Analysis
-
max time kernel
42s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
16-02-2023 22:17
Static task
static1
Behavioral task
behavioral1
Sample
dc0d5b37125864e9c1567612373b54fc84642c21b1c48eb4d55641b144dbe1af.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
dc0d5b37125864e9c1567612373b54fc84642c21b1c48eb4d55641b144dbe1af.exe
Resource
win10-20220812-en
General
-
Target
dc0d5b37125864e9c1567612373b54fc84642c21b1c48eb4d55641b144dbe1af.exe
-
Size
500KB
-
MD5
fe38008e6d81346e69bcb54e62b5f8b8
-
SHA1
ad9bf96ba806c12a347f7805004856550f87de76
-
SHA256
dc0d5b37125864e9c1567612373b54fc84642c21b1c48eb4d55641b144dbe1af
-
SHA512
d2dc99fef5b240a8c4d51e9047c6d81d9b09a2691222095bc6616e8faed6562aeffe9fb3f9d4c7e44bc547b1a1c9c8d7c866fb92bac8d4fcb75403bf7b9aaa63
-
SSDEEP
12288:ZMrcy90yTKfltNecyIObkK5/2LprRWJkXTxGOHxe:ByR+ocRObkaOLlMJkjU60
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dyr33EM.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" eXG87HA.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" eXG87HA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection dyr33EM.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dyr33EM.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dyr33EM.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" eXG87HA.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" eXG87HA.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" dyr33EM.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" dyr33EM.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" eXG87HA.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 852 nUq79xc59.exe 1272 dyr33EM.exe 1176 eXG87HA.exe 700 fxe51Xe.exe -
Loads dropped DLL 8 IoCs
pid Process 1292 dc0d5b37125864e9c1567612373b54fc84642c21b1c48eb4d55641b144dbe1af.exe 852 nUq79xc59.exe 852 nUq79xc59.exe 852 nUq79xc59.exe 852 nUq79xc59.exe 1176 eXG87HA.exe 1292 dc0d5b37125864e9c1567612373b54fc84642c21b1c48eb4d55641b144dbe1af.exe 700 fxe51Xe.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" dyr33EM.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features eXG87HA.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" eXG87HA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features dyr33EM.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce dc0d5b37125864e9c1567612373b54fc84642c21b1c48eb4d55641b144dbe1af.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" dc0d5b37125864e9c1567612373b54fc84642c21b1c48eb4d55641b144dbe1af.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce nUq79xc59.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nUq79xc59.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1272 dyr33EM.exe 1272 dyr33EM.exe 1176 eXG87HA.exe 1176 eXG87HA.exe 700 fxe51Xe.exe 700 fxe51Xe.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1272 dyr33EM.exe Token: SeDebugPrivilege 1176 eXG87HA.exe Token: SeDebugPrivilege 700 fxe51Xe.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1292 wrote to memory of 852 1292 dc0d5b37125864e9c1567612373b54fc84642c21b1c48eb4d55641b144dbe1af.exe 27 PID 1292 wrote to memory of 852 1292 dc0d5b37125864e9c1567612373b54fc84642c21b1c48eb4d55641b144dbe1af.exe 27 PID 1292 wrote to memory of 852 1292 dc0d5b37125864e9c1567612373b54fc84642c21b1c48eb4d55641b144dbe1af.exe 27 PID 1292 wrote to memory of 852 1292 dc0d5b37125864e9c1567612373b54fc84642c21b1c48eb4d55641b144dbe1af.exe 27 PID 1292 wrote to memory of 852 1292 dc0d5b37125864e9c1567612373b54fc84642c21b1c48eb4d55641b144dbe1af.exe 27 PID 1292 wrote to memory of 852 1292 dc0d5b37125864e9c1567612373b54fc84642c21b1c48eb4d55641b144dbe1af.exe 27 PID 1292 wrote to memory of 852 1292 dc0d5b37125864e9c1567612373b54fc84642c21b1c48eb4d55641b144dbe1af.exe 27 PID 852 wrote to memory of 1272 852 nUq79xc59.exe 28 PID 852 wrote to memory of 1272 852 nUq79xc59.exe 28 PID 852 wrote to memory of 1272 852 nUq79xc59.exe 28 PID 852 wrote to memory of 1272 852 nUq79xc59.exe 28 PID 852 wrote to memory of 1272 852 nUq79xc59.exe 28 PID 852 wrote to memory of 1272 852 nUq79xc59.exe 28 PID 852 wrote to memory of 1272 852 nUq79xc59.exe 28 PID 852 wrote to memory of 1176 852 nUq79xc59.exe 29 PID 852 wrote to memory of 1176 852 nUq79xc59.exe 29 PID 852 wrote to memory of 1176 852 nUq79xc59.exe 29 PID 852 wrote to memory of 1176 852 nUq79xc59.exe 29 PID 852 wrote to memory of 1176 852 nUq79xc59.exe 29 PID 852 wrote to memory of 1176 852 nUq79xc59.exe 29 PID 852 wrote to memory of 1176 852 nUq79xc59.exe 29 PID 1292 wrote to memory of 700 1292 dc0d5b37125864e9c1567612373b54fc84642c21b1c48eb4d55641b144dbe1af.exe 30 PID 1292 wrote to memory of 700 1292 dc0d5b37125864e9c1567612373b54fc84642c21b1c48eb4d55641b144dbe1af.exe 30 PID 1292 wrote to memory of 700 1292 dc0d5b37125864e9c1567612373b54fc84642c21b1c48eb4d55641b144dbe1af.exe 30 PID 1292 wrote to memory of 700 1292 dc0d5b37125864e9c1567612373b54fc84642c21b1c48eb4d55641b144dbe1af.exe 30 PID 1292 wrote to memory of 700 1292 dc0d5b37125864e9c1567612373b54fc84642c21b1c48eb4d55641b144dbe1af.exe 30 PID 1292 wrote to memory of 700 1292 dc0d5b37125864e9c1567612373b54fc84642c21b1c48eb4d55641b144dbe1af.exe 30 PID 1292 wrote to memory of 700 1292 dc0d5b37125864e9c1567612373b54fc84642c21b1c48eb4d55641b144dbe1af.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc0d5b37125864e9c1567612373b54fc84642c21b1c48eb4d55641b144dbe1af.exe"C:\Users\Admin\AppData\Local\Temp\dc0d5b37125864e9c1567612373b54fc84642c21b1c48eb4d55641b144dbe1af.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nUq79xc59.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nUq79xc59.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dyr33EM.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dyr33EM.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1272
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\eXG87HA.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\eXG87HA.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1176
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fxe51Xe.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fxe51Xe.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:700
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
355KB
MD554dac0ddc806c65d9541f8be3f206cf1
SHA16fb38e9b2fd47825f06e86cea71bfbffc55e03fb
SHA256d998ec79c95653cfa381769da112666870fef2856913cde1627bc734d9ed84b7
SHA51236d2131302821da55da300ec4b3140a278b871ba9a2a63152c24b377501231b80b5db389e3b038c6dc341c32fec970dadf54cf2baed88e2a12013aef2b47c3b6
-
Filesize
355KB
MD554dac0ddc806c65d9541f8be3f206cf1
SHA16fb38e9b2fd47825f06e86cea71bfbffc55e03fb
SHA256d998ec79c95653cfa381769da112666870fef2856913cde1627bc734d9ed84b7
SHA51236d2131302821da55da300ec4b3140a278b871ba9a2a63152c24b377501231b80b5db389e3b038c6dc341c32fec970dadf54cf2baed88e2a12013aef2b47c3b6
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
295KB
MD5304766f61a677814af31d2737d118b6f
SHA1213a7e70d4f7d13e17ddff12152bcfe2c1cc2de4
SHA25607c33396ed7ec1b40808aae921c50c552dc21b08beabbd5541b9fc9f062e08ac
SHA51208c9202e988e4f6518a14f37b19eefc8b5901a2c07472140303c48535b67830e956759db3738b3bf63559220cb1e59f8045a2fad5d84530e9cb2e670740441ea
-
Filesize
295KB
MD5304766f61a677814af31d2737d118b6f
SHA1213a7e70d4f7d13e17ddff12152bcfe2c1cc2de4
SHA25607c33396ed7ec1b40808aae921c50c552dc21b08beabbd5541b9fc9f062e08ac
SHA51208c9202e988e4f6518a14f37b19eefc8b5901a2c07472140303c48535b67830e956759db3738b3bf63559220cb1e59f8045a2fad5d84530e9cb2e670740441ea
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
355KB
MD554dac0ddc806c65d9541f8be3f206cf1
SHA16fb38e9b2fd47825f06e86cea71bfbffc55e03fb
SHA256d998ec79c95653cfa381769da112666870fef2856913cde1627bc734d9ed84b7
SHA51236d2131302821da55da300ec4b3140a278b871ba9a2a63152c24b377501231b80b5db389e3b038c6dc341c32fec970dadf54cf2baed88e2a12013aef2b47c3b6
-
Filesize
355KB
MD554dac0ddc806c65d9541f8be3f206cf1
SHA16fb38e9b2fd47825f06e86cea71bfbffc55e03fb
SHA256d998ec79c95653cfa381769da112666870fef2856913cde1627bc734d9ed84b7
SHA51236d2131302821da55da300ec4b3140a278b871ba9a2a63152c24b377501231b80b5db389e3b038c6dc341c32fec970dadf54cf2baed88e2a12013aef2b47c3b6
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
295KB
MD5304766f61a677814af31d2737d118b6f
SHA1213a7e70d4f7d13e17ddff12152bcfe2c1cc2de4
SHA25607c33396ed7ec1b40808aae921c50c552dc21b08beabbd5541b9fc9f062e08ac
SHA51208c9202e988e4f6518a14f37b19eefc8b5901a2c07472140303c48535b67830e956759db3738b3bf63559220cb1e59f8045a2fad5d84530e9cb2e670740441ea
-
Filesize
295KB
MD5304766f61a677814af31d2737d118b6f
SHA1213a7e70d4f7d13e17ddff12152bcfe2c1cc2de4
SHA25607c33396ed7ec1b40808aae921c50c552dc21b08beabbd5541b9fc9f062e08ac
SHA51208c9202e988e4f6518a14f37b19eefc8b5901a2c07472140303c48535b67830e956759db3738b3bf63559220cb1e59f8045a2fad5d84530e9cb2e670740441ea
-
Filesize
295KB
MD5304766f61a677814af31d2737d118b6f
SHA1213a7e70d4f7d13e17ddff12152bcfe2c1cc2de4
SHA25607c33396ed7ec1b40808aae921c50c552dc21b08beabbd5541b9fc9f062e08ac
SHA51208c9202e988e4f6518a14f37b19eefc8b5901a2c07472140303c48535b67830e956759db3738b3bf63559220cb1e59f8045a2fad5d84530e9cb2e670740441ea