Analysis
-
max time kernel
50s -
max time network
71s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
13/02/2023, 03:49
Static task
static1
Behavioral task
behavioral1
Sample
b7e4bd1543ad859716be03a0a7fb60bd06c3f59ade8684ca46e447652ef587e2.exe
Resource
win10-20220901-en
General
-
Target
b7e4bd1543ad859716be03a0a7fb60bd06c3f59ade8684ca46e447652ef587e2.exe
-
Size
467KB
-
MD5
3ca81762a23e5f80839d9554e04b4c2c
-
SHA1
9b8a296dd5a5e9a855db33cbc9a59c6e4ead20d3
-
SHA256
b7e4bd1543ad859716be03a0a7fb60bd06c3f59ade8684ca46e447652ef587e2
-
SHA512
a696369ae3e2bf23e6544592fa379d9fb634f323a15f3179be7a66d739226c9fe043bd3486246723a75a69f7b80a05d02ff29bfd58b1ddae0d6d4cf991b38e8f
-
SSDEEP
12288:YMrwy90lXHHnz+/0jsNEK9PVDf7X0YL/K:YycHHnhsttJy
Malware Config
Extracted
redline
fusa
193.233.20.12:4132
-
auth_value
a08b2f01bd2af756e38c5dd60e87e697
Extracted
redline
crnn
176.113.115.17:4132
-
auth_value
6dfbf5eac3db7046d55dfd3f6608be3f
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dhh21.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" dhh21.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dhh21.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dhh21.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" dhh21.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 3908 nrO29.exe 1052 bQj81.exe 4956 cwI00Tb.exe 4556 dhh21.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features dhh21.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" dhh21.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce nrO29.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nrO29.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b7e4bd1543ad859716be03a0a7fb60bd06c3f59ade8684ca46e447652ef587e2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b7e4bd1543ad859716be03a0a7fb60bd06c3f59ade8684ca46e447652ef587e2.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1052 bQj81.exe 1052 bQj81.exe 4956 cwI00Tb.exe 4956 cwI00Tb.exe 4556 dhh21.exe 4556 dhh21.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1052 bQj81.exe Token: SeDebugPrivilege 4956 cwI00Tb.exe Token: SeDebugPrivilege 4556 dhh21.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1748 wrote to memory of 3908 1748 b7e4bd1543ad859716be03a0a7fb60bd06c3f59ade8684ca46e447652ef587e2.exe 66 PID 1748 wrote to memory of 3908 1748 b7e4bd1543ad859716be03a0a7fb60bd06c3f59ade8684ca46e447652ef587e2.exe 66 PID 1748 wrote to memory of 3908 1748 b7e4bd1543ad859716be03a0a7fb60bd06c3f59ade8684ca46e447652ef587e2.exe 66 PID 3908 wrote to memory of 1052 3908 nrO29.exe 67 PID 3908 wrote to memory of 1052 3908 nrO29.exe 67 PID 3908 wrote to memory of 1052 3908 nrO29.exe 67 PID 3908 wrote to memory of 4956 3908 nrO29.exe 69 PID 3908 wrote to memory of 4956 3908 nrO29.exe 69 PID 3908 wrote to memory of 4956 3908 nrO29.exe 69 PID 1748 wrote to memory of 4556 1748 b7e4bd1543ad859716be03a0a7fb60bd06c3f59ade8684ca46e447652ef587e2.exe 70 PID 1748 wrote to memory of 4556 1748 b7e4bd1543ad859716be03a0a7fb60bd06c3f59ade8684ca46e447652ef587e2.exe 70 PID 1748 wrote to memory of 4556 1748 b7e4bd1543ad859716be03a0a7fb60bd06c3f59ade8684ca46e447652ef587e2.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7e4bd1543ad859716be03a0a7fb60bd06c3f59ade8684ca46e447652ef587e2.exe"C:\Users\Admin\AppData\Local\Temp\b7e4bd1543ad859716be03a0a7fb60bd06c3f59ade8684ca46e447652ef587e2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nrO29.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nrO29.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bQj81.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bQj81.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1052
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cwI00Tb.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cwI00Tb.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4956
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dhh21.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dhh21.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4556
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
222KB
MD57b54906621ec5e810b4f7ea3033f4314
SHA1c30d8ab49d25c434b3052ce462f39566f256fc9f
SHA256a2e02dd24df4d967d05af67ab37bfa4dd21eafad8c93833e03478a3bdee76cbc
SHA5126b3ad3bd78c2204dc41f83641038da6a988719cf3d8ba951de11d0a50ece1c4724b7a0911bde9f96b912ba52e72dcc7b88db78e225de94c269c460967856d700
-
Filesize
222KB
MD57b54906621ec5e810b4f7ea3033f4314
SHA1c30d8ab49d25c434b3052ce462f39566f256fc9f
SHA256a2e02dd24df4d967d05af67ab37bfa4dd21eafad8c93833e03478a3bdee76cbc
SHA5126b3ad3bd78c2204dc41f83641038da6a988719cf3d8ba951de11d0a50ece1c4724b7a0911bde9f96b912ba52e72dcc7b88db78e225de94c269c460967856d700
-
Filesize
200KB
MD50f89a6e48b62f880545b08316a3364bd
SHA15d82116153aa4d431ebe6a886934b0b1610739f3
SHA256b784c4f6c187b636d281046f2538df68c785ce5bdd18035cd3c5f084b95b9b4c
SHA512bbb51d86d4421378078aaabe157b95900355dcb8f5deffc99b609447b4e3aa287fc5bfb08381dff089f5198622fcf764e631f4b32c17c206cf364ec5582f1a73
-
Filesize
200KB
MD50f89a6e48b62f880545b08316a3364bd
SHA15d82116153aa4d431ebe6a886934b0b1610739f3
SHA256b784c4f6c187b636d281046f2538df68c785ce5bdd18035cd3c5f084b95b9b4c
SHA512bbb51d86d4421378078aaabe157b95900355dcb8f5deffc99b609447b4e3aa287fc5bfb08381dff089f5198622fcf764e631f4b32c17c206cf364ec5582f1a73
-
Filesize
175KB
MD5da6f3bef8abc85bd09f50783059964e3
SHA1a0f25f60ec1896c4c920ea397f40e6ce29724322
SHA256e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b
SHA5124d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec
-
Filesize
175KB
MD5da6f3bef8abc85bd09f50783059964e3
SHA1a0f25f60ec1896c4c920ea397f40e6ce29724322
SHA256e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b
SHA5124d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec
-
Filesize
175KB
MD5062a3c73b1aaf076abefd71633b66de5
SHA1e4b7e004c32d673fd61b1669c797dc4b207d8445
SHA256f281aafa876847194d635feddb06b11295249cc4bcf940d5246bdb5938410881
SHA5126bee4020fa8e4955b3028a71037f78ec922132009942283e071b3acdeea375300cef092fd692e9463d625065d5ef57e5e1ebd98f72e801ffc2178c071d645ec3
-
Filesize
175KB
MD5062a3c73b1aaf076abefd71633b66de5
SHA1e4b7e004c32d673fd61b1669c797dc4b207d8445
SHA256f281aafa876847194d635feddb06b11295249cc4bcf940d5246bdb5938410881
SHA5126bee4020fa8e4955b3028a71037f78ec922132009942283e071b3acdeea375300cef092fd692e9463d625065d5ef57e5e1ebd98f72e801ffc2178c071d645ec3