Analysis
-
max time kernel
132s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
12/02/2023, 16:46
Static task
static1
General
-
Target
65a641d6288399e154b5276044f8f6b23d20baaa970414708eb34c4b96727ab6.exe
-
Size
719KB
-
MD5
d07a57f78a40b86c8ee79db81b172e1b
-
SHA1
61c06fbfa6ff3c5a8b74b6f03fd4c2078d437293
-
SHA256
65a641d6288399e154b5276044f8f6b23d20baaa970414708eb34c4b96727ab6
-
SHA512
86775e51fd48feeb4d1cc587b1e6bc977b882b0f2c56c64396ea6f353218301b28af119393aa2c7783e010b429925f0c90157a7250d81720b13588bff9dc7d15
-
SSDEEP
12288:0MrFy90/vcCcV3WqA7rCzbZT2MjgZrWH88TVKIP5ahzxMLAIsLth2u2NhA79pk:Zy5V27XAH88TVKIoFME1Ltclw9m
Malware Config
Extracted
redline
fusa
193.233.20.12:4132
-
auth_value
a08b2f01bd2af756e38c5dd60e87e697
Extracted
amadey
3.66
62.204.41.5/Bu58Ngs/index.php
Extracted
redline
romik
193.233.20.12:4132
-
auth_value
8fb78d2889ba0ca42678b59b884e88ff
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" rLn06bV.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" rLn06bV.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" rLn06bV.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" rLn06bV.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" rLn06bV.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/232-567-0x0000000002690000-0x00000000026D6000-memory.dmp family_redline behavioral1/memory/232-587-0x00000000027D0000-0x0000000002814000-memory.dmp family_redline -
Executes dropped EXE 9 IoCs
pid Process 3732 sep43Xt.exe 4236 sWQ18md.exe 4604 krp83xD.exe 1304 msO27.exe 328 mnolyk.exe 232 nmr14ys.exe 4176 rLn06bV.exe 1488 mnolyk.exe 3884 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 4616 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" rLn06bV.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" sWQ18md.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 65a641d6288399e154b5276044f8f6b23d20baaa970414708eb34c4b96727ab6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 65a641d6288399e154b5276044f8f6b23d20baaa970414708eb34c4b96727ab6.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce sep43Xt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" sep43Xt.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce sWQ18md.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5100 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4604 krp83xD.exe 4604 krp83xD.exe 232 nmr14ys.exe 232 nmr14ys.exe 4176 rLn06bV.exe 4176 rLn06bV.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4604 krp83xD.exe Token: SeDebugPrivilege 232 nmr14ys.exe Token: SeDebugPrivilege 4176 rLn06bV.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 5112 wrote to memory of 3732 5112 65a641d6288399e154b5276044f8f6b23d20baaa970414708eb34c4b96727ab6.exe 67 PID 5112 wrote to memory of 3732 5112 65a641d6288399e154b5276044f8f6b23d20baaa970414708eb34c4b96727ab6.exe 67 PID 5112 wrote to memory of 3732 5112 65a641d6288399e154b5276044f8f6b23d20baaa970414708eb34c4b96727ab6.exe 67 PID 3732 wrote to memory of 4236 3732 sep43Xt.exe 68 PID 3732 wrote to memory of 4236 3732 sep43Xt.exe 68 PID 3732 wrote to memory of 4236 3732 sep43Xt.exe 68 PID 4236 wrote to memory of 4604 4236 sWQ18md.exe 69 PID 4236 wrote to memory of 4604 4236 sWQ18md.exe 69 PID 4236 wrote to memory of 4604 4236 sWQ18md.exe 69 PID 4236 wrote to memory of 1304 4236 sWQ18md.exe 71 PID 4236 wrote to memory of 1304 4236 sWQ18md.exe 71 PID 4236 wrote to memory of 1304 4236 