Analysis
-
max time kernel
72s -
max time network
74s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
16/02/2023, 16:06
Static task
static1
General
-
Target
e47250158bbae1b717a7600204daad5d7005b18581a477e4571bdce01c99b088.exe
-
Size
998KB
-
MD5
33352fe2937713a21469e5ff894bff48
-
SHA1
c3a5ed768addb8087ed1cba16af0416743e60e01
-
SHA256
e47250158bbae1b717a7600204daad5d7005b18581a477e4571bdce01c99b088
-
SHA512
9d78557b38396a59ef689625c903382b84a2d8117cfc649a695e0084389cec78bcf88e79e70be48356bce991a6e3a9d63416fedeb7e944618fb10beacfb325a6
-
SSDEEP
24576:kyHfu0KV+tOl5cYnwsM4PO5jPAdcrUy3:zHfuRVqOlPnwsM4cYy
Malware Config
Extracted
redline
dubka
193.233.20.13:4136
-
auth_value
e5a9421183a033f283b2f23139b471f0
Extracted
redline
ruma
193.233.20.13:4136
-
auth_value
647d00dfaba082a4a30f383bca5d1a2a
Extracted
redline
nock
176.113.115.17:4132
-
auth_value
f32d3c6ff0a9a7632c60a2b045a9cde6
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" kTK39Mo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" kTK39Mo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" kTK39Mo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" mNW22mf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" mNW22mf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" mNW22mf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" mNW22mf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" kTK39Mo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" mNW22mf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" kTK39Mo.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/2736-539-0x00000000023D0000-0x0000000002416000-memory.dmp family_redline behavioral1/memory/2736-544-0x0000000004B50000-0x0000000004B94000-memory.dmp family_redline -
Executes dropped EXE 8 IoCs
pid Process 2224 dbO4845.exe 1916 dZJ7143.exe 3080 dRE6543.exe 4892 kTK39Mo.exe 5064 mNW22mf.exe 4176 nOE27rN.exe 2736 oTR64Wy.exe 1952 ptF86VT.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" kTK39Mo.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features mNW22mf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" mNW22mf.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e47250158bbae1b717a7600204daad5d7005b18581a477e4571bdce01c99b088.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dbO4845.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" dbO4845.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dZJ7143.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" dZJ7143.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dRE6543.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" dRE6543.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e47250158bbae1b717a7600204daad5d7005b18581a477e4571bdce01c99b088.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4892 kTK39Mo.exe 4892 kTK39Mo.exe 5064 mNW22mf.exe 5064 mNW22mf.exe 4176 nOE27rN.exe 4176 nOE27rN.exe 2736 oTR64Wy.exe 2736 oTR64Wy.exe 1952 ptF86VT.exe 1952 ptF86VT.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4892 kTK39Mo.exe Token: SeDebugPrivilege 5064 mNW22mf.exe Token: SeDebugPrivilege 4176 nOE27rN.exe Token: SeDebugPrivilege 2736 oTR64Wy.exe Token: SeDebugPrivilege 1952 ptF86VT.