Analysis
-
max time kernel
78s -
max time network
81s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
16/02/2023, 12:42
Static task
static1
General
-
Target
33981ad41e62cef07328007db97a7db9f42c3e4b58e717bfbbff64c7e435e8c4.exe
-
Size
993KB
-
MD5
b6f653647fd899da126d0b926630bcb9
-
SHA1
56e8963a7b18adbc09ef827779336c440b0e2dc8
-
SHA256
33981ad41e62cef07328007db97a7db9f42c3e4b58e717bfbbff64c7e435e8c4
-
SHA512
d7ad348d8cb4dd205a9e8b0fcb5dc0a03f04ee9a49f3dc5ebd838c05a84eaaf58f3706c497bf05b929426c0ca7baad9730317620a1070ab507cff71da11410d9
-
SSDEEP
12288:WMr1y90PikXhsFUfXPSy5ykkcDPvav3kSu/sU6cQGM2/8UK7EK8X1FC4eO:7yQXhsF09KESuUVPtVUlbXP
Malware Config
Extracted
redline
dubka
193.233.20.13:4136
-
auth_value
e5a9421183a033f283b2f23139b471f0
Extracted
redline
ruma
193.233.20.13:4136
-
auth_value
647d00dfaba082a4a30f383bca5d1a2a
Extracted
redline
nock
176.113.115.17:4132
-
auth_value
f32d3c6ff0a9a7632c60a2b045a9cde6
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" ksL67Cb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" ksL67Cb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" ksL67Cb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" mee32Ly.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" ksL67Cb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" ksL67Cb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" mee32Ly.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" mee32Ly.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" mee32Ly.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" mee32Ly.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/4724-542-0x0000000002490000-0x00000000024D6000-memory.dmp family_redline behavioral1/memory/4724-547-0x0000000005090000-0x00000000050D4000-memory.dmp family_redline -
Executes dropped EXE 8 IoCs
pid Process 4912 dHQ0057.exe 4196 dNT1027.exe 760 dnp8713.exe 4940 ksL67Cb.exe 836 mee32Ly.exe 4772 nJY65or.exe 4724 ojQ16BR.exe 4392 pAQ90Nz.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" ksL67Cb.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features mee32Ly.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" mee32Ly.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" dHQ0057.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dNT1027.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" dNT1027.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dnp8713.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" dnp8713.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 33981ad41e62cef07328007db97a7db9f42c3e4b58e717bfbbff64c7e435e8c4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 33981ad41e62cef07328007db97a7db9f42c3e4b58e717bfbbff64c7e435e8c4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dHQ0057.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4940 ksL67Cb.exe 4940 ksL67Cb.exe 836 mee32Ly.exe 836 mee32Ly.exe 4772 nJY65or.exe 4772 nJY65or.exe 4724 ojQ16BR.exe 4724 ojQ16BR.exe 4392 pAQ90Nz.exe 4392 pAQ90Nz.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4940 ksL67Cb.exe Token: SeDebugPrivilege 836 mee32Ly.exe Token: SeDebugPrivilege 4772 nJY65or.exe Token: SeDebugPrivilege 4724 ojQ16BR.exe Token: SeDebugPrivilege 4392 pAQ90Nz.