sWQ18md.exe 71 PID 1304 wrote to memory of 328 1304 msO27.exe 72 PID 1304 wrote to memory of 328 1304 msO27.exe 72 PID 1304 wrote to memory of 328 1304 msO27.exe 72 PID 3732 wrote to memory of 232 3732 sep43Xt.exe 73 PID 3732 wrote to memory of 232 3732 sep43Xt.exe 73 PID 3732 wrote to memory of 232 3732 sep43Xt.exe 73 PID 328 wrote to memory of 5100 328 mnolyk.exe 74 PID 328 wrote to memory of 5100 328 mnolyk.exe 74 PID 328 wrote to memory of 5100 328 mnolyk.exe 74 PID 328 wrote to memory of 4104 328 mnolyk.exe 75 PID 328 wrote to memory of 4104 328 mnolyk.exe 75 PID 328 wrote to memory of 4104 328 mnolyk.exe 75 PID 4104 wrote to memory of 4296 4104 cmd.exe 78 PID 4104 wrote to memory of 4296 4104 cmd.exe 78 PID 4104 wrote to memory of 4296 4104 cmd.exe 78 PID 4104 wrote to memory of 4300 4104 cmd.exe 79 PID 4104 wrote to memory of 4300 4104 cmd.exe 79 PID 4104 wrote to memory of 4300 4104 cmd.exe 79 PID 4104 wrote to memory of 4028 4104 cmd.exe 80 PID 4104 wrote to memory of 4028 4104 cmd.exe 80 PID 4104 wrote to memory of 4028 4104 cmd.exe 80 PID 4104 wrote to memory of 4824 4104 cmd.exe 81 PID 4104 wrote to memory of 4824 4104 cmd.exe 81 PID 4104 wrote to memory of 4824 4104 cmd.exe 81 PID 4104 wrote to memory of 4848 4104 cmd.exe 82 PID 4104 wrote to memory of 4848 4104 cmd.exe 82 PID 4104 wrote to memory of 4848 4104 cmd.exe 82 PID 4104 wrote to memory of 1264 4104 cmd.exe 83 PID 4104 wrote to memory of 1264 4104 cmd.exe 83 PID 4104 wrote to memory of 1264 4104 cmd.exe 83 PID 5112 wrote to memory of 4176 5112 65a641d6288399e154b5276044f8f6b23d20baaa970414708eb34c4b96727ab6.exe 84 PID 5112 wrote to memory of 4176 5112 65a641d6288399e154b5276044f8f6b23d20baaa970414708eb34c4b96727ab6.exe 84 PID 328 wrote to memory of 4616 328 mnolyk.exe 86 PID 328 wrote to memory of 4616 328 mnolyk.exe 86 PID 328 wrote to memory of 4616 328 mnolyk.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\65a641d6288399e154b5276044f8f6b23d20baaa970414708eb34c4b96727ab6.exe"C:\Users\Admin\AppData\Local\Temp\65a641d6288399e154b5276044f8f6b23d20baaa970414708eb34c4b96727ab6.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sep43Xt.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sep43Xt.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sWQ18md.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sWQ18md.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\krp83xD.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\krp83xD.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4604
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\msO27.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\msO27.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:328 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe" /F6⤵
- Creates scheduled task(s)
PID:5100
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5eb6b96734" /P "Admin:N"&&CACLS "..\5eb6b96734" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4296
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"7⤵PID:4300
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E7⤵PID:4028
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4824
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:N"7⤵PID:4848
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:R" /E7⤵PID:1264
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:4616
