Analysis
-
max time kernel
45s -
max time network
63s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
13/02/2023, 15:09
Static task
static1
Behavioral task
behavioral1
Sample
128cee381323338543e831629ebc89c9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
128cee381323338543e831629ebc89c9.exe
Resource
win10v2004-20220812-en
General
-
Target
128cee381323338543e831629ebc89c9.exe
-
Size
481KB
-
MD5
128cee381323338543e831629ebc89c9
-
SHA1
87b1626b745aded348c7efa69fdf252077d3c948
-
SHA256
69d10ce59d7555a18627f7e5ecb72ecec7f1480be3dd5ea4f85008a23e947258
-
SHA512
69f6a9db3f9bb1cab660170e69fda7f5ad1fe7b0f23261408e9657a548664bbe8e5331fb6737e054c123c687ab5cfbd12f9f147ed21c3fd502b0baee3dc23b15
-
SSDEEP
12288:5MrVy90lotyVOqx5gvv/tLQfadBFQdaAjeV+kYc:QyvQVDivu+BydJjU+k1
Malware Config
Extracted
redline
fusa
193.233.20.12:4132
-
auth_value
a08b2f01bd2af756e38c5dd60e87e697
Extracted
redline
crnn
176.113.115.17:4132
-
auth_value
6dfbf5eac3db7046d55dfd3f6608be3f
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" dJs94.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dJs94.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" dJs94.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dJs94.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection dJs94.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dJs94.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 976 nDl87.exe 612 bpF17.exe 684 cUb47cM.exe 1964 dJs94.exe -
Loads dropped DLL 9 IoCs
pid Process 940 128cee381323338543e831629ebc89c9.exe 976 nDl87.exe 976 nDl87.exe 612 bpF17.exe 976 nDl87.exe 684 cUb47cM.exe 940 128cee381323338543e831629ebc89c9.exe 940 128cee381323338543e831629ebc89c9.exe 1964 dJs94.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features dJs94.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" dJs94.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce nDl87.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nDl87.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 128cee381323338543e831629ebc89c9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 128cee381323338543e831629ebc89c9.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 612 bpF17.exe 612 bpF17.exe 684 cUb47cM.exe 684 cUb47cM.exe 1964 dJs94.exe 1964 dJs94.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 612 bpF17.exe Token: SeDebugPrivilege 684 cUb47cM.exe Token: SeDebugPrivilege 1964 dJs94.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 940 wrote to memory of 976 940 128cee381323338543e831629ebc89c9.exe 28 PID 940 wrote to memory of 976 940 128cee381323338543e831629ebc89c9.exe 28 PID 940 wrote to memory of 976 940 128cee381323338543e831629ebc89c9.exe 28 PID 940 wrote to memory of 976 940 128cee381323338543e831629ebc89c9.exe 28 PID 940 wrote to memory of 976 940 128cee381323338543e831629ebc89c9.exe 28 PID 940 wrote to memory of 976 940 128cee381323338543e831629ebc89c9.exe 28 PID 940 wrote to memory of 976 940 128cee381323338543e831629ebc89c9.exe 28 PID 976 wrote to memory of 612 976 nDl87.exe 29 PID 976 wrote to memory of 612 976 nDl87.exe 29 PID 976 wrote to memory of 612 976 nDl87.exe 29 PID 976 wrote to memory of 612 976 nDl87.exe 29 PID 976 wrote to memory of 612 976 nDl87.exe 29 PID 976 wrote to memory of 612 976 nDl87.exe 29 PID 976 wrote to memory of 612 976 nDl87.exe 29 PID 976 wrote to memory of 684 976 nDl87.exe 31 PID 976 wrote to memory of 684 976 nDl87.exe 31 PID 976 wrote to memory of 684 976 nDl87.exe 31 PID 976 wrote to memory of 684 976 nDl87.exe 31 PID 976 wrote to memory of 684 976 nDl87.exe 31 PID 976 wrote to memory of 684 976 nDl87.exe 31 PID 976 wrote to memory of 684 976 nDl87.exe 31 PID 940 wrote to memory of 1964 940 128cee381323338543e831629ebc89c9.exe 32 PID 940 wrote to memory of 1964 940 128cee381323338543e831629ebc89c9.exe 32 PID 940 wrote to memory of 1964 940 128cee381323338543e831629ebc89c9.exe 32 PID 940 wrote to memory of 1964 940 128cee381323338543e831629ebc89c9.exe 32 PID 940 wrote to memory of 1964 940 128cee381323338543e831629ebc89c9.exe 32 PID 940 wrote to memory of 1964 940 128cee381323338543e831629ebc89c9.exe 32 PID 940 wrote to memory of 1964 940 128cee381323338543e831629ebc89c9.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\128cee381323338543e831629ebc89c9.exe"C:\Users\Admin\AppData\Local\Temp\128cee381323338543e831629ebc89c9.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nDl87.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nDl87.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bpF17.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bpF17.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:612
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cUb47cM.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cUb47cM.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:684
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dJs94.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dJs94.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1964
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
248KB
MD56a9b890cefc14924bcdff7ec254e253e
SHA1b5b8a00a704cecd99bbb4c0dd28dc3b37683eb56
SHA25684beb92b4c9d1a1fe9b1ccac9c6b3dd295824bdeb40de052236dbc6b1f5bc758
SHA5124d3267e10bcf023441657b7560d89fc5afdd9862120ca785e16bf1aa84bc78e53867585ff64d6c1bc3a1ef44cd404b08157f217bae9d7fbda1816410e03b933c
-
Filesize
248KB
MD56a9b890cefc14924bcdff7ec254e253e
SHA1b5b8a00a704cecd99bbb4c0dd28dc3b37683eb56
SHA25684beb92b4c9d1a1fe9b1ccac9c6b3dd295824bdeb40de052236dbc6b1f5bc758
SHA5124d3267e10bcf023441657b7560d89fc5afdd9862120ca785e16bf1aa84bc78e53867585ff64d6c1bc3a1ef44cd404b08157f217bae9d7fbda1816410e03b933c
-
Filesize
200KB
MD5f621d542646026bf92446c93e0709f22
SHA1fa3c1f553dcb690ded7a6d3201bc8012082cf4d0
SHA256a1a4cacfe25d7157db7da5ea881986f0f4c1f515b2737582457416a0ca5c5f6e
SHA51286282480b5d801c248aa2704f363039c46849ffb72674e5bd2279ce1436c716e8af542710482e33ac7cec661be4a84767216cfc0e587f21d515e6ed1c445e061
-
Filesize
200KB
MD5f621d542646026bf92446c93e0709f22
SHA1fa3c1f553dcb690ded7a6d3201bc8012082cf4d0
SHA256a1a4cacfe25d7157db7da5ea881986f0f4c1f515b2737582457416a0ca5c5f6e
SHA51286282480b5d801c248aa2704f363039c46849ffb72674e5bd2279ce1436c716e8af542710482e33ac7cec661be4a84767216cfc0e587f21d515e6ed1c445e061
-
Filesize
175KB
MD5da6f3bef8abc85bd09f50783059964e3
SHA1a0f25f60ec1896c4c920ea397f40e6ce29724322
SHA256e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b
SHA5124d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec
-
Filesize
175KB
MD5da6f3bef8abc85bd09f50783059964e3
SHA1a0f25f60ec1896c4c920ea397f40e6ce29724322
