Analysis
-
max time kernel
61s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
16-02-2023 18:57
Static task
static1
Behavioral task
behavioral1
Sample
b915dc1a0c1978fc6f5fa76a30a22a475d9c546b4f29cabbc0db8c6a86e94f87.exe
Resource
win10v2004-20221111-en
General
-
Target
b915dc1a0c1978fc6f5fa76a30a22a475d9c546b4f29cabbc0db8c6a86e94f87.exe
-
Size
855KB
-
MD5
c0f1be41ef253acfe0c45555261ec0b6
-
SHA1
1bab831ebe65c65c38bc35d1dd2da825de50a4e2
-
SHA256
b915dc1a0c1978fc6f5fa76a30a22a475d9c546b4f29cabbc0db8c6a86e94f87
-
SHA512
6ffc51d37675c90160abca9a4084a8fd4189b442b92612d75785512ea5ddccefbbdcfff8c54fb5e72a1873b8b1506839a73cfe401f04a5d4145efc050a3659ef
-
SSDEEP
12288:aMr2y90qJ0sgCwHiWHrOb5tP2XR1gk9SGG4S8W6nPu7tqSQOwU4EnVKhR3S:Uyf01lCQrgvPkjZSF6nPUqzOSEnVKW
Malware Config
Extracted
redline
dubka
193.233.20.13:4136
-
auth_value
e5a9421183a033f283b2f23139b471f0
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" szp6192.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" szp6192.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" roN3912.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" roN3912.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection szp6192.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" szp6192.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" szp6192.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" szp6192.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection roN3912.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" roN3912.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" roN3912.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" roN3912.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
pid Process 4784 vFR6602.exe 4856 vhq5962.exe 2648 roN3912.exe 5044 szp6192.exe 2008 tts32Gb.exe 2604 uwe98At.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" roN3912.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features szp6192.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" szp6192.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vFR6602.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vFR6602.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vhq5962.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" vhq5962.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b915dc1a0c1978fc6f5fa76a30a22a475d9c546b4f29cabbc0db8c6a86e94f87.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b915dc1a0c1978fc6f5fa76a30a22a475d9c546b4f29cabbc0db8c6a86e94f87.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2812 5044 WerFault.exe 84 1904 2604 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2648 roN3912.exe 2648 roN3912.exe 5044 szp6192.exe 5044 szp6192.exe 2008 tts32Gb.exe 2008 tts32Gb.exe 2604 uwe98At.exe 2604 uwe98At.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2648 roN3912.exe Token: SeDebugPrivilege 5044 szp6192.exe Token: SeDebugPrivilege 2008 tts32Gb.exe Token: SeDebugPrivilege 2604 uwe98At.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4884 wrote to memory of 4784 4884 b915dc1a0c1978fc6f5fa76a30a22a475d9c546b4f29cabbc0db8c6a86e94f87.exe 81 PID 4884 wrote to memory of 4784 4884 b915dc1a0c1978fc6f5fa76a30a22a475d9c546b4f29cabbc0db8c6a86e94f87.exe 81 PID 4884 wrote to memory of 4784 4884 b915dc1a0c1978fc6f5fa76a30a22a475d9c546b4f29cabbc0db8c6a86e94f87.exe 81 PID 4784 wrote to memory of 4856 4784 vFR6602.exe 82 PID 4784 wrote to memory of 4856 4784 vFR6602.exe 82 PID 4784 wrote to memory of 4856 4784 vFR6602.exe 82 PID 4856 wrote to memory of 2648 4856 vhq5962.exe 83 PID 4856 wrote to memory of 2648 4856 vhq5962.exe 83 PID 4856 wrote to memory of 5044 4856 vhq5962.exe 84 PID 4856 wrote to memory of 5044 4856 vhq5962.exe 84 PID 4856 wrote to memory of 5044 4856 vhq5962.exe 84 PID 4784 wrote to memory of 2008 4784 vFR6602.exe 87 PID 4784 wrote to memory of 2008 4784 vFR6602.exe 87 PID 4784 wrote to memory of 2008 4784 vFR6602.exe 87 PID 4884 wrote to memory of 2604 4884 b915dc1a0c1978fc6f5fa76a30a22a475d9c546b4f29cabbc0db8c6a86e94f87.exe 89 PID 4884 wrote to memory of 2604 4884 b915dc1a0c1978fc6f5fa76a30a22a475d9c546b4f29cabbc0db8c6a86e94f87.exe 89 PID 4884 wrote to memory of 2604 4884 b915dc1a0c1978fc6f5fa76a30a22a475d9c546b4f29cabbc0db8c6a86e94f87.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\b915dc1a0c1978fc6f5fa76a30a22a475d9c546b4f29cabbc0db8c6a86e94f87.exe"C:\Users\Admin\AppData\Local\Temp\b915dc1a0c1978fc6f5fa76a30a22a475d9c546b4f29cabbc0db8c6a86e94f87.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vFR6602.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vFR6602.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vhq5962.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vhq5962.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\roN3912.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\roN3912.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\szp6192.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\szp6192.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5044 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 10405⤵
- Program crash
PID:2812
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tts32Gb.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tts32Gb.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2008
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uwe98At.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uwe98At.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2604 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2604 -s 13403⤵
- Program crash
PID:1904
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 5044 -ip 50441⤵PID:4488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2604 -ip 26041⤵PID:2736
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
352KB
MD51f4fa5e9d77b2414bc8e643866ef39db
SHA1d3baa3f3a3d3e1988d5c6192f3754c333c3ec091
SHA2566677b0604339c9e81fa0abf5616b712be3e7c64e590dae250368afb1ce7858bf
SHA51266c48871608885176a2c533889f931265a55202cbb0d6240b662632b308fd87c478d2deff3c743ee92ef5d36e0219bf16bb580a099d9790b3748093d6dea2d61
-
Filesize
352KB
MD51f4fa5e9d77b2414bc8e643866ef39db
SHA1d3baa3f3a3d3e1988d5c6192f3754c333c3ec091
SHA2566677b0604339c9e81fa0abf5616b712be3e7c64e590dae250368afb1ce7858bf
SHA51266c48871608885176a2c533889f931265a55202cbb0d6240b662632b308fd87c478d2deff3c743ee92ef5d36e0219bf16bb580a099d9790b3748093d6dea2d61
-
Filesize
500KB
MD593316fa5e4451975c0a31eb86fe8349d
SHA11c6f8989da610abbfc023c1a8656f934285e41d6
SHA2564f330d37cf07ae295997b2360c2eadf39861382d32f1774adad793cd3fe5d153
SHA5129d88eda61527ceecfa1e1fb57a2a9b976ee9c0cf8a757fed806d7f1b1e6ec24f83f792dd45e215ea876feb697cbb748dad565833958747e255dc501ede955694
-
Filesize
500KB
MD593316fa5e4451975c0a31eb86fe8349d
SHA11c6f8989da610abbfc023c1a8656f934285e41d6
SHA2564f330d37cf07ae295997b2360c2eadf39861382d32f1774adad793cd3fe5d153
SHA5129d88eda61527ceecfa1e1fb57a2a9b976ee9c0cf8a757fed806d7f1b1e6ec24f83f792dd45e215ea876feb697cbb748dad565833958747e255dc501ede955694
-
Filesize
175KB
MD5dd0c9e110c68ce1fa5308979ef718f7b
SHA1473deb8069f0841d47b74b7f414dacc6f96eca78
SHA256dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3
SHA51229bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236
-
Filesize
175KB
MD5dd0c9e110c68ce1fa5308979ef718f7b
SHA1473deb8069f0841d47b74b7f414dacc6f96eca78
SHA256dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3
SHA51229bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236
-
Filesize
355KB
MD5c5514a649e7f1f1cfe11bfe4bfd3de59
SHA130694d9ecf2b133ec118dcc11db7699c27b3c2e6
SHA2563c53974d7b2b762514847688a868dcc9bc27394a1fa1a3e92cbe1cb785927782
SHA512744b843e9db41f19a7eb5ffde9cf93dfb456fe3033a9e4ca4f9703428c7ec75108004916c094a081eee5bd12ba5d6d7ff1107981ed3691396a082a8b55388d0c
-
Filesize
355KB
MD5c5514a649e7f1f1cfe11bfe4bfd3de59
SHA130694d9ecf2b133ec118dcc11db7699c27b3c2e6
SHA2563c53974d7b2b762514847688a868dcc9bc27394a1fa1a3e92cbe1cb785927782
SHA512744b843e9db41f19a7eb5ffde9cf93dfb456fe3033a9e4ca4f9703428c7ec75108004916c094a081eee5bd12ba5d6d7ff1107981ed3691396a082a8b55388d0c
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
294KB
MD5e756f652b55d5cdea64c99e99dd2944b
SHA14b029d66a9191401600ce49ee339978e51655c4d
SHA25643e64e06e9b8d9beef5843448023d8741fc39f96ac82dabf28d5daa2a4ec74a8
SHA5129cae586c698a5b6061cc2b52e2cea9de7baaf266f24259c1833588c9448a416a59dd45921de2e17597ce8b03447c83f26ec83e3f4c2e23f7d53345856ca8c457
-
Filesize
294KB
MD5e756f652b55d5cdea64c99e99dd2944b
SHA14b029d66a9191401600ce49ee339978e51655c4d
SHA25643e64e06e9b8d9beef5843448023d8741fc39f96ac82dabf28d5daa2a4ec74a8
SHA5129cae586c698a5b6061cc2b52e2cea9de7baaf266f24259c1833588c9448a416a59dd45921de2e17597ce8b03447c83f26ec83e3f4c2e23f7d53345856ca8c457