Analysis
-
max time kernel
90s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2023, 02:53
Static task
static1
Behavioral task
behavioral1
Sample
9f50f7ccd3dffa9fe88330a55d7b94ac6c03c3320498e5b5337e0d08924791df.exe
Resource
win10v2004-20220901-en
General
-
Target
9f50f7ccd3dffa9fe88330a55d7b94ac6c03c3320498e5b5337e0d08924791df.exe
-
Size
468KB
-
MD5
704f885c894b26366e97b2dc8581563a
-
SHA1
acaabb900382d88f7573880459dd01169aa6a95b
-
SHA256
9f50f7ccd3dffa9fe88330a55d7b94ac6c03c3320498e5b5337e0d08924791df
-
SHA512
7fb0be6c40a97e0d030ecb253851634389e1d352dea571aa86ce0ce4ae725ea01eba3ec908acabb669f3de198d3ea4090970ad0a5eb110404e2d009d40ab76a9
-
SSDEEP
12288:EMr5y90whv6XWTudLXz3cvd/NGyB23mCR:dy19632d7U3h
Malware Config
Extracted
redline
fusa
193.233.20.12:4132
-
auth_value
a08b2f01bd2af756e38c5dd60e87e697
Extracted
redline
crnn
176.113.115.17:4132
-
auth_value
6dfbf5eac3db7046d55dfd3f6608be3f
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dVV05.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection dVV05.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dVV05.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" dVV05.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dVV05.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" dVV05.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 4740 ncU78.exe 2760 baj74.exe 4372 cBZ23tk.exe 396 dVV05.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features dVV05.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" dVV05.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9f50f7ccd3dffa9fe88330a55d7b94ac6c03c3320498e5b5337e0d08924791df.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9f50f7ccd3dffa9fe88330a55d7b94ac6c03c3320498e5b5337e0d08924791df.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ncU78.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ncU78.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1504 396 WerFault.exe 88 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2760 baj74.exe 2760 baj74.exe 4372 cBZ23tk.exe 4372 cBZ23tk.exe 396 dVV05.exe 396 dVV05.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2760 baj74.exe Token: SeDebugPrivilege 4372 cBZ23tk.exe Token: SeDebugPrivilege 396 dVV05.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1352 wrote to memory of 4740 1352 9f50f7ccd3dffa9fe88330a55d7b94ac6c03c3320498e5b5337e0d08924791df.exe 76 PID 1352 wrote to memory of 4740 1352 9f50f7ccd3dffa9fe88330a55d7b94ac6c03c3320498e5b5337e0d08924791df.exe 76 PID 1352 wrote to memory of 4740 1352 9f50f7ccd3dffa9fe88330a55d7b94ac6c03c3320498e5b5337e0d08924791df.exe 76 PID 4740 wrote to memory of 2760 4740 ncU78.exe 77 PID 4740 wrote to memory of 2760 4740 ncU78.exe 77 PID 4740 wrote to memory of 2760 4740 ncU78.exe 77 PID 4740 wrote to memory of 4372 4740 ncU78.exe 84 PID 4740 wrote to memory of 4372 4740 ncU78.exe 84 PID 4740 wrote to memory of 4372 4740 ncU78.exe 84 PID 1352 wrote to memory of 396 1352 9f50f7ccd3dffa9fe88330a55d7b94ac6c03c3320498e5b5337e0d08924791df.exe 88 PID 1352 wrote to memory of 396 1352 9f50f7ccd3dffa9fe88330a55d7b94ac6c03c3320498e5b5337e0d08924791df.exe 88 PID 1352 wrote to memory of 396 1352 9f50f7ccd3dffa9fe88330a55d7b94ac6c03c3320498e5b5337e0d08924791df.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f50f7ccd3dffa9fe88330a55d7b94ac6c03c3320498e5b5337e0d08924791df.exe"C:\Users\Admin\AppData\Local\Temp\9f50f7ccd3dffa9fe88330a55d7b94ac6c03c3320498e5b5337e0d08924791df.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ncU78.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ncU78.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\baj74.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\baj74.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2760
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cBZ23tk.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cBZ23tk.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4372
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dVV05.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dVV05.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:396 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 396 -s 10643⤵
- Program crash
PID:1504
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 396 -ip 3961⤵PID:216
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
222KB
MD50092bc87c52bbf1b042d5e9c78f429f5
SHA1c84fc1c6111ebd3e51ed62ac37fcf92b22f2016d
SHA2563e1a96b86ed15bceb447dab641b092a0a89c03a23f1e156865121cee78614a40
SHA512703624ab24baa45d425de6727b925efa3714123483ffed0b01621aaef7b0e18b28ad3dd5fb910e7f1c1587ebaafe667083e921c8a69899efc4775cfe14d526a5
-
Filesize
222KB
MD50092bc87c52bbf1b042d5e9c78f429f5
SHA1c84fc1c6111ebd3e51ed62ac37fcf92b22f2016d
SHA2563e1a96b86ed15bceb447dab641b092a0a89c03a23f1e156865121cee78614a40
SHA512703624ab24baa45d425de6727b925efa3714123483ffed0b01621aaef7b0e18b28ad3dd5fb910e7f1c1587ebaafe667083e921c8a69899efc4775cfe14d526a5
-
Filesize
200KB
MD51e382cfee2acf85dc0fb75469a97d26b
SHA11aeae2198e42900c27410c1a5b44f25c64aca17e
SHA256b22570c42654e10b8149cd8ebce7c48aac108894769e80f89012bdb48fd9bc49
SHA512f5f267e6681246ed91593bce2a786aea4b995fdd2ea745dc98ec28af7b745e6ac244b8e065fbb508f20d6ebb2829e286e741eae0a87661762aea4a41bc6d199c
-
Filesize
200KB
MD51e382cfee2acf85dc0fb75469a97d26b
SHA11aeae2198e42900c27410c1a5b44f25c64aca17e
SHA256b22570c42654e10b8149cd8ebce7c48aac108894769e80f89012bdb48fd9bc49
SHA512f5f267e6681246ed91593bce2a786aea4b995fdd2ea745dc98ec28af7b745e6ac244b8e065fbb508f20d6ebb2829e286e741eae0a87661762aea4a41bc6d199c
-
Filesize
175KB
MD5da6f3bef8abc85bd09f50783059964e3
SHA1a0f25f60ec1896c4c920ea397f40e6ce29724322
SHA256e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b
SHA5124d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec
-
Filesize
175KB
MD5da6f3bef8abc85bd09f50783059964e3
SHA1a0f25f60ec1896c4c920ea397f40e6ce29724322
SHA256e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b
SHA5124d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec
-
Filesize
175KB
MD5062a3c73b1aaf076abefd71633b66de5
SHA1e4b7e004c32d673fd61b1669c797dc4b207d8445
SHA256f281aafa876847194d635feddb06b11295249cc4bcf940d5246bdb5938410881
SHA5126bee4020fa8e4955b3028a71037f78ec922132009942283e071b3acdeea375300cef092fd692e9463d625065d5ef57e5e1ebd98f72e801ffc2178c071d645ec3
-
Filesize
175KB
MD5062a3c73b1aaf076abefd71633b66de5
SHA1e4b7e004c32d673fd61b1669c797dc4b207d8445
SHA256f281aafa876847194d635feddb06b11295249cc4bcf940d5246bdb5938410881
SHA5126bee4020fa8e4955b3028a71037f78ec922132009942283e071b3acdeea375300cef092fd692e9463d625065d5ef57e5e1ebd98f72e801ffc2178c071d645ec3