Analysis
-
max time kernel
144s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2023, 21:03
Static task
static1
Behavioral task
behavioral1
Sample
426536a0df2560df0e3070b9bd9862b9911df1936e11c81ca4d42a25b13661c0.exe
Resource
win10v2004-20230220-en
General
-
Target
426536a0df2560df0e3070b9bd9862b9911df1936e11c81ca4d42a25b13661c0.exe
-
Size
726KB
-
MD5
3b2a525934e34b6a34632671c850e1fd
-
SHA1
ee381f78ed559d23bb6bd9541a26b01b9a3d41d7
-
SHA256
426536a0df2560df0e3070b9bd9862b9911df1936e11c81ca4d42a25b13661c0
-
SHA512
5d11fe901c97437c21fd0a45cd7ce65241b55c6a57c240bf028f60f9f77c2430f5bfa58d322fd701cc12e62271725da842c478d50f0714a9629f198de8f88a55
-
SSDEEP
12288:YnG266/Am2vu7ov7sjH+dhRf5ZL0qpxpERGhVc4hgsaVMtxj3Z+4JxQO:hT5tgadhRf5ZbjpERn4teMtxjZFIO
Malware Config
Extracted
redline
misha
193.56.146.11:4173
-
auth_value
e17e441c954db214b94a603a7b0b1aea
Extracted
amadey
3.68
193.56.146.218/images/IMG_489440/index.php
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a451fXaJ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a451fXaJ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a451fXaJ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a451fXaJ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a451fXaJ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a451fXaJ.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation k218sMIs.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation redlines.exe -
Executes dropped EXE 7 IoCs
pid Process 4228 m295x110.exe 2608 a451fXaJ.exe 4000 fkdwo759.exe 2288 k218sMIs.exe 2908 redlines.exe 4176 redlines.exe 3916 redlines.exe -
Loads dropped DLL 1 IoCs
pid Process 3120 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a451fXaJ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a451fXaJ.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce m295x110.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" m295x110.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 426536a0df2560df0e3070b9bd9862b9911df1936e11c81ca4d42a25b13661c0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 426536a0df2560df0e3070b9bd9862b9911df1936e11c81ca4d42a25b13661c0.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4868 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 488 2608 WerFault.exe 86 228 2052 WerFault.exe 84 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1840 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2608 a451fXaJ.exe 2608 a451fXaJ.exe 4000 fkdwo759.exe 4000 fkdwo759.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2608 a451fXaJ.exe Token: SeDebugPrivilege 4000 fkdwo759.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2052 wrote to memory of 4228 2052 426536a0df2560df0e3070b9bd9862b9911df1936e11c81ca4d42a25b13661c0.exe 85 PID 2052 wrote to memory of 4228 2052 426536a0df2560df0e3070b9bd9862b9911df1936e11c81ca4d42a25b13661c0.exe 85 PID 2052 wrote to memory of 4228 2052 426536a0df2560df0e3070b9bd9862b9911df1936e11c81ca4d42a25b13661c0.exe 85 PID 4228 wrote to memory of 2608 4228 m295x110.exe 86 PID 4228 wrote to memory of 2608 4228 m295x110.exe 86 PID 4228 wrote to memory of 2608 4228 m295x110.exe 86 PID 4228 wrote to memory of 4000 4228 