Analysis
-
max time kernel
60s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
15-02-2023 00:46
Static task
static1
Behavioral task
behavioral1
Sample
3cfd67ebb7194f40fead8d23f7c876cc92ba675735ac76ca0bf536e84a99ab53.exe
Resource
win10v2004-20220812-en
General
-
Target
3cfd67ebb7194f40fead8d23f7c876cc92ba675735ac76ca0bf536e84a99ab53.exe
-
Size
810KB
-
MD5
3d303ed8841cd247e11b2fc818837f1c
-
SHA1
9b6ee31befc18732babff8e716d84aa7984cf1ba
-
SHA256
3cfd67ebb7194f40fead8d23f7c876cc92ba675735ac76ca0bf536e84a99ab53
-
SHA512
42258ee29a0d1b9e26b121e40beb4242f078df671c931675f774b2bfa28a20e1786f1499ea0437fb5f248f79f20c3c8b89c80426193ab4fcdef4cb8376053f6e
-
SSDEEP
24576:cyqB1HWSNjYbGXhyb2qRUM28DypkhyUPHO0jE8wCG:LY1H/jKTCUUMLhNPl
Malware Config
Extracted
redline
dubka
193.233.20.13:4136
-
auth_value
e5a9421183a033f283b2f23139b471f0
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" smD0932.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" smD0932.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" rsf3264.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" rsf3264.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" rsf3264.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" rsf3264.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection smD0932.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" smD0932.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" smD0932.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" smD0932.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection rsf3264.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" rsf3264.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
pid Process 2496 vAt5116.exe 4904 vEW2496.exe 2368 rsf3264.exe 1872 smD0932.exe 3720 tRI97vJ.exe 812 uns92WE.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" rsf3264.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features smD0932.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" smD0932.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3cfd67ebb7194f40fead8d23f7c876cc92ba675735ac76ca0bf536e84a99ab53.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3cfd67ebb7194f40fead8d23f7c876cc92ba675735ac76ca0bf536e84a99ab53.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vAt5116.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vAt5116.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vEW2496.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" vEW2496.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2552 1872 WerFault.exe 82 3932 812 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2368 rsf3264.exe 2368 rsf3264.exe 1872 smD0932.exe 1872 smD0932.exe 3720 tRI97vJ.exe 3720 tRI97vJ.exe 812 uns92WE.exe 812 uns92WE.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2368 rsf3264.exe Token: SeDebugPrivilege 1872 smD0932.exe Token: SeDebugPrivilege 3720 tRI97vJ.exe Token: SeDebugPrivilege 812 uns92WE.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2496 2440 3cfd67ebb7194f40fead8d23f7c876cc92ba675735ac76ca0bf536e84a99ab53.exe 79 PID 2440 wrote to memory of 2496 2440 3cfd67ebb7194f40fead8d23f7c876cc92ba675735ac76ca0bf536e84a99ab53.exe 79 PID 2440 wrote to memory of 2496 2440 3cfd67ebb7194f40fead8d23f7c876cc92ba675735ac76ca0bf536e84a99ab53.exe 79 PID 2496 wrote to memory of 4904 2496 vAt5116.exe 80 PID 2496 wrote to memory of 4904 2496 vAt5116.exe 80 PID 2496 wrote to memory of 4904 2496 vAt5116.exe 80 PID 4904 wrote to memory of 2368 4904 vEW2496.exe 81 PID 4904 wrote to memory of 2368 4904 vEW2496.exe 81 PID 4904 wrote to memory of 1872 4904 vEW2496.exe 82 PID 4904 wrote to memory of 1872 4904 vEW2496.exe 82 PID 4904 wrote to memory of 1872 4904 vEW2496.exe 82 PID 2496 wrote to memory of 3720 2496 vAt5116.exe 86 PID 2496 wrote to memory of 3720 2496 vAt5116.exe 86 PID 2496 wrote to memory of 3720 2496 vAt5116.exe 86 PID 2440 wrote to memory of 812 2440 3cfd67ebb7194f40fead8d23f7c876cc92ba675735ac76ca0bf536e84a99ab53.exe 89 PID 2440 wrote to memory of 812 2440 3cfd67ebb7194f40fead8d23f7c876cc92ba675735ac76ca0bf536e84a99ab53.exe 89 PID 2440 wrote to memory of 812 2440 3cfd67ebb7194f40fead8d23f7c876cc92ba675735ac76ca0bf536e84a99ab53.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\3cfd67ebb7194f40fead8d23f7c876cc92ba675735ac76ca0bf536e84a99ab53.exe"C:\Users\Admin\AppData\Local\Temp\3cfd67ebb7194f40fead8d23f7c876cc92ba675735ac76ca0bf536e84a99ab53.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vAt5116.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vAt5116.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vEW2496.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vEW2496.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rsf3264.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rsf3264.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2368
