Analysis
-
max time kernel
91s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
13-02-2023 17:51
Static task
static1
Behavioral task
behavioral1
Sample
70555a1345e99d1ea7c0507161448169ee38f7f48e87e114befea449a616b0bb.exe
Resource
win10v2004-20221111-en
General
-
Target
70555a1345e99d1ea7c0507161448169ee38f7f48e87e114befea449a616b0bb.exe
-
Size
763KB
-
MD5
a9873ea604e50ef59160e4f8978bab2d
-
SHA1
b2793e87c38ab70390a05b9f4b1389b6ff894ffa
-
SHA256
70555a1345e99d1ea7c0507161448169ee38f7f48e87e114befea449a616b0bb
-
SHA512
5cae394c8e6cf50b18371a8202e0f9e8559e1342e03b9bf59ef6096cf7559e767f25c515ee768625be1d39f28c4543582221ff603629f98debd4c9fea921364c
-
SSDEEP
12288:1Mr5y90RiRxcvOVkbifdDGF9hF4pAo/lVlHbFkmUScmIHzVclCNv2op/hb:wy1P4oG3hCPdxD++lQvdr
Malware Config
Extracted
redline
cr2
176.113.115.17:4132
-
auth_value
4bf573d6f5ab16f3b5e36da6855dc128
Extracted
redline
dunm
193.233.20.12:4132
-
auth_value
352959e3707029296ec94306d74e2334
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" stB80.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" stB80.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" stB80.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" stB80.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection stB80.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" stB80.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
pid Process 4756 vZy49.exe 4300 vTg36.exe 2036 dQp37.exe 4848 lfu59.exe 1452 nGH11.exe 2492 stB80.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" stB80.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vZy49.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vTg36.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" vTg36.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 70555a1345e99d1ea7c0507161448169ee38f7f48e87e114befea449a616b0bb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 70555a1345e99d1ea7c0507161448169ee38f7f48e87e114befea449a616b0bb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vZy49.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4848 set thread context of 2320 4848 lfu59.exe 94 -
Program crash 1 IoCs
pid pid_target Process procid_target 3228 2036 WerFault.exe 82 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2036 dQp37.exe 2036 dQp37.exe 1452 nGH11.exe 2320 AppLaunch.exe 2320 AppLaunch.exe 1452 nGH11.exe 2492 stB80.exe 2492 stB80.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2036 dQp37.exe Token: SeDebugPrivilege 1452 nGH11.exe Token: SeDebugPrivilege 2320 AppLaunch.exe Token: SeDebugPrivilege 2492 stB80.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 3788 wrote to memory of 4756 3788 70555a1345e99d1ea7c0507161448169ee38f7f48e87e114befea449a616b0bb.exe 80 PID 3788 wrote to memory of 4756 3788 70555a1345e99d1ea7c0507161448169ee38f7f48e87e114befea449a616b0bb.exe 80 PID 3788 wrote to memory of 4756 3788 70555a1345e99d1ea7c0507161448169ee38f7f48e87e114befea449a616b0bb.exe 80 PID 4756 wrote to memory of 4300 4756 vZy49.exe 81 PID 4756 wrote to memory of 4300 4756 vZy49.exe 81 PID 4756 wrote to memory of 4300 4756 vZy49.exe 81 PID 4300 wrote to memory of 2036 4300 vTg36.exe 82 PID 4300 wrote to memory of 2036 4300 vTg36.exe 82 PID 4300 wrote to memory of 2036 4300 vTg36.exe 82 PID 4300 wrote to memory of 4848 4300 vTg36.exe 92 PID 4300 wrote to memory of 4848 4300 vTg36.exe 92 PID 4300 wrote to memory of 4848 4300 vTg36.exe 92 PID 4848 wrote to memory of 2320 4848 lfu59.exe 94 PID 4848 wrote to memory of 2320 4848 lfu59.exe 94 PID 4848 wrote to memory of 2320 4848 lfu59.exe 94 PID 4848 wrote to memory of 2320 4848 lfu59.exe 94 PID 4848 wrote to memory of 2320 4848 lfu59.exe 94 PID 4756 wrote to memory of 1452 4756 vZy49.exe 95 PID 4756 wrote to memory of 1452 4756 vZy49.exe 95 PID 4756 wrote to memory of 1452 4756 vZy49.exe 95 PID 3788 wrote to memory of 2492 3788 70555a1345e99d1ea7c0507161448169ee38f7f48e87e114befea449a616b0bb.exe 96 PID 3788 wrote to memory of 2492 3788 70555a1345e99d1ea7c0507161448169ee38f7f48e87e114befea449a616b0bb.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\70555a1345e99d1ea7c0507161448169ee38f7f48e87e114befea449a616b0bb.exe"C:\Users\Admin\AppData\Local\Temp\70555a1345e99d1ea7c0507161448169ee38f7f48e87e114befea449a616b0bb.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vZy49.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vZy49.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vTg36.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vTg36.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dQp37.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dQp37.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2036 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2036 -s 13485⤵