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2208 wrote to memory of 4912 2208 33981ad41e62cef07328007db97a7db9f42c3e4b58e717bfbbff64c7e435e8c4.exe 66 PID 2208 wrote to memory of 4912 2208 33981ad41e62cef07328007db97a7db9f42c3e4b58e717bfbbff64c7e435e8c4.exe 66 PID 2208 wrote to memory of 4912 2208 33981ad41e62cef07328007db97a7db9f42c3e4b58e717bfbbff64c7e435e8c4.exe 66 PID 4912 wrote to memory of 4196 4912 dHQ0057.exe 67 PID 4912 wrote to memory of 4196 4912 dHQ0057.exe 67 PID 4912 wrote to memory of 4196 4912 dHQ0057.exe 67 PID 4196 wrote to memory of 760 4196 dNT1027.exe 68 PID 4196 wrote to memory of 760 4196 dNT1027.exe 68 PID 4196 wrote to memory of 760 4196 dNT1027.exe 68 PID 760 wrote to memory of 4940 760 dnp8713.exe 69 PID 760 wrote to memory of 4940 760 dnp8713.exe 69 PID 760 wrote to memory of 836 760 dnp8713.exe 70 PID 760 wrote to memory of 836 760 dnp8713.exe 70 PID 760 wrote to memory of 836 760 dnp8713.exe 70 PID 4196 wrote to memory of 4772 4196 dNT1027.exe 71 PID 4196 wrote to memory of 4772 4196 dNT1027.exe 71 PID 4196 wrote to memory of 4772 4196 dNT1027.exe 71 PID 4912 wrote to memory of 4724 4912 dHQ0057.exe 73 PID 4912 wrote to memory of 4724 4912 dHQ0057.exe 73 PID 4912 wrote to memory of 4724 4912 dHQ0057.exe 73 PID 2208 wrote to memory of 4392 2208 33981ad41e62cef07328007db97a7db9f42c3e4b58e717bfbbff64c7e435e8c4.exe 74 PID 2208 wrote to memory of 4392 2208 33981ad41e62cef07328007db97a7db9f42c3e4b58e717bfbbff64c7e435e8c4.exe 74 PID 2208 wrote to memory of 4392 2208 33981ad41e62cef07328007db97a7db9f42c3e4b58e717bfbbff64c7e435e8c4.exe 74
Processes
-
C:\Users\Admin\AppData\Local\Temp\33981ad41e62cef07328007db97a7db9f42c3e4b58e717bfbbff64c7e435e8c4.exe"C:\Users\Admin\AppData\Local\Temp\33981ad41e62cef07328007db97a7db9f42c3e4b58e717bfbbff64c7e435e8c4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dHQ0057.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dHQ0057.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dNT1027.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dNT1027.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dnp8713.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dnp8713.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ksL67Cb.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ksL67Cb.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4940
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mee32Ly.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mee32Ly.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:836
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nJY65or.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nJY65or.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4772
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ojQ16BR.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ojQ16BR.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4724
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pAQ90Nz.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pAQ90Nz.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4392
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
855KB
MD5b5fddcbc1b5f959a18f0f778cf1804ad
SHA101c4f774414e842e89f332c2530eab15c377e0a0
SHA256e7b8303e0fb5335cd24dc44521df818e82e625cc3307f4dcef87900f856670f5
SHA5122bf08a4c3a75fefe643cb9edd676b6d1d6303923a1ec08eae56327dcad3c413beca9ac9bd594c1ec7e17ec9f79a579480136261506d9c043910de20cebfb792f
-
Filesize
855KB
MD5b5fddcbc1b5f959a18f0f778cf1804ad
SHA101c4f774414e842e89f332c2530eab15c377e0a0
SHA256e7b8303e0fb5335cd24dc44521df818e82e625cc3307f4dcef87900f856670f5
SHA5122bf08a4c3a75fefe643cb9edd676b6d1d6303923a1ec08eae56327dcad3c413beca9ac9bd594c1ec7e17ec9f79a579480136261506d9c043910de20cebfb792f
-
Filesize