SHA256e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b
SHA5124d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec
-
Filesize
175KB
MD5062a3c73b1aaf076abefd71633b66de5
SHA1e4b7e004c32d673fd61b1669c797dc4b207d8445
SHA256f281aafa876847194d635feddb06b11295249cc4bcf940d5246bdb5938410881
SHA5126bee4020fa8e4955b3028a71037f78ec922132009942283e071b3acdeea375300cef092fd692e9463d625065d5ef57e5e1ebd98f72e801ffc2178c071d645ec3
-
Filesize
175KB
MD5062a3c73b1aaf076abefd71633b66de5
SHA1e4b7e004c32d673fd61b1669c797dc4b207d8445
SHA256f281aafa876847194d635feddb06b11295249cc4bcf940d5246bdb5938410881
SHA5126bee4020fa8e4955b3028a71037f78ec922132009942283e071b3acdeea375300cef092fd692e9463d625065d5ef57e5e1ebd98f72e801ffc2178c071d645ec3
-
Filesize
248KB
MD56a9b890cefc14924bcdff7ec254e253e
SHA1b5b8a00a704cecd99bbb4c0dd28dc3b37683eb56
SHA25684beb92b4c9d1a1fe9b1ccac9c6b3dd295824bdeb40de052236dbc6b1f5bc758
SHA5124d3267e10bcf023441657b7560d89fc5afdd9862120ca785e16bf1aa84bc78e53867585ff64d6c1bc3a1ef44cd404b08157f217bae9d7fbda1816410e03b933c
-
Filesize
248KB
MD56a9b890cefc14924bcdff7ec254e253e
SHA1b5b8a00a704cecd99bbb4c0dd28dc3b37683eb56
SHA25684beb92b4c9d1a1fe9b1ccac9c6b3dd295824bdeb40de052236dbc6b1f5bc758
SHA5124d3267e10bcf023441657b7560d89fc5afdd9862120ca785e16bf1aa84bc78e53867585ff64d6c1bc3a1ef44cd404b08157f217bae9d7fbda1816410e03b933c
-
Filesize
248KB
MD56a9b890cefc14924bcdff7ec254e253e
SHA1b5b8a00a704cecd99bbb4c0dd28dc3b37683eb56
SHA25684beb92b4c9d1a1fe9b1ccac9c6b3dd295824bdeb40de052236dbc6b1f5bc758
SHA5124d3267e10bcf023441657b7560d89fc5afdd9862120ca785e16bf1aa84bc78e53867585ff64d6c1bc3a1ef44cd404b08157f217bae9d7fbda1816410e03b933c
-
Filesize
200KB
MD5f621d542646026bf92446c93e0709f22
SHA1fa3c1f553dcb690ded7a6d3201bc8012082cf4d0
SHA256a1a4cacfe25d7157db7da5ea881986f0f4c1f515b2737582457416a0ca5c5f6e
SHA51286282480b5d801c248aa2704f363039c46849ffb72674e5bd2279ce1436c716e8af542710482e33ac7cec661be4a84767216cfc0e587f21d515e6ed1c445e061
-
Filesize
200KB
MD5f621d542646026bf92446c93e0709f22
SHA1fa3c1f553dcb690ded7a6d3201bc8012082cf4d0
SHA256a1a4cacfe25d7157db7da5ea881986f0f4c1f515b2737582457416a0ca5c5f6e
SHA51286282480b5d801c248aa2704f363039c46849ffb72674e5bd2279ce1436c716e8af542710482e33ac7cec661be4a84767216cfc0e587f21d515e6ed1c445e061
-
Filesize
175KB
MD5da6f3bef8abc85bd09f50783059964e3
SHA1a0f25f60ec1896c4c920ea397f40e6ce29724322
SHA256e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b
SHA5124d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec
-
Filesize
175KB
MD5da6f3bef8abc85bd09f50783059964e3
SHA1a0f25f60ec1896c4c920ea397f40e6ce29724322
SHA256e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b
SHA5124d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec
-
Filesize
175KB
MD5062a3c73b1aaf076abefd71633b66de5
SHA1e4b7e004c32d673fd61b1669c797dc4b207d8445
SHA256f281aafa876847194d635feddb06b11295249cc4bcf940d5246bdb5938410881
SHA5126bee4020fa8e4955b3028a71037f78ec922132009942283e071b3acdeea375300cef092fd692e9463d625065d5ef57e5e1ebd98f72e801ffc2178c071d645ec3
-
Filesize
175KB
MD5062a3c73b1aaf076abefd71633b66de5
SHA1e4b7e004c32d673fd61b1669c797dc4b207d8445
SHA256f281aafa876847194d635feddb06b11295249cc4bcf940d5246bdb5938410881
SHA5126bee4020fa8e4955b3028a71037f78ec922132009942283e071b3acdeea375300cef092fd692e9463d625065d5ef57e5e1ebd98f72e801ffc2178c071d645ec3