Analysis
-
max time kernel
57s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
14-02-2023 22:46
Static task
static1
General
-
Target
08f1df140b293fb1fe880dbc3afa103ba6fef2c952745d6f129a21e117786f0e.exe
-
Size
852KB
-
MD5
f4b49bcb7012016fed43d9165e13bbb3
-
SHA1
a00e758f3a2a1bee30422312714947db0142cf80
-
SHA256
08f1df140b293fb1fe880dbc3afa103ba6fef2c952745d6f129a21e117786f0e
-
SHA512
6dfb230874f23046733ea3d558d8066639d5528e892714274dfe77fdcdf2616cdc54cf72f52ecb7edc47873cbf699287f0ab83fa0d832c6d9d708e74a55591f0
-
SSDEEP
12288:wMrZy90KX4T04fXBKHsou+TCueqHs/yGM1MUDtBNfOV7UcFeURvZZ6wxqqlQPnY:5y/4vBKHszLKLxlBBNOBUuJ6wDePY
Malware Config
Extracted
redline
dubka
193.233.20.13:4136
-
auth_value
e5a9421183a033f283b2f23139b471f0
Extracted
redline
ruma
193.233.20.13:4136
-
auth_value
647d00dfaba082a4a30f383bca5d1a2a
Extracted
redline
cr10n
176.113.115.17:4132
-
auth_value
6016c19179aa1044c369adb0ec1f363b
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" mOP74ef.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" mOP74ef.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" mOP74ef.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" mOP74ef.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" mOP74ef.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/1276-483-0x0000000004C90000-0x0000000004CD6000-memory.dmp family_redline behavioral1/memory/1276-488-0x0000000004D10000-0x0000000004D54000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 4776 dzl0629.exe 4868 dUg9055.exe 4268 mOP74ef.exe 4332 nwE45fc.exe 1276 oDi22Pz.exe 4056 pPT55PZ.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features mOP74ef.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" mOP74ef.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" dzl0629.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dUg9055.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" dUg9055.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 08f1df140b293fb1fe880dbc3afa103ba6fef2c952745d6f129a21e117786f0e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 08f1df140b293fb1fe880dbc3afa103ba6fef2c952745d6f129a21e117786f0e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dzl0629.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4268 mOP74ef.exe 4268 mOP74ef.exe 4332 nwE45fc.exe 4332 nwE45fc.exe 1276 oDi22Pz.exe 1276 oDi22Pz.exe 4056 pPT55PZ.exe 4056 pPT55PZ.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4268 mOP74ef.exe Token: SeDebugPrivilege 4332 nwE45fc.exe Token: SeDebugPrivilege 1276 oDi22Pz.exe Token: SeDebugPrivilege 4056 pPT55PZ.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2404 wrote to memory of 4776 2404 08f1df140b293fb1fe880dbc3afa103ba6fef2c952745d6f129a21e117786f0e.exe 66 PID 2404 wrote to memory of 4776 2404 08f1df140b293fb1fe880dbc3afa103ba6fef2c952745d6f129a21e117786f0e.exe 66 PID 2404 wrote to memory of 4776 2404 08f1df140b293fb1fe880dbc3afa103ba6fef2c952745d6f129a21e117786f0e.exe 66 PID 4776 wrote to memory of 4868 4776 dzl0629.exe 67 PID 4776 wrote to memory of 4868 4776 dzl0629.exe 67 PID 4776 wrote to memory of 4868 4776 dzl0629.exe 67 PID 4868 wrote to memory of 4268 4868 dUg9055.exe 68 PID 4868 wrote to memory of 4268 4868 dUg9055.exe 68 PID 4868 wrote to memory of 4268 4868 dUg9055.exe 68 PID 4868 wrote to memory of 4332 4868 dUg9055.exe 69 PID 4868 wrote to memory of 4332 4868 dUg9055.exe 69 PID 4868 wrote to memory of 4332 4868 dUg9055.exe 69 PID 4776 wrote to memory of 1276 4776 dzl0629.exe 71 PID 4776 wrote to memory of 1276 4776 dzl0629.exe 71 PID 4776 wrote to memory of 1276 4776 dzl0629.exe 71 PID 2404 wrote to memory of 4056 2404 08f1df140b293fb1fe880dbc3afa103ba6fef2c952745d6f129a21e117786f0e.exe 72 PID 2404 wrote to memory of 4056 2404 08f1df140b293fb1fe880dbc3afa103ba6fef2c952745d6f129a21e117786f0e.exe 72 PID 2404 wrote to memory of 4056 2404 08f1df140b293fb1fe880dbc3afa103ba6fef2c952745d6f129a21e117786f0e.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\08f1df140b293fb1fe880dbc3afa103ba6fef2c952745d6f129a21e117786f0e.exe"C:\Users\Admin\AppData\Local\Temp\08f1df140b293fb1fe880dbc3afa103ba6fef2c952745d6f129a21e117786f0e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dzl0629.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dzl0629.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dUg9055.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dUg9055.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mOP74ef.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mOP74ef.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4268
