Analysis
-
max time kernel
91s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
11-02-2023 19:11
Static task
static1
Behavioral task
behavioral1
Sample
73689f35e5c3314666769cea1523915f725ff953c247be0da22a1023bd51a42c.exe
Resource
win10v2004-20220901-en
General
-
Target
73689f35e5c3314666769cea1523915f725ff953c247be0da22a1023bd51a42c.exe
-
Size
766KB
-
MD5
57c92001d59f347842f452b4ffb17b13
-
SHA1
c1b371e447108cdc859f5a20a35bb5560b6f8693
-
SHA256
73689f35e5c3314666769cea1523915f725ff953c247be0da22a1023bd51a42c
-
SHA512
b06824afd8921058f02112e9715d94f949f9d78638169ee778a24203711980459db7643d52d11ac76ac9b7b6c644f26a309f18809fc4e571c003557fad8ad6a5
-
SSDEEP
12288:BMrxy90ywN7VDo6QlfnYWCIOvstTrkjss4BFDhDlOzMaTc0EfySngPuPfVA:4ydwJVc6QxYvDgrkj8Nn4jTctfySnvV
Malware Config
Extracted
redline
crypt1
176.113.115.17:4132
-
auth_value
2e2ca7bbceaa9f98252a6f9fc0e6fa86
Extracted
redline
dunm
193.233.20.12:4132
-
auth_value
352959e3707029296ec94306d74e2334
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection szC90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" szC90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" szC90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" szC90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" szC90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" szC90.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
pid Process 3640 vjr68.exe 2276 vnT73.exe 3356 dSp38.exe 796 lbx59.exe 3788 nMy29.exe 3616 szC90.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" szC90.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 73689f35e5c3314666769cea1523915f725ff953c247be0da22a1023bd51a42c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 73689f35e5c3314666769cea1523915f725ff953c247be0da22a1023bd51a42c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vjr68.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vjr68.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vnT73.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" vnT73.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 796 set thread context of 4268 796 lbx59.exe 88 -
Program crash 1 IoCs
pid pid_target Process procid_target 1196 3356 WerFault.exe 82 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3356 dSp38.exe 3356 dSp38.exe 4268 AppLaunch.exe 3788 nMy29.exe 4268 AppLaunch.exe 3788 nMy29.exe 3616 szC90.exe 3616 szC90.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3356 dSp38.exe Token: SeDebugPrivilege 4268 AppLaunch.exe Token: SeDebugPrivilege 3788 nMy29.exe Token: SeDebugPrivilege 3616 szC90.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1048 wrote to memory of 3640 1048 73689f35e5c3314666769cea1523915f725ff953c247be0da22a1023bd51a42c.exe 80 PID 1048 wrote to memory of 3640 1048 73689f35e5c3314666769cea1523915f725ff953c247be0da22a1023bd51a42c.exe 80 PID 1048 wrote to memory of 3640 1048 73689f35e5c3314666769cea1523915f725ff953c247be0da22a1023bd51a42c.exe 80 PID 3640 wrote to memory of 2276 3640 vjr68.exe 81 PID 3640 wrote to memory of 2276 3640 vjr68.exe 81 PID 3640 wrote to memory of 2276 3640 vjr68.exe 81 PID 2276 wrote to memory of 3356 2276 vnT73.exe 82 PID 2276 wrote to memory of 3356 2276 vnT73.exe 82 PID 2276 wrote to memory of 3356 2276 vnT73.exe 82 PID 2276 wrote to memory of 796 2276 vnT73.exe 86 PID 2276 wrote to memory of 796 2276 vnT73.exe 86 PID 2276 wrote to memory of 796 2276 vnT73.exe 86 PID 796 wrote to memory of 4268 796 lbx59.exe 88 PID 796 wrote to memory of 4268 796 lbx59.exe 88 PID 796 wrote to memory of 4268 796 lbx59.exe 88 PID 796 wrote to memory of 4268 796 lbx59.exe 88 PID 796 wrote to memory of 4268 796 lbx59.exe 88 PID 3640 wrote to memory of 3788 3640 vjr68.exe 89 PID 3640 wrote to memory of 3788 3640 vjr68.exe 89 PID 3640 wrote to memory of 3788 3640 vjr68.exe 89 PID 1048 wrote to memory of 3616 1048 73689f35e5c3314666769cea1523915f725ff953c247be0da22a1023bd51a42c.exe 91 PID 1048 wrote to memory of 3616 1048 73689f35e5c3314666769cea1523915f725ff953c247be0da22a1023bd51a42c.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\73689f35e5c3314666769cea1523915f725ff953c247be0da22a1023bd51a42c.exe"C:\Users\Admin\AppData\Local\Temp\73689f35e5c3314666769cea1523915f725ff953c247be0da22a1023bd51a42c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vjr68.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vjr68.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vnT73.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vnT73.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dSp38.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dSp38.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3356 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3356 -s 15485⤵
