Analysis
-
max time kernel
135s -
max time network
143s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
11/02/2023, 14:27
Static task
static1
General
-
Target
da80256a4f9361f016e5ae6c7f5ec31707e73f0f3673975a48ab327360a60328.exe
-
Size
739KB
-
MD5
7844c7ac81d8515310925bbe60102853
-
SHA1
03f3e3412cd694362e32d7780b7e6a1a81476d00
-
SHA256
da80256a4f9361f016e5ae6c7f5ec31707e73f0f3673975a48ab327360a60328
-
SHA512
1b9bbf81ca27e4902b715df7f2c55adc0fc1a27c9fd780d995e9e3be0c8be0fedba0340d461185d9a0399c9d513a92690fe290ff2b2f4047ce50f6dbfb1f7569
-
SSDEEP
12288:7Mrry90VLSaGDeOknwZWTsEJ04kI3nJVeeJuDOu+L7ZZt+DOH7Nzz7h8nb:wyLDinw4swjJVuDOu+L7ZZtThunb
Malware Config
Extracted
redline
dunm
193.233.20.12:4132
-
auth_value
352959e3707029296ec94306d74e2334
Extracted
amadey
3.66
62.204.41.4/Gol478Ns/index.php
Extracted
redline
romik
193.233.20.12:4132
-
auth_value
8fb78d2889ba0ca42678b59b884e88ff
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" fwk75.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" fwk75.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" fwk75.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" fwk75.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" fwk75.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/1268-710-0x0000000002690000-0x00000000026D6000-memory.dmp family_redline behavioral1/memory/1268-721-0x00000000028D0000-0x0000000002914000-memory.dmp family_redline -
Executes dropped EXE 9 IoCs
pid Process 3808 gvT61WH.exe 1280 gtm15NP.exe 4556 aHs66jt.exe 4756 bim49Zm.exe 4904 mnolyk.exe 1268 dSB5791.exe 1432 fwk75.exe 1672 mnolyk.exe 3840 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 32 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" fwk75.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce da80256a4f9361f016e5ae6c7f5ec31707e73f0f3673975a48ab327360a60328.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" da80256a4f9361f016e5ae6c7f5ec31707e73f0f3673975a48ab327360a60328.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce gvT61WH.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" gvT61WH.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce gtm15NP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" gtm15NP.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1844 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4556 aHs66jt.exe 4556 aHs66jt.exe 1268 dSB5791.exe 1268 dSB5791.exe 1432 fwk75.exe 1432 fwk75.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4556 aHs66jt.exe Token: SeDebugPrivilege 1268 dSB5791.exe Token: SeDebugPrivilege 1432 fwk75.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2796 wrote to memory of 3808 2796 da80256a4f9361f016e5ae6c7f5ec31707e73f0f3673975a48ab327360a60328.exe 66 PID 2796 wrote to memory of 3808 2796 da80256a4f9361f016e5ae6c7f5ec31707e73f0f3673975a48ab327360a60328.exe 66 PID 2796 wrote to memory of 3808 2796 da80256a4f9361f016e5ae6c7f5ec31707e73f0f3673975a48ab327360a60328.exe 66 PID 3808 wrote to memory of 1280 3808 gvT61WH.exe 67 PID 3808 wrote to memory of 1280 3808 gvT61WH.exe 67 PID 3808 wrote to memory of 1280 3808 gvT61WH.exe 67 PID 1280 wrote to memory of 4556 1280 gtm15NP.exe 68 PID 1280 wrote to memory of 4556 1280 gtm15NP.exe 68 PID 1280 wrote to memory of 4556 1280 gtm15NP.exe 68 PID 1280 wrote to memory of 4756 1280 gtm15NP.exe 70 PID 1280 wrote to memory of 4756 1280 gtm15NP.exe 70 PID 1280 wrote to memory of 4756 1280 gtm15NP.exe 70 PID 4756 wrote to memory of 4904 4756 bim49Zm.exe 71 PID 4756 