Analysis
-
max time kernel
160s -
max time network
151s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
12-02-2023 23:20
Static task
static1
Behavioral task
behavioral1
Sample
71e9702cffa024dbfb623093a287ddd2ed5ad1dddaa9d0e44f7cbf2dd3b083b2.exe
Resource
win10-20220812-en
General
-
Target
71e9702cffa024dbfb623093a287ddd2ed5ad1dddaa9d0e44f7cbf2dd3b083b2.exe
-
Size
716KB
-
MD5
f62854af58d4aef23d3ec5e63696ffc4
-
SHA1
eafdaa4c408dad0ff44dbcf9cf9b839554796117
-
SHA256
71e9702cffa024dbfb623093a287ddd2ed5ad1dddaa9d0e44f7cbf2dd3b083b2
-
SHA512
4e578d91eaa7ac7d771cc28c29f9cc606be40461202731199f1c517d86dd5f1529f0f37b87a0c6e8f3db8b92ba46707f60b8d1652c0bcaa701bc683f886bba42
-
SSDEEP
12288:oMrBy90zfEeZV1UDyUo4wDA9AxqIKlGf88/KdIP8WyK0ilFpTf5jCij8R0r3Jlab:Zy6fVzCaVM6q8f88/KdIpeaRjkSrzuBX
Malware Config
Extracted
redline
fusa
193.233.20.12:4132
-
auth_value
a08b2f01bd2af756e38c5dd60e87e697
Extracted
amadey
3.66
62.204.41.5/Bu58Ngs/index.php
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 3028 sOd92sF.exe 3540 ssb13aH.exe 4932 kHN63sI.exe 2040 mZz55.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 71e9702cffa024dbfb623093a287ddd2ed5ad1dddaa9d0e44f7cbf2dd3b083b2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 71e9702cffa024dbfb623093a287ddd2ed5ad1dddaa9d0e44f7cbf2dd3b083b2.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce sOd92sF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" sOd92sF.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ssb13aH.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ssb13aH.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4932 kHN63sI.exe 4932 kHN63sI.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4932 kHN63sI.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1684 wrote to memory of 3028 1684 71e9702cffa024dbfb623093a287ddd2ed5ad1dddaa9d0e44f7cbf2dd3b083b2.exe 66 PID 1684 wrote to memory of 3028 1684 71e9702cffa024dbfb623093a287ddd2ed5ad1dddaa9d0e44f7cbf2dd3b083b2.exe 66 PID 1684 wrote to memory of 3028 1684 71e9702cffa024dbfb623093a287ddd2ed5ad1dddaa9d0e44f7cbf2dd3b083b2.exe 66 PID 3028 wrote to memory of 3540 3028 sOd92sF.exe 67 PID 3028 wrote to memory of 3540 3028 sOd92sF.exe 67 PID 3028 wrote to memory of 3540 3028 sOd92sF.exe 67 PID 3540 wrote to memory of 4932 3540 ssb13aH.exe 68 PID 3540 wrote to memory of 4932 3540 ssb13aH.exe 68 PID 3540 wrote to memory of 4932 3540 ssb13aH.exe 68 PID 3540 wrote to memory of 2040 3540 ssb13aH.exe 70 PID 3540 wrote to memory of 2040 3540 ssb13aH.exe 70 PID 3540 wrote to memory of 2040 3540 ssb13aH.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\71e9702cffa024dbfb623093a287ddd2ed5ad1dddaa9d0e44f7cbf2dd3b083b2.exe"C:\Users\Admin\AppData\Local\Temp\71e9702cffa024dbfb623093a287ddd2ed5ad1dddaa9d0e44f7cbf2dd3b083b2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sOd92sF.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sOd92sF.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ssb13aH.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ssb13aH.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kHN63sI.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kHN63sI.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4932
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mZz55.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mZz55.exe4⤵
- Executes dropped EXE
PID:2040
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
612KB
MD542d58021187dcdf166968545021f9a06
SHA1bdfb616db34c4c5de6c8badab07d3a4b17cf9c9d
SHA256bdc664a555769a75ae3e5cd219780715f003e9aa9f42718875be93eaa30cbc4e
SHA512fb91190202495bac0004b9ea1d04ca7b0016b8c54e8616de59b9c54942916a9f9dfa6bb69074562fcd86677db762e6ab73abc953bed6fa8b6f241414c162fbf1
-
Filesize
612KB
MD542d58021187dcdf166968545021f9a06
SHA1bdfb616db34c4c5de6c8badab07d3a4b17cf9c9d
SHA256bdc664a555769a75ae3e5cd219780715f003e9aa9f42718875be93eaa30cbc4e
SHA512fb91190202495bac0004b9ea1d04ca7b0016b8c54e8616de59b9c54942916a9f9dfa6bb69074562fcd86677db762e6ab73abc953bed6fa8b6f241414c162fbf1
-
Filesize
286KB
MD525f37e4c90aee212b2d6ba361446d79c
SHA1d3bb0bd049524a98bd5587a866c23bedac7d0401
SHA256b346013f6aedc6b33c9fa6dc5858b75211431d69f33b8f424e9fe97ebd382f75
SHA51213a15348ad37007f6b1f32f2e4c2166a4994928bbacf98a0680b47f61e4474778eef404b9603c8bf825d0928831b86b32c6357114478bd0be84b7d6f8aaadef8
-
Filesize
286KB
MD525f37e4c90aee212b2d6ba361446d79c
SHA1d3bb0bd049524a98bd5587a866c23bedac7d0401
SHA256b346013f6aedc6b33c9fa6dc5858b75211431d69f33b8f424e9fe97ebd382f75
SHA51213a15348ad37007f6b1f32f2e4c2166a4994928bbacf98a0680b47f61e4474778eef404b9603c8bf825d0928831b86b32c6357114478bd0be84b7d6f8aaadef8
-
Filesize
175KB
MD5da6f3bef8abc85bd09f50783059964e3
SHA1a0f25f60ec1896c4c920ea397f40e6ce29724322
SHA256e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b
SHA5124d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec
-
Filesize
175KB
MD5da6f3bef8abc85bd09f50783059964e3
SHA1a0f25f60ec1896c4c920ea397f40e6ce29724322
SHA256e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b
SHA5124d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd