Analysis
-
max time kernel
149s -
max time network
142s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
11/02/2023, 17:02
Static task
static1
General
-
Target
77ed8ecae98af05a043529d4eb1ab62fc39973cf3cc845a55da9e45ac5772eb9.exe
-
Size
739KB
-
MD5
0194581931b43f00a5b51e958cbf5e04
-
SHA1
6f448b158389cf7d77b5ad6228afc7e7c40a01c0
-
SHA256
77ed8ecae98af05a043529d4eb1ab62fc39973cf3cc845a55da9e45ac5772eb9
-
SHA512
d4a73b3faa7883ea6cba90ba08cff1354fb92323ff61232cbc4c6ccea933c644a9aef9275930bb708a3435e986f3435f5b4fcbb6f50c0c1a257ad6756ec5e509
-
SSDEEP
12288:xMrLy90Da4RwGVp8hnJV19QXWGXQOSGAc+xz88D+FIPhJe4sDR5+DmQUKcH:WyUag3VCDzQXTSGyJ88D+FIZ4DTGm4cH
Malware Config
Extracted
redline
fusa
193.233.20.12:4132
-
auth_value
a08b2f01bd2af756e38c5dd60e87e697
Extracted
amadey
3.66
62.204.41.5/Bu58Ngs/index.php
Extracted
redline
romik
193.233.20.12:4132
-
auth_value
8fb78d2889ba0ca42678b59b884e88ff
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" rZn94Ln.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" rZn94Ln.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" rZn94Ln.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" rZn94Ln.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" rZn94Ln.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/528-736-0x00000000025C0000-0x0000000002606000-memory.dmp family_redline behavioral1/memory/528-741-0x0000000002770000-0x00000000027B4000-memory.dmp family_redline -
Executes dropped EXE 8 IoCs
pid Process 4820 sQu23As.exe 1072 srG23Zt.exe 4632 kca23kE.exe 4884 mbW29.exe 816 mnolyk.exe 528 nlK22qE.exe 4256 rZn94Ln.exe 860 mnolyk.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" rZn94Ln.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 77ed8ecae98af05a043529d4eb1ab62fc39973cf3cc845a55da9e45ac5772eb9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 77ed8ecae98af05a043529d4eb1ab62fc39973cf3cc845a55da9e45ac5772eb9.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce sQu23As.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" sQu23As.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce srG23Zt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" srG23Zt.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1780 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4632 kca23kE.exe 4632 kca23kE.exe 528 nlK22qE.exe 528 nlK22qE.exe 4256 rZn94Ln.exe 4256 rZn94Ln.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4632 kca23kE.exe Token: SeDebugPrivilege 528 nlK22qE.exe Token: SeDebugPrivilege 4256 rZn94Ln.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2208 wrote to memory of 4820 2208 77ed8ecae98af05a043529d4eb1ab62fc39973cf3cc845a55da9e45ac5772eb9.exe 66 PID 2208 wrote to memory of 4820 2208 77ed8ecae98af05a043529d4eb1ab62fc39973cf3cc845a55da9e45ac5772eb9.exe 66 PID 2208 wrote to memory of 4820 2208 77ed8ecae98af05a043529d4eb1ab62fc39973cf3cc845a55da9e45ac5772eb9.exe 66 PID 4820 wrote to memory of 1072 4820 sQu23As.exe 67 PID 4820 wrote to memory of 1072 4820 sQu23As.exe 67 PID 4820 wrote to memory of 1072 4820 sQu23As.exe 67 PID 1072 wrote to memory of 4632 1072 srG23Zt.exe 68 PID 1072 wrote to memory of 4632 1072 srG23Zt.exe 68 PID 1072 wrote to memory of 4632 1072 srG23Zt.exe 68 PID 1072 wrote to memory of 4884 1072 srG23Zt.exe 70 PID 1072 wrote to memory of 4884 1072 srG23Zt.exe 70 PID 1072 wrote to memory of 4884 1072 srG23Zt.exe 70 PID 4884 wrote to memory of 816 4884 mbW29.exe 71 PID 4884 wrote to memory of 816 4884 mbW29.exe 71 PID 4884 wrote to memory of 816 4884 mbW29.exe 71 PID 4820 wrote to memory of 528 4820 sQu23As.exe 72 PID 4820 wrote to memory of 528 4820 sQu23As.exe 72 PID 4820 wrote to memory of 528 4820 sQu23As.exe 72 PID 816 wrote to memory of 1780 816 mnolyk.exe 73 PID 816 wrote to memory of 1780 816 mnolyk.exe 73 PID 816 wrote to memory of 1780 816 mnolyk.exe 73 PID 816 wrote to memory of 1884 816 mnolyk.exe 74 PID 816 wrote to memory of 1884 816 mnolyk.exe 74 PID 816 wrote to memory of 1884 816 mnolyk.exe 74 PID 1884 wrote to memory of 3780 1884 cmd.exe 77 PID 1884 wrote to memory of 3780 1884 cmd.exe 77 PID 1884 wrote to memory of 3780 1884 cmd.exe 77 PID 1884 wrote to memory of 3660 1884 cmd.exe 78 PID 1884 wrote to memory of 3660 1884 cmd.exe 78 PID 1884 wrote to memory of 3660 1884 cmd.exe 78 PID 1884 wrote to memory of 1172 1884 cmd.exe 79 PID 1884 wrote to memory of 1172 1884 cmd.exe 79 PID 1884 wrote to memory of 1172 1884 cmd.exe 79 PID 1884 wrote to memory of 4732 1884 cmd.exe 80 PID 1884 wrote to memory of 4732 1884 cmd.exe 80 PID 1884 wrote to memory of 4732 1884 cmd.exe 80 PID 1884 wrote to memory of 752 1884 cmd.exe 81 PID 1884 wrote to memory of 752 1884 cmd.exe 81 PID 1884 wrote to memory of 752 1884 cmd.exe 81 PID 1884 wrote to memory of 4532 1884 cmd.exe 82 PID 1884 wrote to memory of 4532 1884 cmd.exe 82 PID 1884 wrote to memory of 4532 1884 cmd.exe 82 PID 2208 wrote to memory of 4256 2208 77ed8ecae98af05a043529d4eb1ab62fc39973cf3cc845a55da9e45ac5772eb9.exe 83 PID 2208 wrote to memory of 4256 2208 77ed8ecae98af05a043529d4eb1ab62fc39973cf3cc845a55da9e45ac5772eb9.