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nwE45fc.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nwE45fc.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4332
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\oDi22Pz.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\oDi22Pz.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1276
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pPT55PZ.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pPT55PZ.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4056
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
707KB
MD55a6156dc53558ab67ca1e05a9071dd83
SHA1566f67d97b7fbdd18cad8176b5592b84102f0ebc
SHA25650788d678bfc057f3a1d4aa868bf81dca2a46fdf32f71e2448752ca3c3c93d03
SHA5128c9c924fdf11658cf7d291df4a60478d11c8e79dd54fa0aac6f119035d6a8ed93a4ea42f6a48fbd90fe07a43dfda8c650b6b7520553d158fd4d71971e2d60d67
-
Filesize
707KB
MD55a6156dc53558ab67ca1e05a9071dd83
SHA1566f67d97b7fbdd18cad8176b5592b84102f0ebc
SHA25650788d678bfc057f3a1d4aa868bf81dca2a46fdf32f71e2448752ca3c3c93d03
SHA5128c9c924fdf11658cf7d291df4a60478d11c8e79dd54fa0aac6f119035d6a8ed93a4ea42f6a48fbd90fe07a43dfda8c650b6b7520553d158fd4d71971e2d60d67
-
Filesize
175KB
MD5ce5ef6aac94fdb2af40da676f6cab58f
SHA1c393f24b1550955a686ee39067f20813415af95f
SHA256ce360295ca7fcc1a1c2b47a604305c67ab41358770edbd769a6a44aa635c2fd0
SHA5122cc98869cba6a962129c57fb7e3ff0b64623c94903bfbf9a2648e191b633fbe73f8e7b9d8fea348e30cc88bc44d27454fd880c81a55a6b795170fa804e6cda65
-
Filesize
175KB
MD5ce5ef6aac94fdb2af40da676f6cab58f
SHA1c393f24b1550955a686ee39067f20813415af95f
SHA256ce360295ca7fcc1a1c2b47a604305c67ab41358770edbd769a6a44aa635c2fd0
SHA5122cc98869cba6a962129c57fb7e3ff0b64623c94903bfbf9a2648e191b633fbe73f8e7b9d8fea348e30cc88bc44d27454fd880c81a55a6b795170fa804e6cda65
-
Filesize
375KB
MD50261904f509a55a2d77b3be9c08cc1a3
SHA1c39652e94ba97413221d520ffdcff883fc91b7ab
SHA2567a9f64c3c403bda18d79b6ea6dedec9afcaa1c8a9fad452c881a9298d89a21bc
SHA512a466fa76928a8a133fee933a4f847b5483fae7c0d9830e19f001bea0b280df553fd28c66f3ce2a3669592210735159a461125cf18721d63e8466093e4549c2d6
-
Filesize
375KB
MD50261904f509a55a2d77b3be9c08cc1a3
SHA1c39652e94ba97413221d520ffdcff883fc91b7ab
SHA2567a9f64c3c403bda18d79b6ea6dedec9afcaa1c8a9fad452c881a9298d89a21bc
SHA512a466fa76928a8a133fee933a4f847b5483fae7c0d9830e19f001bea0b280df553fd28c66f3ce2a3669592210735159a461125cf18721d63e8466093e4549c2d6
-
Filesize
291KB
MD5ac83657f02dff63c790b80a66ad3d4e3
SHA17e9a2f828a38ad058bd619137f66266ddc664c3a
SHA2560c03276ca27012cd6a8889664e261b98da41b0f80f587db4b3d97ad6a76690cc
SHA5124cc2bcde052072b91cb08bb3b56c4a9249d07d60e4a12512dd1569a4d26a8aa23a0cef909eef90557f1e2bd958034d38970823ef9934e754d97f34d49c98328f
-
Filesize
291KB
MD5ac83657f02dff63c790b80a66ad3d4e3
SHA17e9a2f828a38ad058bd619137f66266ddc664c3a
SHA2560c03276ca27012cd6a8889664e261b98da41b0f80f587db4b3d97ad6a76690cc
SHA5124cc2bcde052072b91cb08bb3b56c4a9249d07d60e4a12512dd1569a4d26a8aa23a0cef909eef90557f1e2bd958034d38970823ef9934e754d97f34d49c98328f
-
Filesize
235KB
MD510b6549523528ef949d086f8f79cf1af
SHA18176ceb01edc3485bd9dc2730bbd073bd93dd2f4
SHA2566627ca6396df9a4f980e245ae3d60c0491fee7910b363af5100acf4898654635
SHA512be6acc7f7bb3e688987c1408883fc84c389bed6e3b18128a41a3cc488b234a57cbf0ff2f0437a239a070e0f5ad77f6dc76a0cd232ff74a53bac1005fcd7a93b1
-
Filesize
235KB
MD510b6549523528ef949d086f8f79cf1af
SHA18176ceb01edc3485bd9dc2730bbd073bd93dd2f4
SHA2566627ca6396df9a4f980e245ae3d60c0491fee7910b363af5100acf4898654635
SHA512be6acc7f7bb3e688987c1408883fc84c389bed6e3b18128a41a3cc488b234a57cbf0ff2f0437a239a070e0f5ad77f6dc76a0cd232ff74a53bac1005fcd7a93b1
-
Filesize
175KB
MD5dd0c9e110c68ce1fa5308979ef718f7b
SHA1473deb8069f0841d47b74b7f414dacc6f96eca78
SHA256dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3
SHA51229bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236
-
Filesize
175KB
MD5dd0c9e110c68ce1fa5308979ef718f7b
SHA1473deb8069f0841d47b74b7f414dacc6f96eca78
SHA256dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3
SHA51229bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236