Analysis
-
max time kernel
54s -
max time network
73s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
13/02/2023, 21:21
Static task
static1
General
-
Target
4c729081fe4f035d5e0dff8c6d141d996e5da4c872b0fa8210849845762ed342.exe
-
Size
763KB
-
MD5
2eed6f34c26fd02b3435634d77a0ea21
-
SHA1
a886b4026a662f8bc3a726f5e30c982b0370a341
-
SHA256
4c729081fe4f035d5e0dff8c6d141d996e5da4c872b0fa8210849845762ed342
-
SHA512
839ef6e7ed538064a3ee74b32f5428bc95c2e62e8f955a913105da4b3536d14495e27a4a6b34f992efb6d57bf79cd9d1bb866af91ea5cd8fa9a88bf0e8809d54
-
SSDEEP
12288:eMrJy90ktmEgitJZEZv8MqcWZFlp5wc60swa3sTB/4i6ca/H9Bd:Hy5Dt/iv8bp5Bn6iAZ/9Bd
Malware Config
Extracted
redline
romik
193.233.20.12:4132
-
auth_value
8fb78d2889ba0ca42678b59b884e88ff
Extracted
redline
dunm
193.233.20.12:4132
-
auth_value
352959e3707029296ec94306d74e2334
Extracted
redline
cr2
176.113.115.17:4132
-
auth_value
4bf573d6f5ab16f3b5e36da6855dc128
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" snF71.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" snF71.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" snF71.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" snF71.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" snF71.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/2276-317-0x0000000002220000-0x0000000002266000-memory.dmp family_redline behavioral1/memory/2276-324-0x0000000002580000-0x00000000025C4000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 4856 viB60.exe 2188 vjv69.exe 2276 dVg46.exe 4596 luR93.exe 4728 nWF41.exe 1556 snF71.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" snF71.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vjv69.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" vjv69.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4c729081fe4f035d5e0dff8c6d141d996e5da4c872b0fa8210849845762ed342.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4c729081fe4f035d5e0dff8c6d141d996e5da4c872b0fa8210849845762ed342.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce viB60.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" viB60.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4596 set thread context of 1504 4596 luR93.exe 72 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2276 dVg46.exe 2276 dVg46.exe 1504 AppLaunch.exe 1504 AppLaunch.exe 4728 nWF41.exe 4728 nWF41.exe 1556 snF71.exe 1556 snF71.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2276 dVg46.exe Token: SeDebugPrivilege 1504 AppLaunch.exe Token: SeDebugPrivilege 4728 nWF41.exe Token: SeDebugPrivilege 1556 snF71.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 4792 wrote to memory of 4856 4792 4c729081fe4f035d5e0dff8c6d141d996e5da4c872b0fa8210849845762ed342.exe 67 PID 4792 wrote to memory of 4856 4792 4c729081fe4f035d5e0dff8c6d141d996e5da4c872b0fa8210849845762ed342.exe 67 PID 4792 wrote to memory of 4856 4792 4c729081fe4f035d5e0dff8c6d141d996e5da4c872b0fa8210849845762ed342.exe 67 PID 4856 wrote to memory of 2188 4856 viB60.exe 66 PID 4856 wrote to memory of 2188 4856 viB60.exe 66 PID 4856 wrote to memory of 2188 4856 viB60.exe 66 PID 2188 wrote to memory of 2276 2188 vjv69.exe 68 PID 2188 wrote to memory of 2276 2188 vjv69.exe 68 PID 2188 wrote to memory of 2276 2188 vjv69.exe 68 PID 2188 wrote to memory of 4596 2188 vjv69.exe 70 PID 2188 wrote to memory of 4596 2188 vjv69.exe 70 PID 2188 wrote to memory of 4596 2188 vjv69.exe 70 PID 4596 wrote to memory of 1504 4596 luR93.exe 72 PID 4596 wrote to memory of 1504 4596 luR93.exe 72 PID 4596 wrote to memory of 1504 4596 luR93.exe 72 PID 4596 wrote to memory of 1504 4596 luR93.exe 72 PID 4596 wrote to memory of 1504 4596 luR93.exe 72 PID 4856 wrote to memory of 4728 4856 viB60.exe 73 PID 4856 wrote to memory of 4728 4856 viB60.exe 73 PID 4856 wrote to memory of 4728 4856 viB60.exe 73 PID 4792 wrote to memory of 1556 4792 4c729081fe4f035d5e0dff8c6d141d996e5da4c872b0fa8210849845762ed342.exe 74 PID 4792 wrote to memory of 1556 4792 4c729081fe4f035d5e0dff8c6d141d996e5da4c872b0fa8210849845762ed342.exe 74