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\smD0932.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\smD0932.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1872 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1872 -s 10805⤵
- Program crash
PID:2552
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tRI97vJ.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tRI97vJ.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3720
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uns92WE.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uns92WE.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:812 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 812 -s 13603⤵
- Program crash
PID:3932
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1872 -ip 18721⤵PID:3232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 812 -ip 8121⤵PID:2472
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
293KB
MD5ec0c7c2ce156617357b27c12c55df977
SHA1ee3e38afc5679a67c96eef302f7dd62ffc5b2aff
SHA256a8fb13aef5dafccbee2d454155197e472fa8b7f31a2a9fde7038e65785d603ea
SHA51288a1d0f87318cd396b2483b5c679bfc34cdd1ab028ec0cd4098940cf03fff7e484e367b47cbe05e599e9ec5267f628dadbc0bb067af8fd9cf698501214acfd29
-
Filesize
293KB
MD5ec0c7c2ce156617357b27c12c55df977
SHA1ee3e38afc5679a67c96eef302f7dd62ffc5b2aff
SHA256a8fb13aef5dafccbee2d454155197e472fa8b7f31a2a9fde7038e65785d603ea
SHA51288a1d0f87318cd396b2483b5c679bfc34cdd1ab028ec0cd4098940cf03fff7e484e367b47cbe05e599e9ec5267f628dadbc0bb067af8fd9cf698501214acfd29
-
Filesize
478KB
MD5c13977cff5f370479c9a6bac88aa2b1d
SHA1b405bc7f4cea637097ad6bd587bc0ae940dee2b4
SHA256556080d6e8dbdbf15bfb0f222b37c73aca77c73cd29b4bddd6867a5a27adb727
SHA512258cd59b0689edcc05d3fabb30db751e58b9ac9a48cf74a9d90ac6d29556860eec90877cf8f0a7b1937320150d47d0a319c3cc835056fd88e4f9dfcaec702193
-
Filesize
478KB
MD5c13977cff5f370479c9a6bac88aa2b1d
SHA1b405bc7f4cea637097ad6bd587bc0ae940dee2b4
SHA256556080d6e8dbdbf15bfb0f222b37c73aca77c73cd29b4bddd6867a5a27adb727
SHA512258cd59b0689edcc05d3fabb30db751e58b9ac9a48cf74a9d90ac6d29556860eec90877cf8f0a7b1937320150d47d0a319c3cc835056fd88e4f9dfcaec702193
-
Filesize
175KB
MD5dd0c9e110c68ce1fa5308979ef718f7b
SHA1473deb8069f0841d47b74b7f414dacc6f96eca78
SHA256dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3
SHA51229bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236
-
Filesize
175KB
MD5dd0c9e110c68ce1fa5308979ef718f7b
SHA1473deb8069f0841d47b74b7f414dacc6f96eca78
SHA256dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3
SHA51229bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236
-
Filesize
334KB
MD559216ab7c8598092679df7ada23f0ce1
SHA18954d591995411a465e6aeb311e4dcc16e851591
SHA2568aac7b34400436686abcea2f2f57adba0f682443932d4d0815f4e0466a6051d8
SHA51224d2b3eb4050d26431dbbc0f606b8d48150333bc12b17d7b5ea2ac2b0e9bd1056bfaa7951dafe9a964e7cb48e4cd5f0c0c0b7d27d376197f3edf1b25f974321f
-
Filesize
334KB
MD559216ab7c8598092679df7ada23f0ce1
SHA18954d591995411a465e6aeb311e4dcc16e851591
SHA2568aac7b34400436686abcea2f2f57adba0f682443932d4d0815f4e0466a6051d8
SHA51224d2b3eb4050d26431dbbc0f606b8d48150333bc12b17d7b5ea2ac2b0e9bd1056bfaa7951dafe9a964e7cb48e4cd5f0c0c0b7d27d376197f3edf1b25f974321f
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
235KB
MD56624f30ded3013757b0c939b54784923
SHA16ef093b81a84500e1e15478e221a60cef1558284
SHA256ef1da0cddbba5ac7cc5cbbb54d432058e036969776e65d3bfbb06afb705d1db8
SHA512e14cb8e0e3e2a76c2597534a08ef454cdfb6637ae32fb29280a0e38756554de2d160c499b11c8a6a0272522dc577e1d1b2d6b478e37c2e747a5321ba83069391
-
Filesize
235KB
MD56624f30ded3013757b0c939b54784923
SHA16ef093b81a84500e1e15478e221a60cef1558284
SHA256ef1da0cddbba5ac7cc5cbbb54d432058e036969776e65d3bfbb06afb705d1db8
SHA512e14cb8e0e3e2a76c2597534a08ef454cdfb6637ae32fb29280a0e38756554de2d160c499b11c8a6a0272522dc577e1d1b2d6b478e37c2e747a5321ba83069391