Analysis
-
max time kernel
128s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
15-02-2023 13:32
Static task
static1
Behavioral task
behavioral1
Sample
1eedec8c0566aeeca66054494aaa06b1e7c99ce1ebfaf5e698d73a2421706d7e.exe
Resource
win10v2004-20220812-en
General
-
Target
1eedec8c0566aeeca66054494aaa06b1e7c99ce1ebfaf5e698d73a2421706d7e.exe
-
Size
859KB
-
MD5
004072e8f50474e0714f5eca5f9f5d68
-
SHA1
b86bc97446ed5c88702507dd15bc15f1f249c551
-
SHA256
1eedec8c0566aeeca66054494aaa06b1e7c99ce1ebfaf5e698d73a2421706d7e
-
SHA512
2be970735772cbdc00d4a37022d2b2c81c2bab682cc30a9aaedb16306fd5028da18b94eb67e9df74b9e27839b33846630064479ac060482784a22d214639a07c
-
SSDEEP
24576:2yNoYjpxJ6YCbeRDpW5HcUIHLeCvTTTGShxw1Y9TD:FNoYjpxPbDpW58ZeCvTd/w1
Malware Config
Extracted
redline
dubka
193.233.20.13:4136
-
auth_value
e5a9421183a033f283b2f23139b471f0
Extracted
redline
cr10n
176.113.115.17:4132
-
auth_value
6016c19179aa1044c369adb0ec1f363b
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" mFl12qi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" mFl12qi.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection mFl12qi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" mFl12qi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" mFl12qi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" mFl12qi.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
pid Process 5084 dmK4533.exe 1540 dKQ2326.exe 2648 mFl12qi.exe 1100 nzI80Ww.exe 3888 oEO57rz.exe 4228 pyv99JO.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features mFl12qi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" mFl12qi.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dmK4533.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" dmK4533.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dKQ2326.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" dKQ2326.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1eedec8c0566aeeca66054494aaa06b1e7c99ce1ebfaf5e698d73a2421706d7e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1eedec8c0566aeeca66054494aaa06b1e7c99ce1ebfaf5e698d73a2421706d7e.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3984 sc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 724 2648 WerFault.exe 84 4188 3888 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2648 mFl12qi.exe 2648 mFl12qi.exe 1100 nzI80Ww.exe 1100 nzI80Ww.exe 3888 oEO57rz.exe 3888 oEO57rz.exe 4228 pyv99JO.exe 4228 pyv99JO.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2648 mFl12qi.exe Token: SeDebugPrivilege 1100 nzI80Ww.exe Token: SeDebugPrivilege 3888 oEO57rz.exe Token: SeDebugPrivilege 4228 pyv99JO.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 5000 wrote to memory of 5084 5000 1eedec8c0566aeeca66054494aaa06b1e7c99ce1ebfaf5e698d73a2421706d7e.exe 82 PID 5000 wrote to memory of 5084 5000 1eedec8c0566aeeca66054494aaa06b1e7c99ce1ebfaf5e698d73a2421706d7e.exe 82 PID 5000 wrote to memory of 5084 5000 1eedec8c0566aeeca66054494aaa06b1e7c99ce1ebfaf5e698d73a2421706d7e.exe 82 PID 5084 wrote to memory of 1540 5084 dmK4533.exe 83 PID 5084 wrote to memory of 1540 5084 dmK4533.exe 83 PID 5084 wrote to memory of 1540 5084 dmK4533.exe 83 PID 1540 wrote to memory of 2648 1540 dKQ2326.exe 84 PID 1540 wrote to memory of 2648 1540 dKQ2326.exe 84 PID 1540 wrote to memory of 2648 1540 dKQ2326.exe 84 PID 1540 wrote to memory of 1100 1540 dKQ2326.exe 90 PID 1540 wrote to memory of 1100 1540 dKQ2326.exe 90 PID 1540 wrote to memory of 1100 1540 dKQ2326.exe 90 PID 5084 wrote to memory of 3888 5084 dmK4533.exe 91 PID 5084 wrote to memory of 3888 5084 dmK4533.exe 91 PID 5084 wrote to memory of 3888 5084 dmK4533.exe 91 PID 5000 wrote to memory of 4228 5000 1eedec8c0566aeeca66054494aaa06b1e7c99ce1ebfaf5e698d73a2421706d7e.exe 98 PID 5000 wrote to memory of 4228 5000 1eedec8c0566aeeca66054494aaa06b1e7c99ce1ebfaf5e698d73a2421706d7e.exe 98 PID 5000 wrote to memory of 4228 5000 1eedec8c0566aeeca66054494aaa06b1e7c99ce1ebfaf5e698d73a2421706d7e.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\1eedec8c0566aeeca66054494aaa06b1e7c99ce1ebfaf5e698d73a2421706d7e.exe"C:\Users\Admin\AppData\Local\Temp\1eedec8c0566aeeca66054494aaa06b1e7c99ce1ebfaf5e698d73a2421706d7e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dmK4533.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dmK4533.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dKQ2326.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dKQ2326.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mFl12qi.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mFl12qi.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2648 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2648 -s 10805⤵
