Analysis
-
max time kernel
57s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
15-02-2023 06:16
Static task
static1
Behavioral task
behavioral1
Sample
118f66773e8f3159b0c97378f43aec704ad8254500c333d07babd3dc855d6b7c.exe
Resource
win10-20220812-en
General
-
Target
118f66773e8f3159b0c97378f43aec704ad8254500c333d07babd3dc855d6b7c.exe
-
Size
821KB
-
MD5
a9b915c30133545880712a16101bbcbf
-
SHA1
6b453b68c3d6ccb5bc646beb846b6ae10c756246
-
SHA256
118f66773e8f3159b0c97378f43aec704ad8254500c333d07babd3dc855d6b7c
-
SHA512
963d71f72a96c71c2a59822733a149ca4ca1b33d3d57dd3d442ac432c23175dff99ccb8676ca07939777fd7655cbd85c1f6f5bf52fcb2f962214ac2ae25ea5d5
-
SSDEEP
12288:QMrfy90HM9fLjiIahecxX7FXpgFAX2LD2sg94psjyVs8rS59HuwL2qtLs8shLa5c:fyFfLjiIaHB7FXpTmL9w43JwxW9hj
Malware Config
Extracted
redline
dubka
193.233.20.13:4136
-
auth_value
e5a9421183a033f283b2f23139b471f0
Extracted
redline
ruma
193.233.20.13:4136
-
auth_value
647d00dfaba082a4a30f383bca5d1a2a
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" rYC0754.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" rYC0754.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sZa9550.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sZa9550.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" rYC0754.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" rYC0754.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" rYC0754.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sZa9550.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sZa9550.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sZa9550.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/816-490-0x0000000000930000-0x0000000000976000-memory.dmp family_redline behavioral1/memory/816-495-0x0000000002690000-0x00000000026D4000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 4692 vXG1417.exe 2340 vCS4140.exe 3360 rYC0754.exe 3320 sZa9550.exe 3744 tlt84mj.exe 816 uXk26Zq.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" sZa9550.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" rYC0754.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features sZa9550.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 118f66773e8f3159b0c97378f43aec704ad8254500c333d07babd3dc855d6b7c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vXG1417.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vXG1417.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vCS4140.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" vCS4140.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 118f66773e8f3159b0c97378f43aec704ad8254500c333d07babd3dc855d6b7c.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3360 rYC0754.exe 3360 rYC0754.exe 3320 sZa9550.exe 3320 sZa9550.exe 3744 tlt84mj.exe 3744 tlt84mj.exe 816 uXk26Zq.exe 816 uXk26Zq.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3360 rYC0754.exe Token: SeDebugPrivilege 3320 sZa9550.exe Token: SeDebugPrivilege 3744 tlt84mj.exe Token: SeDebugPrivilege 816 uXk26Zq.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2700 wrote to memory of 4692 2700 118f66773e8f3159b0c97378f43aec704ad8254500c333d07babd3dc855d6b7c.exe 66 PID 2700 wrote to memory of 4692 2700 118f66773e8f3159b0c97378f43aec704ad8254500c333d07babd3dc855d6b7c.exe 66 PID 2700 wrote to memory of 4692 2700 118f66773e8f3159b0c97378f43aec704ad8254500c333d07babd3dc855d6b7c.exe 66 PID 4692 wrote to memory of 2340 4692 vXG1417.exe 67 PID 4692 wrote to memory of 2340 4692 vXG1417.exe 67 PID 4692 wrote to memory of 2340 4692 vXG1417.exe 67 PID 2340 wrote to memory of 3360 2340 vCS4140.exe 68 PID 2340 wrote to memory of 3360 2340 vCS4140.exe 68 PID 2340 wrote to memory of 3320 2340 vCS4140.exe 69 PID 2340 wrote to memory of 3320 2340 vCS4140.exe 69 PID 2340 wrote to memory of 3320 2340 vCS4140.exe 69 PID 4692 wrote to memory of 3744 4692 vXG1417.exe 70 PID 4692 wrote to memory of 3744 4692 vXG1417.exe 70 PID 4692 wrote to memory of 3744 4692 vXG1417.exe 70 PID 2700 wrote to memory of 816 2700 118f66773e8f3159b0c97378f43aec704ad8254500c333d07babd3dc855d6b7c.exe 72 PID 2700 wrote to memory of 816 2700 118f66773e8f3159b0c97378f43aec704ad8254500c333d07babd3dc855d6b7c.exe 72 PID 2700 wrote to memory of 816 2700 118f66773e8f3159b0c97378f43aec704ad8254500c333d07babd3dc855d6b7c.