Analysis
-
max time kernel
72s -
max time network
74s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
15/02/2023, 22:44
Static task
static1
General
-
Target
6dde89d4281d0cb2f83bd630307e194ce2a6dbcc5167796c5851dc24c0b92899.exe
-
Size
960KB
-
MD5
ea5a446817d0b3df03a8c152029b7975
-
SHA1
bb54ea839b02d75aaa92743f2cbdf41b73a0f895
-
SHA256
6dde89d4281d0cb2f83bd630307e194ce2a6dbcc5167796c5851dc24c0b92899
-
SHA512
72b215988dc36ebf4671cae2699ba623744f18c3ff9d58171d68f803fb059370e58c0ce0412e11be2d3d3638d8c6f881b6606ad1d6f66868832d7ac7e6196f1b
-
SSDEEP
24576:DycgeuTc97HTwSJXTHVwUaV9CDOvixKDz0mNdQ7V:Wcgeu0cSJDHVwNXCKvGKDo1
Malware Config
Extracted
redline
dubka
193.233.20.13:4136
-
auth_value
e5a9421183a033f283b2f23139b471f0
Extracted
redline
ruma
193.233.20.13:4136
-
auth_value
647d00dfaba082a4a30f383bca5d1a2a
Extracted
redline
cr10n
176.113.115.17:4132
-
auth_value
6016c19179aa1044c369adb0ec1f363b
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" mYN12hh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" mYN12hh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" mYN12hh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" kUq34Sd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" kUq34Sd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" kUq34Sd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" mYN12hh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" kUq34Sd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" kUq34Sd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" mYN12hh.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/1392-538-0x0000000002630000-0x0000000002676000-memory.dmp family_redline behavioral1/memory/1392-543-0x0000000004B00000-0x0000000004B44000-memory.dmp family_redline -
Executes dropped EXE 8 IoCs
pid Process 60 deW0417.exe 3532 dPS5603.exe 4468 doH8006.exe 4324 kUq34Sd.exe 4588 mYN12hh.exe 4972 nvJ07Qp.exe 1392 ocM90UL.exe 2788 plO51LN.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" kUq34Sd.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features mYN12hh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" mYN12hh.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce deW0417.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" deW0417.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dPS5603.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" dPS5603.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce doH8006.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" doH8006.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6dde89d4281d0cb2f83bd630307e194ce2a6dbcc5167796c5851dc24c0b92899.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6dde89d4281d0cb2f83bd630307e194ce2a6dbcc5167796c5851dc24c0b92899.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4324 kUq34Sd.exe 4324 kUq34Sd.exe 4588 mYN12hh.exe 4588 mYN12hh.exe 4972 nvJ07Qp.exe 4972 nvJ07Qp.exe 1392 ocM90UL.exe 1392 ocM90UL.exe 2788 plO51LN.exe 2788 plO51LN.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4324 kUq34Sd.exe Token: SeDebugPrivilege 4588 mYN12hh.exe Token: SeDebugPrivilege 4972 nvJ07Qp.exe Token: SeDebugPrivilege 1392 ocM90UL.exe Token: SeDebugPrivilege 2788 plO51LN.