Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
16/02/2023, 00:19
Static task
static1
General
-
Target
fbffeb32d22f299ea0acb0c965f03adf2ba382f6688d7a9aa7a228d0cbec59d9.exe
-
Size
724KB
-
MD5
9fd95dee50a152083afe8952eec91672
-
SHA1
4393083222f1f3ce8f489b287fdb172aa427c93f
-
SHA256
fbffeb32d22f299ea0acb0c965f03adf2ba382f6688d7a9aa7a228d0cbec59d9
-
SHA512
a5947ff2bcd1dc2167fde0bb92e43bd753a401403ad1aa804fc3892d2fc99d62e5bd53a4e8433f0d10607af977907a4ddb8f6544240c8972dccaa98ff9fabea7
-
SSDEEP
12288:+Mrcy90fr7pnOUIGnkBbLUhK0mKflt6FjLQHG6khAZWGycAdNy:6yI7pwG0X4K0mQ25V6khAZdyXy
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Extracted
redline
ruma
193.233.20.13:4136
-
auth_value
647d00dfaba082a4a30f383bca5d1a2a
Extracted
amadey
3.66
193.233.20.4/t6r48nSa/index.php
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" fjY24LW.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" fjY24LW.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" fjY24LW.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" fjY24LW.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" fjY24LW.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/4596-419-0x0000000002430000-0x0000000002476000-memory.dmp family_redline behavioral1/memory/4596-424-0x0000000005010000-0x0000000005054000-memory.dmp family_redline -
Executes dropped EXE 9 IoCs
pid Process 3448 sXB21hh.exe 3304 smQ94fV.exe 5048 fjY24LW.exe 3984 hpw00GW.exe 4596 kKY41rs.exe 2052 nnc91wK.exe 3804 mnolyk.exe 416 mnolyk.exe 2200 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 1516 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" fjY24LW.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fbffeb32d22f299ea0acb0c965f03adf2ba382f6688d7a9aa7a228d0cbec59d9.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce sXB21hh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" sXB21hh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce smQ94fV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" smQ94fV.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fbffeb32d22f299ea0acb0c965f03adf2ba382f6688d7a9aa7a228d0cbec59d9.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1836 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5048 fjY24LW.exe 5048 fjY24LW.exe 3984 hpw00GW.exe 3984 hpw00GW.exe 4596 kKY41rs.exe 4596 kKY41rs.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5048 fjY24LW.exe Token: SeDebugPrivilege 3984 hpw00GW.exe Token: SeDebugPrivilege 4596 kKY41rs.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 4556 wrote to memory of 3448 4556 fbffeb32d22f299ea0acb0c965f03adf2ba382f6688d7a9aa7a228d0cbec59d9.exe 66 PID 4556 wrote to memory of 3448 4556 fbffeb32d22f299ea0acb0c965f03adf2ba382f6688d7a9aa7a228d0cbec59d9.exe 66 PID 4556 wrote to memory of 3448 4556 fbffeb32d22f299ea0acb0c965f03adf2ba382f6688d7a9aa7a228d0cbec59d9.exe 66 PID 3448 wrote to memory of 3304 3448 sXB21hh.exe 67 PID 3448 wrote to memory of 3304 3448 sXB21hh.exe 67 PID 3448 wrote to memory of 3304 3448 sXB21hh.exe 67 PID 3304 wrote to memory of 5048 3304 smQ94fV.exe 68 PID 3304 wrote to memory of 5048 3304 smQ94fV.exe 68 PID 3304 wrote to memory of 3984 3304 smQ94fV.exe 69 PID 3304 wrote to memory of 3984 3304 smQ94fV.exe 69 PID 3304 wrote to memory of 3984 3304 smQ94fV.exe 69 PID 3448 wrote to memory of 4596 3448 sXB21hh.exe 71 PID 3448 wrote to memory of 4596 3448 sXB21hh.exe 71 PID 3448 wrote to memory of 4596 3448 sXB21hh.exe 71 PID 4556 wrote to memory of 2052 4556 fbffeb32d22f299ea0acb0c965f03adf2ba382f6688d7a9aa7a228d0cbec59d9.exe 72 PID 4556 wrote to memory of 2052 4556 fbffeb32d22f299ea0acb0c965f03adf2ba382f6688d7a9aa7a228d0cbec59d9.exe 72 PID 4556 wrote to memory of 2052 4556 fbffeb32d22f299ea0acb0c965f03adf2ba382f6688d7a9aa7a228d0cbec59d9.exe 72 PID 2052 wrote to memory of 3804 2052 nnc91wK.exe 73 PID 2052 wrote to memory of 3804 2052 nnc91wK.exe 73 PID 2052 wrote to memory of 3804 2052 nnc91wK.exe 73 PID 3804 wrote to memory of 1836 3804 mnolyk.exe 74 PID 3804 wrote to memory of 1836 3804 mnolyk.exe 74 PID 3804 wrote to memory of 1836 3804 mnolyk.exe 74 PID 3804 wrote to memory of 4956 3804 mnolyk.exe 75 PID 3804 wrote to memory of 4956 3804 mnolyk.exe 75 PID 3804 wrote to memory of 4956 3804 mnolyk.exe 75 PID 4956 wrote to memory of 3976 4956 cmd.exe 78 PID 4956 wrote to memory of 3976 4956 cmd.exe 78 PID 4956 wrote to memory of 3976 4956 cmd.exe 78 PID 4956 wrote to memory of 3064 4956 cmd.exe 79 PID 4956 wrote to memory of 3064 4956 cmd.exe 79 PID 4956 wrote to memory of 3064 4956 cmd.exe 79 PID 4956 wrote to memory of 2880 4956 cmd.exe 80 PID 4956 wrote to memory of 2880 4956 cmd.exe 80 PID 4956 wrote to memory of 2880 4956 cmd.exe 80 PID 4956 wrote to memory of 4728 4956 cmd.exe 81 PID 4956 wrote to memory of 4728 4956 cmd.exe 81 PID 4956 wrote to memory of 4728 4956 cmd.exe 81 PID 4956 wrote to memory of 4696 4956 cmd.exe 82 PID 4956 wrote to memory of 4696 4956 cmd.exe 82 PID 4956 wrote to memory of 4696 4956 cmd.exe 82 PID 4956 wrote to memory of 4760 4956 cmd.exe 83 PID 4956 wrote to memory of 4760 4956 cmd.exe 83 PID 4956 wrote to memory of 4760 4956 cmd.exe 83 PID 3804 wrote to memory of 1516 3804 mnolyk.exe 85 PID 3804 wrote to memory of 1516 3804 mnolyk.exe 85 PID 3804 wrote to memory of 1516 3804 mnolyk.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\fbffeb32d22f299ea0acb0c965f03adf2ba382f6688d7a9aa7a228d0cbec59d9.exe"C:\Users\Admin\AppData\Local\Temp\fbffeb32d22f299ea0acb0c965f03adf2ba382f6688d7a9aa7a228d0cbec59d9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sXB21hh.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sXB21hh.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\smQ94fV.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\smQ94fV.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\fjY24LW.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\fjY24LW.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5048
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\hpw00GW.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\hpw00GW.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3984
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kKY41rs.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kKY41rs.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4596
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nnc91wK.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nnc91wK.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe" /F4⤵
- Creates scheduled task(s)
