Analysis
-
max time kernel
60s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
14-02-2023 01:59
Static task
static1
Behavioral task
behavioral1
Sample
ce30c6c1b0168c376dca8094978f5256349e1d6da9d1cb62aa4c5fdf97e7d602.exe
Resource
win10v2004-20221111-en
General
-
Target
ce30c6c1b0168c376dca8094978f5256349e1d6da9d1cb62aa4c5fdf97e7d602.exe
-
Size
480KB
-
MD5
e8845244456f345c5ecbc41d769d56d3
-
SHA1
94551a00604f91f22eb2baeb5ad6422e73991d7b
-
SHA256
ce30c6c1b0168c376dca8094978f5256349e1d6da9d1cb62aa4c5fdf97e7d602
-
SHA512
e63d6a8e7a8c0288b6cde40480ce12145491cd12ab36fb3c72f9cd2d3e3d870837d85df7cbd649089e940d3ccf8d75c18352762188ffc1c8421b8c26bfaefca3
-
SSDEEP
12288:vMrxy90OJXzuATwVWizRclyUzSyMDeHXyMchM8:eyJhzunVZNAlHXyHP
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Extracted
redline
crnn
176.113.115.17:4132
-
auth_value
6dfbf5eac3db7046d55dfd3f6608be3f
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dXb40.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection dXb40.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dXb40.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" dXb40.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dXb40.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" dXb40.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 4908 ndJ90.exe 948 bkw68.exe 3364 cOE08Ed.exe 4880 dXb40.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features dXb40.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" dXb40.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ce30c6c1b0168c376dca8094978f5256349e1d6da9d1cb62aa4c5fdf97e7d602.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ce30c6c1b0168c376dca8094978f5256349e1d6da9d1cb62aa4c5fdf97e7d602.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ndJ90.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ndJ90.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 448 4880 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 948 bkw68.exe 948 bkw68.exe 3364 cOE08Ed.exe 3364 cOE08Ed.exe 4880 dXb40.exe 4880 dXb40.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 948 bkw68.exe Token: SeDebugPrivilege 3364 cOE08Ed.exe Token: SeDebugPrivilege 4880 dXb40.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4884 wrote to memory of 4908 4884 ce30c6c1b0168c376dca8094978f5256349e1d6da9d1cb62aa4c5fdf97e7d602.exe 82 PID 4884 wrote to memory of 4908 4884 ce30c6c1b0168c376dca8094978f5256349e1d6da9d1cb62aa4c5fdf97e7d602.exe 82 PID 4884 wrote to memory of 4908 4884 ce30c6c1b0168c376dca8094978f5256349e1d6da9d1cb62aa4c5fdf97e7d602.exe 82 PID 4908 wrote to memory of 948 4908 ndJ90.exe 83 PID 4908 wrote to memory of 948 4908 ndJ90.exe 83 PID 4908 wrote to memory of 948 4908 ndJ90.exe 83 PID 4908 wrote to memory of 3364 4908 ndJ90.exe 84 PID 4908 wrote to memory of 3364 4908 ndJ90.exe 84 PID 4908 wrote to memory of 3364 4908 ndJ90.exe 84 PID 4884 wrote to memory of 4880 4884 ce30c6c1b0168c376dca8094978f5256349e1d6da9d1cb62aa4c5fdf97e7d602.exe 89 PID 4884 wrote to memory of 4880 4884 ce30c6c1b0168c376dca8094978f5256349e1d6da9d1cb62aa4c5fdf97e7d602.exe 89 PID 4884 wrote to memory of 4880 4884 ce30c6c1b0168c376dca8094978f5256349e1d6da9d1cb62aa4c5fdf97e7d602.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce30c6c1b0168c376dca8094978f5256349e1d6da9d1cb62aa4c5fdf97e7d602.exe"C:\Users\Admin\AppData\Local\Temp\ce30c6c1b0168c376dca8094978f5256349e1d6da9d1cb62aa4c5fdf97e7d602.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ndJ90.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ndJ90.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bkw68.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bkw68.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:948
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cOE08Ed.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cOE08Ed.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3364
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dXb40.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dXb40.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4880 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4880 -s 10803⤵
- Program crash
PID:448
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4880 -ip 48801⤵PID:1792
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
247KB
MD56cf228753a605faa339ed5509a3a1b84
SHA1340fa64fb659c183a7d040514be806e51ed33abb
SHA2565456903fe3382ca3a494aa5c2d626ddbc57ce8c977893d546ff5345df484bab9
SHA51269c25fec8903c2189e189a80288a6bd9ed44c8e56bb79903f371ccdd0e7fd0a8075ff3f7816d906e9d839e64145921fe34ae8c1df77e5b85597b7508080ce61b
-
Filesize
247KB
MD56cf228753a605faa339ed5509a3a1b84
SHA1340fa64fb659c183a7d040514be806e51ed33abb
SHA2565456903fe3382ca3a494aa5c2d626ddbc57ce8c977893d546ff5345df484bab9
SHA51269c25fec8903c2189e189a80288a6bd9ed44c8e56bb79903f371ccdd0e7fd0a8075ff3f7816d906e9d839e64145921fe34ae8c1df77e5b85597b7508080ce61b
-
Filesize
202KB
MD52e1a8d74664fee7822d45b1a47dc1613
SHA199f6871fd5305c0291a2dbb523b4d0c1c8bf82b2
SHA256b0fa4f04ad1c9f4e5b5b9e26ae17086c03065b2ef3b7f23bfa831c3c7ab5cbf5
SHA512cbb02c70c4d5823aada130bfab3bf89f48302947b56a8204b227bdcac7d8a30e5386e1ed1bddb89c55882e3e9ed985a2e2c2eca5da65606238853c871ec3e85d
-
Filesize
202KB
MD52e1a8d74664fee7822d45b1a47dc1613
SHA199f6871fd5305c0291a2dbb523b4d0c1c8bf82b2
SHA256b0fa4f04ad1c9f4e5b5b9e26ae17086c03065b2ef3b7f23bfa831c3c7ab5cbf5
SHA512cbb02c70c4d5823aada130bfab3bf89f48302947b56a8204b227bdcac7d8a30e5386e1ed1bddb89c55882e3e9ed985a2e2c2eca5da65606238853c871ec3e85d
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
175KB
MD5062a3c73b1aaf076abefd71633b66de5
SHA1e4b7e004c32d673fd61b1669c797dc4b207d8445
SHA256f281aafa876847194d635feddb06b11295249cc4bcf940d5246bdb5938410881
SHA5126bee4020fa8e4955b3028a71037f78ec922132009942283e071b3acdeea375300cef092fd692e9463d625065d5ef57e5e1ebd98f72e801ffc2178c071d645ec3
-
Filesize
175KB
MD5062a3c73b1aaf076abefd71633b66de5
SHA1e4b7e004c32d673fd61b1669c797dc4b207d8445
SHA256f281aafa876847194d635feddb06b11295249cc4bcf940d5246bdb5938410881
SHA5126bee4020fa8e4955b3028a71037f78ec922132009942283e071b3acdeea375300cef092fd692e9463d625065d5ef57e5e1ebd98f72e801ffc2178c071d645ec3