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 3488 wrote to memory of 2224 3488 e47250158bbae1b717a7600204daad5d7005b18581a477e4571bdce01c99b088.exe 66 PID 3488 wrote to memory of 2224 3488 e47250158bbae1b717a7600204daad5d7005b18581a477e4571bdce01c99b088.exe 66 PID 3488 wrote to memory of 2224 3488 e47250158bbae1b717a7600204daad5d7005b18581a477e4571bdce01c99b088.exe 66 PID 2224 wrote to memory of 1916 2224 dbO4845.exe 67 PID 2224 wrote to memory of 1916 2224 dbO4845.exe 67 PID 2224 wrote to memory of 1916 2224 dbO4845.exe 67 PID 1916 wrote to memory of 3080 1916 dZJ7143.exe 68 PID 1916 wrote to memory of 3080 1916 dZJ7143.exe 68 PID 1916 wrote to memory of 3080 1916 dZJ7143.exe 68 PID 3080 wrote to memory of 4892 3080 dRE6543.exe 69 PID 3080 wrote to memory of 4892 3080 dRE6543.exe 69 PID 3080 wrote to memory of 5064 3080 dRE6543.exe 70 PID 3080 wrote to memory of 5064 3080 dRE6543.exe 70 PID 3080 wrote to memory of 5064 3080 dRE6543.exe 70 PID 1916 wrote to memory of 4176 1916 dZJ7143.exe 71 PID 1916 wrote to memory of 4176 1916 dZJ7143.exe 71 PID 1916 wrote to memory of 4176 1916 dZJ7143.exe 71 PID 2224 wrote to memory of 2736 2224 dbO4845.exe 73 PID 2224 wrote to memory of 2736 2224 dbO4845.exe 73 PID 2224 wrote to memory of 2736 2224 dbO4845.exe 73 PID 3488 wrote to memory of 1952 3488 e47250158bbae1b717a7600204daad5d7005b18581a477e4571bdce01c99b088.exe 74 PID 3488 wrote to memory of 1952 3488 e47250158bbae1b717a7600204daad5d7005b18581a477e4571bdce01c99b088.exe 74 PID 3488 wrote to memory of 1952 3488 e47250158bbae1b717a7600204daad5d7005b18581a477e4571bdce01c99b088.exe 74
Processes
-
C:\Users\Admin\AppData\Local\Temp\e47250158bbae1b717a7600204daad5d7005b18581a477e4571bdce01c99b088.exe"C:\Users\Admin\AppData\Local\Temp\e47250158bbae1b717a7600204daad5d7005b18581a477e4571bdce01c99b088.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dbO4845.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dbO4845.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dZJ7143.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dZJ7143.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dRE6543.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dRE6543.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\kTK39Mo.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\kTK39Mo.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4892
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mNW22mf.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mNW22mf.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5064
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nOE27rN.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nOE27rN.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4176
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\oTR64Wy.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\oTR64Wy.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptF86VT.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptF86VT.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1952
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
856KB
MD58f29dce951bf6c590c5d0219352ea021
SHA166ee23bdd97fcbeab8783bec278e3461af253d6b
SHA256c6d2ee4517906838d0d49052fc67189e76abc7864428f9a1defe47d269d175b2
SHA5125071a40b438650810da16a8f3eb0c355bc160dbb57240d0187c8d4b6f3e242ee1d5e7c5d83afe18adf7b1e0fe02d4c9696409bc4f598c05da3e0bff22f6a0bfc
-
Filesize
856KB
MD58f29dce951bf6c590c5d0219352ea021
SHA166ee23bdd97fcbeab8783bec278e3461af253d6b
SHA256c6d2ee4517906838d0d49052fc67189e76abc7864428f9a1defe47d269d175b2
SHA5125071a40b438650810da16a8f3eb0c355bc160dbb57240d0187c8d4b6f3e242ee1d5e7c5d83afe18adf7b1e0fe02d4c9696409bc4f598c05da3e0bff22f6a0bfc
-
Filesize
175KB
MD58f2223375414f5a6708a342a1efb714e
