Analysis
-
max time kernel
138s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
11/02/2023, 13:04
Static task
static1
Behavioral task
behavioral1
Sample
52ca7344eca2a4182a89126542d2e96854439e54c3aba73e2699046f0c31aedf.exe
Resource
win10v2004-20221111-en
General
-
Target
52ca7344eca2a4182a89126542d2e96854439e54c3aba73e2699046f0c31aedf.exe
-
Size
551KB
-
MD5
fef747038a6db99d89ee7a8c827faaeb
-
SHA1
395fa04bd45d93b4d7e7de428c0cb0139e084d87
-
SHA256
52ca7344eca2a4182a89126542d2e96854439e54c3aba73e2699046f0c31aedf
-
SHA512
6a34ef7ce2c3aa36db92cdf1c9fbccab6bc3d6162ca86ac436a6875e2251495deb9d15e27afdbffb2ad49b08fd659d5c8cd61ffdbcc68e171a85d9bb704975de
-
SSDEEP
12288:jMr0y90pdDVes6i+Ta7q7jA+KTYSeSqJ0J:DyCV6VTaG3UTYiJ
Malware Config
Extracted
redline
fusa
193.233.20.12:4132
-
auth_value
a08b2f01bd2af756e38c5dd60e87e697
Extracted
redline
nocrypt
176.113.115.17:4132
-
auth_value
4fc7cda1ab5883a6197f20f517ce2a8c
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dSg00.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" dSg00.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dSg00.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection dSg00.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dSg00.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" dSg00.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 2348 nWb87.exe 2164 bmM06.exe 3956 cYp71NA.exe 240 dSg00.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features dSg00.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" dSg00.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 52ca7344eca2a4182a89126542d2e96854439e54c3aba73e2699046f0c31aedf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 52ca7344eca2a4182a89126542d2e96854439e54c3aba73e2699046f0c31aedf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce nWb87.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nWb87.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2072 240 WerFault.exe 84 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2164 bmM06.exe 2164 bmM06.exe 3956 cYp71NA.exe 3956 cYp71NA.exe 240 dSg00.exe 240 dSg00.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2164 bmM06.exe Token: SeDebugPrivilege 3956 cYp71NA.exe Token: SeDebugPrivilege 240 dSg00.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4844 wrote to memory of 2348 4844 52ca7344eca2a4182a89126542d2e96854439e54c3aba73e2699046f0c31aedf.exe 80 PID 4844 wrote to memory of 2348 4844 52ca7344eca2a4182a89126542d2e96854439e54c3aba73e2699046f0c31aedf.exe 80 PID 4844 wrote to memory of 2348 4844 52ca7344eca2a4182a89126542d2e96854439e54c3aba73e2699046f0c31aedf.exe 80 PID 2348 wrote to memory of 2164 2348 nWb87.exe 81 PID 2348 wrote to memory of 2164 2348 nWb87.exe 81 PID 2348 wrote to memory of 2164 2348 nWb87.exe 81 PID 2348 wrote to memory of 3956 2348 nWb87.exe 83 PID 2348 wrote to memory of 3956 2348 nWb87.exe 83 PID 2348 wrote to memory of 3956 2348 nWb87.exe 83 PID 4844 wrote to memory of 240 4844 52ca7344eca2a4182a89126542d2e96854439e54c3aba73e2699046f0c31aedf.exe 84 PID 4844 wrote to memory of 240 4844 52ca7344eca2a4182a89126542d2e96854439e54c3aba73e2699046f0c31aedf.exe 84 PID 4844 wrote to memory of 240 4844 52ca7344eca2a4182a89126542d2e96854439e54c3aba73e2699046f0c31aedf.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\52ca7344eca2a4182a89126542d2e96854439e54c3aba73e2699046f0c31aedf.exe"C:\Users\Admin\AppData\Local\Temp\52ca7344eca2a4182a89126542d2e96854439e54c3aba73e2699046f0c31aedf.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nWb87.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nWb87.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bmM06.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bmM06.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2164
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cYp71NA.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cYp71NA.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3956
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dSg00.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dSg00.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:240 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 240 -s 10843⤵
- Program crash
PID:2072
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 240 -ip 2401⤵PID:3608
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
422KB
MD53c189136240dd7c0598e4108ccb4eee8
SHA190060a3f325f2aea6e43170ef941fd7af0d787ca
SHA2563cb096cf07c7eb61f90f54f208d06a73fbc8d35b6cdc32e66af7746e1f7c44ef
SHA51248047e53fc44eb1d62936907781de85268eff2618d9d4b5c94a0d3d97de59c6a8462cfde965a68963685888e088604da2599547a0ec009cdf6113e2e299aaa54
-
Filesize
422KB
MD53c189136240dd7c0598e4108ccb4eee8
SHA190060a3f325f2aea6e43170ef941fd7af0d787ca
SHA2563cb096cf07c7eb61f90f54f208d06a73fbc8d35b6cdc32e66af7746e1f7c44ef
SHA51248047e53fc44eb1d62936907781de85268eff2618d9d4b5c94a0d3d97de59c6a8462cfde965a68963685888e088604da2599547a0ec009cdf6113e2e299aaa54
-
Filesize
202KB
MD5a4d7f47f17e5fa9c6525da11537aac47
SHA1e5fc801b9d8f789e5b1abd0dc60799cc04c7f5a3
SHA2560a277b309019c9078ebca2355f7b7fcacb5f927a8f3426dbd2de7e24b39b85fa
SHA51220c267dd791a2766df96de9fc92aa6957f2a42b73e0bb68f223ce1ff96b30e60d9652278f908a82e58a1a25c72a133e45949450a222fa0fd1529dd93d71abc12
-
Filesize
202KB
MD5a4d7f47f17e5fa9c6525da11537aac47
SHA1e5fc801b9d8f789e5b1abd0dc60799cc04c7f5a3
SHA2560a277b309019c9078ebca2355f7b7fcacb5f927a8f3426dbd2de7e24b39b85fa
SHA51220c267dd791a2766df96de9fc92aa6957f2a42b73e0bb68f223ce1ff96b30e60d9652278f908a82e58a1a25c72a133e45949450a222fa0fd1529dd93d71abc12
-
Filesize
175KB
MD5da6f3bef8abc85bd09f50783059964e3
SHA1a0f25f60ec1896c4c920ea397f40e6ce29724322
SHA256e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b
SHA5124d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec
-
Filesize
175KB
MD5da6f3bef8abc85bd09f50783059964e3
SHA1a0f25f60ec1896c4c920ea397f40e6ce29724322
SHA256e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b
SHA5124d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec
-
Filesize
175KB
MD530132c45c2305b287d96a3ad8158e9e3
SHA1c89477868792dbfc6abeb3016e4fcc542b01bea1
SHA2560cca99711baf600eb030bbfcf279faf74c564084e733df3d9e98bea3e4e2f45f
SHA5121f6ccbaf0787c9bc61f568c4398374426961fc73ed7ea38c75e27d7025a9df6f93ea111297a6a02acdeea52845067e222e681f278dc7278d834fbbb6be98b74e
-
Filesize
175KB
MD530132c45c2305b287d96a3ad8158e9e3
SHA1c89477868792dbfc6abeb3016e4fcc542b01bea1
SHA2560cca99711baf600eb030bbfcf279faf74c564084e733df3d9e98bea3e4e2f45f
SHA5121f6ccbaf0787c9bc61f568c4398374426961fc73ed7ea38c75e27d7025a9df6f93ea111297a6a02acdeea52845067e222e681f278dc7278d834fbbb6be98b74e