Analysis
-
max time kernel
91s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
14-02-2023 16:30
Static task
static1
Behavioral task
behavioral1
Sample
fe4c0883eba2c1f26dd638142a5c6f9d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
fe4c0883eba2c1f26dd638142a5c6f9d.exe
Resource
win10v2004-20221111-en
General
-
Target
fe4c0883eba2c1f26dd638142a5c6f9d.exe
-
Size
468KB
-
MD5
fe4c0883eba2c1f26dd638142a5c6f9d
-
SHA1
6417d8b40c8737d4219a2978d757724c8d5ee06f
-
SHA256
2e94a777e3b86474913bb95e457207c645956b53f41a39149418d806be8a6aa1
-
SHA512
37c72eaccd5352722c274e45413f4079f59cc965de867e82892087a74aabb5ee3edd5c4ff0d8913c8ce79c3e6c488b5f08a6a90a94139b89e8bea80f1b15ae90
-
SSDEEP
6144:Kny+bnr+Cp0yN90QEfcIUP0LVPIkYFsmPBcLslftc1xUMThp1yc60+hc5Hur92zB:VMr+y90VZUMLVoGmPlftcnpKfF9FTK
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Extracted
redline
cr10n
176.113.115.17:4132
-
auth_value
6016c19179aa1044c369adb0ec1f363b
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dqW66.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection dqW66.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dqW66.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" dqW66.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dqW66.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" dqW66.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 864 ndO54.exe 944 bot56.exe 4928 coB01Eu.exe 4416 dqW66.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features dqW66.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" dqW66.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ndO54.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ndO54.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fe4c0883eba2c1f26dd638142a5c6f9d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fe4c0883eba2c1f26dd638142a5c6f9d.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4748 4416 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 944 bot56.exe 944 bot56.exe 4928 coB01Eu.exe 4928 coB01Eu.exe 4416 dqW66.exe 4416 dqW66.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 944 bot56.exe Token: SeDebugPrivilege 4928 coB01Eu.exe Token: SeDebugPrivilege 4416 dqW66.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3796 wrote to memory of 864 3796 fe4c0883eba2c1f26dd638142a5c6f9d.exe 83 PID 3796 wrote to memory of 864 3796 fe4c0883eba2c1f26dd638142a5c6f9d.exe 83 PID 3796 wrote to memory of 864 3796 fe4c0883eba2c1f26dd638142a5c6f9d.exe 83 PID 864 wrote to memory of 944 864 ndO54.exe 84 PID 864 wrote to memory of 944 864 ndO54.exe 84 PID 864 wrote to memory of 944 864 ndO54.exe 84 PID 864 wrote to memory of 4928 864 ndO54.exe 91 PID 864 wrote to memory of 4928 864 ndO54.exe 91 PID 864 wrote to memory of 4928 864 ndO54.exe 91 PID 3796 wrote to memory of 4416 3796 fe4c0883eba2c1f26dd638142a5c6f9d.exe 92 PID 3796 wrote to memory of 4416 3796 fe4c0883eba2c1f26dd638142a5c6f9d.exe 92 PID 3796 wrote to memory of 4416 3796 fe4c0883eba2c1f26dd638142a5c6f9d.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe4c0883eba2c1f26dd638142a5c6f9d.exe"C:\Users\Admin\AppData\Local\Temp\fe4c0883eba2c1f26dd638142a5c6f9d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ndO54.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ndO54.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bot56.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bot56.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:944
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\coB01Eu.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\coB01Eu.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4928
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dqW66.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dqW66.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4416 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4416 -s 10803⤵
- Program crash
PID:4748
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4416 -ip 44161⤵PID:5040
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
220KB
MD5de42ca5e48e76be8fc7fd36752b6eb50
SHA1c594fea49882a1f0c4745c38de903c8f3e963acd
SHA2569be125a22fe4bbedcd63b46faf563f107bb54c1f6c894e45b4794c3e184aa0aa
SHA512b4dbe8b6ed6cf26a7225ef2a8af07629fdcc447920dd8bb5362cefdbbafe439ef92e5011c8c26716dba06646d161eca676470e484995173dd39dc42db454ff7b
-
Filesize
220KB
MD5de42ca5e48e76be8fc7fd36752b6eb50
SHA1c594fea49882a1f0c4745c38de903c8f3e963acd
SHA2569be125a22fe4bbedcd63b46faf563f107bb54c1f6c894e45b4794c3e184aa0aa
SHA512b4dbe8b6ed6cf26a7225ef2a8af07629fdcc447920dd8bb5362cefdbbafe439ef92e5011c8c26716dba06646d161eca676470e484995173dd39dc42db454ff7b
-
Filesize
202KB
MD5feeaf18fafd2b343ae4f71234552cf28
SHA1dfdc687e0d79e24da5c029e4dab92b5af9fcbaa2
SHA25618da39c88089c62e15abfacd6ab592769108775268d4be2751478629774e2c14
SHA512d1a51bbbb040920943b74c59aafd9bdf925db31cd63fa0fde3b9e9fad8ec55e6856e1b857c926a076f968f13fcc36d642c30ac2e2d7a24b1c7ee882e58cb8eb7
-
Filesize
202KB
MD5feeaf18fafd2b343ae4f71234552cf28
SHA1dfdc687e0d79e24da5c029e4dab92b5af9fcbaa2
SHA25618da39c88089c62e15abfacd6ab592769108775268d4be2751478629774e2c14
SHA512d1a51bbbb040920943b74c59aafd9bdf925db31cd63fa0fde3b9e9fad8ec55e6856e1b857c926a076f968f13fcc36d642c30ac2e2d7a24b1c7ee882e58cb8eb7
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
175KB
MD5ce5ef6aac94fdb2af40da676f6cab58f
SHA1c393f24b1550955a686ee39067f20813415af95f
SHA256ce360295ca7fcc1a1c2b47a604305c67ab41358770edbd769a6a44aa635c2fd0
SHA5122cc98869cba6a962129c57fb7e3ff0b64623c94903bfbf9a2648e191b633fbe73f8e7b9d8fea348e30cc88bc44d27454fd880c81a55a6b795170fa804e6cda65
-
Filesize
175KB
MD5ce5ef6aac94fdb2af40da676f6cab58f
SHA1c393f24b1550955a686ee39067f20813415af95f
SHA256ce360295ca7fcc1a1c2b47a604305c67ab41358770edbd769a6a44aa635c2fd0
SHA5122cc98869cba6a962129c57fb7e3ff0b64623c94903bfbf9a2648e191b633fbe73f8e7b9d8fea348e30cc88bc44d27454fd880c81a55a6b795170fa804e6cda65