Analysis
-
max time kernel
88s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
11-02-2023 07:26
Static task
static1
Behavioral task
behavioral1
Sample
61d774ae487d0e21b3020445dae34226d19f17e97cb5f0003533a18501ca3dd6.exe
Resource
win10-20220812-en
General
-
Target
61d774ae487d0e21b3020445dae34226d19f17e97cb5f0003533a18501ca3dd6.exe
-
Size
550KB
-
MD5
dee963872a300a754293c252e1e724f2
-
SHA1
a69f8c5531bf78280f301451872b71c9e265f0a7
-
SHA256
61d774ae487d0e21b3020445dae34226d19f17e97cb5f0003533a18501ca3dd6
-
SHA512
0bb26d8b30e5aa152f16baa544d470b4b4b1466956ffaf1761aad96b53871d8a0c1398891d6b943440912e729eaac2d17b37564e1f62e2f17e8099fee10e3c4b
-
SSDEEP
12288:7Mr0y90qVw4QZzFNLd9JQJXUWRFxHBXS2NG8seZtkqAGjxg:jyGZPd9qJzhpSXpKU5
Malware Config
Extracted
redline
fusa
193.233.20.12:4132
-
auth_value
a08b2f01bd2af756e38c5dd60e87e697
Extracted
redline
nocrypt
176.113.115.17:4132
-
auth_value
4fc7cda1ab5883a6197f20f517ce2a8c
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dvn40.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dvn40.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" dvn40.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dvn40.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" dvn40.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 5032 nlE93.exe 976 bwX16.exe 4840 cBj39JO.exe 1028 dvn40.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features dvn40.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" dvn40.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 61d774ae487d0e21b3020445dae34226d19f17e97cb5f0003533a18501ca3dd6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 61d774ae487d0e21b3020445dae34226d19f17e97cb5f0003533a18501ca3dd6.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce nlE93.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nlE93.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 976 bwX16.exe 976 bwX16.exe 4840 cBj39JO.exe 4840 cBj39JO.exe 1028 dvn40.exe 1028 dvn40.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 976 bwX16.exe Token: SeDebugPrivilege 4840 cBj39JO.exe Token: SeDebugPrivilege 1028 dvn40.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4956 wrote to memory of 5032 4956 61d774ae487d0e21b3020445dae34226d19f17e97cb5f0003533a18501ca3dd6.exe 66 PID 4956 wrote to memory of 5032 4956 61d774ae487d0e21b3020445dae34226d19f17e97cb5f0003533a18501ca3dd6.exe 66 PID 4956 wrote to memory of 5032 4956 61d774ae487d0e21b3020445dae34226d19f17e97cb5f0003533a18501ca3dd6.exe 66 PID 5032 wrote to memory of 976 5032 nlE93.exe 67 PID 5032 wrote to memory of 976 5032 nlE93.exe 67 PID 5032 wrote to memory of 976 5032 nlE93.exe 67 PID 5032 wrote to memory of 4840 5032 nlE93.exe 69 PID 5032 wrote to memory of 4840 5032 nlE93.exe 69 PID 5032 wrote to memory of 4840 5032 nlE93.exe 69 PID 4956 wrote to memory of 1028 4956 61d774ae487d0e21b3020445dae34226d19f17e97cb5f0003533a18501ca3dd6.exe 70 PID 4956 wrote to memory of 1028 4956 61d774ae487d0e21b3020445dae34226d19f17e97cb5f0003533a18501ca3dd6.exe 70 PID 4956 wrote to memory of 1028 4956 61d774ae487d0e21b3020445dae34226d19f17e97cb5f0003533a18501ca3dd6.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\61d774ae487d0e21b3020445dae34226d19f17e97cb5f0003533a18501ca3dd6.exe"C:\Users\Admin\AppData\Local\Temp\61d774ae487d0e21b3020445dae34226d19f17e97cb5f0003533a18501ca3dd6.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nlE93.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nlE93.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bwX16.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bwX16.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:976
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cBj39JO.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cBj39JO.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4840
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dvn40.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dvn40.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1028
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
423KB
MD57f14c915dbebec4c03ca065b9258626c
SHA104361ee6fe924e9395e826fe40149c535e7bf9c9
SHA256cab802ade8841200f555adc3678e1a442101b4f454b6d18d98424797434d0b27
SHA51236e1b891c975658153f2b10f42536894a464a7fe434daf78642a6aba5296e55c92b2d162a1ead053cded9b9156d7c901d4730833f1d536a2dd09282808c86d40
-
Filesize
423KB
MD57f14c915dbebec4c03ca065b9258626c
SHA104361ee6fe924e9395e826fe40149c535e7bf9c9
SHA256cab802ade8841200f555adc3678e1a442101b4f454b6d18d98424797434d0b27
SHA51236e1b891c975658153f2b10f42536894a464a7fe434daf78642a6aba5296e55c92b2d162a1ead053cded9b9156d7c901d4730833f1d536a2dd09282808c86d40
-
Filesize
202KB
MD507974041297a3844f73b1548918b75bf
SHA1e19307f11088ec2663a002540225996c1c35d454
SHA2569d75bb285063ace390b8c5f9f6e90988839ca93346126a884b81e5136dc9bb1c
SHA512de4c5a8c881ef020b0b17a74ff688ef6f9180315af0c468f5b4b9e7f2c5765e3fc86f062dc3190d273ee40f7ff1b354dcc1833f5abef5d0ca1ecb786fe9c0bde
-
Filesize
202KB
MD507974041297a3844f73b1548918b75bf
SHA1e19307f11088ec2663a002540225996c1c35d454
SHA2569d75bb285063ace390b8c5f9f6e90988839ca93346126a884b81e5136dc9bb1c
SHA512de4c5a8c881ef020b0b17a74ff688ef6f9180315af0c468f5b4b9e7f2c5765e3fc86f062dc3190d273ee40f7ff1b354dcc1833f5abef5d0ca1ecb786fe9c0bde
-
Filesize
175KB
MD5da6f3bef8abc85bd09f50783059964e3
SHA1a0f25f60ec1896c4c920ea397f40e6ce29724322
SHA256e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b
SHA5124d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec
-
Filesize
175KB
MD5da6f3bef8abc85bd09f50783059964e3
SHA1a0f25f60ec1896c4c920ea397f40e6ce29724322
SHA256e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b
SHA5124d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec
-
Filesize
175KB
MD530132c45c2305b287d96a3ad8158e9e3
SHA1c89477868792dbfc6abeb3016e4fcc542b01bea1
SHA2560cca99711baf600eb030bbfcf279faf74c564084e733df3d9e98bea3e4e2f45f
SHA5121f6ccbaf0787c9bc61f568c4398374426961fc73ed7ea38c75e27d7025a9df6f93ea111297a6a02acdeea52845067e222e681f278dc7278d834fbbb6be98b74e
-
Filesize
175KB
MD530132c45c2305b287d96a3ad8158e9e3
SHA1c89477868792dbfc6abeb3016e4fcc542b01bea1
SHA2560cca99711baf600eb030bbfcf279faf74c564084e733df3d9e98bea3e4e2f45f
SHA5121f6ccbaf0787c9bc61f568c4398374426961fc73ed7ea38c75e27d7025a9df6f93ea111297a6a02acdeea52845067e222e681f278dc7278d834fbbb6be98b74e