Analysis
-
max time kernel
90s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
13-02-2023 22:46
Static task
static1
Behavioral task
behavioral1
Sample
f169ebda36849fb0f45a80b941b05085dda39aede7c657684d0b877e42a28081.exe
Resource
win10v2004-20220812-en
General
-
Target
f169ebda36849fb0f45a80b941b05085dda39aede7c657684d0b877e42a28081.exe
-
Size
474KB
-
MD5
81ab25f21bf7576b5fbcc86a6da5fe74
-
SHA1
3ab2c40ff41f8e69533ed32a8c9caad6481e3a8b
-
SHA256
f169ebda36849fb0f45a80b941b05085dda39aede7c657684d0b877e42a28081
-
SHA512
d45bf983a4f44db7ff118eb5d3a059b30aedf8128f78feb48af9a72c6807efa0471bba79e653e68d99b72e36ce9eac5ce00a22b957bfc24bae1ee39e513e076c
-
SSDEEP
12288:lMray90mqCFTefCtlWzskRqn8x+gWoWKR34:XyEClxtlwsRK+gJtx4
Malware Config
Extracted
redline
fusa
193.233.20.12:4132
-
auth_value
a08b2f01bd2af756e38c5dd60e87e697
Extracted
redline
crnn
176.113.115.17:4132
-
auth_value
6dfbf5eac3db7046d55dfd3f6608be3f
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dyB78.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" dyB78.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dyB78.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" dyB78.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dyB78.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection dyB78.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 3172 nLS45.exe 1360 baL11.exe 4864 cvO34xk.exe 3452 dyB78.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features dyB78.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" dyB78.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f169ebda36849fb0f45a80b941b05085dda39aede7c657684d0b877e42a28081.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f169ebda36849fb0f45a80b941b05085dda39aede7c657684d0b877e42a28081.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce nLS45.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nLS45.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4168 3452 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1360 baL11.exe 1360 baL11.exe 4864 cvO34xk.exe 4864 cvO34xk.exe 3452 dyB78.exe 3452 dyB78.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1360 baL11.exe Token: SeDebugPrivilege 4864 cvO34xk.exe Token: SeDebugPrivilege 3452 dyB78.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1400 wrote to memory of 3172 1400 f169ebda36849fb0f45a80b941b05085dda39aede7c657684d0b877e42a28081.exe 81 PID 1400 wrote to memory of 3172 1400 f169ebda36849fb0f45a80b941b05085dda39aede7c657684d0b877e42a28081.exe 81 PID 1400 wrote to memory of 3172 1400 f169ebda36849fb0f45a80b941b05085dda39aede7c657684d0b877e42a28081.exe 81 PID 3172 wrote to memory of 1360 3172 nLS45.exe 82 PID 3172 wrote to memory of 1360 3172 nLS45.exe 82 PID 3172 wrote to memory of 1360 3172 nLS45.exe 82 PID 3172 wrote to memory of 4864 3172 nLS45.exe 86 PID 3172 wrote to memory of 4864 3172 nLS45.exe 86 PID 3172 wrote to memory of 4864 3172 nLS45.exe 86 PID 1400 wrote to memory of 3452 1400 f169ebda36849fb0f45a80b941b05085dda39aede7c657684d0b877e42a28081.exe 91 PID 1400 wrote to memory of 3452 1400 f169ebda36849fb0f45a80b941b05085dda39aede7c657684d0b877e42a28081.exe 91 PID 1400 wrote to memory of 3452 1400 f169ebda36849fb0f45a80b941b05085dda39aede7c657684d0b877e42a28081.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\f169ebda36849fb0f45a80b941b05085dda39aede7c657684d0b877e42a28081.exe"C:\Users\Admin\AppData\Local\Temp\f169ebda36849fb0f45a80b941b05085dda39aede7c657684d0b877e42a28081.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nLS45.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nLS45.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\baL11.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\baL11.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1360
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cvO34xk.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cvO34xk.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4864
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dyB78.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dyB78.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3452 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3452 -s 10803⤵
- Program crash
PID:4168
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3452 -ip 34521⤵PID:4052
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
235KB
MD5ea2af715b2c17a763c05bffc5669ded5
SHA1876295abbc668533e3629c38e5b4db50776f969a
SHA256b639725c9da4eecd879a811d1f643a2d7cef7b15079547c075f3f380f2e83e29
SHA5121f42bf7bed7a87b2da22af31b6c0f3afe844eac6949e2f9379290ff6548259431f6f55c3d5a3de2f408889e0f3cb67898e1e26050b87408a10937902df0b0c9d
-
Filesize
235KB
MD5ea2af715b2c17a763c05bffc5669ded5
SHA1876295abbc668533e3629c38e5b4db50776f969a
SHA256b639725c9da4eecd879a811d1f643a2d7cef7b15079547c075f3f380f2e83e29
SHA5121f42bf7bed7a87b2da22af31b6c0f3afe844eac6949e2f9379290ff6548259431f6f55c3d5a3de2f408889e0f3cb67898e1e26050b87408a10937902df0b0c9d
-
Filesize
200KB
MD5f7e7a2ebd38ec2f267cf8c4183e0789f
SHA1a72484caea0a972046dc747b2c5768a3aa0c2185
SHA25652d00ac8e74c23a61bb7189501ad762603575979e86a531af0d1a8c02b1c0f0f
SHA512fee47d6ccee76898dbae72d737cc95b5c06c7e53ca4762b601eb78ed63bea403c6425a2dcdaf4262cc5042343bd02447b311912d9822abcdeed8a4e42e57eb99
-
Filesize
200KB
MD5f7e7a2ebd38ec2f267cf8c4183e0789f
SHA1a72484caea0a972046dc747b2c5768a3aa0c2185
SHA25652d00ac8e74c23a61bb7189501ad762603575979e86a531af0d1a8c02b1c0f0f
SHA512fee47d6ccee76898dbae72d737cc95b5c06c7e53ca4762b601eb78ed63bea403c6425a2dcdaf4262cc5042343bd02447b311912d9822abcdeed8a4e42e57eb99
-
Filesize
175KB
MD5da6f3bef8abc85bd09f50783059964e3
SHA1a0f25f60ec1896c4c920ea397f40e6ce29724322
SHA256e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b
SHA5124d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec
-
Filesize
175KB
MD5da6f3bef8abc85bd09f50783059964e3
SHA1a0f25f60ec1896c4c920ea397f40e6ce29724322
SHA256e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b
SHA5124d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec
-
Filesize
175KB
MD5062a3c73b1aaf076abefd71633b66de5
SHA1e4b7e004c32d673fd61b1669c797dc4b207d8445
SHA256f281aafa876847194d635feddb06b11295249cc4bcf940d5246bdb5938410881
SHA5126bee4020fa8e4955b3028a71037f78ec922132009942283e071b3acdeea375300cef092fd692e9463d625065d5ef57e5e1ebd98f72e801ffc2178c071d645ec3
-
Filesize
175KB
MD5062a3c73b1aaf076abefd71633b66de5
SHA1e4b7e004c32d673fd61b1669c797dc4b207d8445
SHA256f281aafa876847194d635feddb06b11295249cc4bcf940d5246bdb5938410881
SHA5126bee4020fa8e4955b3028a71037f78ec922132009942283e071b3acdeea375300cef092fd692e9463d625065d5ef57e5e1ebd98f72e801ffc2178c071d645ec3