Analysis
-
max time kernel
124s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
14-02-2023 19:34
Static task
static1
Behavioral task
behavioral1
Sample
6db6a663e887e86ac18532e4f477f61e2c9e181e4ab1f384c72b7c892aeb8b30.exe
Resource
win10v2004-20221111-en
General
-
Target
6db6a663e887e86ac18532e4f477f61e2c9e181e4ab1f384c72b7c892aeb8b30.exe
-
Size
536KB
-
MD5
bf40b15d8b1c47d088c5edebbc8343e8
-
SHA1
920ffab6207ff092c9e68b95e6fdbd2ae0029bb1
-
SHA256
6db6a663e887e86ac18532e4f477f61e2c9e181e4ab1f384c72b7c892aeb8b30
-
SHA512
e267aca80bbcebdc855ce0d205597ceeed212f04596eca48ee1374d44afae329480f1df99d113b36a9a04212a5d7d16253c16a664a01bff4a525adef6636ee0b
-
SSDEEP
12288:1Mruy90BQWaBdqje2I8otbmLWR0TNlXoziMTQXQG:fy9WGqjhn2b6PXoziQFG
Malware Config
Extracted
redline
dubka
193.233.20.13:4136
-
auth_value
e5a9421183a033f283b2f23139b471f0
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sDP00.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sDP00.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sDP00.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sDP00.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sDP00.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sDP00.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 4184 vLe40.exe 1604 dyc38.exe 5020 nbR27Jr.exe 448 sDP00.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sDP00.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6db6a663e887e86ac18532e4f477f61e2c9e181e4ab1f384c72b7c892aeb8b30.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6db6a663e887e86ac18532e4f477f61e2c9e181e4ab1f384c72b7c892aeb8b30.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vLe40.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vLe40.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4056 1604 WerFault.exe 81 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1604 dyc38.exe 1604 dyc38.exe 5020 nbR27Jr.exe 5020 nbR27Jr.exe 448 sDP00.exe 448 sDP00.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1604 dyc38.exe Token: SeDebugPrivilege 5020 nbR27Jr.exe Token: SeDebugPrivilege 448 sDP00.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 872 wrote to memory of 4184 872 6db6a663e887e86ac18532e4f477f61e2c9e181e4ab1f384c72b7c892aeb8b30.exe 80 PID 872 wrote to memory of 4184 872 6db6a663e887e86ac18532e4f477f61e2c9e181e4ab1f384c72b7c892aeb8b30.exe 80 PID 872 wrote to memory of 4184 872 6db6a663e887e86ac18532e4f477f61e2c9e181e4ab1f384c72b7c892aeb8b30.exe 80 PID 4184 wrote to memory of 1604 4184 vLe40.exe 81 PID 4184 wrote to memory of 1604 4184 vLe40.exe 81 PID 4184 wrote to memory of 1604 4184 vLe40.exe 81 PID 4184 wrote to memory of 5020 4184 vLe40.exe 84 PID 4184 wrote to memory of 5020 4184 vLe40.exe 84 PID 4184 wrote to memory of 5020 4184 vLe40.exe 84 PID 872 wrote to memory of 448 872 6db6a663e887e86ac18532e4f477f61e2c9e181e4ab1f384c72b7c892aeb8b30.exe 86 PID 872 wrote to memory of 448 872 6db6a663e887e86ac18532e4f477f61e2c9e181e4ab1f384c72b7c892aeb8b30.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\6db6a663e887e86ac18532e4f477f61e2c9e181e4ab1f384c72b7c892aeb8b30.exe"C:\Users\Admin\AppData\Local\Temp\6db6a663e887e86ac18532e4f477f61e2c9e181e4ab1f384c72b7c892aeb8b30.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vLe40.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vLe40.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dyc38.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dyc38.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1604 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1604 -s 17364⤵
- Program crash
PID:4056
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nbR27Jr.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nbR27Jr.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5020
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sDP00.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sDP00.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1604 -ip 16041⤵PID:220
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
432KB
MD55d68d77927af6154c5b4823f86b483c3
SHA1155017dd89a5f67b23b1e2d5c60b113dc4074c0c
SHA25628d14fcbf4e40d9f0ff95a58ce213c319bd029f71912b22c88b4d2d1cf043005
SHA512fcf7ae274cd49df406ec0463696836a30113b3947fe3708a78b9c8ce3c8004aabaebb06ac0fa2dfd73c7c6e3b991bd72b78a9963a8c4f8dd1ef3a9a2908874a7
-
Filesize
432KB
MD55d68d77927af6154c5b4823f86b483c3
SHA1155017dd89a5f67b23b1e2d5c60b113dc4074c0c
SHA25628d14fcbf4e40d9f0ff95a58ce213c319bd029f71912b22c88b4d2d1cf043005
SHA512fcf7ae274cd49df406ec0463696836a30113b3947fe3708a78b9c8ce3c8004aabaebb06ac0fa2dfd73c7c6e3b991bd72b78a9963a8c4f8dd1ef3a9a2908874a7
-
Filesize
293KB
MD57cf461732cf9d151aed5ca9f15c9d689
SHA116308873863f9231638b81abe04b80afd0b98c18
SHA256971b14529405a8774ceb5552f3f12fcf455f530e567b71ae043ef166f4ff9d4f
SHA5121b27323c2386aa46b28ebd2b8a127dfa86ccefee0a104c73d0ec2fd56b7f72c65a46d0529716def211c747e386d101aa38cc7d2143839927971ba7788e381e75
-
Filesize
293KB
MD57cf461732cf9d151aed5ca9f15c9d689
SHA116308873863f9231638b81abe04b80afd0b98c18
SHA256971b14529405a8774ceb5552f3f12fcf455f530e567b71ae043ef166f4ff9d4f
SHA5121b27323c2386aa46b28ebd2b8a127dfa86ccefee0a104c73d0ec2fd56b7f72c65a46d0529716def211c747e386d101aa38cc7d2143839927971ba7788e381e75
-
Filesize
175KB
MD5dd0c9e110c68ce1fa5308979ef718f7b
SHA1473deb8069f0841d47b74b7f414dacc6f96eca78
SHA256dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3
SHA51229bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236
-
Filesize
175KB
MD5dd0c9e110c68ce1fa5308979ef718f7b
SHA1473deb8069f0841d47b74b7f414dacc6f96eca78
SHA256dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3
SHA51229bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236