m295x110.exe 98 PID 4228 wrote to memory of 4000 4228 m295x110.exe 98 PID 4228 wrote to memory of 4000 4228 m295x110.exe 98 PID 2052 wrote to memory of 2288 2052 426536a0df2560df0e3070b9bd9862b9911df1936e11c81ca4d42a25b13661c0.exe 99 PID 2052 wrote to memory of 2288 2052 426536a0df2560df0e3070b9bd9862b9911df1936e11c81ca4d42a25b13661c0.exe 99 PID 2052 wrote to memory of 2288 2052 426536a0df2560df0e3070b9bd9862b9911df1936e11c81ca4d42a25b13661c0.exe 99 PID 2288 wrote to memory of 2908 2288 k218sMIs.exe 101 PID 2288 wrote to memory of 2908 2288 k218sMIs.exe 101 PID 2288 wrote to memory of 2908 2288 k218sMIs.exe 101 PID 2908 wrote to memory of 1840 2908 redlines.exe 104 PID 2908 wrote to memory of 1840 2908 redlines.exe 104 PID 2908 wrote to memory of 1840 2908 redlines.exe 104 PID 2908 wrote to memory of 224 2908 redlines.exe 106 PID 2908 wrote to memory of 224 2908 redlines.exe 106 PID 2908 wrote to memory of 224 2908 redlines.exe 106 PID 224 wrote to memory of 5040 224 cmd.exe 108 PID 224 wrote to memory of 5040 224 cmd.exe 108 PID 224 wrote to memory of 5040 224 cmd.exe 108 PID 224 wrote to memory of 3128 224 cmd.exe 109 PID 224 wrote to memory of 3128 224 cmd.exe 109 PID 224 wrote to memory of 3128 224 cmd.exe 109 PID 224 wrote to memory of 2460 224 cmd.exe 110 PID 224 wrote to memory of 2460 224 cmd.exe 110 PID 224 wrote to memory of 2460 224 cmd.exe 110 PID 224 wrote to memory of 3644 224 cmd.exe 111 PID 224 wrote to memory of 3644 224 cmd.exe 111 PID 224 wrote to memory of 3644 224 cmd.exe 111 PID 224 wrote to memory of 1016 224 cmd.exe 112 PID 224 wrote to memory of 1016 224 cmd.exe 112 PID 224 wrote to memory of 1016 224 cmd.exe 112 PID 224 wrote to memory of 3472 224 cmd.exe 113 PID 224 wrote to memory of 3472 224 cmd.exe 113 PID 224 wrote to memory of 3472 224 cmd.exe 113 PID 2908 wrote to memory of 3120 2908 redlines.exe 121 PID 2908 wrote to memory of 3120 2908 redlines.exe 121 PID 2908 wrote to memory of 3120 2908 redlines.exe 121
Processes
-
C:\Users\Admin\AppData\Local\Temp\426536a0df2560df0e3070b9bd9862b9911df1936e11c81ca4d42a25b13661c0.exe"C:\Users\Admin\AppData\Local\Temp\426536a0df2560df0e3070b9bd9862b9911df1936e11c81ca4d42a25b13661c0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m295x110.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m295x110.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a451fXaJ.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a451fXaJ.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2608 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2608 -s 10844⤵
- Program crash
PID:488
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fkdwo759.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fkdwo759.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4000
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k218sMIs.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k218sMIs.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\46aee2aca4\redlines.exe"C:\Users\Admin\AppData\Local\Temp\46aee2aca4\redlines.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN redlines.exe /TR "C:\Users\Admin\AppData\Local\Temp\46aee2aca4\redlines.exe" /F4⤵
