Analysis
-
max time kernel
61s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
15/02/2023, 05:48
Static task
static1
Behavioral task
behavioral1
Sample
3b97bad38f7923de6a4efc7ff91886511854a1d7e35e597457ac79df308118eb.exe
Resource
win10v2004-20221111-en
General
-
Target
3b97bad38f7923de6a4efc7ff91886511854a1d7e35e597457ac79df308118eb.exe
-
Size
821KB
-
MD5
112fa9a87b69726344d1ce2dfc278613
-
SHA1
f1011a9000e228222d8900388aa6096fe20259a1
-
SHA256
3b97bad38f7923de6a4efc7ff91886511854a1d7e35e597457ac79df308118eb
-
SHA512
52ae485ba85dffeb89e0a69b5ba1f0acd4d9513c9b59bd924d0a30db7e29d8f702a860874172cb0dabd182d5182716d1842cb5039140e98a2625e590cc8a4ce6
-
SSDEEP
12288:sMrTy90J+dm8S2qHwkmCvYYsz4dEP1LZ2Ng74gsjOwP2OGVcn/qtLs8sPBTY7i:fyMJ3XTuy0L0s452OMW9Zsm
Malware Config
Extracted
redline
dubka
193.233.20.13:4136
-
auth_value
e5a9421183a033f283b2f23139b471f0
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" szw4360.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection szw4360.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" szw4360.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" szw4360.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" szw4360.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" roY6436.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" roY6436.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" szw4360.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection roY6436.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" roY6436.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" roY6436.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" roY6436.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
pid Process 4380 vIE5907.exe 3212 vry6932.exe 1000 roY6436.exe 1496 szw4360.exe 4968 tVT88xt.exe 4440 uHA76kG.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" roY6436.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features szw4360.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" szw4360.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3b97bad38f7923de6a4efc7ff91886511854a1d7e35e597457ac79df308118eb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vIE5907.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vIE5907.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vry6932.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" vry6932.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3b97bad38f7923de6a4efc7ff91886511854a1d7e35e597457ac79df308118eb.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4736 4440 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1000 roY6436.exe 1000 roY6436.exe 1496 szw4360.exe 1496 szw4360.exe 4968 tVT88xt.exe 4968 tVT88xt.exe 4440 uHA76kG.exe 4440 uHA76kG.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1000 roY6436.exe Token: SeDebugPrivilege 1496 szw4360.exe Token: SeDebugPrivilege 4968 tVT88xt.exe Token: SeDebugPrivilege 4440 uHA76kG.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2372 wrote to memory of 4380 2372 3b97bad38f7923de6a4efc7ff91886511854a1d7e35e597457ac79df308118eb.exe 83 PID 2372 wrote to memory of 4380 2372 3b97bad38f7923de6a4efc7ff91886511854a1d7e35e597457ac79df308118eb.exe 83 PID 2372 wrote to memory of 4380 2372 3b97bad38f7923de6a4efc7ff91886511854a1d7e35e597457ac79df308118eb.exe 83 PID 4380 wrote to memory of 3212 4380 vIE5907.exe 84 PID 4380 wrote to memory of 3212 4380 vIE5907.exe 84 PID 4380 wrote to memory of 3212 4380 vIE5907.exe 84 PID 3212 wrote to memory of 1000 3212 vry6932.exe 85 PID 3212 wrote to memory of 1000 3212 vry6932.exe 85 PID 3212 wrote to memory of 1496 3212 vry6932.exe 86 PID 3212 wrote to memory of 1496 3212 vry6932.exe 86 PID 3212 wrote to memory of 1496 3212 vry6932.exe 86 PID 4380 wrote to memory of 4968 4380 vIE5907.exe 87 PID 4380 wrote to memory of 4968 4380 vIE5907.exe 87 PID 4380 wrote to memory of 4968 4380 vIE5907.exe 87 PID 2372 wrote to memory of 4440 2372 3b97bad38f7923de6a4efc7ff91886511854a1d7e35e597457ac79df308118eb.exe 89 PID 2372 wrote to memory of 4440 2372 3b97bad38f7923de6a4efc7ff91886511854a1d7e35e597457ac79df308118eb.exe 89 PID 2372 wrote to memory of 4440 2372 3b97bad38f7923de6a4efc7ff91886511854a1d7e35e597457ac79df308118eb.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b97bad38f7923de6a4efc7ff91886511854a1d7e35e597457ac79df308118eb.exe"C:\Users\Admin\AppData\Local\Temp\3b97bad38f7923de6a4efc7ff91886511854a1d7e35e597457ac79df308118eb.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vIE5907.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vIE5907.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vry6932.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vry6932.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\roY6436.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\roY6436.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1000
