Analysis
-
max time kernel
54s -
max time network
149s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
13/02/2023, 19:43
Static task
static1
Behavioral task
behavioral1
Sample
e804647333540ab93e3635585e2738c973509f568ff0d6b666b80b16a2176d23.exe
Resource
win10-20220812-en
General
-
Target
e804647333540ab93e3635585e2738c973509f568ff0d6b666b80b16a2176d23.exe
-
Size
477KB
-
MD5
14c8d645441d383eff9da8e77eca166c
-
SHA1
8b4647eed3d707b28384a126462b1a7c31f6e5b8
-
SHA256
e804647333540ab93e3635585e2738c973509f568ff0d6b666b80b16a2176d23
-
SHA512
09d4e37fafd0703362e6e77f8940ad70386a8646cd0243737f6f99ea53f6585f55f3f8f43ddbdec6fed3bcfb634662f3df075cda76d951ad561f845bebfecb31
-
SSDEEP
12288:dMrVy90Ll04Q7Qv5CPl9AtUJ3NwYAP+ZuGIDnbuLQ:Ey/4PxYliE3FIGISQ
Malware Config
Extracted
redline
fusa
193.233.20.12:4132
-
auth_value
a08b2f01bd2af756e38c5dd60e87e697
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" lhL79db.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" bgY38II.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" bgY38II.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" bgY38II.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" bgY38II.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" lhL79db.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" lhL79db.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" lhL79db.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" bgY38II.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" lhL79db.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 1772 nrk97Lo.exe 2976 bgY38II.exe 4424 dhz78xn.exe 4480 lhL79db.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features bgY38II.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" bgY38II.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" lhL79db.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e804647333540ab93e3635585e2738c973509f568ff0d6b666b80b16a2176d23.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e804647333540ab93e3635585e2738c973509f568ff0d6b666b80b16a2176d23.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce nrk97Lo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nrk97Lo.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2976 bgY38II.exe 2976 bgY38II.exe 4424 dhz78xn.exe 4424 dhz78xn.exe 4480 lhL79db.exe 4480 lhL79db.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2976 bgY38II.exe Token: SeDebugPrivilege 4424 dhz78xn.exe Token: SeDebugPrivilege 4480 lhL79db.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4696 wrote to memory of 1772 4696 e804647333540ab93e3635585e2738c973509f568ff0d6b666b80b16a2176d23.exe 66 PID 4696 wrote to memory of 1772 4696 e804647333540ab93e3635585e2738c973509f568ff0d6b666b80b16a2176d23.exe 66 PID 4696 wrote to memory of 1772 4696 e804647333540ab93e3635585e2738c973509f568ff0d6b666b80b16a2176d23.exe 66 PID 1772 wrote to memory of 2976 1772 nrk97Lo.exe 67 PID 1772 wrote to memory of 2976 1772 nrk97Lo.exe 67 PID 1772 wrote to memory of 2976 1772 nrk97Lo.exe 67 PID 1772 wrote to memory of 4424 1772 nrk97Lo.exe 68 PID 1772 wrote to memory of 4424 1772 nrk97Lo.exe 68 PID 1772 wrote to memory of 4424 1772 nrk97Lo.exe 68 PID 4696 wrote to memory of 4480 4696 e804647333540ab93e3635585e2738c973509f568ff0d6b666b80b16a2176d23.exe 70 PID 4696 wrote to memory of 4480 4696 e804647333540ab93e3635585e2738c973509f568ff0d6b666b80b16a2176d23.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\e804647333540ab93e3635585e2738c973509f568ff0d6b666b80b16a2176d23.exe"C:\Users\Admin\AppData\Local\Temp\e804647333540ab93e3635585e2738c973509f568ff0d6b666b80b16a2176d23.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nrk97Lo.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nrk97Lo.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bgY38II.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bgY38II.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2976
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dhz78xn.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dhz78xn.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4424
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lhL79db.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lhL79db.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4480
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
373KB
MD55e291838b031220f1a714a08487f72b9
SHA1b0b4aa6c2e46727eb6888918fd02040f887ac8d0
SHA256098c382f0f15231a7ae3a0b3a783f8be2800e51b83b364cd66898bdd2527fb94
SHA512c30c2bdbb5e8a0f71aadb9652ea5137005bc76294d0bca225f8d695b4550d8c80bee098a41bb999545152760ec3ae3042c62dee484488469b15d7f8f6bb9694c
-
Filesize
373KB
MD55e291838b031220f1a714a08487f72b9
SHA1b0b4aa6c2e46727eb6888918fd02040f887ac8d0
SHA256098c382f0f15231a7ae3a0b3a783f8be2800e51b83b364cd66898bdd2527fb94
SHA512c30c2bdbb5e8a0f71aadb9652ea5137005bc76294d0bca225f8d695b4550d8c80bee098a41bb999545152760ec3ae3042c62dee484488469b15d7f8f6bb9694c
-
Filesize
235KB
MD5a3c28043de92114046cdc2a3d86c58f6
SHA164b3fdeee29433f0bb8a75c4fc4e8abdf1254ee9
SHA25678d2576aedb85a49ec767f0bb9fa0e3c9570d5ed034e50e87a3ca8484a16f0e5
SHA5126b0b37d54b82ff9c69f9d254ded3d07cfe5d13e8bef7849204035d564c9e1bd1bf2b505e03cade39286627d4617b7da19742199997487be7d3428a43f12ae0c0
-
Filesize
235KB
MD5a3c28043de92114046cdc2a3d86c58f6
SHA164b3fdeee29433f0bb8a75c4fc4e8abdf1254ee9
SHA25678d2576aedb85a49ec767f0bb9fa0e3c9570d5ed034e50e87a3ca8484a16f0e5
SHA5126b0b37d54b82ff9c69f9d254ded3d07cfe5d13e8bef7849204035d564c9e1bd1bf2b505e03cade39286627d4617b7da19742199997487be7d3428a43f12ae0c0
-
Filesize
175KB
MD5da6f3bef8abc85bd09f50783059964e3
SHA1a0f25f60ec1896c4c920ea397f40e6ce29724322
SHA256e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b
SHA5124d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec
-
Filesize
175KB
MD5da6f3bef8abc85bd09f50783059964e3
SHA1a0f25f60ec1896c4c920ea397f40e6ce29724322
SHA256e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b
SHA5124d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec