Analysis
-
max time kernel
106s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
17-02-2023 00:25
Static task
static1
Behavioral task
behavioral1
Sample
77cfdfc330a73a21a2e24498a7b44aa69597f4ef45ca470e68e654108acc2ff7.exe
Resource
win10v2004-20221111-en
General
-
Target
77cfdfc330a73a21a2e24498a7b44aa69597f4ef45ca470e68e654108acc2ff7.exe
-
Size
701KB
-
MD5
bfc20875ffe2530e5c8e4f56ecc7cb3d
-
SHA1
2ec991cd1c5ecb5836967927fa11271e21774611
-
SHA256
77cfdfc330a73a21a2e24498a7b44aa69597f4ef45ca470e68e654108acc2ff7
-
SHA512
a3cceaf968a73342307b7da8a81584e64fae6c2ac72d9c460c667fce6ab54ebe6c546f680923edeed306c9fe205f19c2ed27bbc657817cb6787d6c7a08003104
-
SSDEEP
12288:1MrNy90LkdvZ3o4yVTWhulzPMFrc1x/iSrdSvn9AgI35oa9fTYS8P:cyYkLoDFj2FrWieuymyTiP
Malware Config
Extracted
redline
dubka
193.233.20.13:4136
-
auth_value
e5a9421183a033f283b2f23139b471f0
Extracted
redline
nock
176.113.115.17:4132
-
auth_value
f32d3c6ff0a9a7632c60a2b045a9cde6
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection kOj15Hj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" kOj15Hj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" kOj15Hj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" kOj15Hj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" kOj15Hj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" kOj15Hj.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
pid Process 4072 dnv4202.exe 4368 dDY6089.exe 2184 kOj15Hj.exe 1992 nBp84XC.exe 2708 oGB68hK.exe 3604 pwA78Kd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" kOj15Hj.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dDY6089.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" dDY6089.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 77cfdfc330a73a21a2e24498a7b44aa69597f4ef45ca470e68e654108acc2ff7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 77cfdfc330a73a21a2e24498a7b44aa69597f4ef45ca470e68e654108acc2ff7.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dnv4202.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" dnv4202.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3812 2708 WerFault.exe 86 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2184 kOj15Hj.exe 2184 kOj15Hj.exe 1992 nBp84XC.exe 1992 nBp84XC.exe 2708 oGB68hK.exe 2708 oGB68hK.exe 3604 pwA78Kd.exe 3604 pwA78Kd.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2184 kOj15Hj.exe Token: SeDebugPrivilege 1992 nBp84XC.exe Token: SeDebugPrivilege 2708 oGB68hK.exe Token: SeDebugPrivilege 3604 pwA78Kd.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3388 wrote to memory of 4072 3388 77cfdfc330a73a21a2e24498a7b44aa69597f4ef45ca470e68e654108acc2ff7.exe 82 PID 3388 wrote to memory of 4072 3388 77cfdfc330a73a21a2e24498a7b44aa69597f4ef45ca470e68e654108acc2ff7.exe 82 PID 3388 wrote to memory of 4072 3388 77cfdfc330a73a21a2e24498a7b44aa69597f4ef45ca470e68e654108acc2ff7.exe 82 PID 4072 wrote to memory of 4368 4072 dnv4202.exe 83 PID 4072 wrote to memory of 4368 4072 dnv4202.exe 83 PID 4072 wrote to memory of 4368 4072 dnv4202.exe 83 PID 4368 wrote to memory of 2184 4368 dDY6089.exe 84 PID 4368 wrote to memory of 2184 4368 dDY6089.exe 84 PID 4368 wrote to memory of 1992 4368 dDY6089.exe 85 PID 4368 wrote to memory of 1992 4368 dDY6089.exe 85 PID 4368 wrote to memory of 1992 4368 dDY6089.exe 85 PID 4072 wrote to memory of 2708 4072 dnv4202.exe 86 PID 4072 wrote to memory of 2708 4072 dnv4202.exe 86 PID 4072 wrote to memory of 2708 4072 dnv4202.exe 86 PID 3388 wrote to memory of 3604 3388 77cfdfc330a73a21a2e24498a7b44aa69597f4ef45ca470e68e654108acc2ff7.exe 90 PID 3388 wrote to memory of 3604 3388 77cfdfc330a73a21a2e24498a7b44aa69597f4ef45ca470e68e654108acc2ff7.exe 90 PID 3388 wrote to memory of 3604 3388 77cfdfc330a73a21a2e24498a7b44aa69597f4ef45ca470e68e654108acc2ff7.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\77cfdfc330a73a21a2e24498a7b44aa69597f4ef45ca470e68e654108acc2ff7.exe"C:\Users\Admin\AppData\Local\Temp\77cfdfc330a73a21a2e24498a7b44aa69597f4ef45ca470e68e654108acc2ff7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dnv4202.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dnv4202.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dDY6089.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dDY6089.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kOj15Hj.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kOj15Hj.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2184
