Analysis
-
max time kernel
49s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
14/02/2023, 21:59
Static task
static1
Behavioral task
behavioral1
Sample
f6f59c7a04ebffefb8c26ac7e793830b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f6f59c7a04ebffefb8c26ac7e793830b.exe
Resource
win10v2004-20220812-en
General
-
Target
f6f59c7a04ebffefb8c26ac7e793830b.exe
-
Size
478KB
-
MD5
f6f59c7a04ebffefb8c26ac7e793830b
-
SHA1
a3c5e62097ce27b7dbd81bfb130c7a6cb2238c3a
-
SHA256
65e511cf23bd6cfa2aaacbef01565f56a278c33b9396322c4022b88100c48425
-
SHA512
aef64a66fa376ae44a328cd996d94051a08a190e2fd62c23c9fc04eb8788b31d01b7a58c5685f7b9cf039e522da57d866056a38a8801947b750db549e5d8aa5d
-
SSDEEP
6144:K5y+bnr+bp0yN90QEIVoUPyjqMC0o8HVmi9S2WBmkFSp0Vnx8hat9bybsIbar3xG:fMrvy902oUKZC0vS2ex+EmseajxmZ1t
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" blS41Vy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" blS41Vy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" blS41Vy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" lbk43oM.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" lbk43oM.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection blS41Vy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" blS41Vy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" blS41Vy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" lbk43oM.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" lbk43oM.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" lbk43oM.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 112 nsf73qk.exe 1644 blS41Vy.exe 336 dYt33We.exe 1772 lbk43oM.exe -
Loads dropped DLL 8 IoCs
pid Process 1076 f6f59c7a04ebffefb8c26ac7e793830b.exe 112 nsf73qk.exe 112 nsf73qk.exe 112 nsf73qk.exe 1644 blS41Vy.exe 112 nsf73qk.exe 336 dYt33We.exe 1076 f6f59c7a04ebffefb8c26ac7e793830b.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features blS41Vy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" blS41Vy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features lbk43oM.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" lbk43oM.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce f6f59c7a04ebffefb8c26ac7e793830b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f6f59c7a04ebffefb8c26ac7e793830b.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce nsf73qk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nsf73qk.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1644 blS41Vy.exe 1644 blS41Vy.exe 336 dYt33We.exe 336 dYt33We.exe 1772 lbk43oM.exe 1772 lbk43oM.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1644 blS41Vy.exe Token: SeDebugPrivilege 336 dYt33We.exe Token: SeDebugPrivilege 1772 lbk43oM.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1076 wrote to memory of 112 1076 f6f59c7a04ebffefb8c26ac7e793830b.exe 26 PID 1076 wrote to memory of 112 1076 f6f59c7a04ebffefb8c26ac7e793830b.exe 26 PID 1076 wrote to memory of 112 1076 f6f59c7a04ebffefb8c26ac7e793830b.exe 26 PID 1076 wrote to memory of 112 1076 f6f59c7a04ebffefb8c26ac7e793830b.exe 26 PID 1076 wrote to memory of 112 1076 f6f59c7a04ebffefb8c26ac7e793830b.exe 26 PID 1076 wrote to memory of 112 1076 f6f59c7a04ebffefb8c26ac7e793830b.exe 26 PID 1076 wrote to memory of 112 1076 f6f59c7a04ebffefb8c26ac7e793830b.exe 26 PID 112 wrote to memory of 1644 112 nsf73qk.exe 27 PID 112 wrote to memory of 1644 112 nsf73qk.exe 27 PID 112 wrote to memory of 1644 112 nsf73qk.exe 27 PID 112 wrote to memory of 1644 112 nsf73qk.exe 27 PID 112 wrote to memory of 1644 112 nsf73qk.exe 27 PID 112 wrote to memory of 1644 112 nsf73qk.exe 27 PID 112 wrote to memory of 1644 112 nsf73qk.exe 27 PID 112 wrote to memory of 336 112 nsf73qk.exe 28 PID 112 wrote to memory of 336 112 nsf73qk.exe 28 PID 112 wrote to memory of 336 112 nsf73qk.exe 28 PID 112 wrote to memory of 336 112 nsf73qk.exe 28 PID 112 wrote to memory of 336 112 nsf73qk.exe 28 PID 112 wrote to memory of 336 112 nsf73qk.exe 28 PID 112 wrote to memory of 336 112 nsf73qk.exe 28 PID 1076 wrote to memory of 1772 1076 f6f59c7a04ebffefb8c26ac7e793830b.exe 30 PID 1076 wrote to memory of 1772 1076 f6f59c7a04ebffefb8c26ac7e793830b.exe 30 PID 1076 wrote to memory of 1772 1076 f6f59c7a04ebffefb8c26ac7e793830b.exe 30 PID 1076 wrote to memory of 1772 1076 f6f59c7a04ebffefb8c26ac7e793830b.exe 30 PID 1076 wrote to memory of 1772 1076 f6f59c7a04ebffefb8c26ac7e793830b.exe 30 PID 1076 wrote to memory of 1772 1076 f6f59c7a04ebffefb8c26ac7e793830b.exe 30 PID 1076 wrote to memory of 1772 1076 f6f59c7a04ebffefb8c26ac7e793830b.