Analysis
-
max time kernel
58s -
max time network
67s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
15/02/2023, 09:54
Static task
static1
General
-
Target
833bc2719d026c922e9d91d926cccf348f8cd34920807c90b2cc0eda7215be52.exe
-
Size
861KB
-
MD5
8be103cbbac919ed79f30e410fbabd5f
-
SHA1
e162ab167d980ca70ac8d038814a64cfb1e57790
-
SHA256
833bc2719d026c922e9d91d926cccf348f8cd34920807c90b2cc0eda7215be52
-
SHA512
0039776beac61ce9ac77bd334d89805c829d42db71796007680f67da294630bee2c6503b6a162a75db3d83db07a9a0fa545e72a6dccc69b8ba6ecb40e1170884
-
SSDEEP
24576:PyoJVzpqGGJ+1DAjDJ7Lze4bQmJculZEJSTC:aEHqGKgUauQqcaE
Malware Config
Extracted
redline
dubka
193.233.20.13:4136
-
auth_value
e5a9421183a033f283b2f23139b471f0
Extracted
redline
ruma
193.233.20.13:4136
-
auth_value
647d00dfaba082a4a30f383bca5d1a2a
Extracted
redline
cr10n
176.113.115.17:4132
-
auth_value
6016c19179aa1044c369adb0ec1f363b
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" mgQ99Rb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" mgQ99Rb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" mgQ99Rb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" mgQ99Rb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" mgQ99Rb.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/3336-489-0x00000000021E0000-0x0000000002226000-memory.dmp family_redline behavioral1/memory/3336-497-0x00000000024C0000-0x0000000002504000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 3732 did5824.exe 4204 dvY2412.exe 4756 mgQ99Rb.exe 4864 njo23aP.exe 3336 oPd60Ff.exe 2796 pGf05uI.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features mgQ99Rb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" mgQ99Rb.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 833bc2719d026c922e9d91d926cccf348f8cd34920807c90b2cc0eda7215be52.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 833bc2719d026c922e9d91d926cccf348f8cd34920807c90b2cc0eda7215be52.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce did5824.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" did5824.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dvY2412.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" dvY2412.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4756 mgQ99Rb.exe 4756 mgQ99Rb.exe 4864 njo23aP.exe 4864 njo23aP.exe 3336 oPd60Ff.exe 3336 oPd60Ff.exe 2796 pGf05uI.exe 2796 pGf05uI.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4756 mgQ99Rb.exe Token: SeDebugPrivilege 4864 njo23aP.exe Token: SeDebugPrivilege 3336 oPd60Ff.exe Token: SeDebugPrivilege 2796 pGf05uI.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2704 wrote to memory of 3732 2704 833bc2719d026c922e9d91d926cccf348f8cd34920807c90b2cc0eda7215be52.exe 66 PID 2704 wrote to memory of 3732 2704 833bc2719d026c922e9d91d926cccf348f8cd34920807c90b2cc0eda7215be52.exe 66 PID 2704 wrote to memory of 3732 2704 833bc2719d026c922e9d91d926cccf348f8cd34920807c90b2cc0eda7215be52.exe 66 PID 3732 wrote to memory of 4204 3732 did5824.exe 67 PID 3732 wrote to memory of 4204 3732 did5824.exe 67 PID 3732 wrote to memory of 4204 3732 did5824.exe 67 PID 4204 wrote to memory of 4756 4204 dvY2412.exe 68 PID 4204 wrote to memory of 4756 4204 dvY2412.exe 68 PID 4204 wrote to memory of 4756 4204 dvY2412.exe 68 PID 4204 wrote to memory of 4864 4204 dvY2412.exe 69 PID 4204 wrote to memory of 4864 4204 dvY2412.exe 69 PID 4204 wrote to memory of 4864 4204 dvY2412.exe 69 PID 3732 wrote to memory of 3336 3732 did5824.exe 71 PID 3732 wrote to memory of 3336 3732 did5824.exe 71 PID 3732 wrote to memory of 3336 3732 did5824.exe 71 PID 2704 wrote to memory of 2796 2704 833bc2719d026c922e9d91d926cccf348f8cd34920807c90b2cc0eda7215be52.exe 72 PID 2704 wrote to memory of 2796 2704 833bc2719d026c922e9d91d926cccf348f8cd34920807c90b2cc0eda7215be52.exe 72 PID 2704 wrote to memory of 2796 2704 833bc2719d026c922e9d91d926cccf348f8cd34920807c90b2cc0eda7215be52.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\833bc2719d026c922e9d91d926cccf348f8cd34920807c90b2cc0eda7215be52.exe"C:\Users\Admin\AppData\Local\Temp\833bc2719d026c922e9d91d926cccf348f8cd34920807c90b2cc0eda7215be52.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\did5824.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\did5824.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dvY2412.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dvY2412.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mgQ99Rb.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mgQ99Rb.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4756