SHA1b9342d91cef91c550ec054e4ef8ad8a8785f06a0
SHA25638a3186a175d2d3a7f9216f6b8df67264f1a38d320547b7016d4d2f9ad2b845e
SHA5121af0d38a90d91ec07fd91a89cff7997c6159ad2c5bbed1ac8cd90a364f99766c3a01787713699414801b6f00bbfa5bb30ae66dee98b71628f019b78dee7a368e
-
Filesize
175KB
MD58f2223375414f5a6708a342a1efb714e
SHA1b9342d91cef91c550ec054e4ef8ad8a8785f06a0
SHA25638a3186a175d2d3a7f9216f6b8df67264f1a38d320547b7016d4d2f9ad2b845e
SHA5121af0d38a90d91ec07fd91a89cff7997c6159ad2c5bbed1ac8cd90a364f99766c3a01787713699414801b6f00bbfa5bb30ae66dee98b71628f019b78dee7a368e
-
Filesize
500KB
MD56b91750446844a358a05aec8494664e3
SHA12296f9a7a3dd5264585772bbbe14ef1557d899be
SHA256c8dbd4e69f608f00b8b11f9ed00ba1be49207555db801c587e72ccdec7978082
SHA512a87b69069c3d74f95fedaf6a5ad1ebe064d0daf7f122486f036d67e86606b06fe15da8921ef41702d6cbea575e5990c45dabc29b6bb8cbf932ddb5f95a05d5d5
-
Filesize
500KB
MD56b91750446844a358a05aec8494664e3
SHA12296f9a7a3dd5264585772bbbe14ef1557d899be
SHA256c8dbd4e69f608f00b8b11f9ed00ba1be49207555db801c587e72ccdec7978082
SHA512a87b69069c3d74f95fedaf6a5ad1ebe064d0daf7f122486f036d67e86606b06fe15da8921ef41702d6cbea575e5990c45dabc29b6bb8cbf932ddb5f95a05d5d5
-
Filesize
352KB
MD53c6eb15e40eaa09b88ebacad5f92a588
SHA1851b5b722ae3c18c82471125d5d492989b1b6d56
SHA256cc695bd0ddafc3c63f5037002132855008378ad39b0097876a4205f8babe50fe
SHA512c52117cd8b024bf07135045e077bad1a1287864db06bfd73e128477ce0008949b741f5c16055e9f65aef21741c90352ef034863cdc7561f52d9e71891b8ecedc
-
Filesize
352KB
MD53c6eb15e40eaa09b88ebacad5f92a588
SHA1851b5b722ae3c18c82471125d5d492989b1b6d56
SHA256cc695bd0ddafc3c63f5037002132855008378ad39b0097876a4205f8babe50fe
SHA512c52117cd8b024bf07135045e077bad1a1287864db06bfd73e128477ce0008949b741f5c16055e9f65aef21741c90352ef034863cdc7561f52d9e71891b8ecedc
-
Filesize
356KB
MD5fe88d9ddc00c791bfd2ef51204126628
SHA15b3e56c3d9bef33aa7319951917ab5fe3d551f14
SHA256c59e1874d848eee7be6257b2684ccf715f073dc413e9fb4a82180dbb774d2e52
SHA51266684fcfaa9bb43253ba913a330847e3b61a1264c4066cdc02cd1984c734163127aeffb10ddad952a27c0c29490de841fd0ed43edc96e2c746c9a1d8cc6bb206
-
Filesize
356KB
MD5fe88d9ddc00c791bfd2ef51204126628
SHA15b3e56c3d9bef33aa7319951917ab5fe3d551f14
SHA256c59e1874d848eee7be6257b2684ccf715f073dc413e9fb4a82180dbb774d2e52
SHA51266684fcfaa9bb43253ba913a330847e3b61a1264c4066cdc02cd1984c734163127aeffb10ddad952a27c0c29490de841fd0ed43edc96e2c746c9a1d8cc6bb206
-
Filesize
175KB
MD5dd0c9e110c68ce1fa5308979ef718f7b
SHA1473deb8069f0841d47b74b7f414dacc6f96eca78
SHA256dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3
SHA51229bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236
-
Filesize
175KB
MD5dd0c9e110c68ce1fa5308979ef718f7b
SHA1473deb8069f0841d47b74b7f414dacc6f96eca78
SHA256dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3
SHA51229bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
295KB
MD5d1baaaef27df63f5eee510b48a48fb0a
SHA19fbfd664631228831a0e75e1b2ec97078d1ba5ed
SHA25613fa439a8f580d451aabe918306177a7f38920a07dc07665b05c4c5f19e726b7
SHA5125598f84da673777996cf10e9af99d20b365c945f9eb5807f9fcaa5387c21201c1a5cc699b67e381ee82bd5adb6fefd167f1f62bd0421a21f5d172f6853ebd988
-
Filesize
295KB
MD5d1baaaef27df63f5eee510b48a48fb0a
SHA19fbfd664631228831a0e75e1b2ec97078d1ba5ed
SHA25613fa439a8f580d451aabe918306177a7f38920a07dc07665b05c4c5f19e726b7
SHA5125598f84da673777996cf10e9af99d20b365c945f9eb5807f9fcaa5387c21201c1a5cc699b67e381ee82bd5adb6fefd167f1f62bd0421a21f5d172f6853ebd988