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\118f66773e8f3159b0c97378f43aec704ad8254500c333d07babd3dc855d6b7c.exe"C:\Users\Admin\AppData\Local\Temp\118f66773e8f3159b0c97378f43aec704ad8254500c333d07babd3dc855d6b7c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vXG1417.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vXG1417.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vCS4140.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vCS4140.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rYC0754.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rYC0754.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3360
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\sZa9550.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\sZa9550.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3320
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tlt84mj.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tlt84mj.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3744
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uXk26Zq.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uXk26Zq.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:816
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
306KB
MD5e3bd469e3fd01ab3983d387a7f7c9074
SHA12f1b1a7599ec24688b797675477acdb121eb910d
SHA256301891941f3791dcf7239324e82bba9b891ab4fcc53c27f0944a775db3a66e61
SHA512782fbc92de0384d98f3e5b6831e608853640e41f264e5449c1a95343c80e39e1bdf1d039b83246a8f90aba37db306a14cf4ea3d51e7bf95ba8ae9fe62bb0d6db
-
Filesize
306KB
MD5e3bd469e3fd01ab3983d387a7f7c9074
SHA12f1b1a7599ec24688b797675477acdb121eb910d
SHA256301891941f3791dcf7239324e82bba9b891ab4fcc53c27f0944a775db3a66e61
SHA512782fbc92de0384d98f3e5b6831e608853640e41f264e5449c1a95343c80e39e1bdf1d039b83246a8f90aba37db306a14cf4ea3d51e7bf95ba8ae9fe62bb0d6db
-
Filesize
484KB
MD5a6afd603e9cb8683923ed9533d18d8ae
SHA11e3972c5df40f8b8fd22da79154b7a4060b3b446
SHA256908a99d9e92ee07bc7de621e5974ba3edb5c7d31920d2f726968f1e58dfc8351
SHA512e57a213db9f38f27fd20721febcd99ed98411df8e275984bec972dcadce0713c3238cf2f8b9af0dd1ab6e0324e2b42dd958f787ba3713dfbf86f74ebef67c07d
-
Filesize
484KB
MD5a6afd603e9cb8683923ed9533d18d8ae
SHA11e3972c5df40f8b8fd22da79154b7a4060b3b446
SHA256908a99d9e92ee07bc7de621e5974ba3edb5c7d31920d2f726968f1e58dfc8351
SHA512e57a213db9f38f27fd20721febcd99ed98411df8e275984bec972dcadce0713c3238cf2f8b9af0dd1ab6e0324e2b42dd958f787ba3713dfbf86f74ebef67c07d
-
Filesize
175KB
MD5dd0c9e110c68ce1fa5308979ef718f7b
SHA1473deb8069f0841d47b74b7f414dacc6f96eca78
SHA256dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3
SHA51229bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236
-
Filesize
175KB
MD5dd0c9e110c68ce1fa5308979ef718f7b
SHA1473deb8069f0841d47b74b7f414dacc6f96eca78
SHA256dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3
SHA51229bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236
-
Filesize
339KB
MD522f22df2e2e66ea5fe35ee4ac3c40c84
SHA1b6376a234b2953fc3415213d85c528f6f2488695
SHA256b691fdffed4e69c14ee1ce980617ee5e8c0fbfe0644bd92cf86969a0dac211a5
SHA51256eff6ad42851cc9adb998839413ef42f6ac35477bb49b809425e7da6e47a7e1d49829ed6bd38eb63b5eb3fdbf2007039829144a316f8b2142bd31a387ae1ce9
-
Filesize
339KB
MD522f22df2e2e66ea5fe35ee4ac3c40c84
SHA1b6376a234b2953fc3415213d85c528f6f2488695
SHA256b691fdffed4e69c14ee1ce980617ee5e8c0fbfe0644bd92cf86969a0dac211a5
SHA51256eff6ad42851cc9adb998839413ef42f6ac35477bb49b809425e7da6e47a7e1d49829ed6bd38eb63b5eb3fdbf2007039829144a316f8b2142bd31a387ae1ce9
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
249KB
MD5566f734554b2800514afb7cfd9d0e541
SHA1e580309b4ce2d38f9ece2a14bb675e8ceb62de73
SHA256dba4c1abdeaa378d90094d0a223d8a670786e7b402654646375e0cdf64103567
SHA512cb2eef0a8ef41ee026672395e1d74fe26ed3da3b89cd2b6a5684caa2501ec1f8a1e7c51359bdb80140d84e2e8259fe5980785703c99fa215aa01c23081855cc2
-
Filesize
249KB
MD5566f734554b2800514afb7cfd9d0e541
SHA1e580309b4ce2d38f9ece2a14bb675e8ceb62de73
SHA256dba4c1abdeaa378d90094d0a223d8a670786e7b402654646375e0cdf64103567
SHA512cb2eef0a8ef41ee026672395e1d74fe26ed3da3b89cd2b6a5684caa2501ec1f8a1e7c51359bdb80140d84e2e8259fe5980785703c99fa215aa01c23081855cc2