Analysis
-
max time kernel
90s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2023, 09:15
Static task
static1
Behavioral task
behavioral1
Sample
7a023534e2ea54a80b0ea8f51ea6d053ff27a353ff153aaccd85568f67a32aa5.exe
Resource
win10v2004-20221111-en
General
-
Target
7a023534e2ea54a80b0ea8f51ea6d053ff27a353ff153aaccd85568f67a32aa5.exe
-
Size
469KB
-
MD5
fef3d12a1fe20fced05419512b510cbb
-
SHA1
269939fd78d1d8878ce10dc36c7920a4174cba8d
-
SHA256
7a023534e2ea54a80b0ea8f51ea6d053ff27a353ff153aaccd85568f67a32aa5
-
SHA512
cd14a90731676b3ac9ba9028bb61f499c61984e193898bdcb4245e7185edbf58a7efd5f275ef07045a815b279c7f940878a4dceaefadbbdf9a60117884b125a6
-
SSDEEP
12288:dMrky90oZ78lEyTm+95+gWZr7Vi3Sgvq9qRnXQ:xy/1y/sgWjvOSqRnXQ
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Extracted
redline
cr10n
176.113.115.17:4132
-
auth_value
6016c19179aa1044c369adb0ec1f363b
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection dSo61.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dSo61.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" dSo61.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dSo61.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" dSo61.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dSo61.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 2792 nNt12.exe 3868 bfe83.exe 4480 cPy79vk.exe 4700 dSo61.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features dSo61.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" dSo61.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 7a023534e2ea54a80b0ea8f51ea6d053ff27a353ff153aaccd85568f67a32aa5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7a023534e2ea54a80b0ea8f51ea6d053ff27a353ff153aaccd85568f67a32aa5.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce nNt12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nNt12.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3816 4700 WerFault.exe 84 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3868 bfe83.exe 3868 bfe83.exe 4480 cPy79vk.exe 4480 cPy79vk.exe 4700 dSo61.exe 4700 dSo61.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3868 bfe83.exe Token: SeDebugPrivilege 4480 cPy79vk.exe Token: SeDebugPrivilege 4700 dSo61.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4880 wrote to memory of 2792 4880 7a023534e2ea54a80b0ea8f51ea6d053ff27a353ff153aaccd85568f67a32aa5.exe 81 PID 4880 wrote to memory of 2792 4880 7a023534e2ea54a80b0ea8f51ea6d053ff27a353ff153aaccd85568f67a32aa5.exe 81 PID 4880 wrote to memory of 2792 4880 7a023534e2ea54a80b0ea8f51ea6d053ff27a353ff153aaccd85568f67a32aa5.exe 81 PID 2792 wrote to memory of 3868 2792 nNt12.exe 82 PID 2792 wrote to memory of 3868 2792 nNt12.exe 82 PID 2792 wrote to memory of 3868 2792 nNt12.exe 82 PID 2792 wrote to memory of 4480 2792 nNt12.exe 83 PID 2792 wrote to memory of 4480 2792 nNt12.exe 83 PID 2792 wrote to memory of 4480 2792 nNt12.exe 83 PID 4880 wrote to memory of 4700 4880 7a023534e2ea54a80b0ea8f51ea6d053ff27a353ff153aaccd85568f67a32aa5.exe 84 PID 4880 wrote to memory of 4700 4880 7a023534e2ea54a80b0ea8f51ea6d053ff27a353ff153aaccd85568f67a32aa5.exe 84 PID 4880 wrote to memory of 4700 4880 7a023534e2ea54a80b0ea8f51ea6d053ff27a353ff153aaccd85568f67a32aa5.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a023534e2ea54a80b0ea8f51ea6d053ff27a353ff153aaccd85568f67a32aa5.exe"C:\Users\Admin\AppData\Local\Temp\7a023534e2ea54a80b0ea8f51ea6d053ff27a353ff153aaccd85568f67a32aa5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nNt12.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nNt12.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bfe83.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bfe83.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3868
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cPy79vk.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cPy79vk.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4480
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dSo61.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dSo61.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4700 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4700 -s 10803⤵
- Program crash
PID:3816
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4700 -ip 47001⤵PID:4448
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
221KB
MD54feb45b0494ebda3a75baf46d9a6ace6
SHA1412a2e08c2def6996742c6e8fc20cfc982d30cd9
SHA2563e361b1e9b10cdc0c9f294148c6f4b4bc0d93a4562a6b8dda641e870e1432f77
SHA512d408c826beba95df794cd648f8ccb87d871c35368038bea9105c550b5b5f054241c75d73d46056a313aa045ff02a5322bac2e754d542bd7d469f9bd69cc87125
-
Filesize
221KB
MD54feb45b0494ebda3a75baf46d9a6ace6
SHA1412a2e08c2def6996742c6e8fc20cfc982d30cd9
SHA2563e361b1e9b10cdc0c9f294148c6f4b4bc0d93a4562a6b8dda641e870e1432f77
SHA512d408c826beba95df794cd648f8ccb87d871c35368038bea9105c550b5b5f054241c75d73d46056a313aa045ff02a5322bac2e754d542bd7d469f9bd69cc87125
-
Filesize
202KB
MD518b1cdf6eaf473705d5000e53498dfb2
SHA16f83716fce0220d269945e82e078204a175992c5
SHA256dea78dc80a8dcc645701763858eeee0ce38bcc16641a0bbfd4e104b06adafb5d
SHA512c39ea7b3e3535b4d2c2ce281a0af21b338cbe0d06bb4a144ab43a6eab93777c97994b5dbb1c97a838e9d2bfb8f83f17bddcf5a6aca0aa65d5d9f7e6a1ec79d20
-
Filesize
202KB
MD518b1cdf6eaf473705d5000e53498dfb2
SHA16f83716fce0220d269945e82e078204a175992c5
SHA256dea78dc80a8dcc645701763858eeee0ce38bcc16641a0bbfd4e104b06adafb5d
SHA512c39ea7b3e3535b4d2c2ce281a0af21b338cbe0d06bb4a144ab43a6eab93777c97994b5dbb1c97a838e9d2bfb8f83f17bddcf5a6aca0aa65d5d9f7e6a1ec79d20
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
175KB
MD5ce5ef6aac94fdb2af40da676f6cab58f
SHA1c393f24b1550955a686ee39067f20813415af95f
SHA256ce360295ca7fcc1a1c2b47a604305c67ab41358770edbd769a6a44aa635c2fd0
SHA5122cc98869cba6a962129c57fb7e3ff0b64623c94903bfbf9a2648e191b633fbe73f8e7b9d8fea348e30cc88bc44d27454fd880c81a55a6b795170fa804e6cda65
-
Filesize
175KB
MD5ce5ef6aac94fdb2af40da676f6cab58f
SHA1c393f24b1550955a686ee39067f20813415af95f
SHA256ce360295ca7fcc1a1c2b47a604305c67ab41358770edbd769a6a44aa635c2fd0
SHA5122cc98869cba6a962129c57fb7e3ff0b64623c94903bfbf9a2648e191b633fbe73f8e7b9d8fea348e30cc88bc44d27454fd880c81a55a6b795170fa804e6cda65