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\77ed8ecae98af05a043529d4eb1ab62fc39973cf3cc845a55da9e45ac5772eb9.exe"C:\Users\Admin\AppData\Local\Temp\77ed8ecae98af05a043529d4eb1ab62fc39973cf3cc845a55da9e45ac5772eb9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sQu23As.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sQu23As.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\srG23Zt.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\srG23Zt.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kca23kE.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kca23kE.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4632
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mbW29.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mbW29.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe" /F6⤵
- Creates scheduled task(s)
PID:1780
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5eb6b96734" /P "Admin:N"&&CACLS "..\5eb6b96734" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3780
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"7⤵PID:3660
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E7⤵PID:1172
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4732
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:N"7⤵PID:752
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:R" /E7⤵PID:4532
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nlK22qE.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nlK22qE.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:528
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rZn94Ln.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rZn94Ln.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4256
-
-
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe1⤵
- Executes dropped EXE
PID:860
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
636KB
MD5399705eb7972591c3bdfc87d59db62d5
SHA1596cb553c6f50dbeebd1b0765a775c71c4048453
SHA25613fd6ac2ed2cd715d8d6374dbb2a18f17f4ef6bfb213e06032a3174853e5e346
SHA51209c0a554ad4b5b5772380df7d0c51904592d5d0515a139cc1684e6c4c5810c805674e3d045ddf69e42cfc8ce6ca41f00c866244eb0a98f8a92a8b3b8cd8da6fb
-
Filesize
636KB
MD5399705eb7972591c3bdfc87d59db62d5
SHA1596cb553c6f50dbeebd1b0765a775c71c4048453
SHA25613fd6ac2ed2cd715d8d6374dbb2a18f17f4ef6bfb213e06032a3174853e5e346
SHA51209c0a554ad4b5b5772380df7d0c51904592d5d0515a139cc1684e6c4c5810c805674e3d045ddf69e42cfc8ce6ca41f00c866244eb0a98f8a92a8b3b8cd8da6fb
-
Filesize
338KB
MD524c46754103adc1ecce0a7e177f03bf2
SHA172f06bb8c21d8da858a16399e2cd86be84f2e987
SHA2560130db5ed9a6d75757e9232d13d56033239b00afc7eeade437f96e377353181c
SHA51255ec531b17b8c7f193f918ff2042b72c18f6e4a081acb6daffdc5801c0083d2fa582e06ca495dcd3c2b624f4b291f2fae61b4364452b45f1c8635d41acb70eef
-
Filesize
338KB
MD524c46754103adc1ecce0a7e177f03bf2
SHA172f06bb8c21d8da858a16399e2cd86be84f2e987
SHA2560130db5ed9a6d75757e9232d13d56033239b00afc7eeade437f96e377353181c
SHA51255ec531b17b8c7f193f918ff2042b72c18f6e4a081acb6daffdc5801c0083d2fa582e06ca495dcd3c2b624f4b291f2fae61b4364452b45f1c8635d41acb70eef
-
Filesize
286KB
MD5a59a6d4f5487bee9edf3a53dd61dfbdf
SHA13d6a771de8d1680df5fde4e81883c9c2b2329b74
SHA25617420b311bae3c4fdb9de8f5f11f1572d4a41bcb9394afb0ba1f499b3d19c975
SHA5127200eb3e747f98cba3a707aa2af5c2f2eca3195f00863f458e7a11ae05f0188f2ef6389b2ad1a8ce1c41661f7338808fba528e86c6da74f14cb24299313deea6
-
Filesize
286KB
MD5a59a6d4f5487bee9edf3a53dd61dfbdf
SHA13d6a771de8d1680df5fde4e81883c9c2b2329b74
SHA25617420b311bae3c4fdb9de8f5f11f1572d4a41bcb9394afb0ba1f499b3d19c975
SHA5127200eb3e747f98cba3a707aa2af5c2f2eca3195f00863f458e7a11ae05f0188f2ef6389b2ad1a8ce1c41661f7338808fba528e86c6da74f14cb24299313deea6
-
Filesize
175KB
MD5da6f3bef8abc85bd09f50783059964e3
SHA1a0f25f60ec1896c4c920ea397f40e6ce29724322
SHA256e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b
SHA5124d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec
-
Filesize
175KB
MD5da6f3bef8abc85bd09f50783059964e3
SHA1a0f25f60ec1896c4c920ea397f40e6ce29724322
SHA256e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b
SHA5124d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd