Analysis
-
max time kernel
65s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
13-02-2023 22:31
Static task
static1
Behavioral task
behavioral1
Sample
7be94813669601adf1c2486a165dbf5f3317bbcadad72272509b5820f2a20dff.exe
Resource
win10v2004-20221111-en
General
-
Target
7be94813669601adf1c2486a165dbf5f3317bbcadad72272509b5820f2a20dff.exe
-
Size
478KB
-
MD5
3ab12afc1a30cbdb0c3da2d84ab1bbcb
-
SHA1
ab0725be45a171e263d27771aa56193545b66464
-
SHA256
7be94813669601adf1c2486a165dbf5f3317bbcadad72272509b5820f2a20dff
-
SHA512
6cd7d8e4dc7be9a318c51d01cbcd57797cae017f37e92dea304987e114a226e5787de46b587cdbab49619b0fbe35db3b645fdaaf28a01b383ee09553aa0af799
-
SSDEEP
6144:KZy+bnr+Lp0yN90QEwvlRj1yuwT2vUnDHSybHW/FweEGePQZJAm2qpza88+kpC:DMrjy90Stp1yulm3HW/eYyU2q88BMC
Malware Config
Extracted
redline
fusa
193.233.20.12:4132
-
auth_value
a08b2f01bd2af756e38c5dd60e87e697
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection lpn76Wh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" lpn76Wh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" lpn76Wh.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection bHj10yq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" bHj10yq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" bHj10yq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" lpn76Wh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" lpn76Wh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" lpn76Wh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" bHj10yq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" bHj10yq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" bHj10yq.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 5020 nQb70dX.exe 5000 bHj10yq.exe 316 dbV49wp.exe 2080 lpn76Wh.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" bHj10yq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" lpn76Wh.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features bHj10yq.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7be94813669601adf1c2486a165dbf5f3317bbcadad72272509b5820f2a20dff.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce nQb70dX.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nQb70dX.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 7be94813669601adf1c2486a165dbf5f3317bbcadad72272509b5820f2a20dff.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1868 5000 WerFault.exe 82 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5000 bHj10yq.exe 5000 bHj10yq.exe 316 dbV49wp.exe 316 dbV49wp.exe 2080 lpn76Wh.exe 2080 lpn76Wh.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5000 bHj10yq.exe Token: SeDebugPrivilege 316 dbV49wp.exe Token: SeDebugPrivilege 2080 lpn76Wh.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1276 wrote to memory of 5020 1276 7be94813669601adf1c2486a165dbf5f3317bbcadad72272509b5820f2a20dff.exe 81 PID 1276 wrote to memory of 5020 1276 7be94813669601adf1c2486a165dbf5f3317bbcadad72272509b5820f2a20dff.exe 81 PID 1276 wrote to memory of 5020 1276 7be94813669601adf1c2486a165dbf5f3317bbcadad72272509b5820f2a20dff.exe 81 PID 5020 wrote to memory of 5000 5020 nQb70dX.exe 82 PID 5020 wrote to memory of 5000 5020 nQb70dX.exe 82 PID 5020 wrote to memory of 5000 5020 nQb70dX.exe 82 PID 5020 wrote to memory of 316 5020 nQb70dX.exe 91 PID 5020 wrote to memory of 316 5020 nQb70dX.exe 91 PID 5020 wrote to memory of 316 5020 nQb70dX.exe 91 PID 1276 wrote to memory of 2080 1276 7be94813669601adf1c2486a165dbf5f3317bbcadad72272509b5820f2a20dff.exe 93 PID 1276 wrote to memory of 2080 1276 7be94813669601adf1c2486a165dbf5f3317bbcadad72272509b5820f2a20dff.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\7be94813669601adf1c2486a165dbf5f3317bbcadad72272509b5820f2a20dff.exe"C:\Users\Admin\AppData\Local\Temp\7be94813669601adf1c2486a165dbf5f3317bbcadad72272509b5820f2a20dff.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nQb70dX.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nQb70dX.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bHj10yq.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bHj10yq.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5000 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 10084⤵
- Program crash
PID:1868
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dbV49wp.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dbV49wp.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:316
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lpn76Wh.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lpn76Wh.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 5000 -ip 50001⤵PID:2676
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
375KB
MD5fd0b41eed48fd57e156b5b20e51f1642
SHA1b25ccc6c159d4a5f1ef66e4c0e770349cf8146cf
SHA256aab8ef2a9108a9df8c25e0b6d775ce7809c483de6927c9622cdf63775cf7ead3
SHA512058c17aa7fd6c3051650c87e96352566feba15471e582a2fe1910dbe8eb441dcb2cdb364904ca4d4c786ef83255dc1801562eccde42f588496ba3ba9ae0e37d9
-
Filesize
375KB
MD5fd0b41eed48fd57e156b5b20e51f1642
SHA1b25ccc6c159d4a5f1ef66e4c0e770349cf8146cf
SHA256aab8ef2a9108a9df8c25e0b6d775ce7809c483de6927c9622cdf63775cf7ead3
SHA512058c17aa7fd6c3051650c87e96352566feba15471e582a2fe1910dbe8eb441dcb2cdb364904ca4d4c786ef83255dc1801562eccde42f588496ba3ba9ae0e37d9
-
Filesize
235KB
MD5ea2af715b2c17a763c05bffc5669ded5
SHA1876295abbc668533e3629c38e5b4db50776f969a
SHA256b639725c9da4eecd879a811d1f643a2d7cef7b15079547c075f3f380f2e83e29
SHA5121f42bf7bed7a87b2da22af31b6c0f3afe844eac6949e2f9379290ff6548259431f6f55c3d5a3de2f408889e0f3cb67898e1e26050b87408a10937902df0b0c9d
-
Filesize
235KB
MD5ea2af715b2c17a763c05bffc5669ded5
SHA1876295abbc668533e3629c38e5b4db50776f969a
SHA256b639725c9da4eecd879a811d1f643a2d7cef7b15079547c075f3f380f2e83e29
SHA5121f42bf7bed7a87b2da22af31b6c0f3afe844eac6949e2f9379290ff6548259431f6f55c3d5a3de2f408889e0f3cb67898e1e26050b87408a10937902df0b0c9d
-
Filesize
175KB
MD5da6f3bef8abc85bd09f50783059964e3
SHA1a0f25f60ec1896c4c920ea397f40e6ce29724322
SHA256e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b
SHA5124d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec
-
Filesize
175KB
MD5da6f3bef8abc85bd09f50783059964e3
SHA1a0f25f60ec1896c4c920ea397f40e6ce29724322
SHA256e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b
SHA5124d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec