Analysis
-
max time kernel
51s -
max time network
64s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
15/02/2023, 11:40
Static task
static1
Behavioral task
behavioral1
Sample
ce450b84352e0d5493b83ebd94b544891273f2827028038a1b9e133d002401df.exe
Resource
win10-20220901-en
General
-
Target
ce450b84352e0d5493b83ebd94b544891273f2827028038a1b9e133d002401df.exe
-
Size
482KB
-
MD5
fae5750624894ce974277f1b9f37ba57
-
SHA1
47ac2d908882d450059697f65d5f6edb851349b6
-
SHA256
ce450b84352e0d5493b83ebd94b544891273f2827028038a1b9e133d002401df
-
SHA512
3242b8f193b33a73341bfbee8c3956ba457f91bfdf7aaafecac8adb930e7242e74588b6a89b14c3c5c9e61ca33ddb398c3f9dc81db544cda55de077d2cf10b68
-
SSDEEP
12288:sMrmy90pJA0aVsBnKbX/C4mzE2HGWrqJp/a9ss:ayeJoVyc6/zE2cp/Sss
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dpE68Ua.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" dpE68Ua.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" eaw83Kn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" eaw83Kn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" eaw83Kn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dpE68Ua.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" dpE68Ua.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dpE68Ua.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" eaw83Kn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" eaw83Kn.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 3020 naE54lS94.exe 4564 dpE68Ua.exe 804 eaw83Kn.exe 2564 fQP09Xc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" eaw83Kn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" dpE68Ua.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features eaw83Kn.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" naE54lS94.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ce450b84352e0d5493b83ebd94b544891273f2827028038a1b9e133d002401df.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ce450b84352e0d5493b83ebd94b544891273f2827028038a1b9e133d002401df.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce naE54lS94.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4564 dpE68Ua.exe 4564 dpE68Ua.exe 804 eaw83Kn.exe 804 eaw83Kn.exe 2564 fQP09Xc.exe 2564 fQP09Xc.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4564 dpE68Ua.exe Token: SeDebugPrivilege 804 eaw83Kn.exe Token: SeDebugPrivilege 2564 fQP09Xc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3316 wrote to memory of 3020 3316 ce450b84352e0d5493b83ebd94b544891273f2827028038a1b9e133d002401df.exe 66 PID 3316 wrote to memory of 3020 3316 ce450b84352e0d5493b83ebd94b544891273f2827028038a1b9e133d002401df.exe 66 PID 3316 wrote to memory of 3020 3316 ce450b84352e0d5493b83ebd94b544891273f2827028038a1b9e133d002401df.exe 66 PID 3020 wrote to memory of 4564 3020 naE54lS94.exe 67 PID 3020 wrote to memory of 4564 3020 naE54lS94.exe 67 PID 3020 wrote to memory of 804 3020 naE54lS94.exe 68 PID 3020 wrote to memory of 804 3020 naE54lS94.exe 68 PID 3020 wrote to memory of 804 3020 naE54lS94.exe 68 PID 3316 wrote to memory of 2564 3316 ce450b84352e0d5493b83ebd94b544891273f2827028038a1b9e133d002401df.exe 69 PID 3316 wrote to memory of 2564 3316 ce450b84352e0d5493b83ebd94b544891273f2827028038a1b9e133d002401df.exe 69 PID 3316 wrote to memory of 2564 3316 ce450b84352e0d5493b83ebd94b544891273f2827028038a1b9e133d002401df.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce450b84352e0d5493b83ebd94b544891273f2827028038a1b9e133d002401df.exe"C:\Users\Admin\AppData\Local\Temp\ce450b84352e0d5493b83ebd94b544891273f2827028038a1b9e133d002401df.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\naE54lS94.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\naE54lS94.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dpE68Ua.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dpE68Ua.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4564
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\eaw83Kn.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\eaw83Kn.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:804
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fQP09Xc.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fQP09Xc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2564
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
337KB
MD5b7b7332e159bdc80a423cc51343107ce
SHA19eaac26971bc7f6abf6e4e4431c7d0fd1d2fecd7
SHA256dd990b222071401df8e1c5d4d22f11ec14b4574fdfa300f8ed4795ffa8e15cf0
SHA512d52781e47e7da682dbebca554141c20d5e53b958cbbd5a66280df234a8bc9dce1139b13edcb458b33705dfd52b8c0aa1c0643ddda66a6f1fc926b1356aa54044
-
Filesize
337KB
MD5b7b7332e159bdc80a423cc51343107ce
SHA19eaac26971bc7f6abf6e4e4431c7d0fd1d2fecd7
SHA256dd990b222071401df8e1c5d4d22f11ec14b4574fdfa300f8ed4795ffa8e15cf0
SHA512d52781e47e7da682dbebca554141c20d5e53b958cbbd5a66280df234a8bc9dce1139b13edcb458b33705dfd52b8c0aa1c0643ddda66a6f1fc926b1356aa54044
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
246KB
MD55689d82e0bb0b6c738220f0e2d50f757
SHA11f1c0b8fceb6cb706866f2e32338a661af642e24
SHA2567cb1ef101075ff5d838a237ac29decc694606f34c102e4ec189b2f47780b60dd
SHA512dc16bef6fc2aee37df075e0db1e278889d6228d6979d2f680a88286fb6f90bf77249871cf9db4746e343f3ae4672d518873732ed04aedb3e5ea9947bbeb6f96b
-
Filesize
246KB
MD55689d82e0bb0b6c738220f0e2d50f757
SHA11f1c0b8fceb6cb706866f2e32338a661af642e24
SHA2567cb1ef101075ff5d838a237ac29decc694606f34c102e4ec189b2f47780b60dd
SHA512dc16bef6fc2aee37df075e0db1e278889d6228d6979d2f680a88286fb6f90bf77249871cf9db4746e343f3ae4672d518873732ed04aedb3e5ea9947bbeb6f96b