Analysis
-
max time kernel
91s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2023, 17:22
Static task
static1
Behavioral task
behavioral1
Sample
4209217638d07140e6483d9e608b1c49c4706ea75e8051206eb9948fd81f1e76.exe
Resource
win10v2004-20221111-en
General
-
Target
4209217638d07140e6483d9e608b1c49c4706ea75e8051206eb9948fd81f1e76.exe
-
Size
534KB
-
MD5
1e27d4b857c48e247d76671ff5bccc97
-
SHA1
9735b0f3ffbdf89b62ab043f781ffc2b298d81e9
-
SHA256
4209217638d07140e6483d9e608b1c49c4706ea75e8051206eb9948fd81f1e76
-
SHA512
a2b403cf491b998004b232d9f755b941fd6733938343a978f7e7baa405d9e6580ce07d08252598b7c39d31f5d0842fcef601f590c46c612899ec386003d0cb51
-
SSDEEP
12288:uMruy90rhW3AWVtNqnT+Y1lkAdpgoylklajckmVSgvf:My2aHVMT+7AjvIwDbf
Malware Config
Extracted
redline
dunm
193.233.20.12:4132
-
auth_value
352959e3707029296ec94306d74e2334
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" szx84.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" szx84.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" szx84.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection szx84.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" szx84.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" szx84.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 5040 vou80.exe 4964 ddl38.exe 4468 nVR74Yx.exe 1892 szx84.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" szx84.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vou80.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4209217638d07140e6483d9e608b1c49c4706ea75e8051206eb9948fd81f1e76.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4209217638d07140e6483d9e608b1c49c4706ea75e8051206eb9948fd81f1e76.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vou80.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4576 4964 WerFault.exe 83 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4964 ddl38.exe 4964 ddl38.exe 4468 nVR74Yx.exe 4468 nVR74Yx.exe 1892 szx84.exe 1892 szx84.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4964 ddl38.exe Token: SeDebugPrivilege 4468 nVR74Yx.exe Token: SeDebugPrivilege 1892 szx84.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2796 wrote to memory of 5040 2796 4209217638d07140e6483d9e608b1c49c4706ea75e8051206eb9948fd81f1e76.exe 82 PID 2796 wrote to memory of 5040 2796 4209217638d07140e6483d9e608b1c49c4706ea75e8051206eb9948fd81f1e76.exe 82 PID 2796 wrote to memory of 5040 2796 4209217638d07140e6483d9e608b1c49c4706ea75e8051206eb9948fd81f1e76.exe 82 PID 5040 wrote to memory of 4964 5040 vou80.exe 83 PID 5040 wrote to memory of 4964 5040 vou80.exe 83 PID 5040 wrote to memory of 4964 5040 vou80.exe 83 PID 5040 wrote to memory of 4468 5040 vou80.exe 93 PID 5040 wrote to memory of 4468 5040 vou80.exe 93 PID 5040 wrote to memory of 4468 5040 vou80.exe 93 PID 2796 wrote to memory of 1892 2796 4209217638d07140e6483d9e608b1c49c4706ea75e8051206eb9948fd81f1e76.exe 94 PID 2796 wrote to memory of 1892 2796 4209217638d07140e6483d9e608b1c49c4706ea75e8051206eb9948fd81f1e76.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\4209217638d07140e6483d9e608b1c49c4706ea75e8051206eb9948fd81f1e76.exe"C:\Users\Admin\AppData\Local\Temp\4209217638d07140e6483d9e608b1c49c4706ea75e8051206eb9948fd81f1e76.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vou80.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vou80.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ddl38.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ddl38.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4964 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4964 -s 17044⤵
- Program crash
PID:4576
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nVR74Yx.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nVR74Yx.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4468
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\szx84.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\szx84.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4964 -ip 49641⤵PID:3520
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
430KB
MD54bbf47208ccadb511e86a6119c0449a8
SHA1572f4434c236076a93467c5e9694eb84b741eee6
SHA2563993946fa041c9cdbd5fef21e93d1a3700e35869e8af249e5a285435c94c1755
SHA512bc9fd953c67970b05788442a790fa3455a8eb6aa5a29d7d80e71a1240d3805dc0be5553e0c09108b1346deafbf24cbf37d751df4d686e8dfb74b74abacc08533
-
Filesize
430KB
MD54bbf47208ccadb511e86a6119c0449a8
SHA1572f4434c236076a93467c5e9694eb84b741eee6
SHA2563993946fa041c9cdbd5fef21e93d1a3700e35869e8af249e5a285435c94c1755
SHA512bc9fd953c67970b05788442a790fa3455a8eb6aa5a29d7d80e71a1240d3805dc0be5553e0c09108b1346deafbf24cbf37d751df4d686e8dfb74b74abacc08533
-
Filesize
292KB
MD530a4cbf5fbf88f1584221b1c0124bd20
SHA1538a5a4be1861e7f15da874e99f709b79be84548
SHA256600a66c2394de95742ad4674ecd7cb7f675df2d4a974aab2b9386d4419ea927d
SHA5123b635fa6ebfebbe9a671a29162b7e1818fcfc7e72dcffdb4bde34883e47f07d5f18b3bd6ec615dd78e750058d23f441369f1f40c48e0b338d255e05be5c05251
-
Filesize
292KB
MD530a4cbf5fbf88f1584221b1c0124bd20
SHA1538a5a4be1861e7f15da874e99f709b79be84548
SHA256600a66c2394de95742ad4674ecd7cb7f675df2d4a974aab2b9386d4419ea927d
SHA5123b635fa6ebfebbe9a671a29162b7e1818fcfc7e72dcffdb4bde34883e47f07d5f18b3bd6ec615dd78e750058d23f441369f1f40c48e0b338d255e05be5c05251
-
Filesize
175KB
MD569f79e05d0c83aee310d9adfe5aa7f2b
SHA1485c490180380051a14316564fbda07723be11b1
SHA256c41dc7f6cc752595337cd7f209f923b43b061b201c6ab4dc02151afb90cd66e2
SHA512f1789a74aeb83867c37ddeadcd06cddfc1454a94fcc122b35d67b0309b46742b9a6611e4c3e583baa90a3fd456e45c75ae5f1a206f6e4500c1f3f8ddf5e47b42
-
Filesize
175KB
MD569f79e05d0c83aee310d9adfe5aa7f2b
SHA1485c490180380051a14316564fbda07723be11b1
SHA256c41dc7f6cc752595337cd7f209f923b43b061b201c6ab4dc02151afb90cd66e2
SHA512f1789a74aeb83867c37ddeadcd06cddfc1454a94fcc122b35d67b0309b46742b9a6611e4c3e583baa90a3fd456e45c75ae5f1a206f6e4500c1f3f8ddf5e47b42