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\njo23aP.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\njo23aP.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4864
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\oPd60Ff.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\oPd60Ff.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3336
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pGf05uI.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pGf05uI.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2796
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
717KB
MD522e119297508e8fe3f312ecb394beeed
SHA139caf5df5ae3144a0a896b55e695d2cb8526ecc1
SHA25645aef075b0fd144a8e7b395446954c8e28c2e5029c27872647d939b04d2f3fd2
SHA512819012e90b9ad8674753f6656e96a28a01128fe193047664311b85df30107d0bf4caa778631b442aa2ebaf3e9ddcb49a5b3aaa928327e724f763528954ab706f
-
Filesize
717KB
MD522e119297508e8fe3f312ecb394beeed
SHA139caf5df5ae3144a0a896b55e695d2cb8526ecc1
SHA25645aef075b0fd144a8e7b395446954c8e28c2e5029c27872647d939b04d2f3fd2
SHA512819012e90b9ad8674753f6656e96a28a01128fe193047664311b85df30107d0bf4caa778631b442aa2ebaf3e9ddcb49a5b3aaa928327e724f763528954ab706f
-
Filesize
175KB
MD5ce5ef6aac94fdb2af40da676f6cab58f
SHA1c393f24b1550955a686ee39067f20813415af95f
SHA256ce360295ca7fcc1a1c2b47a604305c67ab41358770edbd769a6a44aa635c2fd0
SHA5122cc98869cba6a962129c57fb7e3ff0b64623c94903bfbf9a2648e191b633fbe73f8e7b9d8fea348e30cc88bc44d27454fd880c81a55a6b795170fa804e6cda65
-
Filesize
175KB
MD5ce5ef6aac94fdb2af40da676f6cab58f
SHA1c393f24b1550955a686ee39067f20813415af95f
SHA256ce360295ca7fcc1a1c2b47a604305c67ab41358770edbd769a6a44aa635c2fd0
SHA5122cc98869cba6a962129c57fb7e3ff0b64623c94903bfbf9a2648e191b633fbe73f8e7b9d8fea348e30cc88bc44d27454fd880c81a55a6b795170fa804e6cda65
-
Filesize
379KB
MD52656c33472609ae0e00f05f563aa8276
SHA1b49faa9b02b3aa7d7a92c6ebca816282d648c30a
SHA256718e93adfea4a2c46e146720cdd3287a3ee9a5aa7c1e24f621038619f2a3860a
SHA51216e1d6b177c13d969496ef5ee378914145155e795a58179cceb3d1c2da4fb1f996f1d0e3f687db08390e7a4c0e705e588e7494ab4d31128c382f6cea7735367e
-
Filesize
379KB
MD52656c33472609ae0e00f05f563aa8276
SHA1b49faa9b02b3aa7d7a92c6ebca816282d648c30a
SHA256718e93adfea4a2c46e146720cdd3287a3ee9a5aa7c1e24f621038619f2a3860a
SHA51216e1d6b177c13d969496ef5ee378914145155e795a58179cceb3d1c2da4fb1f996f1d0e3f687db08390e7a4c0e705e588e7494ab4d31128c382f6cea7735367e
-
Filesize
306KB
MD50bdf7901be49e053cb6b88e9e1d4a805
SHA180bb92261e5405f2a100740673d365251e70f9a6
SHA256ceae18ce869f741fb9f5cf755cc5e79c0b2d509aef739236ff5bc24662a74a9a
SHA5128fed6f65db29f0c1ab4cb36e83f003c241ed601a67fd8c520f3e7a13c6192a778e461dc827df6ec91454f562f7d70e4bf00dc945cf214fb22aa5acffb8813428
-
Filesize
306KB
MD50bdf7901be49e053cb6b88e9e1d4a805
SHA180bb92261e5405f2a100740673d365251e70f9a6
SHA256ceae18ce869f741fb9f5cf755cc5e79c0b2d509aef739236ff5bc24662a74a9a
SHA5128fed6f65db29f0c1ab4cb36e83f003c241ed601a67fd8c520f3e7a13c6192a778e461dc827df6ec91454f562f7d70e4bf00dc945cf214fb22aa5acffb8813428
-
Filesize
248KB
MD59821f24e5aa2c1312d1b025f18ed5e03
SHA163bf2524ee14b19cd323e77f9e2d96e10d949fb6
SHA25687be77c0612d5ffaf2f74cbc1296e40ebd131d775b3693531bcea88d9c6ee8b4
SHA5125c0ed2cbc1373916c8ebf7bbf2c7d07c409247fd8ca1a410f76596b3a0a0a75e6a59e2eb4407f4836e42416a30699608d8b752fb2538df861ac42510e969efca
-
Filesize
248KB
MD59821f24e5aa2c1312d1b025f18ed5e03
SHA163bf2524ee14b19cd323e77f9e2d96e10d949fb6
SHA25687be77c0612d5ffaf2f74cbc1296e40ebd131d775b3693531bcea88d9c6ee8b4
SHA5125c0ed2cbc1373916c8ebf7bbf2c7d07c409247fd8ca1a410f76596b3a0a0a75e6a59e2eb4407f4836e42416a30699608d8b752fb2538df861ac42510e969efca
-
Filesize
175KB
MD5dd0c9e110c68ce1fa5308979ef718f7b
SHA1473deb8069f0841d47b74b7f414dacc6f96eca78
SHA256dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3
SHA51229bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236
-
Filesize
175KB
MD5dd0c9e110c68ce1fa5308979ef718f7b
SHA1473deb8069f0841d47b74b7f414dacc6f96eca78
SHA256dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3
SHA51229bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236