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c729081fe4f035d5e0dff8c6d141d996e5da4c872b0fa8210849845762ed342.exe"C:\Users\Admin\AppData\Local\Temp\4c729081fe4f035d5e0dff8c6d141d996e5da4c872b0fa8210849845762ed342.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\viB60.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\viB60.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nWF41.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nWF41.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4728
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\snF71.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\snF71.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1556
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vjv69.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vjv69.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dVg46.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dVg46.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2276
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\luR93.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\luR93.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1504
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
659KB
MD55ca0d776090a3f5c425764af2abf4002
SHA18132191b86fa8c83c4a186277eb99fcb5444aa8e
SHA256d6dae9584b6700e459568060b26f117094ab3636fa82e750ab692d9260d4339b
SHA51297eff5db9966edc7726115fcfaaafaaf0c171a5c59cd58f86b397b62f3fe1739ddb9c3c3842615a70abde99d166f550bcd4d03a14f46801613d60ecdbb1e9c55
-
Filesize
659KB
MD55ca0d776090a3f5c425764af2abf4002
SHA18132191b86fa8c83c4a186277eb99fcb5444aa8e
SHA256d6dae9584b6700e459568060b26f117094ab3636fa82e750ab692d9260d4339b
SHA51297eff5db9966edc7726115fcfaaafaaf0c171a5c59cd58f86b397b62f3fe1739ddb9c3c3842615a70abde99d166f550bcd4d03a14f46801613d60ecdbb1e9c55
-
Filesize
175KB
MD569f79e05d0c83aee310d9adfe5aa7f2b
SHA1485c490180380051a14316564fbda07723be11b1
SHA256c41dc7f6cc752595337cd7f209f923b43b061b201c6ab4dc02151afb90cd66e2
SHA512f1789a74aeb83867c37ddeadcd06cddfc1454a94fcc122b35d67b0309b46742b9a6611e4c3e583baa90a3fd456e45c75ae5f1a206f6e4500c1f3f8ddf5e47b42
-
Filesize
175KB
MD569f79e05d0c83aee310d9adfe5aa7f2b
SHA1485c490180380051a14316564fbda07723be11b1
SHA256c41dc7f6cc752595337cd7f209f923b43b061b201c6ab4dc02151afb90cd66e2
SHA512f1789a74aeb83867c37ddeadcd06cddfc1454a94fcc122b35d67b0309b46742b9a6611e4c3e583baa90a3fd456e45c75ae5f1a206f6e4500c1f3f8ddf5e47b42
-
Filesize
515KB
MD5c4cb4a2e9e71a63939110093c77f978a
SHA15f1c9d084faa5cf4e1bca4918bc405710d7c7bd4
SHA256518c16034b1d2592ac29c61c7b89ead1a790128c8ed67247ffb20ebdbbb4c7e8
SHA512db3a29cf45dacd85f214cdae89f6768eb7434751b9122868ad98eb081d0b6093a71d67fe11db5566c06a257769673d39c064cf187985ca349eb77d8dda7bea7f
-
Filesize
515KB
MD5c4cb4a2e9e71a63939110093c77f978a
SHA15f1c9d084faa5cf4e1bca4918bc405710d7c7bd4
SHA256518c16034b1d2592ac29c61c7b89ead1a790128c8ed67247ffb20ebdbbb4c7e8
SHA512db3a29cf45dacd85f214cdae89f6768eb7434751b9122868ad98eb081d0b6093a71d67fe11db5566c06a257769673d39c064cf187985ca349eb77d8dda7bea7f
-
Filesize
292KB
MD5d24ae9ef5f6e13b6661f299a1c1b1b60
SHA1a9eb608a807806e5ce89d8fed55b9b267afe101b
SHA256ce43f7268b5aa74fe55290ede0defc619d1474a38fff87f5077586f346b78f19
SHA512395e34541f21e9128a7e61abd0eb6d7010e7bec526783b5e798c5185a27dba69a4b6a7c6afcc99c09e33f235673ad9b730b915c317ffc6f2d6ac2c7514f2bc15
-
Filesize
292KB
MD5d24ae9ef5f6e13b6661f299a1c1b1b60
SHA1a9eb608a807806e5ce89d8fed55b9b267afe101b
SHA256ce43f7268b5aa74fe55290ede0defc619d1474a38fff87f5077586f346b78f19
SHA512395e34541f21e9128a7e61abd0eb6d7010e7bec526783b5e798c5185a27dba69a4b6a7c6afcc99c09e33f235673ad9b730b915c317ffc6f2d6ac2c7514f2bc15
-
Filesize
281KB
MD54f7302c3f372c146e2dd87a7ea481f31
SHA1c1f39c30a4138440399ae1c566cd414b2a4dd459
SHA2566c9f8de22f30f2d8ddf1fa04c975d2832f6455e546a5ac1e923e76016ffa66e3
SHA512a9a355bef77e741cb4b5040480960e0509d5c2ebcc866ad81a448bd24096fafa4962d02f76f365f8714bb8f41bbff28320566ce049746e3857c4353029140312
-
Filesize
281KB
MD54f7302c3f372c146e2dd87a7ea481f31
SHA1c1f39c30a4138440399ae1c566cd414b2a4dd459
SHA2566c9f8de22f30f2d8ddf1fa04c975d2832f6455e546a5ac1e923e76016ffa66e3
SHA512a9a355bef77e741cb4b5040480960e0509d5c2ebcc866ad81a448bd24096fafa4962d02f76f365f8714bb8f41bbff28320566ce049746e3857c4353029140312