Analysis
-
max time kernel
91s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2023, 17:36
Static task
static1
Behavioral task
behavioral1
Sample
db888c33e99939779647619d4a2926d6592b62b96fae1794d5c4bcca86956f16.exe
Resource
win10v2004-20221111-en
General
-
Target
db888c33e99939779647619d4a2926d6592b62b96fae1794d5c4bcca86956f16.exe
-
Size
739KB
-
MD5
d7404a6099ea5cfa126c83bf38f61ea3
-
SHA1
50028cf7f82a05ac59986568780542e33b480458
-
SHA256
db888c33e99939779647619d4a2926d6592b62b96fae1794d5c4bcca86956f16
-
SHA512
31023b304d07e679392f60a35e2b8cb9364530082c28f6901d852bf99af88811a2a035a2402633e77336f407851ac8f03ea74796791d565a3e777685960f1b20
-
SSDEEP
12288:lMrGy90I/fNVZb8IVcI0N6c4q6aKOQSfS4wEUxikveQ6mv4KQYspy:vyjNVZb8Iz0GxSfS4wEeXv/vbd
Malware Config
Extracted
redline
cr10
176.113.115.17:4132
-
auth_value
0a52a09c70a98bb6612362e5eb8b1d02
Extracted
redline
dubka
193.233.20.13:4136
-
auth_value
e5a9421183a033f283b2f23139b471f0
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sEq08.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sEq08.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sEq08.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sEq08.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sEq08.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sEq08.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
pid Process 1956 vmx79.exe 3432 vTW34.exe 1972 dJo17.exe 2684 lrC80.exe 5068 nXL42.exe 3108 sEq08.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sEq08.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vmx79.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vTW34.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" vTW34.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce db888c33e99939779647619d4a2926d6592b62b96fae1794d5c4bcca86956f16.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" db888c33e99939779647619d4a2926d6592b62b96fae1794d5c4bcca86956f16.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vmx79.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2684 set thread context of 3816 2684 lrC80.exe 93 -
Program crash 1 IoCs
pid pid_target Process procid_target 3356 1972 WerFault.exe 82 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1972 dJo17.exe 1972 dJo17.exe 5068 nXL42.exe 3816 AppLaunch.exe 3816 AppLaunch.exe 5068 nXL42.exe 3108 sEq08.exe 3108 sEq08.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1972 dJo17.exe Token: SeDebugPrivilege 5068 nXL42.exe Token: SeDebugPrivilege 3816 AppLaunch.exe Token: SeDebugPrivilege 3108 sEq08.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 4292 wrote to memory of 1956 4292 db888c33e99939779647619d4a2926d6592b62b96fae1794d5c4bcca86956f16.exe 80 PID 4292 wrote to memory of 1956 4292 db888c33e99939779647619d4a2926d6592b62b96fae1794d5c4bcca86956f16.exe 80 PID 4292 wrote to memory of 1956 4292 db888c33e99939779647619d4a2926d6592b62b96fae1794d5c4bcca86956f16.exe 80 PID 1956 wrote to memory of 3432 1956 vmx79.exe 81 PID 1956 wrote to memory of 3432 1956 vmx79.exe 81 PID 1956 wrote to memory of 3432 1956 vmx79.exe 81 PID 3432 wrote to memory of 1972 3432 vTW34.exe 82 PID 3432 wrote to memory of 1972 3432 vTW34.exe 82 PID 3432 wrote to memory of 1972 3432 vTW34.exe 82 PID 3432 wrote to memory of 2684 3432 vTW34.exe 91 PID 3432 wrote to memory of 2684 3432 vTW34.exe 91 PID 3432 wrote to memory of 2684 3432 vTW34.exe 91 PID 2684 wrote to memory of 3816 2684 lrC80.exe 93 PID 2684 wrote to memory of 3816 2684 lrC80.exe 93 PID 2684 wrote to memory of 3816 2684 lrC80.exe 93 PID 2684 wrote to memory of 3816 2684 lrC80.exe 93 PID 2684 wrote to memory of 3816 2684 lrC80.exe 93 PID 1956 wrote to memory of 5068 1956 vmx79.exe 94 PID 1956 wrote to memory of 5068 1956 vmx79.exe 94 PID 1956 wrote to memory of 5068 1956 vmx79.exe 94 PID 4292 wrote to memory of 3108 4292 db888c33e99939779647619d4a2926d6592b62b96fae1794d5c4bcca86956f16.exe 95 PID 4292 wrote to memory of 3108 4292 db888c33e99939779647619d4a2926d6592b62b96fae1794d5c4bcca86956f16.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\db888c33e99939779647619d4a2926d6592b62b96fae1794d5c4bcca86956f16.exe"C:\Users\Admin\AppData\Local\Temp\db888c33e99939779647619d4a2926d6592b62b96fae1794d5c4bcca86956f16.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vmx79.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vmx79.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vTW34.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vTW34.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dJo17.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dJo17.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1972 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1972 -s 13405⤵