PID:1836
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5eb6b96734" /P "Admin:N"&&CACLS "..\5eb6b96734" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3976
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"5⤵PID:3064
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E5⤵PID:2880
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4728
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:N"5⤵PID:4696
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:R" /E5⤵PID:4760
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1516
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe1⤵
- Executes dropped EXE
PID:416
-
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe1⤵
- Executes dropped EXE
PID:2200
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
538KB
MD5a1e8dd333951840b96e5b8eee17db2bf
SHA1873549a1cbf1e23c4954285be2cf180ea296922b
SHA2560bbfa55b656b9eba591a795b035c39f2af2694a3bf09668f6c02a0117d935f49
SHA512f724a0caa617eae3598da8e4b990294dd4d7a6c860d4993a879c739c3bb718057500c097c98ae1e29ac021d6a136c42e7cad9e7f2d56b1bcfab384d66d35a84e
-
Filesize
538KB
MD5a1e8dd333951840b96e5b8eee17db2bf
SHA1873549a1cbf1e23c4954285be2cf180ea296922b
SHA2560bbfa55b656b9eba591a795b035c39f2af2694a3bf09668f6c02a0117d935f49
SHA512f724a0caa617eae3598da8e4b990294dd4d7a6c860d4993a879c739c3bb718057500c097c98ae1e29ac021d6a136c42e7cad9e7f2d56b1bcfab384d66d35a84e
-
Filesize
314KB
MD5aa47043dbfecab249a25a28c75508b14
SHA14be399fdc0bf61e57d3dfec38d5b5f9cbd88f7d5
SHA25626545390a512163f85092f23ba83f9db640ebf342e31deccee46ad2b16f5a54b
SHA512027e897a55cdb70d4c4c300fc554c15b801669062de5b66ecd0682dd8ce55aa4d2894042d9d6f084aa90574b7b3f2551c4563a6800e43f07bc11620a6a38de16
-
Filesize
314KB
MD5aa47043dbfecab249a25a28c75508b14
SHA14be399fdc0bf61e57d3dfec38d5b5f9cbd88f7d5
SHA25626545390a512163f85092f23ba83f9db640ebf342e31deccee46ad2b16f5a54b
SHA512027e897a55cdb70d4c4c300fc554c15b801669062de5b66ecd0682dd8ce55aa4d2894042d9d6f084aa90574b7b3f2551c4563a6800e43f07bc11620a6a38de16
-
Filesize
202KB
MD5bdec340ce9f49b3ab254cf3de2c57a18
SHA15fc2ca8d411fb7429662259da69e70f893346dc2
SHA256c9161b4f1fdd5225dcac57f6ed50aebf14481bf3d4b63929666d6a277aa26bb3
SHA512122ebd39829be2ca426ce2d73fa854d345179dc1590ff7b04be1fcdc815281fec679c94890988be1fae43963d6fccb783751b75df0401c9501fcbedf98c511dd
-
Filesize
202KB
MD5bdec340ce9f49b3ab254cf3de2c57a18
SHA15fc2ca8d411fb7429662259da69e70f893346dc2
SHA256c9161b4f1fdd5225dcac57f6ed50aebf14481bf3d4b63929666d6a277aa26bb3
SHA512122ebd39829be2ca426ce2d73fa854d345179dc1590ff7b04be1fcdc815281fec679c94890988be1fae43963d6fccb783751b75df0401c9501fcbedf98c511dd
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
89KB
MD54cf63b9a3e4bc0910af4d8baa5939238
SHA1361eea9bb65071ebf09d9598fe7a482e487b919f
SHA256dd82c0954f9047eb2a601aefa58eec94c79f71cab58f980a663ae3b8a54a63f9
SHA512177f101609bbdb7a3e423ecb2914b21d3fb91bf1e6267c4a30313b8ae0b5bc49659fc6ce1f1715649b8ee774022a9b045d886f2ba658ef065eefceedeaf7ee38
-
Filesize
89KB
MD54cf63b9a3e4bc0910af4d8baa5939238
SHA1361eea9bb65071ebf09d9598fe7a482e487b919f
SHA256dd82c0954f9047eb2a601aefa58eec94c79f71cab58f980a663ae3b8a54a63f9
SHA512177f101609bbdb7a3e423ecb2914b21d3fb91bf1e6267c4a30313b8ae0b5bc49659fc6ce1f1715649b8ee774022a9b045d886f2ba658ef065eefceedeaf7ee38