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nBp84XC.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nBp84XC.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1992
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\oGB68hK.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\oGB68hK.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2708 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2708 -s 13524⤵
- Program crash
PID:3812
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pwA78Kd.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pwA78Kd.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3604
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2708 -ip 27081⤵PID:3708
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
556KB
MD54d82515238532fe83c781ef4031b3509
SHA1dcb2e81e9227893de67bb851e5b8de172ac1549b
SHA2568d8ff9580282d4ab6a7a00cef5f1309cd012671b88eea4d40b1a54778f2e1a15
SHA512680b4c6867f48c363f8cdf81c5bfecf41fea1ffbf779d57083bf8e1b3ec9747b21bfc502fdfb6695d34e4991077f20fa51219f04cd8c439403601ebae21024ef
-
Filesize
556KB
MD54d82515238532fe83c781ef4031b3509
SHA1dcb2e81e9227893de67bb851e5b8de172ac1549b
SHA2568d8ff9580282d4ab6a7a00cef5f1309cd012671b88eea4d40b1a54778f2e1a15
SHA512680b4c6867f48c363f8cdf81c5bfecf41fea1ffbf779d57083bf8e1b3ec9747b21bfc502fdfb6695d34e4991077f20fa51219f04cd8c439403601ebae21024ef
-
Filesize
175KB
MD58f2223375414f5a6708a342a1efb714e
SHA1b9342d91cef91c550ec054e4ef8ad8a8785f06a0
SHA25638a3186a175d2d3a7f9216f6b8df67264f1a38d320547b7016d4d2f9ad2b845e
SHA5121af0d38a90d91ec07fd91a89cff7997c6159ad2c5bbed1ac8cd90a364f99766c3a01787713699414801b6f00bbfa5bb30ae66dee98b71628f019b78dee7a368e
-
Filesize
175KB
MD58f2223375414f5a6708a342a1efb714e
SHA1b9342d91cef91c550ec054e4ef8ad8a8785f06a0
SHA25638a3186a175d2d3a7f9216f6b8df67264f1a38d320547b7016d4d2f9ad2b845e
SHA5121af0d38a90d91ec07fd91a89cff7997c6159ad2c5bbed1ac8cd90a364f99766c3a01787713699414801b6f00bbfa5bb30ae66dee98b71628f019b78dee7a368e
-
Filesize
202KB
MD51debbf9d3c9e7da1571a169541607a66
SHA14df2365843dbd2b22cf09f6109b31c9fab7906ed
SHA256fb74c02ff113e5584a2c77eb511fc3ce07aa90e9edeb49d894224b55c09857bb
SHA512b40eff793a8ff75887f7f15fee5622ca2b4edc0528ff557dd9283e93e39e73dd0295822c67243cc35466a148f5f9b3bf956f9df637ce68287930f038da5f8aeb
-
Filesize
202KB
MD51debbf9d3c9e7da1571a169541607a66
SHA14df2365843dbd2b22cf09f6109b31c9fab7906ed
SHA256fb74c02ff113e5584a2c77eb511fc3ce07aa90e9edeb49d894224b55c09857bb
SHA512b40eff793a8ff75887f7f15fee5622ca2b4edc0528ff557dd9283e93e39e73dd0295822c67243cc35466a148f5f9b3bf956f9df637ce68287930f038da5f8aeb
-
Filesize
352KB
MD56246fa8e2a0bf5c5ec6e8d171a6a14c8
SHA1ef73e775020044458242bdc2350acdadb62aaff2
SHA25677f8f1fbb3492807055191ffad8c8f94eed7a7865d983788c43a2e399fc7c0d8
SHA512700f14073e301b560cb252df10589cb07349cae6f962714668a59ded5b0d6b8769c478fe730a05cbdf5ade644e8b4a38c107645e16ebaa1e8d401703f1b6180b
-
Filesize
352KB
MD56246fa8e2a0bf5c5ec6e8d171a6a14c8
SHA1ef73e775020044458242bdc2350acdadb62aaff2
SHA25677f8f1fbb3492807055191ffad8c8f94eed7a7865d983788c43a2e399fc7c0d8
SHA512700f14073e301b560cb252df10589cb07349cae6f962714668a59ded5b0d6b8769c478fe730a05cbdf5ade644e8b4a38c107645e16ebaa1e8d401703f1b6180b
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
175KB
MD5dd0c9e110c68ce1fa5308979ef718f7b
SHA1473deb8069f0841d47b74b7f414dacc6f96eca78
SHA256dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3
SHA51229bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236
-
Filesize
175KB
MD5dd0c9e110c68ce1fa5308979ef718f7b
SHA1473deb8069f0841d47b74b7f414dacc6f96eca78
SHA256dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3
SHA51229bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236