- Program crash
PID:3228
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\lfu59.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\lfu59.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2320
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nGH11.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nGH11.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1452
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\stB80.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\stB80.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2492
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2036 -ip 20361⤵PID:4100
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
659KB
MD52dbc9ab2fef09dfcb686950e03f6cea8
SHA1f8a9c57f5ff70520f3ec2915933ca09a36748e54
SHA256e74a9770352f1915dc5ea2091a8ec616f9b8042af424b877ff108fed3ce275df
SHA512234153425302b5362be4be2533f8a324cb2e50dc8e3a3b3e40ef82002c80c8b769dded6c174dee7225f80d51c9fe0b5a4ea6296a5c10ad2096925c903cb1e8e0
-
Filesize
659KB
MD52dbc9ab2fef09dfcb686950e03f6cea8
SHA1f8a9c57f5ff70520f3ec2915933ca09a36748e54
SHA256e74a9770352f1915dc5ea2091a8ec616f9b8042af424b877ff108fed3ce275df
SHA512234153425302b5362be4be2533f8a324cb2e50dc8e3a3b3e40ef82002c80c8b769dded6c174dee7225f80d51c9fe0b5a4ea6296a5c10ad2096925c903cb1e8e0
-
Filesize
175KB
MD569f79e05d0c83aee310d9adfe5aa7f2b
SHA1485c490180380051a14316564fbda07723be11b1
SHA256c41dc7f6cc752595337cd7f209f923b43b061b201c6ab4dc02151afb90cd66e2
SHA512f1789a74aeb83867c37ddeadcd06cddfc1454a94fcc122b35d67b0309b46742b9a6611e4c3e583baa90a3fd456e45c75ae5f1a206f6e4500c1f3f8ddf5e47b42
-
Filesize
175KB
MD569f79e05d0c83aee310d9adfe5aa7f2b
SHA1485c490180380051a14316564fbda07723be11b1
SHA256c41dc7f6cc752595337cd7f209f923b43b061b201c6ab4dc02151afb90cd66e2
SHA512f1789a74aeb83867c37ddeadcd06cddfc1454a94fcc122b35d67b0309b46742b9a6611e4c3e583baa90a3fd456e45c75ae5f1a206f6e4500c1f3f8ddf5e47b42
-
Filesize
514KB
MD5bae1b94654c8f01f8ffb88adc20203f3
SHA198b44227c19a1cce34f370326a8d2c84370ad9a9
SHA256b38ecf60e65c2d51f5f6861434cc9951035745d4bbe6068718c1a478179afdf4
SHA512ee722204396fe75a850e8667162caae93b981b051ffb3f21e6e17fd24c8b36873a1a5c2e9d371009e3492cc9fc7e1517ba1dfb4f6e1c3b17cd8f5972fcff0c6c
-
Filesize
514KB
MD5bae1b94654c8f01f8ffb88adc20203f3
SHA198b44227c19a1cce34f370326a8d2c84370ad9a9
SHA256b38ecf60e65c2d51f5f6861434cc9951035745d4bbe6068718c1a478179afdf4
SHA512ee722204396fe75a850e8667162caae93b981b051ffb3f21e6e17fd24c8b36873a1a5c2e9d371009e3492cc9fc7e1517ba1dfb4f6e1c3b17cd8f5972fcff0c6c
-
Filesize
292KB
MD530a4cbf5fbf88f1584221b1c0124bd20
SHA1538a5a4be1861e7f15da874e99f709b79be84548
SHA256600a66c2394de95742ad4674ecd7cb7f675df2d4a974aab2b9386d4419ea927d
SHA5123b635fa6ebfebbe9a671a29162b7e1818fcfc7e72dcffdb4bde34883e47f07d5f18b3bd6ec615dd78e750058d23f441369f1f40c48e0b338d255e05be5c05251
-
Filesize
292KB
MD530a4cbf5fbf88f1584221b1c0124bd20
SHA1538a5a4be1861e7f15da874e99f709b79be84548
SHA256600a66c2394de95742ad4674ecd7cb7f675df2d4a974aab2b9386d4419ea927d
SHA5123b635fa6ebfebbe9a671a29162b7e1818fcfc7e72dcffdb4bde34883e47f07d5f18b3bd6ec615dd78e750058d23f441369f1f40c48e0b338d255e05be5c05251
-
Filesize
281KB
MD54f7302c3f372c146e2dd87a7ea481f31
SHA1c1f39c30a4138440399ae1c566cd414b2a4dd459
SHA2566c9f8de22f30f2d8ddf1fa04c975d2832f6455e546a5ac1e923e76016ffa66e3
SHA512a9a355bef77e741cb4b5040480960e0509d5c2ebcc866ad81a448bd24096fafa4962d02f76f365f8714bb8f41bbff28320566ce049746e3857c4353029140312
-
Filesize
281KB
MD54f7302c3f372c146e2dd87a7ea481f31
SHA1c1f39c30a4138440399ae1c566cd414b2a4dd459
SHA2566c9f8de22f30f2d8ddf1fa04c975d2832f6455e546a5ac1e923e76016ffa66e3
SHA512a9a355bef77e741cb4b5040480960e0509d5c2ebcc866ad81a448bd24096fafa4962d02f76f365f8714bb8f41bbff28320566ce049746e3857c4353029140312