- Program crash
PID:724
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nzI80Ww.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nzI80Ww.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1100
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\oEO57rz.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\oEO57rz.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3888 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3888 -s 13324⤵
- Program crash
PID:4188
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pyv99JO.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pyv99JO.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2648 -ip 26481⤵PID:3336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3888 -ip 38881⤵PID:1692
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3984
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
714KB
MD5b09eeedb72f3a80a57981fab401a7670
SHA132ac21593bd65cdaa91e4dd97d8dfd697114d7c3
SHA256e2d3f37ef699f3cd069f44e1a072b030b1c344592d2a94a4f2a16790aa712de5
SHA5123c7cd6970736e618afceb6796b65fcde456e4027f55120c2d69d262be765e763cf571cd8a9d1c7d6f4a9c0c0c77f435e1baa2e06501cc8980bf4feb6ec6d2e77
-
Filesize
714KB
MD5b09eeedb72f3a80a57981fab401a7670
SHA132ac21593bd65cdaa91e4dd97d8dfd697114d7c3
SHA256e2d3f37ef699f3cd069f44e1a072b030b1c344592d2a94a4f2a16790aa712de5
SHA5123c7cd6970736e618afceb6796b65fcde456e4027f55120c2d69d262be765e763cf571cd8a9d1c7d6f4a9c0c0c77f435e1baa2e06501cc8980bf4feb6ec6d2e77
-
Filesize
175KB
MD5ce5ef6aac94fdb2af40da676f6cab58f
SHA1c393f24b1550955a686ee39067f20813415af95f
SHA256ce360295ca7fcc1a1c2b47a604305c67ab41358770edbd769a6a44aa635c2fd0
SHA5122cc98869cba6a962129c57fb7e3ff0b64623c94903bfbf9a2648e191b633fbe73f8e7b9d8fea348e30cc88bc44d27454fd880c81a55a6b795170fa804e6cda65
-
Filesize
175KB
MD5ce5ef6aac94fdb2af40da676f6cab58f
SHA1c393f24b1550955a686ee39067f20813415af95f
SHA256ce360295ca7fcc1a1c2b47a604305c67ab41358770edbd769a6a44aa635c2fd0
SHA5122cc98869cba6a962129c57fb7e3ff0b64623c94903bfbf9a2648e191b633fbe73f8e7b9d8fea348e30cc88bc44d27454fd880c81a55a6b795170fa804e6cda65
-
Filesize
379KB
MD5732b137967c4d97aec0a785bda0fb68d
SHA14245f1dd66721331d7973e192127ccae8bb0be57
SHA256d837b41a25fca31ebee3b54dabda3f7d35001fdca1a9a9ce5bd43bb5d1c7e6cc
SHA512825715a5f1ce0f5697b66ebf59836221c960f7327bf7366b8e87d510186dc022dc89d967f77474b4ffd17decd3700a035236fc8736d6f04e78107d9aebba1043
-
Filesize
379KB
MD5732b137967c4d97aec0a785bda0fb68d
SHA14245f1dd66721331d7973e192127ccae8bb0be57
SHA256d837b41a25fca31ebee3b54dabda3f7d35001fdca1a9a9ce5bd43bb5d1c7e6cc
SHA512825715a5f1ce0f5697b66ebf59836221c960f7327bf7366b8e87d510186dc022dc89d967f77474b4ffd17decd3700a035236fc8736d6f04e78107d9aebba1043
-
Filesize
303KB
MD5b1066b2760a3572e0b4f01dfdd3d5210
SHA1275e5a3a693fbb902de1f990935a4aa60ccaa922
SHA256966089b0d2a5c7e5da8310197c86d4dad426d8ef11e67227bdbeb2799b038a29
SHA51257c3062653d055934b0948545812d2e91029cbe00d9f470e7fd74ececcd9cd74bc60a0c19a66f78e5a3266f314e66ae5103eed0a25432ceb6bebccea00f9686e
-
Filesize
303KB
MD5b1066b2760a3572e0b4f01dfdd3d5210
SHA1275e5a3a693fbb902de1f990935a4aa60ccaa922
SHA256966089b0d2a5c7e5da8310197c86d4dad426d8ef11e67227bdbeb2799b038a29
SHA51257c3062653d055934b0948545812d2e91029cbe00d9f470e7fd74ececcd9cd74bc60a0c19a66f78e5a3266f314e66ae5103eed0a25432ceb6bebccea00f9686e
-
Filesize
245KB
MD5d23b6e7f93be0600ef70b88eba0b02e9
SHA17c173033fa51159637ce720cb649aee8cc1b5e1a
SHA25631cde2aab228129ca55f961c3eeb3e774cf25888f4efd33565193fe483e36f12
SHA512f66e8ef13b54109de28bbc92cdca91047283f12bb54a07ded4dd605bee956bde27ad36c45944ba7f2d890a063e15957c1b3c8d376658aec6404896c187c55f98
-
Filesize
245KB
MD5d23b6e7f93be0600ef70b88eba0b02e9
SHA17c173033fa51159637ce720cb649aee8cc1b5e1a
SHA25631cde2aab228129ca55f961c3eeb3e774cf25888f4efd33565193fe483e36f12
SHA512f66e8ef13b54109de28bbc92cdca91047283f12bb54a07ded4dd605bee956bde27ad36c45944ba7f2d890a063e15957c1b3c8d376658aec6404896c187c55f98
-
Filesize
175KB
MD5dd0c9e110c68ce1fa5308979ef718f7b
SHA1473deb8069f0841d47b74b7f414dacc6f96eca78
SHA256dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3
SHA51229bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236
-
Filesize
175KB
MD5dd0c9e110c68ce1fa5308979ef718f7b
SHA1473deb8069f0841d47b74b7f414dacc6f96eca78
SHA256dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3
SHA51229bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236