf
SHA5129e8a8cc8e352d56b856b82acf283be07faf4a4168ef164b3fc248f2aa1f60acb82243da7f18f2cd405a610acf639ab5ac6d763191d50e1fae86311758a32cd9a
-
Filesize
202KB
MD580be60e29f7547b8dc5aea89145da8d8
SHA164be30f5c55e72426cfdc2d5b952d5e6cd29add8
SHA256ca9f89d67e693bc814245d6d209927ac7189b11e7478227835108c8eeb8bc4cf
SHA5129e8a8cc8e352d56b856b82acf283be07faf4a4168ef164b3fc248f2aa1f60acb82243da7f18f2cd405a610acf639ab5ac6d763191d50e1fae86311758a32cd9a
-
Filesize
175KB
MD5da6f3bef8abc85bd09f50783059964e3
SHA1a0f25f60ec1896c4c920ea397f40e6ce29724322
SHA256e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b
SHA5124d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec
-
Filesize
175KB
MD5da6f3bef8abc85bd09f50783059964e3
SHA1a0f25f60ec1896c4c920ea397f40e6ce29724322
SHA256e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b
SHA5124d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec
-
Filesize
175KB
MD530132c45c2305b287d96a3ad8158e9e3
SHA1c89477868792dbfc6abeb3016e4fcc542b01bea1
SHA2560cca99711baf600eb030bbfcf279faf74c564084e733df3d9e98bea3e4e2f45f
SHA5121f6ccbaf0787c9bc61f568c4398374426961fc73ed7ea38c75e27d7025a9df6f93ea111297a6a02acdeea52845067e222e681f278dc7278d834fbbb6be98b74e
-
Filesize
175KB
MD530132c45c2305b287d96a3ad8158e9e3
SHA1c89477868792dbfc6abeb3016e4fcc542b01bea1
SHA2560cca99711baf600eb030bbfcf279faf74c564084e733df3d9e98bea3e4e2f45f
SHA5121f6ccbaf0787c9bc61f568c4398374426961fc73ed7ea38c75e27d7025a9df6f93ea111297a6a02acdeea52845067e222e681f278dc7278d834fbbb6be98b74e