Analysis
-
max time kernel
95s -
max time network
79s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
12/02/2023, 11:46
Static task
static1
Behavioral task
behavioral1
Sample
86b9cf4824590be0c956691d27575b8726df7470c2894a33b885c277affdeaef.exe
Resource
win10-20220812-en
General
-
Target
86b9cf4824590be0c956691d27575b8726df7470c2894a33b885c277affdeaef.exe
-
Size
472KB
-
MD5
a39579d351a04143699cba0f6ef5aa7e
-
SHA1
c25bfa74aab0a36856057eeed4a5e50bec2da3c6
-
SHA256
86b9cf4824590be0c956691d27575b8726df7470c2894a33b885c277affdeaef
-
SHA512
d1caa4a81ec1f3f1fcbc23b5b6b5077de5a18c2f5d7782e11bc7e9f484c916042bcccfe96b373d7e51d3ab16becacdaefdb369ab8ebec8f68dd562b5b1ffad39
-
SSDEEP
12288:YMr1y90/vhEP1VpCnIKUOEhwWfTmxVUueyozrnkWh:tyFNVrBOEhWcRycrvh
Malware Config
Extracted
redline
fusa
193.233.20.12:4132
-
auth_value
a08b2f01bd2af756e38c5dd60e87e697
Extracted
redline
nocrypt
176.113.115.17:4132
-
auth_value
4fc7cda1ab5883a6197f20f517ce2a8c
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dcL09.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dcL09.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" dcL09.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dcL09.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" dcL09.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 4504 ndL37.exe 4328 bks32.exe 4776 cAe00tQ.exe 4404 dcL09.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features dcL09.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" dcL09.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 86b9cf4824590be0c956691d27575b8726df7470c2894a33b885c277affdeaef.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ndL37.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ndL37.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 86b9cf4824590be0c956691d27575b8726df7470c2894a33b885c277affdeaef.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4328 bks32.exe 4328 bks32.exe 4776 cAe00tQ.exe 4776 cAe00tQ.exe 4404 dcL09.exe 4404 dcL09.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4328 bks32.exe Token: SeDebugPrivilege 4776 cAe00tQ.exe Token: SeDebugPrivilege 4404 dcL09.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2640 wrote to memory of 4504 2640 86b9cf4824590be0c956691d27575b8726df7470c2894a33b885c277affdeaef.exe 66 PID 2640 wrote to memory of 4504 2640 86b9cf4824590be0c956691d27575b8726df7470c2894a33b885c277affdeaef.exe 66 PID 2640 wrote to memory of 4504 2640 86b9cf4824590be0c956691d27575b8726df7470c2894a33b885c277affdeaef.exe 66 PID 4504 wrote to memory of 4328 4504 ndL37.exe 67 PID 4504 wrote to memory of 4328 4504 ndL37.exe 67 PID 4504 wrote to memory of 4328 4504 ndL37.exe 67 PID 4504 wrote to memory of 4776 4504 ndL37.exe 69 PID 4504 wrote to memory of 4776 4504 ndL37.exe 69 PID 4504 wrote to memory of 4776 4504 ndL37.exe 69 PID 2640 wrote to memory of 4404 2640 86b9cf4824590be0c956691d27575b8726df7470c2894a33b885c277affdeaef.exe 70 PID 2640 wrote to memory of 4404 2640 86b9cf4824590be0c956691d27575b8726df7470c2894a33b885c277affdeaef.exe 70 PID 2640 wrote to memory of 4404 2640 86b9cf4824590be0c956691d27575b8726df7470c2894a33b885c277affdeaef.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\86b9cf4824590be0c956691d27575b8726df7470c2894a33b885c277affdeaef.exe"C:\Users\Admin\AppData\Local\Temp\86b9cf4824590be0c956691d27575b8726df7470c2894a33b885c277affdeaef.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ndL37.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ndL37.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bks32.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bks32.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4328
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cAe00tQ.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cAe00tQ.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4776
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dcL09.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dcL09.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4404
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
229KB
MD53fd64f986615bbfd392fdfb7fc368a0c
SHA187d87e598eeda6628eb8499e43456e6c15a5be3d
SHA256d86430c9d5e18b6678e63032248b6492fc4cc76efe37fef3672a349f8ae908f1
SHA51264337454f35e1e673cdecbdd7b47645c73632190d9baf8a938bc8a2a1d08ca35fb532cfaafdcb6395492359db047d88e3379777667feb231aea53f34c67a3b4c
-
Filesize
229KB
MD53fd64f986615bbfd392fdfb7fc368a0c
SHA187d87e598eeda6628eb8499e43456e6c15a5be3d
SHA256d86430c9d5e18b6678e63032248b6492fc4cc76efe37fef3672a349f8ae908f1
SHA51264337454f35e1e673cdecbdd7b47645c73632190d9baf8a938bc8a2a1d08ca35fb532cfaafdcb6395492359db047d88e3379777667feb231aea53f34c67a3b4c
-
Filesize
202KB
MD51227c5cb16cdf79842c4912af3fe5021
SHA11e7321fd0a7279df39aaa9534f11b39ceb29f166
SHA256bb0e542721b85ebcdc5e8d262ac5ba222a58b4fb0b91afd3c1c083312c1b7ae8
SHA5124be21c3edff2579fa074c0137bfa69521a303024e2bdf1db2ff22c47c1336aff4f92951a60e9d02eeea3f9a3256c30c1bb37866c2676d5fb7b05e6b9fe217df1
-
Filesize
202KB
MD51227c5cb16cdf79842c4912af3fe5021
SHA11e7321fd0a7279df39aaa9534f11b39ceb29f166
SHA256bb0e542721b85ebcdc5e8d262ac5ba222a58b4fb0b91afd3c1c083312c1b7ae8
SHA5124be21c3edff2579fa074c0137bfa69521a303024e2bdf1db2ff22c47c1336aff4f92951a60e9d02eeea3f9a3256c30c1bb37866c2676d5fb7b05e6b9fe217df1
-
Filesize
175KB
MD5da6f3bef8abc85bd09f50783059964e3
SHA1a0f25f60ec1896c4c920ea397f40e6ce29724322
SHA256e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b
SHA5124d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec
-
Filesize
175KB
MD5da6f3bef8abc85bd09f50783059964e3
SHA1a0f25f60ec1896c4c920ea397f40e6ce29724322
SHA256e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b
SHA5124d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec
-
Filesize
175KB
MD530132c45c2305b287d96a3ad8158e9e3
SHA1c89477868792dbfc6abeb3016e4fcc542b01bea1
SHA2560cca99711baf600eb030bbfcf279faf74c564084e733df3d9e98bea3e4e2f45f
SHA5121f6ccbaf0787c9bc61f568c4398374426961fc73ed7ea38c75e27d7025a9df6f93ea111297a6a02acdeea52845067e222e681f278dc7278d834fbbb6be98b74e
-
Filesize
175KB
MD530132c45c2305b287d96a3ad8158e9e3
SHA1c89477868792dbfc6abeb3016e4fcc542b01bea1
SHA2560cca99711baf600eb030bbfcf279faf74c564084e733df3d9e98bea3e4e2f45f
SHA5121f6ccbaf0787c9bc61f568c4398374426961fc73ed7ea38c75e27d7025a9df6f93ea111297a6a02acdeea52845067e222e681f278dc7278d834fbbb6be98b74e