Analysis
-
max time kernel
102s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
14-02-2023 08:36
Static task
static1
Behavioral task
behavioral1
Sample
7384ad4b89310f0e5ce7a561d7173bad.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7384ad4b89310f0e5ce7a561d7173bad.exe
Resource
win10v2004-20221111-en
General
-
Target
7384ad4b89310f0e5ce7a561d7173bad.exe
-
Size
480KB
-
MD5
7384ad4b89310f0e5ce7a561d7173bad
-
SHA1
ec9f9990704595941aa89cb7560ac74a0c71f3a2
-
SHA256
bff73ef26c410d89b352b6f6a33897fce077d951db59735155ff6e7a0e71209c
-
SHA512
12c8bb7b5729adad551fe2246fe1733f2a0d898e6f0ca3555f7ab909feca4e25cd9e5b5bd293d29bab688a6f3d1292e615c07925bb2909bdbfbaa0f87a757310
-
SSDEEP
12288:gMrty90wu1GLaabMMpSYHAnd2SFiLCoRagTZe:9yDuEfeQS0Cost
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Extracted
redline
crnn
176.113.115.17:4132
-
auth_value
6dfbf5eac3db7046d55dfd3f6608be3f
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dkI58.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection dkI58.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dkI58.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" dkI58.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dkI58.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" dkI58.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 2812 nrV73.exe 2872 byh16.exe 4100 cFX70sA.exe 3492 dkI58.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features dkI58.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" dkI58.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 7384ad4b89310f0e5ce7a561d7173bad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7384ad4b89310f0e5ce7a561d7173bad.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce nrV73.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nrV73.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2652 3492 WerFault.exe 88 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2872 byh16.exe 2872 byh16.exe 4100 cFX70sA.exe 4100 cFX70sA.exe 3492 dkI58.exe 3492 dkI58.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2872 byh16.exe Token: SeDebugPrivilege 4100 cFX70sA.exe Token: SeDebugPrivilege 3492 dkI58.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1764 wrote to memory of 2812 1764 7384ad4b89310f0e5ce7a561d7173bad.exe 76 PID 1764 wrote to memory of 2812 1764 7384ad4b89310f0e5ce7a561d7173bad.exe 76 PID 1764 wrote to memory of 2812 1764 7384ad4b89310f0e5ce7a561d7173bad.exe 76 PID 2812 wrote to memory of 2872 2812 nrV73.exe 77 PID 2812 wrote to memory of 2872 2812 nrV73.exe 77 PID 2812 wrote to memory of 2872 2812 nrV73.exe 77 PID 2812 wrote to memory of 4100 2812 nrV73.exe 84 PID 2812 wrote to memory of 4100 2812 nrV73.exe 84 PID 2812 wrote to memory of 4100 2812 nrV73.exe 84 PID 1764 wrote to memory of 3492 1764 7384ad4b89310f0e5ce7a561d7173bad.exe 88 PID 1764 wrote to memory of 3492 1764 7384ad4b89310f0e5ce7a561d7173bad.exe 88 PID 1764 wrote to memory of 3492 1764 7384ad4b89310f0e5ce7a561d7173bad.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\7384ad4b89310f0e5ce7a561d7173bad.exe"C:\Users\Admin\AppData\Local\Temp\7384ad4b89310f0e5ce7a561d7173bad.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nrV73.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nrV73.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\byh16.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\byh16.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2872
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cFX70sA.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cFX70sA.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4100
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dkI58.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dkI58.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3492 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 10803⤵
- Program crash
PID:2652
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3492 -ip 34921⤵PID:2380
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
247KB
MD50ef0dfd14f4136e407d971cfb57adf3f
SHA1f7225981e833c73276fcb3569357f5c60312843a
SHA25675b453b18104f8df29c0c668319eee3dc13a162a9d9054135a69b28f0803ae49
SHA512bc06e461f8ff784b31cc98570e1e62c881c8eb20b4883e9ebf59207d0ef34fef982bbdbdb04ba7521c29cabda874274f71658dc6f7ae9cf01ae14bf9392bd281
-
Filesize
247KB
MD50ef0dfd14f4136e407d971cfb57adf3f
SHA1f7225981e833c73276fcb3569357f5c60312843a
SHA25675b453b18104f8df29c0c668319eee3dc13a162a9d9054135a69b28f0803ae49
SHA512bc06e461f8ff784b31cc98570e1e62c881c8eb20b4883e9ebf59207d0ef34fef982bbdbdb04ba7521c29cabda874274f71658dc6f7ae9cf01ae14bf9392bd281
-
Filesize
202KB
MD5c061012bed5bd45e89402b59eb1dc6c4
SHA179c55149fea496bf61cba88544650b641b9b8051
SHA25643035d7ab2c5376cc32d33b94e513e6e70e52767095451a0ed557e644dcfbda0
SHA512675096d0d8ed047e7346bdc9d4d5d593694332464257bf951b60533326152fe6c1a25b8612561b5b3050e7e2595911615bc990f1e4bd470abc2bd69d412f614f
-
Filesize
202KB
MD5c061012bed5bd45e89402b59eb1dc6c4
SHA179c55149fea496bf61cba88544650b641b9b8051
SHA25643035d7ab2c5376cc32d33b94e513e6e70e52767095451a0ed557e644dcfbda0
SHA512675096d0d8ed047e7346bdc9d4d5d593694332464257bf951b60533326152fe6c1a25b8612561b5b3050e7e2595911615bc990f1e4bd470abc2bd69d412f614f
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
175KB
MD5062a3c73b1aaf076abefd71633b66de5
SHA1e4b7e004c32d673fd61b1669c797dc4b207d8445
SHA256f281aafa876847194d635feddb06b11295249cc4bcf940d5246bdb5938410881
SHA5126bee4020fa8e4955b3028a71037f78ec922132009942283e071b3acdeea375300cef092fd692e9463d625065d5ef57e5e1ebd98f72e801ffc2178c071d645ec3
-
Filesize
175KB
MD5062a3c73b1aaf076abefd71633b66de5
SHA1e4b7e004c32d673fd61b1669c797dc4b207d8445
SHA256f281aafa876847194d635feddb06b11295249cc4bcf940d5246bdb5938410881
SHA5126bee4020fa8e4955b3028a71037f78ec922132009942283e071b3acdeea375300cef092fd692e9463d625065d5ef57e5e1ebd98f72e801ffc2178c071d645ec3