wrote to memory of 4904 4756 bim49Zm.exe 71 PID 4756 wrote to memory of 4904 4756 bim49Zm.exe 71 PID 3808 wrote to memory of 1268 3808 gvT61WH.exe 72 PID 3808 wrote to memory of 1268 3808 gvT61WH.exe 72 PID 3808 wrote to memory of 1268 3808 gvT61WH.exe 72 PID 4904 wrote to memory of 1844 4904 mnolyk.exe 73 PID 4904 wrote to memory of 1844 4904 mnolyk.exe 73 PID 4904 wrote to memory of 1844 4904 mnolyk.exe 73 PID 4904 wrote to memory of 2472 4904 mnolyk.exe 74 PID 4904 wrote to memory of 2472 4904 mnolyk.exe 74 PID 4904 wrote to memory of 2472 4904 mnolyk.exe 74 PID 2472 wrote to memory of 5036 2472 cmd.exe 77 PID 2472 wrote to memory of 5036 2472 cmd.exe 77 PID 2472 wrote to memory of 5036 2472 cmd.exe 77 PID 2472 wrote to memory of 3408 2472 cmd.exe 78 PID 2472 wrote to memory of 3408 2472 cmd.exe 78 PID 2472 wrote to memory of 3408 2472 cmd.exe 78 PID 2472 wrote to memory of 1852 2472 cmd.exe 79 PID 2472 wrote to memory of 1852 2472 cmd.exe 79 PID 2472 wrote to memory of 1852 2472 cmd.exe 79 PID 2472 wrote to memory of 4604 2472 cmd.exe 80 PID 2472 wrote to memory of 4604 2472 cmd.exe 80 PID 2472 wrote to memory of 4604 2472 cmd.exe 80 PID 2472 wrote to memory of 772 2472 cmd.exe 81 PID 2472 wrote to memory of 772 2472 cmd.exe 81 PID 2472 wrote to memory of 772 2472 cmd.exe 81 PID 2472 wrote to memory of 4664 2472 cmd.exe 82 PID 2472 wrote to memory of 4664 2472 cmd.exe 82 PID 2472 wrote to memory of 4664 2472 cmd.exe 82 PID 2796 wrote to memory of 1432 2796 da80256a4f9361f016e5ae6c7f5ec31707e73f0f3673975a48ab327360a60328.exe 83 PID 2796 wrote to memory of 1432 2796 da80256a4f9361f016e5ae6c7f5ec31707e73f0f3673975a48ab327360a60328.exe 83 PID 4904 wrote to memory of 32 4904 mnolyk.exe 85 PID 4904 wrote to memory of 32 4904 mnolyk.exe 85 PID 4904 wrote to memory of 32 4904 mnolyk.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\da80256a4f9361f016e5ae6c7f5ec31707e73f0f3673975a48ab327360a60328.exe"C:\Users\Admin\AppData\Local\Temp\da80256a4f9361f016e5ae6c7f5ec31707e73f0f3673975a48ab327360a60328.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gvT61WH.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gvT61WH.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\gtm15NP.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\gtm15NP.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\aHs66jt.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\aHs66jt.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4556
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bim49Zm.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bim49Zm.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe" /F6⤵
- Creates scheduled task(s)
PID:1844
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\4b9a106e76" /P "Admin:N"&&CACLS "..\4b9a106e76" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:5036
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"7⤵PID:3408
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E7⤵PID:1852
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4604
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\4b9a106e76" /P "Admin:N"7⤵PID:772
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\4b9a106e76" /P "Admin:R" /E7⤵PID:4664
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main6⤵
- Loads dropped DLL
PID:32
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dSB5791.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dSB5791.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1268