- Program crash
PID:3356
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\lrC80.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\lrC80.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3816
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nXL42.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nXL42.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5068
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sEq08.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sEq08.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1972 -ip 19721⤵PID:1312
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
635KB
MD51843160bc6692d876285c247854d0469
SHA1b9c2efa657b64f19dd89985d9781e273d81bdcc1
SHA256315f4d4c6f6bc19c87679ed30ab9a5084a4343edf570aedb761c227d182ad759
SHA512c77792be9ad7a4230ecd88244e44d18ff23a01ef523808b9064080abdc41e16f06b5e72cf57e70aa411048936334ef07214ce9591dda29bfe2fe6c253c476bfd
-
Filesize
635KB
MD51843160bc6692d876285c247854d0469
SHA1b9c2efa657b64f19dd89985d9781e273d81bdcc1
SHA256315f4d4c6f6bc19c87679ed30ab9a5084a4343edf570aedb761c227d182ad759
SHA512c77792be9ad7a4230ecd88244e44d18ff23a01ef523808b9064080abdc41e16f06b5e72cf57e70aa411048936334ef07214ce9591dda29bfe2fe6c253c476bfd
-
Filesize
175KB
MD5dd0c9e110c68ce1fa5308979ef718f7b
SHA1473deb8069f0841d47b74b7f414dacc6f96eca78
SHA256dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3
SHA51229bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236
-
Filesize
175KB
MD5dd0c9e110c68ce1fa5308979ef718f7b
SHA1473deb8069f0841d47b74b7f414dacc6f96eca78
SHA256dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3
SHA51229bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236
-
Filesize
491KB
MD50027395bec2d869625d3f20bdfea8d5d
SHA10736b7f94e6263fe9d8eb8e00fb8c7fed7e9b457
SHA2565587198b8915228f3b719ab18e94d32305cb245e2cbc686b0e70e69649256d2e
SHA51272f2bdea983adb05e8f07362099fe37633a1de9464c603c43586b6ae6f0fa7c2a6c222b6c0f7f9690a6fdcadddc700747157f8b43010e653700bb2554b8b2547
-
Filesize
491KB
MD50027395bec2d869625d3f20bdfea8d5d
SHA10736b7f94e6263fe9d8eb8e00fb8c7fed7e9b457
SHA2565587198b8915228f3b719ab18e94d32305cb245e2cbc686b0e70e69649256d2e
SHA51272f2bdea983adb05e8f07362099fe37633a1de9464c603c43586b6ae6f0fa7c2a6c222b6c0f7f9690a6fdcadddc700747157f8b43010e653700bb2554b8b2547
-
Filesize
293KB
MD5b5b088e47af91c344e3583ef9391586f
SHA181c28284f693f66d1d30b8ee09f0d69e27457333
SHA2563f201ce75b624c56d73e6aa11e0d93825455d0ee88d3fdcc8e2f3bafae6cc739
SHA5129d0789dfa16b849709e3bb04159ed2bf6ccd74975472efe87aeb9d8ff0539b8953cb0937b4d646fba7d1460ea8c1fd0ee4dfb9ec2debfefdee70ab9b05ca1a3b
-
Filesize
293KB
MD5b5b088e47af91c344e3583ef9391586f
SHA181c28284f693f66d1d30b8ee09f0d69e27457333
SHA2563f201ce75b624c56d73e6aa11e0d93825455d0ee88d3fdcc8e2f3bafae6cc739
SHA5129d0789dfa16b849709e3bb04159ed2bf6ccd74975472efe87aeb9d8ff0539b8953cb0937b4d646fba7d1460ea8c1fd0ee4dfb9ec2debfefdee70ab9b05ca1a3b
-
Filesize
265KB
MD5b9eedd1c8b16c4481c3cadbe6ed97280
SHA16d44e5ced475bda87d1282b30ebc84bd25595e1f
SHA256ceb59e6ddd127fcc56e7dca136002b8552290a954c92dd565706c4dc472bad17
SHA512335b334750f8de4e366c7eb3ddc854a46b0d8cbd4d5479671131c9ce9a93fe679ae728b970b6ce3489a6863472bd2172870c6c8e4f1271234b23717a6dc957f1
-
Filesize
265KB
MD5b9eedd1c8b16c4481c3cadbe6ed97280
SHA16d44e5ced475bda87d1282b30ebc84bd25595e1f
SHA256ceb59e6ddd127fcc56e7dca136002b8552290a954c92dd565706c4dc472bad17
SHA512335b334750f8de4e366c7eb3ddc854a46b0d8cbd4d5479671131c9ce9a93fe679ae728b970b6ce3489a6863472bd2172870c6c8e4f1271234b23717a6dc957f1