175KB
MD58f2223375414f5a6708a342a1efb714e
SHA1b9342d91cef91c550ec054e4ef8ad8a8785f06a0
SHA25638a3186a175d2d3a7f9216f6b8df67264f1a38d320547b7016d4d2f9ad2b845e
SHA5121af0d38a90d91ec07fd91a89cff7997c6159ad2c5bbed1ac8cd90a364f99766c3a01787713699414801b6f00bbfa5bb30ae66dee98b71628f019b78dee7a368e
-
Filesize
175KB
MD58f2223375414f5a6708a342a1efb714e
SHA1b9342d91cef91c550ec054e4ef8ad8a8785f06a0
SHA25638a3186a175d2d3a7f9216f6b8df67264f1a38d320547b7016d4d2f9ad2b845e
SHA5121af0d38a90d91ec07fd91a89cff7997c6159ad2c5bbed1ac8cd90a364f99766c3a01787713699414801b6f00bbfa5bb30ae66dee98b71628f019b78dee7a368e
-
Filesize
501KB
MD5e81a3e080c4a76b1bba73d10ab28b517
SHA1fa38ed3430520ec7967405431c722f775d5162dd
SHA256019d798a64a49880af6f9604e5699c70c85965a72b107141bb44849134ec8b71
SHA5124c5da3e07805e6fe534124696fa5863d95a7c58f6c1e72e7a4f5bab3775c8b99215f89d69c192ded2893afba8498ab1617dd475801e2e914cdb2bafd72575b2d
-
Filesize
501KB
MD5e81a3e080c4a76b1bba73d10ab28b517
SHA1fa38ed3430520ec7967405431c722f775d5162dd
SHA256019d798a64a49880af6f9604e5699c70c85965a72b107141bb44849134ec8b71
SHA5124c5da3e07805e6fe534124696fa5863d95a7c58f6c1e72e7a4f5bab3775c8b99215f89d69c192ded2893afba8498ab1617dd475801e2e914cdb2bafd72575b2d
-
Filesize
352KB
MD5df7d202d9b57eda6183ee678d9424ccd
SHA1614ba684060c40c7d6022a37d066e578e1982513
SHA256f93557efd3fa8e2c6c0caad37b3e5ba5951f1c6e73568316e966283aaa618c5a
SHA51225092eb83de6d8a5e3bb79469e9147bf2bb48b5b6bc74892ed16d4c5529c3ec73f2a86cca5319f91778b656a3396fff7d2cae6c738d7504f0bd8f97b2ed0e843
-
Filesize
352KB
MD5df7d202d9b57eda6183ee678d9424ccd
SHA1614ba684060c40c7d6022a37d066e578e1982513
SHA256f93557efd3fa8e2c6c0caad37b3e5ba5951f1c6e73568316e966283aaa618c5a
SHA51225092eb83de6d8a5e3bb79469e9147bf2bb48b5b6bc74892ed16d4c5529c3ec73f2a86cca5319f91778b656a3396fff7d2cae6c738d7504f0bd8f97b2ed0e843
-
Filesize
356KB
MD570aa401a782cfbf04734e07d2ae6328d
SHA1f08ca35f4d8310892605491410021e7c73063f14
SHA256c922b949a7549dd2be206f0a586d261d69b50b70cc2bda73471d94b6f2d3e352
SHA5121a928984cc8fde0080a93985d19ac8c60066f7ce0fac2bb87dc3d2573f602c54b608225256c775e8332705a6a82b2ed9414968d335ae4be2861d5cf0d708fdc6
-
Filesize
356KB
MD570aa401a782cfbf04734e07d2ae6328d
SHA1f08ca35f4d8310892605491410021e7c73063f14
SHA256c922b949a7549dd2be206f0a586d261d69b50b70cc2bda73471d94b6f2d3e352
SHA5121a928984cc8fde0080a93985d19ac8c60066f7ce0fac2bb87dc3d2573f602c54b608225256c775e8332705a6a82b2ed9414968d335ae4be2861d5cf0d708fdc6
-
Filesize
175KB
MD5dd0c9e110c68ce1fa5308979ef718f7b
SHA1473deb8069f0841d47b74b7f414dacc6f96eca78
SHA256dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3
SHA51229bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236
-
Filesize
175KB
MD5dd0c9e110c68ce1fa5308979ef718f7b
SHA1473deb8069f0841d47b74b7f414dacc6f96eca78
SHA256dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3
SHA51229bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
295KB
MD52338c84711b756237e614c3869cf6100
SHA16146eace912945070cb084fe3839c8d2dc27c403
SHA256fbfd8bd7e7ff54ce43c209c34a9959ad1abe7325209756decc04e3d9a44ff87b
SHA51224bd3e70fc0ac61f6fcc432de5e93ac38c66eb3fb0e9b09337acc526873dd42f779f2741761ffb1677936e8f219f3c3b683c9476d8ab604803795fc323c7bae6
-
Filesize
295KB
MD52338c84711b756237e614c3869cf6100
SHA16146eace912945070cb084fe3839c8d2dc27c403
SHA256fbfd8bd7e7ff54ce43c209c34a9959ad1abe7325209756decc04e3d9a44ff87b
SHA51224bd3e70fc0ac61f6fcc432de5e93ac38c66eb3fb0e9b09337acc526873dd42f779f2741761ffb1677936e8f219f3c3b683c9476d8ab604803795fc323c7bae6