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2972 wrote to memory of 60 2972 6dde89d4281d0cb2f83bd630307e194ce2a6dbcc5167796c5851dc24c0b92899.exe 66 PID 2972 wrote to memory of 60 2972 6dde89d4281d0cb2f83bd630307e194ce2a6dbcc5167796c5851dc24c0b92899.exe 66 PID 2972 wrote to memory of 60 2972 6dde89d4281d0cb2f83bd630307e194ce2a6dbcc5167796c5851dc24c0b92899.exe 66 PID 60 wrote to memory of 3532 60 deW0417.exe 67 PID 60 wrote to memory of 3532 60 deW0417.exe 67 PID 60 wrote to memory of 3532 60 deW0417.exe 67 PID 3532 wrote to memory of 4468 3532 dPS5603.exe 68 PID 3532 wrote to memory of 4468 3532 dPS5603.exe 68 PID 3532 wrote to memory of 4468 3532 dPS5603.exe 68 PID 4468 wrote to memory of 4324 4468 doH8006.exe 69 PID 4468 wrote to memory of 4324 4468 doH8006.exe 69 PID 4468 wrote to memory of 4588 4468 doH8006.exe 70 PID 4468 wrote to memory of 4588 4468 doH8006.exe 70 PID 4468 wrote to memory of 4588 4468 doH8006.exe 70 PID 3532 wrote to memory of 4972 3532 dPS5603.exe 71 PID 3532 wrote to memory of 4972 3532 dPS5603.exe 71 PID 3532 wrote to memory of 4972 3532 dPS5603.exe 71 PID 60 wrote to memory of 1392 60 deW0417.exe 73 PID 60 wrote to memory of 1392 60 deW0417.exe 73 PID 60 wrote to memory of 1392 60 deW0417.exe 73 PID 2972 wrote to memory of 2788 2972 6dde89d4281d0cb2f83bd630307e194ce2a6dbcc5167796c5851dc24c0b92899.exe 74 PID 2972 wrote to memory of 2788 2972 6dde89d4281d0cb2f83bd630307e194ce2a6dbcc5167796c5851dc24c0b92899.exe 74 PID 2972 wrote to memory of 2788 2972 6dde89d4281d0cb2f83bd630307e194ce2a6dbcc5167796c5851dc24c0b92899.exe 74
Processes
-
C:\Users\Admin\AppData\Local\Temp\6dde89d4281d0cb2f83bd630307e194ce2a6dbcc5167796c5851dc24c0b92899.exe"C:\Users\Admin\AppData\Local\Temp\6dde89d4281d0cb2f83bd630307e194ce2a6dbcc5167796c5851dc24c0b92899.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\deW0417.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\deW0417.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dPS5603.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dPS5603.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\doH8006.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\doH8006.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\kUq34Sd.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\kUq34Sd.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4324
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mYN12hh.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mYN12hh.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4588
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nvJ07Qp.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nvJ07Qp.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4972
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ocM90UL.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ocM90UL.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1392
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plO51LN.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plO51LN.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2788
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
820KB
MD5a20ee69f7e60f9827c169d2e9f450e1a
SHA15f50ca27ae6032c57e8195d6156c9f93f9d7eea6
SHA2563885b6429a12a095ba0c46ae5dd6bca60981aa76a06e254b0da63002d00b1ab9
SHA5124cd797a698525bade8fcf3616188ccc764097a76c718b358bb0ba1ed548931c42a1b81db7c690afeaae75f96f0a8b7d77bccb14375cdce4ca816efb859c34412
-
Filesize
820KB
MD5a20ee69f7e60f9827c169d2e9f450e1a
SHA15f50ca27ae6032c57e8195d6156c9f93f9d7eea6
SHA2563885b6429a12a095ba0c46ae5dd6bca60981aa76a06e254b0da63002d00b1ab9
SHA5124cd797a698525bade8fcf3616188ccc764097a76c718b358bb0ba1ed548931c42a1b81db7c690afeaae75f96f0a8b7d77bccb14375cdce4ca816efb859c34412
-
Filesize
175KB