- Creates scheduled task(s)
PID:1840
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "redlines.exe" /P "Admin:N"&&CACLS "redlines.exe" /P "Admin:R" /E&&echo Y|CACLS "..\46aee2aca4" /P "Admin:N"&&CACLS "..\46aee2aca4" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:5040
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "redlines.exe" /P "Admin:N"5⤵PID:3128
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "redlines.exe" /P "Admin:R" /E5⤵PID:2460
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3644
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\46aee2aca4" /P "Admin:N"5⤵PID:1016
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\46aee2aca4" /P "Admin:R" /E5⤵PID:3472
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3120
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2052 -s 4242⤵
- Program crash
PID:228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2608 -ip 26081⤵PID:3920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2052 -ip 20521⤵PID:3976
-
C:\Users\Admin\AppData\Local\Temp\46aee2aca4\redlines.exeC:\Users\Admin\AppData\Local\Temp\46aee2aca4\redlines.exe1⤵
- Executes dropped EXE
PID:4176
-
C:\Users\Admin\AppData\Local\Temp\46aee2aca4\redlines.exeC:\Users\Admin\AppData\Local\Temp\46aee2aca4\redlines.exe1⤵
- Executes dropped EXE
PID:3916
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4868
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
235KB
MD52cf60f8337d5b2ac1ecd5a702fe8119f
SHA1491f843831a2ae68847cb612be7f5886eac354d6
SHA2562a3dbe07f949ead607ad6aa3ab4cf7e544c1d7482e6a72ce109dff5a81f38336
SHA512fba0b731d36e4ce708f46629c18d04ee9a940037abaa57f7667ccbe226a01956c5ff99b029c46feaafea326a7e5aa606c0bb73cd3ed25f8fbae8410209322ac7
-
Filesize
235KB
MD52cf60f8337d5b2ac1ecd5a702fe8119f
SHA1491f843831a2ae68847cb612be7f5886eac354d6
SHA2562a3dbe07f949ead607ad6aa3ab4cf7e544c1d7482e6a72ce109dff5a81f38336
SHA512fba0b731d36e4ce708f46629c18d04ee9a940037abaa57f7667ccbe226a01956c5ff99b029c46feaafea326a7e5aa606c0bb73cd3ed25f8fbae8410209322ac7
-
Filesize
235KB
MD52cf60f8337d5b2ac1ecd5a702fe8119f
SHA1491f843831a2ae68847cb612be7f5886eac354d6
SHA2562a3dbe07f949ead607ad6aa3ab4cf7e544c1d7482e6a72ce109dff5a81f38336
SHA512fba0b731d36e4ce708f46629c18d04ee9a940037abaa57f7667ccbe226a01956c5ff99b029c46feaafea326a7e5aa606c0bb73cd3ed25f8fbae8410209322ac7
-
Filesize
235KB
MD52cf60f8337d5b2ac1ecd5a702fe8119f
SHA1491f843831a2ae68847cb612be7f5886eac354d6
SHA2562a3dbe07f949ead607ad6aa3ab4cf7e544c1d7482e6a72ce109dff5a81f38336
SHA512fba0b731d36e4ce708f46629c18d04ee9a940037abaa57f7667ccbe226a01956c5ff99b029c46feaafea326a7e5aa606c0bb73cd3ed25f8fbae8410209322ac7
-
Filesize
235KB
MD52cf60f8337d5b2ac1ecd5a702fe8119f
SHA1491f843831a2ae68847cb612be7f5886eac354d6
SHA2562a3dbe07f949ead607ad6aa3ab4cf7e544c1d7482e6a72ce109dff5a81f38336
SHA512fba0b731d36e4ce708f46629c18d04ee9a940037abaa57f7667ccbe226a01956c5ff99b029c46feaafea326a7e5aa606c0bb73cd3ed25f8fbae8410209322ac7
-
Filesize
235KB
MD52cf60f8337d5b2ac1ecd5a702fe8119f
SHA1491f843831a2ae68847cb612be7f5886eac354d6
SHA2562a3dbe07f949ead607ad6aa3ab4cf7e544c1d7482e6a72ce109dff5a81f38336