- Program crash
PID:1196
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\lbx59.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\lbx59.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4268
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nMy29.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nMy29.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3788
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\szC90.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\szC90.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3356 -ip 33561⤵PID:228
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
662KB
MD521ddeb410f0a7d50bdcd0048d45f45d9
SHA1d7445739154370162f7e1f81555f8f97b69bd100
SHA25656400b9fb4b7fdfd3452667198bd415fa1b63fa3038f1901af6d88b955ddafb5
SHA512c30e236048d21eff34226f48d252a053bd08de15554eccfc013e111d4d33fa02d1f69557095459fcb55be7f224fdca551d010ecf1f4bd795912395c8327b293d
-
Filesize
662KB
MD521ddeb410f0a7d50bdcd0048d45f45d9
SHA1d7445739154370162f7e1f81555f8f97b69bd100
SHA25656400b9fb4b7fdfd3452667198bd415fa1b63fa3038f1901af6d88b955ddafb5
SHA512c30e236048d21eff34226f48d252a053bd08de15554eccfc013e111d4d33fa02d1f69557095459fcb55be7f224fdca551d010ecf1f4bd795912395c8327b293d
-
Filesize
175KB
MD569f79e05d0c83aee310d9adfe5aa7f2b
SHA1485c490180380051a14316564fbda07723be11b1
SHA256c41dc7f6cc752595337cd7f209f923b43b061b201c6ab4dc02151afb90cd66e2
SHA512f1789a74aeb83867c37ddeadcd06cddfc1454a94fcc122b35d67b0309b46742b9a6611e4c3e583baa90a3fd456e45c75ae5f1a206f6e4500c1f3f8ddf5e47b42
-
Filesize
175KB
MD569f79e05d0c83aee310d9adfe5aa7f2b
SHA1485c490180380051a14316564fbda07723be11b1
SHA256c41dc7f6cc752595337cd7f209f923b43b061b201c6ab4dc02151afb90cd66e2
SHA512f1789a74aeb83867c37ddeadcd06cddfc1454a94fcc122b35d67b0309b46742b9a6611e4c3e583baa90a3fd456e45c75ae5f1a206f6e4500c1f3f8ddf5e47b42
-
Filesize
517KB
MD5cc03aeb61411d3aec5f5806a43423e29
SHA1df42934a32676d5ab7d62c30619117e3c16c0137
SHA2569320fd317b1aee8da6c0a6d2aa2d95683cdd49032d12e8ae0bd3eb4f40dea56d
SHA512edc569696575c66cde3cbcf700f924054d4f724838c786fd99c0d047c0a557cc097e7b11d1468d6ab4286e70f75a98a91b8065e6a3d2b5d036f125842ada04df
-
Filesize
517KB
MD5cc03aeb61411d3aec5f5806a43423e29
SHA1df42934a32676d5ab7d62c30619117e3c16c0137
SHA2569320fd317b1aee8da6c0a6d2aa2d95683cdd49032d12e8ae0bd3eb4f40dea56d
SHA512edc569696575c66cde3cbcf700f924054d4f724838c786fd99c0d047c0a557cc097e7b11d1468d6ab4286e70f75a98a91b8065e6a3d2b5d036f125842ada04df
-
Filesize
295KB
MD5d8dc91e4e92e8180ed954ad107ef273a
SHA171a90521a00c976b51a3bb871ae084ff7b82fd85
SHA2561bf985d2fad051952b94362e61093806795a0b79ec6641e75cf9e194d770abd3
SHA512772a25964a00375ea5ed6132b8d335e63d182f7744b8662aa99a4bd29f43a80e80f908bc17cd2f7351f5685b4de5844cea1b78f674b1fb0551e2ffd83b29020f
-
Filesize
295KB
MD5d8dc91e4e92e8180ed954ad107ef273a
SHA171a90521a00c976b51a3bb871ae084ff7b82fd85
SHA2561bf985d2fad051952b94362e61093806795a0b79ec6641e75cf9e194d770abd3
SHA512772a25964a00375ea5ed6132b8d335e63d182f7744b8662aa99a4bd29f43a80e80f908bc17cd2f7351f5685b4de5844cea1b78f674b1fb0551e2ffd83b29020f
-
Filesize
277KB
MD53bc6ecb7d1f35f3171383f88879659b7
SHA1e82887b3d6ab38ae3b8880d6c904244495dcf0cc
SHA256c95f1ca2230edb615f3365e4c3ad09e4e1940a2c554eaf27c0df2d5bc4fc1068
SHA512709eb1c1c322c70a2a377324fa1766bfff9a3e1d37db04da240aaab36317d813b6f32f5c0d0a3f8d30f196f132985fce0ec030d5783df3c7bff76a4ccfb4431c
-
Filesize
277KB
MD53bc6ecb7d1f35f3171383f88879659b7
SHA1e82887b3d6ab38ae3b8880d6c904244495dcf0cc
SHA256c95f1ca2230edb615f3365e4c3ad09e4e1940a2c554eaf27c0df2d5bc4fc1068
SHA512709eb1c1c322c70a2a377324fa1766bfff9a3e1d37db04da240aaab36317d813b6f32f5c0d0a3f8d30f196f132985fce0ec030d5783df3c7bff76a4ccfb4431c