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fwk75.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fwk75.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1432
-
-
C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe1⤵
- Executes dropped EXE
PID:1672
-
C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe1⤵
- Executes dropped EXE
PID:3840
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
635KB
MD55f741e3ff7482576d39137e1184ac626
SHA1ee9a858ca951020d99c6af4b53806fff4639b60a
SHA256fa766e8919978b8ed1008f337c75d6226e79eb51e40e2208ed0a7d1dc56205ec
SHA5121e97d9ca889471a09433155c0a65682de04e5a0f0d93f720363b627e9d7aab6135cf45af31d5955c25320f5b96527f7d06a175e92d3367d706c8cb6369f9d38a
-
Filesize
635KB
MD55f741e3ff7482576d39137e1184ac626
SHA1ee9a858ca951020d99c6af4b53806fff4639b60a
SHA256fa766e8919978b8ed1008f337c75d6226e79eb51e40e2208ed0a7d1dc56205ec
SHA5121e97d9ca889471a09433155c0a65682de04e5a0f0d93f720363b627e9d7aab6135cf45af31d5955c25320f5b96527f7d06a175e92d3367d706c8cb6369f9d38a
-
Filesize
338KB
MD5cb2d93db92499f0d807e5de936216415
SHA16599f128b4914dfa7085a114f765f28ab2383366
SHA2568b784da006ef6549b3db738ed63352e81be6cf5941330388e02b72ec188c41f6
SHA512af7c64d82e6d728cbbaf73e39f3f5203a6a575e06dd8e847f937460df83aeadc1599d45e6edc1af35bef60ac899e369f96b181932e25bce850fe179a05e6ba66
-
Filesize
338KB
MD5cb2d93db92499f0d807e5de936216415
SHA16599f128b4914dfa7085a114f765f28ab2383366
SHA2568b784da006ef6549b3db738ed63352e81be6cf5941330388e02b72ec188c41f6
SHA512af7c64d82e6d728cbbaf73e39f3f5203a6a575e06dd8e847f937460df83aeadc1599d45e6edc1af35bef60ac899e369f96b181932e25bce850fe179a05e6ba66
-
Filesize
286KB
MD5bd73320949e3cc6a2882fe62f5d478dd
SHA1cd6e91791db3e5a70a91689dd846f59df09e770e
SHA256fa21660bc44ee48578a84da66f7068cab68e5886dde8409971a7fc056a90aba3
SHA512c444b90abdb85f7f650e341535b57c6c79d6ed73cfd55b83d39d8f7d0e217f4c95b54326f4a249bbbe3c9c9562392cf0d925c7483a538688a6dedce936b15a9b
-
Filesize
286KB
MD5bd73320949e3cc6a2882fe62f5d478dd
SHA1cd6e91791db3e5a70a91689dd846f59df09e770e
SHA256fa21660bc44ee48578a84da66f7068cab68e5886dde8409971a7fc056a90aba3
SHA512c444b90abdb85f7f650e341535b57c6c79d6ed73cfd55b83d39d8f7d0e217f4c95b54326f4a249bbbe3c9c9562392cf0d925c7483a538688a6dedce936b15a9b
-
Filesize
175KB
MD569f79e05d0c83aee310d9adfe5aa7f2b
SHA1485c490180380051a14316564fbda07723be11b1
SHA256c41dc7f6cc752595337cd7f209f923b43b061b201c6ab4dc02151afb90cd66e2
SHA512f1789a74aeb83867c37ddeadcd06cddfc1454a94fcc122b35d67b0309b46742b9a6611e4c3e583baa90a3fd456e45c75ae5f1a206f6e4500c1f3f8ddf5e47b42
-
Filesize
175KB
MD569f79e05d0c83aee310d9adfe5aa7f2b
SHA1485c490180380051a14316564fbda07723be11b1
SHA256c41dc7f6cc752595337cd7f209f923b43b061b201c6ab4dc02151afb90cd66e2
SHA512f1789a74aeb83867c37ddeadcd06cddfc1454a94fcc122b35d67b0309b46742b9a6611e4c3e583baa90a3fd456e45c75ae5f1a206f6e4500c1f3f8ddf5e47b42
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
89KB
MD5c79b74d8fec5e7e2ba2f1789fd582a15
SHA178a1e5d99dbaccc5e07b125e1dfb280112cb3128
SHA256b5bd049d32f0faeea6ce65a0f0d326de5bc4427a7c1ad24bfb0ea050c1dec7d3
SHA5120debfc54904fd538cfb1fc648d18f90a991337200b3decf74b28ac2f341843fb3bab4f45bc92cfec333b18dfff9cc136854462e79054a39926a7bd8ee2e057ba
-
Filesize
89KB
MD5c79b74d8fec5e7e2ba2f1789fd582a15
SHA178a1e5d99dbaccc5e07b125e1dfb280112cb3128
SHA256b5bd049d32f0faeea6ce65a0f0d326de5bc4427a7c1ad24bfb0ea050c1dec7d3
SHA5120debfc54904fd538cfb1fc648d18f90a991337200b3decf74b28ac2f341843fb3bab4f45bc92cfec333b18dfff9cc136854462e79054a39926a7bd8ee2e057ba