Analysis
-
max time kernel
134s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
15/02/2023, 19:23
Static task
static1
Behavioral task
behavioral1
Sample
a41133503bb354385a96e98ec3a88ffdc8ec8ee8e3ab88de00435531299e694d.exe
Resource
win10v2004-20220812-en
General
-
Target
a41133503bb354385a96e98ec3a88ffdc8ec8ee8e3ab88de00435531299e694d.exe
-
Size
853KB
-
MD5
307691fb4fbf96a0d80ee30313dff552
-
SHA1
2ac5780fa1c001c60f8f2ae3705fd1f42475b2d1
-
SHA256
a41133503bb354385a96e98ec3a88ffdc8ec8ee8e3ab88de00435531299e694d
-
SHA512
f42900a8988cfabe92d17ed550f4d2f6dcb36f78e1de44ec7a6d89f867de886b654e7112faceaf4120efaf90a4160d0e99f8cb8cd854f81092eb1453e184824e
-
SSDEEP
24576:XyoAWVgLDkntsf5ELge5jsLNsZuH0Wh2B7HTY:iqSiCiLL5QpHHthY7H
Malware Config
Extracted
redline
dubka
193.233.20.13:4136
-
auth_value
e5a9421183a033f283b2f23139b471f0
Extracted
redline
cr10n
176.113.115.17:4132
-
auth_value
6016c19179aa1044c369adb0ec1f363b
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" mAZ00Pi.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection mAZ00Pi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" mAZ00Pi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" mAZ00Pi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" mAZ00Pi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" mAZ00Pi.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
pid Process 4840 dJZ6173.exe 4344 dnR8449.exe 4940 mAZ00Pi.exe 1584 ncD16OT.exe 4660 oGp99VA.exe 2320 pzR15SC.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features mAZ00Pi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" mAZ00Pi.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dJZ6173.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" dJZ6173.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dnR8449.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" dnR8449.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a41133503bb354385a96e98ec3a88ffdc8ec8ee8e3ab88de00435531299e694d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a41133503bb354385a96e98ec3a88ffdc8ec8ee8e3ab88de00435531299e694d.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2696 sc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3892 4940 WerFault.exe 84 4652 4660 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4940 mAZ00Pi.exe 4940 mAZ00Pi.exe 1584 ncD16OT.exe 1584 ncD16OT.exe 4660 oGp99VA.exe 4660 oGp99VA.exe 2320 pzR15SC.exe 2320 pzR15SC.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4940 mAZ00Pi.exe Token: SeDebugPrivilege 1584 ncD16OT.exe Token: SeDebugPrivilege 4660 oGp99VA.exe Token: SeDebugPrivilege 2320 pzR15SC.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2796 wrote to memory of 4840 2796 a41133503bb354385a96e98ec3a88ffdc8ec8ee8e3ab88de00435531299e694d.exe 82 PID 2796 wrote to memory of 4840 2796 a41133503bb354385a96e98ec3a88ffdc8ec8ee8e3ab88de00435531299e694d.exe 82 PID 2796 wrote to memory of 4840 2796 a41133503bb354385a96e98ec3a88ffdc8ec8ee8e3ab88de00435531299e694d.exe 82 PID 4840 wrote to memory of 4344 4840 dJZ6173.exe 83 PID 4840 wrote to memory of 4344 4840 dJZ6173.exe 83 PID 4840 wrote to memory of 4344 4840 dJZ6173.exe 83 PID 4344 wrote to memory of 4940 4344 dnR8449.exe 84 PID 4344 wrote to memory of 4940 4344 dnR8449.exe 84 PID 4344 wrote to memory of 4940 4344 dnR8449.exe 84 PID 4344 wrote to memory of 1584 4344 dnR8449.exe 90 PID 4344 wrote to memory of 1584 4344 dnR8449.exe 90 PID 4344 wrote to memory of 1584 4344 dnR8449.exe 90 PID 4840 wrote to memory of 4660 4840 dJZ6173.exe 92 PID 4840 wrote to memory of 4660 4840 dJZ6173.exe 92 PID 4840 wrote to memory of 4660 4840 dJZ6173.exe 92 PID 2796 wrote to memory of 2320 2796 a41133503bb354385a96e98ec3a88ffdc8ec8ee8e3ab88de00435531299e694d.exe 98 PID 2796 wrote to memory of 2320 2796 a41133503bb354385a96e98ec3a88ffdc8ec8ee8e3ab88de00435531299e694d.exe 98 PID 2796 wrote to memory of 2320 2796 a41133503bb354385a96e98ec3a88ffdc8ec8ee8e3ab88de00435531299e694d.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\a41133503bb354385a96e98ec3a88ffdc8ec8ee8e3ab88de00435531299e694d.exe"C:\Users\Admin\AppData\Local\Temp\a41133503bb354385a96e98ec3a88ffdc8ec8ee8e3ab88de00435531299e694d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dJZ6173.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dJZ6173.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dnR8449.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dnR8449.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mAZ00Pi.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mAZ00Pi.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4940 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4940 -s 10805⤵