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\szw4360.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\szw4360.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1496
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tVT88xt.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tVT88xt.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4968
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uHA76kG.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uHA76kG.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4440 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4440 -s 13243⤵
- Program crash
PID:4736
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4440 -ip 44401⤵PID:4824
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
306KB
MD5e3bd469e3fd01ab3983d387a7f7c9074
SHA12f1b1a7599ec24688b797675477acdb121eb910d
SHA256301891941f3791dcf7239324e82bba9b891ab4fcc53c27f0944a775db3a66e61
SHA512782fbc92de0384d98f3e5b6831e608853640e41f264e5449c1a95343c80e39e1bdf1d039b83246a8f90aba37db306a14cf4ea3d51e7bf95ba8ae9fe62bb0d6db
-
Filesize
306KB
MD5e3bd469e3fd01ab3983d387a7f7c9074
SHA12f1b1a7599ec24688b797675477acdb121eb910d
SHA256301891941f3791dcf7239324e82bba9b891ab4fcc53c27f0944a775db3a66e61
SHA512782fbc92de0384d98f3e5b6831e608853640e41f264e5449c1a95343c80e39e1bdf1d039b83246a8f90aba37db306a14cf4ea3d51e7bf95ba8ae9fe62bb0d6db
-
Filesize
484KB
MD527e4ddabd830a749adb4ea51d9147682
SHA1c83fe2645c4604989e27e181ffbc1e7547eccf06
SHA2563e307be98002cc8de5222f5527391d016e15347dca958e8ade6ce8af017d8b65
SHA51282182cfa07dab78c208bfde4eb90086be181c2caba34a9a586813a2253393bc23375ffce4ff0fd86c270ac159dbbcfdb0afffc79c76bd046e1fed72b798179da
-
Filesize
484KB
MD527e4ddabd830a749adb4ea51d9147682
SHA1c83fe2645c4604989e27e181ffbc1e7547eccf06
SHA2563e307be98002cc8de5222f5527391d016e15347dca958e8ade6ce8af017d8b65
SHA51282182cfa07dab78c208bfde4eb90086be181c2caba34a9a586813a2253393bc23375ffce4ff0fd86c270ac159dbbcfdb0afffc79c76bd046e1fed72b798179da
-
Filesize
175KB
MD5dd0c9e110c68ce1fa5308979ef718f7b
SHA1473deb8069f0841d47b74b7f414dacc6f96eca78
SHA256dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3
SHA51229bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236
-
Filesize
175KB
MD5dd0c9e110c68ce1fa5308979ef718f7b
SHA1473deb8069f0841d47b74b7f414dacc6f96eca78
SHA256dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3
SHA51229bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236
-
Filesize
339KB
MD5de671f082c7a89f6c092279c338e06e6
SHA1de8799c81a645e6f57378258ed969b3d7ef928a0
SHA2568bf3c7ccf741053d361e2c788a2bdf15886a924193289c2f94b459b142eafe69
SHA5122bf350a5abb391ec061e1f6292b9ace6628b88a4fd1a4b230fb2be0be9af704b07f495790e78d6bfe8b124853224568fed0368e094f9aec316badfa7dfb78bd4
-
Filesize
339KB
MD5de671f082c7a89f6c092279c338e06e6
SHA1de8799c81a645e6f57378258ed969b3d7ef928a0
SHA2568bf3c7ccf741053d361e2c788a2bdf15886a924193289c2f94b459b142eafe69
SHA5122bf350a5abb391ec061e1f6292b9ace6628b88a4fd1a4b230fb2be0be9af704b07f495790e78d6bfe8b124853224568fed0368e094f9aec316badfa7dfb78bd4
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
249KB
MD5566f734554b2800514afb7cfd9d0e541
SHA1e580309b4ce2d38f9ece2a14bb675e8ceb62de73
SHA256dba4c1abdeaa378d90094d0a223d8a670786e7b402654646375e0cdf64103567
SHA512cb2eef0a8ef41ee026672395e1d74fe26ed3da3b89cd2b6a5684caa2501ec1f8a1e7c51359bdb80140d84e2e8259fe5980785703c99fa215aa01c23081855cc2
-
Filesize
249KB
MD5566f734554b2800514afb7cfd9d0e541
SHA1e580309b4ce2d38f9ece2a14bb675e8ceb62de73
SHA256dba4c1abdeaa378d90094d0a223d8a670786e7b402654646375e0cdf64103567
SHA512cb2eef0a8ef41ee026672395e1d74fe26ed3da3b89cd2b6a5684caa2501ec1f8a1e7c51359bdb80140d84e2e8259fe5980785703c99fa215aa01c23081855cc2