MD5ce5ef6aac94fdb2af40da676f6cab58f
SHA1c393f24b1550955a686ee39067f20813415af95f
SHA256ce360295ca7fcc1a1c2b47a604305c67ab41358770edbd769a6a44aa635c2fd0
SHA5122cc98869cba6a962129c57fb7e3ff0b64623c94903bfbf9a2648e191b633fbe73f8e7b9d8fea348e30cc88bc44d27454fd880c81a55a6b795170fa804e6cda65
-
Filesize
175KB
MD5ce5ef6aac94fdb2af40da676f6cab58f
SHA1c393f24b1550955a686ee39067f20813415af95f
SHA256ce360295ca7fcc1a1c2b47a604305c67ab41358770edbd769a6a44aa635c2fd0
SHA5122cc98869cba6a962129c57fb7e3ff0b64623c94903bfbf9a2648e191b633fbe73f8e7b9d8fea348e30cc88bc44d27454fd880c81a55a6b795170fa804e6cda65
-
Filesize
483KB
MD56701dace23a9bf0a7e4e25ff32ef622d
SHA1c5b9a3227ebd70c582b957a1d4604d30f2195b9c
SHA2563d6b3b6aed0a2f0d487d2126c27259a23b8afeadfa327989d5ce559b4327e304
SHA5124525297c526198c3d843c2e025aa375b4e32837fdc0a01ccfa8eec3e3817fc71aac5534e67dd34a20a4445d417b959d72a6b09c4f58613bddc4328fb4ddedee7
-
Filesize
483KB
MD56701dace23a9bf0a7e4e25ff32ef622d
SHA1c5b9a3227ebd70c582b957a1d4604d30f2195b9c
SHA2563d6b3b6aed0a2f0d487d2126c27259a23b8afeadfa327989d5ce559b4327e304
SHA5124525297c526198c3d843c2e025aa375b4e32837fdc0a01ccfa8eec3e3817fc71aac5534e67dd34a20a4445d417b959d72a6b09c4f58613bddc4328fb4ddedee7
-
Filesize
315KB
MD5f294797a611f6dee63a6fcad56fa3e5a
SHA1b526f47e46b96c55059660891d1260ee0b51d5e7
SHA256ee8c1327dd23846c9c6fdd9eb6930e7bc91b18c31a9291c01fa0e2a6dc462ff2
SHA51215ca26c8bb2affac72d413973d5639ac045c73b1b49c5728a611b5d7624e8d19b0c2b42f24fddd23168da2c60b1b6452dc3454e9799c8c8c284a2ec05343e828
-
Filesize
315KB
MD5f294797a611f6dee63a6fcad56fa3e5a
SHA1b526f47e46b96c55059660891d1260ee0b51d5e7
SHA256ee8c1327dd23846c9c6fdd9eb6930e7bc91b18c31a9291c01fa0e2a6dc462ff2
SHA51215ca26c8bb2affac72d413973d5639ac045c73b1b49c5728a611b5d7624e8d19b0c2b42f24fddd23168da2c60b1b6452dc3454e9799c8c8c284a2ec05343e828
-
Filesize
339KB
MD5e33d167d634907759fff4b432396c598
SHA1604e7ebfd511c571ffb8f767737ebded12dd9568
SHA256546f11a2ada7ac4f7709edc14f1bc245709ea0f2d8a0fbefe4b3d465c7cf6d4c
SHA512eb90b2cc1978cae68780737b71019ff7d3e7826ee88ff7600ff37a8e170085f2ea7236954d1c5a64398ce8fbdc8564c870ea1eaefe26dcc86003b9e4fee90d4d
-
Filesize
339KB
MD5e33d167d634907759fff4b432396c598
SHA1604e7ebfd511c571ffb8f767737ebded12dd9568
SHA256546f11a2ada7ac4f7709edc14f1bc245709ea0f2d8a0fbefe4b3d465c7cf6d4c
SHA512eb90b2cc1978cae68780737b71019ff7d3e7826ee88ff7600ff37a8e170085f2ea7236954d1c5a64398ce8fbdc8564c870ea1eaefe26dcc86003b9e4fee90d4d
-
Filesize
175KB
MD5dd0c9e110c68ce1fa5308979ef718f7b
SHA1473deb8069f0841d47b74b7f414dacc6f96eca78
SHA256dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3
SHA51229bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236
-
Filesize
175KB
MD5dd0c9e110c68ce1fa5308979ef718f7b
SHA1473deb8069f0841d47b74b7f414dacc6f96eca78
SHA256dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3
SHA51229bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
258KB
MD55a704962dbdb25e4b334c2fb21cf8cb3
SHA1234c1e7a4cd5df7209fb2ff4c054a8fb71fc7ff1
SHA2568eba9adce93cfbf45188ba4d6a84ba9dbd98f6c4476bf56f359bfdabac616d22
SHA5126f1eceea4d68fef53697ac8d1dd37864f6726cd612e3e4c0fe190b9b7c8897607f41a557c2e3c37dffe18ccf459c4e132da02cacfbc13970add91f75b5b4a271
-
Filesize
258KB
MD55a704962dbdb25e4b334c2fb21cf8cb3
SHA1234c1e7a4cd5df7209fb2ff4c054a8fb71fc7ff1
SHA2568eba9adce93cfbf45188ba4d6a84ba9dbd98f6c4476bf56f359bfdabac616d22
SHA5126f1eceea4d68fef53697ac8d1dd37864f6726cd612e3e4c0fe190b9b7c8897607f41a557c2e3c37dffe18ccf459c4e132da02cacfbc13970add91f75b5b4a271