- Program crash
PID:3892
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ncD16OT.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ncD16OT.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1584
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\oGp99VA.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\oGp99VA.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4660 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4660 -s 17884⤵
- Program crash
PID:4652
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pzR15SC.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pzR15SC.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4940 -ip 49401⤵PID:4692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4660 -ip 46601⤵PID:800
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2696
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
708KB
MD53b2b78d5872793dfaea8b501aacf3416
SHA1a22a9ab5590a64eedfc7e78ece84808850692f33
SHA2565e8d86f8f5335c3f226560165587554d3056b48b11974735d068e2cafa5cf22e
SHA51249b051455b276cd9195586ca2005066dfb57d113aebcf715a53a63cb658b6849b8d28fb19b8b0bbb2408823248ca50edd5e79ce105d817411be62055f731f065
-
Filesize
708KB
MD53b2b78d5872793dfaea8b501aacf3416
SHA1a22a9ab5590a64eedfc7e78ece84808850692f33
SHA2565e8d86f8f5335c3f226560165587554d3056b48b11974735d068e2cafa5cf22e
SHA51249b051455b276cd9195586ca2005066dfb57d113aebcf715a53a63cb658b6849b8d28fb19b8b0bbb2408823248ca50edd5e79ce105d817411be62055f731f065
-
Filesize
175KB
MD5ce5ef6aac94fdb2af40da676f6cab58f
SHA1c393f24b1550955a686ee39067f20813415af95f
SHA256ce360295ca7fcc1a1c2b47a604305c67ab41358770edbd769a6a44aa635c2fd0
SHA5122cc98869cba6a962129c57fb7e3ff0b64623c94903bfbf9a2648e191b633fbe73f8e7b9d8fea348e30cc88bc44d27454fd880c81a55a6b795170fa804e6cda65
-
Filesize
175KB
MD5ce5ef6aac94fdb2af40da676f6cab58f
SHA1c393f24b1550955a686ee39067f20813415af95f
SHA256ce360295ca7fcc1a1c2b47a604305c67ab41358770edbd769a6a44aa635c2fd0
SHA5122cc98869cba6a962129c57fb7e3ff0b64623c94903bfbf9a2648e191b633fbe73f8e7b9d8fea348e30cc88bc44d27454fd880c81a55a6b795170fa804e6cda65
-
Filesize
375KB
MD535e250c6db89b7501d3e033a92301b67
SHA12f7ff3fe611b7cb7d851280abd6d0abf8e8ed3cf
SHA2569a7f516eba4542a8ea4c366922b936887d5675d2079d75e7f6f5156632fceef5
SHA5122bebc64a8e5abb9071bc2a488a59e79e746650aef64680683fcfbef0b9fc00d7021398c20bb592d66475cd52f6c389a2b5b63af230d6212d90e6974c03e794fb
-
Filesize
375KB
MD535e250c6db89b7501d3e033a92301b67
SHA12f7ff3fe611b7cb7d851280abd6d0abf8e8ed3cf
SHA2569a7f516eba4542a8ea4c366922b936887d5675d2079d75e7f6f5156632fceef5
SHA5122bebc64a8e5abb9071bc2a488a59e79e746650aef64680683fcfbef0b9fc00d7021398c20bb592d66475cd52f6c389a2b5b63af230d6212d90e6974c03e794fb
-
Filesize
299KB
MD52e21d812c7c00c3c91b1d632595fa0b3
SHA16ddc68edd4fea9376e8ce3988eb6506d52122402
SHA256dc31e785818a0e46f2342cc27a724276607d6115382ecbee8fa0530a534e6345
SHA51227ad851dcb623165ef3c7af2aa8d226c40c3f89de188b0c284e1f69d305ea555f31dab4c07cfb994fd78f92f5906e147de478307e7995e822962aee9f426b706
-
Filesize
299KB
MD52e21d812c7c00c3c91b1d632595fa0b3
SHA16ddc68edd4fea9376e8ce3988eb6506d52122402
SHA256dc31e785818a0e46f2342cc27a724276607d6115382ecbee8fa0530a534e6345
SHA51227ad851dcb623165ef3c7af2aa8d226c40c3f89de188b0c284e1f69d305ea555f31dab4c07cfb994fd78f92f5906e147de478307e7995e822962aee9f426b706
-
Filesize
241KB
MD5f2bcb17a128cbfa928ca290d240f9601
SHA1487e8bd83d6aa5a8633562ff09254ae922f158f6
SHA256986bc0236c044a0f4a4e94f3232e1d7d34ce488c289639e059456fb80184b2e6
SHA5124ee4abb1b4c7d4c23e9e40d9ab857b72fbf36f5688bcbb5a4b674620843a0f3f5fed178405f2ac587f9e2a56c91cb1b0d584ff876c5e5639f91fb42b76b1e923
-
Filesize
241KB
MD5f2bcb17a128cbfa928ca290d240f9601
SHA1487e8bd83d6aa5a8633562ff09254ae922f158f6
SHA256986bc0236c044a0f4a4e94f3232e1d7d34ce488c289639e059456fb80184b2e6
SHA5124ee4abb1b4c7d4c23e9e40d9ab857b72fbf36f5688bcbb5a4b674620843a0f3f5fed178405f2ac587f9e2a56c91cb1b0d584ff876c5e5639f91fb42b76b1e923
-
Filesize
175KB
MD5dd0c9e110c68ce1fa5308979ef718f7b
SHA1473deb8069f0841d47b74b7f414dacc6f96eca78
SHA256dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3
SHA51229bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236
-
Filesize
175KB
MD5dd0c9e110c68ce1fa5308979ef718f7b
SHA1473deb8069f0841d47b74b7f414dacc6f96eca78
SHA256dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3
SHA51229bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236