SHA512fba0b731d36e4ce708f46629c18d04ee9a940037abaa57f7667ccbe226a01956c5ff99b029c46feaafea326a7e5aa606c0bb73cd3ed25f8fbae8410209322ac7
-
Filesize
235KB
MD52cf60f8337d5b2ac1ecd5a702fe8119f
SHA1491f843831a2ae68847cb612be7f5886eac354d6
SHA2562a3dbe07f949ead607ad6aa3ab4cf7e544c1d7482e6a72ce109dff5a81f38336
SHA512fba0b731d36e4ce708f46629c18d04ee9a940037abaa57f7667ccbe226a01956c5ff99b029c46feaafea326a7e5aa606c0bb73cd3ed25f8fbae8410209322ac7
-
Filesize
391KB
MD576eeb5bbf0c4bd69403aa2b955f944f0
SHA137c5cebd5db3a379d36083b4b9b4f1a0aad4f6bb
SHA25694f0ac00e6ab6ebe460cd5e25f6adb983d45674b95437b39125194d3cbb81221
SHA512dd0328c7e1f469a8dccbd557cc6782f063e63fb16b9c52757852196cf49b5bee74ded6920f086f36325b784d2cd22acccbfcde727e77654f73e3db5779db20ed
-
Filesize
391KB
MD576eeb5bbf0c4bd69403aa2b955f944f0
SHA137c5cebd5db3a379d36083b4b9b4f1a0aad4f6bb
SHA25694f0ac00e6ab6ebe460cd5e25f6adb983d45674b95437b39125194d3cbb81221
SHA512dd0328c7e1f469a8dccbd557cc6782f063e63fb16b9c52757852196cf49b5bee74ded6920f086f36325b784d2cd22acccbfcde727e77654f73e3db5779db20ed
-
Filesize
363KB
MD55f9106c1a4ae0150887ac3eadc521f31
SHA1b7c59f033e09829e70ebf380ef9c33aff98d2bf4
SHA256ddda2d12c18f4944b44af8c6bb030ae608060d087483c423acf217c4c4ed5411
SHA51280ab71ecb332f2316abf7cb73c4811bf2162c2e95fc0670fcd8d26370158e2b2f342328ece12e9edeed90a7568d24d0048bdb9ee3ea928fd80d1499851c5caf3
-
Filesize
363KB
MD55f9106c1a4ae0150887ac3eadc521f31
SHA1b7c59f033e09829e70ebf380ef9c33aff98d2bf4
SHA256ddda2d12c18f4944b44af8c6bb030ae608060d087483c423acf217c4c4ed5411
SHA51280ab71ecb332f2316abf7cb73c4811bf2162c2e95fc0670fcd8d26370158e2b2f342328ece12e9edeed90a7568d24d0048bdb9ee3ea928fd80d1499851c5caf3
-
Filesize
175KB
MD5fb6b1dfc1d31819df66b4eba004f4f1e
SHA18fb4085acc6bdac0c653130d20ccf87dc0a4bc16
SHA2564a8cf958110e605398244c588878680f5f367bf064573a69fded3f4ca70c7549
SHA512270f0208fac6330d413709de2f1aa348f20e434bb70b886a96e7db87f74607c9dcbee92b458ea375ca9d22a89af46b31655b84d6f26fac3d12e63f8242d41f3a
-
Filesize
175KB
MD5fb6b1dfc1d31819df66b4eba004f4f1e
SHA18fb4085acc6bdac0c653130d20ccf87dc0a4bc16
SHA2564a8cf958110e605398244c588878680f5f367bf064573a69fded3f4ca70c7549
SHA512270f0208fac6330d413709de2f1aa348f20e434bb70b886a96e7db87f74607c9dcbee92b458ea375ca9d22a89af46b31655b84d6f26fac3d12e63f8242d41f3a
-
Filesize
89KB
MD557cf7ce2696f4ac87b27879886a089bf
SHA1897fc8605b17f47fd51272a8a5f5605d939c744f
SHA256388abaad8701de54dcc5e0d8380630e1b6f0b323f1a9cf4377e38399753842b3
SHA512fd5a09e5908817a612eb59bf424272a749ff6ccccbd66f1900d29c58564befef981bd8bf7049d6d6690ffb8553bf9647f7051a9fb4b57ea1d68e256a769b6a86
-
Filesize
89KB
MD557cf7ce2696f4ac87b27879886a089bf
SHA1897fc8605b17f47fd51272a8a5f5605d939c744f
SHA256388abaad8701de54dcc5e0d8380630e1b6f0b323f1a9cf4377e38399753842b3
SHA512fd5a09e5908817a612eb59bf424272a749ff6ccccbd66f1900d29c58564befef981bd8bf7049d6d6690ffb8553bf9647f7051a9fb4b57ea1d68e256a769b6a86
-
Filesize
89KB
MD557cf7ce2696f4ac87b27879886a089bf
SHA1897fc8605b17f47fd51272a8a5f5605d939c744f
SHA256388abaad8701de54dcc5e0d8380630e1b6f0b323f1a9cf4377e38399753842b3
SHA512fd5a09e5908817a612eb59bf424272a749ff6ccccbd66f1900d29c58564befef981bd8bf7049d6d6690ffb8553bf9647f7051a9fb4b57ea1d68e256a769b6a86
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5