Analysis
-
max time kernel
86s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 02:12
Static task
static1
Behavioral task
behavioral1
Sample
0cad2cfc06b38439809d62e1c5ca38068fce11b1442dbdb4eaa32e68c2914b55.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0cad2cfc06b38439809d62e1c5ca38068fce11b1442dbdb4eaa32e68c2914b55.exe
Resource
win10v2004-20230220-en
General
-
Target
0cad2cfc06b38439809d62e1c5ca38068fce11b1442dbdb4eaa32e68c2914b55.exe
-
Size
686KB
-
MD5
a9f1d139268416c799550a0741aeadbb
-
SHA1
a2c3f3ff9443023114b94add4f7a30c165edd50c
-
SHA256
0cad2cfc06b38439809d62e1c5ca38068fce11b1442dbdb4eaa32e68c2914b55
-
SHA512
98c777aad810b357603e82505fa13681ebe777f71cdf6d4a94a7272f9516429d3b338f3256b12d9d41855725f73964866db227bef6cb18c69bb3e8e377ce59d8
-
SSDEEP
12288:9MrQy903BCHk07CUdCa9RW4mTc73ZR+OYmMJuH64N4k4kk+B6q9wcK:Ny5XeU00+JuiiDDK
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
dogma
193.233.20.32:4125
-
auth_value
1b692976ca991040f2e8890409c35142
Signatures
-
Processes:
pro8040.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8040.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8040.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8040.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8040.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8040.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8040.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral2/memory/2968-191-0x00000000049C0000-0x00000000049FF000-memory.dmp family_redline behavioral2/memory/2968-192-0x00000000049C0000-0x00000000049FF000-memory.dmp family_redline behavioral2/memory/2968-194-0x00000000049C0000-0x00000000049FF000-memory.dmp family_redline behavioral2/memory/2968-196-0x00000000049C0000-0x00000000049FF000-memory.dmp family_redline behavioral2/memory/2968-198-0x00000000049C0000-0x00000000049FF000-memory.dmp family_redline behavioral2/memory/2968-203-0x00000000049C0000-0x00000000049FF000-memory.dmp family_redline behavioral2/memory/2968-206-0x00000000049C0000-0x00000000049FF000-memory.dmp family_redline behavioral2/memory/2968-208-0x00000000049C0000-0x00000000049FF000-memory.dmp family_redline behavioral2/memory/2968-210-0x00000000049C0000-0x00000000049FF000-memory.dmp family_redline behavioral2/memory/2968-212-0x00000000049C0000-0x00000000049FF000-memory.dmp family_redline behavioral2/memory/2968-214-0x00000000049C0000-0x00000000049FF000-memory.dmp family_redline behavioral2/memory/2968-216-0x00000000049C0000-0x00000000049FF000-memory.dmp family_redline behavioral2/memory/2968-218-0x00000000049C0000-0x00000000049FF000-memory.dmp family_redline behavioral2/memory/2968-220-0x00000000049C0000-0x00000000049FF000-memory.dmp family_redline behavioral2/memory/2968-222-0x00000000049C0000-0x00000000049FF000-memory.dmp family_redline behavioral2/memory/2968-224-0x00000000049C0000-0x00000000049FF000-memory.dmp family_redline behavioral2/memory/2968-226-0x00000000049C0000-0x00000000049FF000-memory.dmp family_redline behavioral2/memory/2968-228-0x00000000049C0000-0x00000000049FF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un595980.exepro8040.exequ6243.exesi657032.exepid process 2776 un595980.exe 5092 pro8040.exe 2968 qu6243.exe 3832 si657032.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro8040.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8040.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8040.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
0cad2cfc06b38439809d62e1c5ca38068fce11b1442dbdb4eaa32e68c2914b55.exeun595980.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0cad2cfc06b38439809d62e1c5ca38068fce11b1442dbdb4eaa32e68c2914b55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0cad2cfc06b38439809d62e1c5ca38068fce11b1442dbdb4eaa32e68c2914b55.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un595980.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un595980.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro8040.exequ6243.exesi657032.exepid process 5092 pro8040.exe 5092 pro8040.exe 2968 qu6243.exe 2968 qu6243.exe 3832 si657032.exe 3832 si657032.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro8040.exequ6243.exesi657032.exedescription pid process Token: SeDebugPrivilege 5092 pro8040.exe Token: SeDebugPrivilege 2968 qu6243.exe Token: SeDebugPrivilege 3832 si657032.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