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nmr14ys.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nmr14ys.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:232
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rLn06bV.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rLn06bV.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4176
-
-
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe1⤵
- Executes dropped EXE
PID:1488
-
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe1⤵
- Executes dropped EXE
PID:3884
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
615KB
MD53d517b6dfbdde154348de314d7cf1972
SHA16bdcbfc84ad236bbbac36f556060568b33519e37
SHA256400922b83d0498acca76f6e27f16a1f021551647402a771512290e67e48906e1
SHA512ce35a3e1c4ef8ff005e4e9987892a751ffe16cba20de6e8534e8a1bbd0de41f44335712b1905253298c6255868e166f7bbfc22defd03ce04b67f5d08e8f4b174
-
Filesize
615KB
MD53d517b6dfbdde154348de314d7cf1972
SHA16bdcbfc84ad236bbbac36f556060568b33519e37
SHA256400922b83d0498acca76f6e27f16a1f021551647402a771512290e67e48906e1
SHA512ce35a3e1c4ef8ff005e4e9987892a751ffe16cba20de6e8534e8a1bbd0de41f44335712b1905253298c6255868e166f7bbfc22defd03ce04b67f5d08e8f4b174
-
Filesize
287KB
MD50024cc9e82a4601c75eaf243dddb6bce
SHA112813cc6138f0209735e44802a0bbeb2d0bbc158
SHA256e26139f3c42f250a12c1df619868bda6dab52067f2708f9ed2acf74d2bb748aa
SHA5120e10eea8a790875fba1ecd87ffafa410adf5bbd2709b0df1037da96a6b926fdbc4ab2c32396cf1c6b10d696c2ad28ad9e4d04954c9c2ee41a31db9cfad111ade
-
Filesize
287KB
MD50024cc9e82a4601c75eaf243dddb6bce
SHA112813cc6138f0209735e44802a0bbeb2d0bbc158
SHA256e26139f3c42f250a12c1df619868bda6dab52067f2708f9ed2acf74d2bb748aa
SHA5120e10eea8a790875fba1ecd87ffafa410adf5bbd2709b0df1037da96a6b926fdbc4ab2c32396cf1c6b10d696c2ad28ad9e4d04954c9c2ee41a31db9cfad111ade
-
Filesize
286KB
MD539e45b398e641bcd11a6c76a2ee297d0
SHA19c7c13269d0476b0189dde92147526dc57acf459
SHA2560600fa5930d39ffe77d325dc148d1a8005ba3e9e6738ea6abd2438ab39192a1e
SHA512b435212f887146420f79fd1b8c6209eafe25870e42f1bea93b2e19f7e4e9d1ee074268aec8ebcb9d09eea728fd7244604c45ffc2de32f4b64b201abc2c3cd4e9
-
Filesize
286KB
MD539e45b398e641bcd11a6c76a2ee297d0
SHA19c7c13269d0476b0189dde92147526dc57acf459
SHA2560600fa5930d39ffe77d325dc148d1a8005ba3e9e6738ea6abd2438ab39192a1e
SHA512b435212f887146420f79fd1b8c6209eafe25870e42f1bea93b2e19f7e4e9d1ee074268aec8ebcb9d09eea728fd7244604c45ffc2de32f4b64b201abc2c3cd4e9
-
Filesize
175KB
MD5da6f3bef8abc85bd09f50783059964e3
SHA1a0f25f60ec1896c4c920ea397f40e6ce29724322
SHA256e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b
SHA5124d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec
-
Filesize
175KB
MD5da6f3bef8abc85bd09f50783059964e3
SHA1a0f25f60ec1896c4c920ea397f40e6ce29724322
SHA256e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b
SHA5124d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
89KB
MD59221a421a3e777eb7d4ce55e474bcc4a
SHA1c96d7bd7ccbf9352d50527bff472595b3dc5298e
SHA25610ee53988bcfbb4bb9c8928ea96c4268bd64b9dfd1f28c6233185e695434d2f8
SHA51263ac172cb19c7c020676937cb35e853710d08e99e06e8cdcb410c37e0c9056af409a50fdec0c90a3c532edcf5e0f128fa1e2181063e1208d4fc4643b1b5736f3
-
Filesize
89KB
MD59221a421a3e777eb7d4ce55e474bcc4a
SHA1c96d7bd7ccbf9352d50527bff472595b3dc5298e
SHA25610ee53988bcfbb4bb9c8928ea96c4268bd64b9dfd1f28c6233185e695434d2f8
SHA51263ac172cb19c7c020676937cb35e853710d08e99e06e8cdcb410c37e0c9056af409a50fdec0c90a3c532edcf5e0f128fa1e2181063e1208d4fc4643b1b5736f3