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6f59c7a04ebffefb8c26ac7e793830b.exe"C:\Users\Admin\AppData\Local\Temp\f6f59c7a04ebffefb8c26ac7e793830b.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nsf73qk.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nsf73qk.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\blS41Vy.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\blS41Vy.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1644
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dYt33We.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dYt33We.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:336
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lbk43oM.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lbk43oM.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1772
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
374KB
MD53cbfebe88954e88895166a9b523347c1
SHA1907becf36fdd2b81c6915019638f57c16c8a86ef
SHA25624410576fbe3b0ec4279cfab48b933e93a197da8f80b5919d21334e89a8ad38e
SHA5125cd07353d6a20a25edb40a8b4d9ecf6623574f18fb69ff3fedba147388ec8c8c3d6a0f0a18821a6100c6564a84778c2969e9e8b2d6d3094f78fd6ee52b4c1b2c
-
Filesize
374KB
MD53cbfebe88954e88895166a9b523347c1
SHA1907becf36fdd2b81c6915019638f57c16c8a86ef
SHA25624410576fbe3b0ec4279cfab48b933e93a197da8f80b5919d21334e89a8ad38e
SHA5125cd07353d6a20a25edb40a8b4d9ecf6623574f18fb69ff3fedba147388ec8c8c3d6a0f0a18821a6100c6564a84778c2969e9e8b2d6d3094f78fd6ee52b4c1b2c
-
Filesize
234KB
MD5353c989b6b901edf860a132aa278144c
SHA1b900aeb6427096ba11bc80552d71b8de14a3f921
SHA25613f7ba7f9d4ef700b504fb077fc13b1d0fd008456d3fca56c5df3a4306db7a87
SHA5122f3a3eb6508f5f3ab2308e76481155d6336a606011c1276e24d5fb8925a622ff0ea06ff7a7932753f844d578353c9a1cc9eb5d99378d65b09352d93f01deb6d1
-
Filesize
234KB
MD5353c989b6b901edf860a132aa278144c
SHA1b900aeb6427096ba11bc80552d71b8de14a3f921
SHA25613f7ba7f9d4ef700b504fb077fc13b1d0fd008456d3fca56c5df3a4306db7a87
SHA5122f3a3eb6508f5f3ab2308e76481155d6336a606011c1276e24d5fb8925a622ff0ea06ff7a7932753f844d578353c9a1cc9eb5d99378d65b09352d93f01deb6d1
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
374KB
MD53cbfebe88954e88895166a9b523347c1
SHA1907becf36fdd2b81c6915019638f57c16c8a86ef
SHA25624410576fbe3b0ec4279cfab48b933e93a197da8f80b5919d21334e89a8ad38e
SHA5125cd07353d6a20a25edb40a8b4d9ecf6623574f18fb69ff3fedba147388ec8c8c3d6a0f0a18821a6100c6564a84778c2969e9e8b2d6d3094f78fd6ee52b4c1b2c
-
Filesize
374KB
MD53cbfebe88954e88895166a9b523347c1
SHA1907becf36fdd2b81c6915019638f57c16c8a86ef
SHA25624410576fbe3b0ec4279cfab48b933e93a197da8f80b5919d21334e89a8ad38e
SHA5125cd07353d6a20a25edb40a8b4d9ecf6623574f18fb69ff3fedba147388ec8c8c3d6a0f0a18821a6100c6564a84778c2969e9e8b2d6d3094f78fd6ee52b4c1b2c
-
Filesize
234KB
MD5353c989b6b901edf860a132aa278144c
SHA1b900aeb6427096ba11bc80552d71b8de14a3f921
SHA25613f7ba7f9d4ef700b504fb077fc13b1d0fd008456d3fca56c5df3a4306db7a87
SHA5122f3a3eb6508f5f3ab2308e76481155d6336a606011c1276e24d5fb8925a622ff0ea06ff7a7932753f844d578353c9a1cc9eb5d99378d65b09352d93f01deb6d1
-
Filesize
234KB
MD5353c989b6b901edf860a132aa278144c
SHA1b900aeb6427096ba11bc80552d71b8de14a3f921
SHA25613f7ba7f9d4ef700b504fb077fc13b1d0fd008456d3fca56c5df3a4306db7a87
SHA5122f3a3eb6508f5f3ab2308e76481155d6336a606011c1276e24d5fb8925a622ff0ea06ff7a7932753f844d578353c9a1cc9eb5d99378d65b09352d93f01deb6d1
-
Filesize
234KB
MD5353c989b6b901edf860a132aa278144c
SHA1b900aeb6427096ba11bc80552d71b8de14a3f921
SHA25613f7ba7f9d4ef700b504fb077fc13b1d0fd008456d3fca56c5df3a4306db7a87
SHA5122f3a3eb6508f5f3ab2308e76481155d6336a606011c1276e24d5fb8925a622ff0ea06ff7a7932753f844d578353c9a1cc9eb5d99378d65b09352d93f01deb6d1
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2