Analysis
-
max time kernel
61s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
15/02/2023, 19:02
Static task
static1
Behavioral task
behavioral1
Sample
f1272c8751068bfdcc6ce57193f10eb59efc004cc102ea2f052757b39eb35e43.exe
Resource
win10v2004-20221111-en
General
-
Target
f1272c8751068bfdcc6ce57193f10eb59efc004cc102ea2f052757b39eb35e43.exe
-
Size
812KB
-
MD5
b340a79ea784dfbd4edc94db69afcc68
-
SHA1
b235b08cee4837d119a1e6efbd33bdde0145eabe
-
SHA256
f1272c8751068bfdcc6ce57193f10eb59efc004cc102ea2f052757b39eb35e43
-
SHA512
25fb8621b06b7993ef5c6cf56cf2b1110a4d9f08006000e9c52785a72859d402bef31cf82fae7229ebd55f32e54a5980e88c5f058aef8182ebe5d6a3ba92c440
-
SSDEEP
12288:yMr/y90vCLRHBVtgLBSQSZlgQUQvfbRvLont1X2VdU146nuPmlaarhOfK1CYAUu:1yOyVyNStZlgQLThLgJ2fU14ysacIE1
Malware Config
Extracted
redline
dubka
193.233.20.13:4136
-
auth_value
e5a9421183a033f283b2f23139b471f0
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sZe9136.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" rIx8637.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" rIx8637.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection sZe9136.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sZe9136.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sZe9136.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sZe9136.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection rIx8637.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" rIx8637.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" rIx8637.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" rIx8637.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sZe9136.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
pid Process 2336 vmT1215.exe 2872 vSr6733.exe 3432 rIx8637.exe 4692 sZe9136.exe 1828 tQv99Fk.exe 3584 uFB47VQ.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" rIx8637.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features sZe9136.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" sZe9136.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f1272c8751068bfdcc6ce57193f10eb59efc004cc102ea2f052757b39eb35e43.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f1272c8751068bfdcc6ce57193f10eb59efc004cc102ea2f052757b39eb35e43.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vmT1215.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vmT1215.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vSr6733.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" vSr6733.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4532 4692 WerFault.exe 82 2380 3584 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3432 rIx8637.exe 3432 rIx8637.exe 4692 sZe9136.exe 4692 sZe9136.exe 1828 tQv99Fk.exe 1828 tQv99Fk.exe 3584 uFB47VQ.exe 3584 uFB47VQ.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3432 rIx8637.exe Token: SeDebugPrivilege 4692 sZe9136.exe Token: SeDebugPrivilege 1828 tQv99Fk.exe Token: SeDebugPrivilege 3584 uFB47VQ.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1764 wrote to memory of 2336 1764 f1272c8751068bfdcc6ce57193f10eb59efc004cc102ea2f052757b39eb35e43.exe 76 PID 1764 wrote to memory of 2336 1764 f1272c8751068bfdcc6ce57193f10eb59efc004cc102ea2f052757b39eb35e43.exe 76 PID 1764 wrote to memory of 2336 1764 f1272c8751068bfdcc6ce57193f10eb59efc004cc102ea2f052757b39eb35e43.exe 76 PID 2336 wrote to memory of 2872 2336 vmT1215.exe 77 PID 2336 wrote to memory of 2872 2336 vmT1215.exe 77 PID 2336 wrote to memory of 2872 2336 vmT1215.exe 77 PID 2872 wrote to memory of 3432 2872 vSr6733.exe 78 PID 2872 wrote to memory of 3432 2872 vSr6733.exe 78 PID 2872 wrote to memory of 4692 2872 vSr6733.exe 82 PID 2872 wrote to memory of 4692 2872 vSr6733.exe 82 PID 2872 wrote to memory of 4692 2872 vSr6733.exe 82 PID 2336 wrote to memory of 1828 2336 vmT1215.exe 86 PID 2336 wrote to memory of 1828 2336 vmT1215.exe 86 PID 2336 wrote to memory of 1828 2336 vmT1215.exe 86 PID 1764 wrote to memory of 3584 1764 f1272c8751068bfdcc6ce57193f10eb59efc004cc102ea2f052757b39eb35e43.exe 89 PID 1764 wrote to memory of 3584 1764 f1272c8751068bfdcc6ce57193f10eb59efc004cc102ea2f052757b39eb35e43.exe 89 PID 1764 wrote to memory of 3584 1764 f1272c8751068bfdcc6ce57193f10eb59efc004cc102ea2f052757b39eb35e43.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1272c8751068bfdcc6ce57193f10eb59efc004cc102ea2f052757b39eb35e43.exe"C:\Users\Admin\AppData\Local\Temp\f1272c8751068bfdcc6ce57193f10eb59efc004cc102ea2f052757b39eb35e43.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vmT1215.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vmT1215.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vSr6733.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vSr6733.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rIx8637.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rIx8637.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3432
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\sZe9136.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\sZe9136.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4692 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4692 -s 10805⤵
- Program crash
PID:4532
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tQv99Fk.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tQv99Fk.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1828
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uFB47VQ.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uFB47VQ.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3584 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3584 -s 18563⤵
- Program crash
PID:2380
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4692 -ip 46921⤵PID:4740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3584 -ip 35841⤵PID:1944
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
299KB
MD52e21d812c7c00c3c91b1d632595fa0b3
SHA16ddc68edd4fea9376e8ce3988eb6506d52122402
SHA256dc31e785818a0e46f2342cc27a724276607d6115382ecbee8fa0530a534e6345
SHA51227ad851dcb623165ef3c7af2aa8d226c40c3f89de188b0c284e1f69d305ea555f31dab4c07cfb994fd78f92f5906e147de478307e7995e822962aee9f426b706
-
Filesize
299KB
MD52e21d812c7c00c3c91b1d632595fa0b3
SHA16ddc68edd4fea9376e8ce3988eb6506d52122402
SHA256dc31e785818a0e46f2342cc27a724276607d6115382ecbee8fa0530a534e6345
SHA51227ad851dcb623165ef3c7af2aa8d226c40c3f89de188b0c284e1f69d305ea555f31dab4c07cfb994fd78f92f5906e147de478307e7995e822962aee9f426b706
-
Filesize
478KB
MD504cbcc514722f9a79659e0d54d4f4a85
SHA197236eb76899e211ea2c11daab619d6fbd7114d3
SHA25678d732c039a278d55e3cee5666ad7816f54ea0584d28f793ccfa2dbdfc622d83
SHA512fc22e690bfb2829dbaf6d66f10a5455707d0aa8f8973fbda316dbb2672f153129d3af1ae02e1cfb538e1e895d1c61d3ccc7689c86caa33168a64cab0abaf5faf
-
Filesize
478KB
MD504cbcc514722f9a79659e0d54d4f4a85
SHA197236eb76899e211ea2c11daab619d6fbd7114d3
SHA25678d732c039a278d55e3cee5666ad7816f54ea0584d28f793ccfa2dbdfc622d83
SHA512fc22e690bfb2829dbaf6d66f10a5455707d0aa8f8973fbda316dbb2672f153129d3af1ae02e1cfb538e1e895d1c61d3ccc7689c86caa33168a64cab0abaf5faf
-
Filesize
175KB
MD5dd0c9e110c68ce1fa5308979ef718f7b
SHA1473deb8069f0841d47b74b7f414dacc6f96eca78
SHA256dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3
SHA51229bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236
-
Filesize
175KB
MD5dd0c9e110c68ce1fa5308979ef718f7b
SHA1473deb8069f0841d47b74b7f414dacc6f96eca78
SHA256dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3
SHA51229bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236
-
Filesize
334KB
MD5431f28da19163171701df35e301215ed
SHA1b777d79bc8b40bf2a5a02de6e5766a0bb547388d
SHA25667ec882fb988dd43c15a0954019ad96ba5350676933bf71b8deeac591eea298d
SHA5124c0717ae10e0b04c7ecf2f1d4bc2ba9da0765c0d213ec45ec46210f28d56b7630143af59bb087e7beb40e940c84ab44b076d685303e560f55d216310f281852d
-
Filesize
334KB
MD5431f28da19163171701df35e301215ed
SHA1b777d79bc8b40bf2a5a02de6e5766a0bb547388d
SHA25667ec882fb988dd43c15a0954019ad96ba5350676933bf71b8deeac591eea298d
SHA5124c0717ae10e0b04c7ecf2f1d4bc2ba9da0765c0d213ec45ec46210f28d56b7630143af59bb087e7beb40e940c84ab44b076d685303e560f55d216310f281852d
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
241KB
MD5f2bcb17a128cbfa928ca290d240f9601
SHA1487e8bd83d6aa5a8633562ff09254ae922f158f6
SHA256986bc0236c044a0f4a4e94f3232e1d7d34ce488c289639e059456fb80184b2e6
SHA5124ee4abb1b4c7d4c23e9e40d9ab857b72fbf36f5688bcbb5a4b674620843a0f3f5fed178405f2ac587f9e2a56c91cb1b0d584ff876c5e5639f91fb42b76b1e923
-
Filesize
241KB
MD5f2bcb17a128cbfa928ca290d240f9601
SHA1487e8bd83d6aa5a8633562ff09254ae922f158f6
SHA256986bc0236c044a0f4a4e94f3232e1d7d34ce488c289639e059456fb80184b2e6
SHA5124ee4abb1b4c7d4c23e9e40d9ab857b72fbf36f5688bcbb5a4b674620843a0f3f5fed178405f2ac587f9e2a56c91cb1b0d584ff876c5e5639f91fb42b76b1e923