0cad2cfc06b38439809d62e1c5ca38068fce11b1442dbdb4eaa32e68c2914b55.exeun595980.exedescription pid process target process PID 616 wrote to memory of 2776 616 0cad2cfc06b38439809d62e1c5ca38068fce11b1442dbdb4eaa32e68c2914b55.exe un595980.exe PID 616 wrote to memory of 2776 616 0cad2cfc06b38439809d62e1c5ca38068fce11b1442dbdb4eaa32e68c2914b55.exe un595980.exe PID 616 wrote to memory of 2776 616 0cad2cfc06b38439809d62e1c5ca38068fce11b1442dbdb4eaa32e68c2914b55.exe un595980.exe PID 2776 wrote to memory of 5092 2776 un595980.exe pro8040.exe PID 2776 wrote to memory of 5092 2776 un595980.exe pro8040.exe PID 2776 wrote to memory of 5092 2776 un595980.exe pro8040.exe PID 2776 wrote to memory of 2968 2776 un595980.exe qu6243.exe PID 2776 wrote to memory of 2968 2776 un595980.exe qu6243.exe PID 2776 wrote to memory of 2968 2776 un595980.exe qu6243.exe PID 616 wrote to memory of 3832 616 0cad2cfc06b38439809d62e1c5ca38068fce11b1442dbdb4eaa32e68c2914b55.exe si657032.exe PID 616 wrote to memory of 3832 616 0cad2cfc06b38439809d62e1c5ca38068fce11b1442dbdb4eaa32e68c2914b55.exe si657032.exe PID 616 wrote to memory of 3832 616 0cad2cfc06b38439809d62e1c5ca38068fce11b1442dbdb4eaa32e68c2914b55.exe si657032.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0cad2cfc06b38439809d62e1c5ca38068fce11b1442dbdb4eaa32e68c2914b55.exe"C:\Users\Admin\AppData\Local\Temp\0cad2cfc06b38439809d62e1c5ca38068fce11b1442dbdb4eaa32e68c2914b55.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un595980.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un595980.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8040.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8040.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6243.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6243.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si657032.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si657032.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3832
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD52bf222e554ef91aa5164f6939ff97f4b
SHA16f9ff75bc7226b6f443959f6687e0807e8f878fd
SHA256c0f85885c32b21daba984eb3702115b9fc51f521967bb26c5aa8d0c31b7bda5e
SHA51236bc5169436cfd2826c95b25fca98c61f28bb3ee7586845ea6d2337834445b3fceab43067595c10cb75aad58626fcebecce8c4841fc4f6260d0df71519049cd7
-
Filesize
175KB
MD52bf222e554ef91aa5164f6939ff97f4b
SHA16f9ff75bc7226b6f443959f6687e0807e8f878fd
SHA256c0f85885c32b21daba984eb3702115b9fc51f521967bb26c5aa8d0c31b7bda5e
SHA51236bc5169436cfd2826c95b25fca98c61f28bb3ee7586845ea6d2337834445b3fceab43067595c10cb75aad58626fcebecce8c4841fc4f6260d0df71519049cd7
-
Filesize
544KB
MD569d2c7e7ea6c689537148803cac81c1b
SHA1659e093e72513e2d97b677814318c34c65ea9ad7
SHA256fcfba73e7556e540a132846702b6fcd9d9a6413792bb6a51016ce62ac9cc142b
SHA5129b559f96767faddfdabb4afd919b6f5352fc6636ef8cdaaa4a9c04e1bde1c2d57a3ec10c1136c94817b353a7f1ba03515baf4464bd0dc5e2182f475383496ba1
-
Filesize
544KB
MD569d2c7e7ea6c689537148803cac81c1b
SHA1659e093e72513e2d97b677814318c34c65ea9ad7
SHA256fcfba73e7556e540a132846702b6fcd9d9a6413792bb6a51016ce62ac9cc142b
SHA5129b559f96767faddfdabb4afd919b6f5352fc6636ef8cdaaa4a9c04e1bde1c2d57a3ec10c1136c94817b353a7f1ba03515baf4464bd0dc5e2182f475383496ba1
-
Filesize
325KB
MD568a953b4ff629715b2af924533868e74
SHA1ebaae606c35abff022e31dc7a837caefbe1643bc
SHA2563d95a4d67ddac1ff9da5bcac088b92c37ca0dac25511c50437ce56ec2ca1938c
SHA512194d6eba6ae4ee4a4f6abbfb311c23f65e4463365f02fdd45a06f76a6886add3f885e6f82e4c60cd28e014bf063b405d7b0f4fec289f9777272638cba7f21261
-
Filesize
325KB
MD568a953b4ff629715b2af924533868e74
SHA1ebaae606c35abff022e31dc7a837caefbe1643bc
SHA2563d95a4d67ddac1ff9da5bcac088b92c37ca0dac25511c50437ce56ec2ca1938c
SHA512194d6eba6ae4ee4a4f6abbfb311c23f65e4463365f02fdd45a06f76a6886add3f885e6f82e4c60cd28e014bf063b405d7b0f4fec289f9777272638cba7f21261
-
Filesize
384KB
MD5a679124bde8474a989fc64ba0afe6736
SHA116d715362070afec5a39dd72b92362c2b48fbd04
SHA25601d6b0c952579896a12d8d3b2561dbd5123cfd2c2a7d382cbacf47974a783a40
SHA5125bafbc0c604472ddde4e9997c0edddb66ac3f05e94b5b195cbd4d844dcecbd7b414ce733fda01ccc4188bbe036507d4ff8963fc77f48cea0fa6a60a19d181597
-
Filesize
384KB
MD5a679124bde8474a989fc64ba0afe6736
SHA116d715362070afec5a39dd72b92362c2b48fbd04
SHA25601d6b0c952579896a12d8d3b2561dbd5123cfd2c2a7d382cbacf47974a783a40
SHA5125bafbc0c604472ddde4e9997c0edddb66ac3f05e94b5b195cbd4d844dcecbd7b414ce733fda01ccc4188bbe036507d4ff8963fc77f48cea0fa6a60a19d181597