Analysis
-
max time kernel
145s -
max time network
111s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
10-04-2023 21:17
Static task
static1
General
-
Target
8da6ee7b8add1a7f4d15d02fc61ada0cdeffd28f30a9290bfc340174e1fe0781.exe
-
Size
939KB
-
MD5
92547dba42f3d4a4c8fce4da5d3b8f5a
-
SHA1
bdb2c511f35c9fd4767a582949bc71fe1195d3e8
-
SHA256
8da6ee7b8add1a7f4d15d02fc61ada0cdeffd28f30a9290bfc340174e1fe0781
-
SHA512
e66c5b0d726ec58d889f07a1a56a3be1d0aa2dbc1343e18abaf4518f1326fb4fa8ae8f064d45d023bc0d45a8c6d0fafb4b32811b25f20c5be0007e46b7795432
-
SSDEEP
24576:6yGRrKAgP/yFWLBbsx2FuoIFghluXJDoljvtc:BGR2A2Pxsx2TRnSDoh
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
zima
176.113.115.145:4125
-
auth_value
2ef701d510c0d27e8a8e3270281678b1
Signatures
-
Processes:
pr818675.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr818675.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr818675.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr818675.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr818675.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr818675.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/1288-185-0x0000000002130000-0x0000000002176000-memory.dmp family_redline behavioral1/memory/1288-186-0x00000000025E0000-0x0000000002624000-memory.dmp family_redline behavioral1/memory/1288-187-0x00000000025E0000-0x000000000261F000-memory.dmp family_redline behavioral1/memory/1288-188-0x00000000025E0000-0x000000000261F000-memory.dmp family_redline behavioral1/memory/1288-190-0x00000000025E0000-0x000000000261F000-memory.dmp family_redline behavioral1/memory/1288-194-0x00000000025E0000-0x000000000261F000-memory.dmp family_redline behavioral1/memory/1288-198-0x00000000025E0000-0x000000000261F000-memory.dmp family_redline behavioral1/memory/1288-200-0x00000000025E0000-0x000000000261F000-memory.dmp family_redline behavioral1/memory/1288-202-0x00000000025E0000-0x000000000261F000-memory.dmp family_redline behavioral1/memory/1288-204-0x00000000025E0000-0x000000000261F000-memory.dmp family_redline behavioral1/memory/1288-206-0x00000000025E0000-0x000000000261F000-memory.dmp family_redline behavioral1/memory/1288-208-0x00000000025E0000-0x000000000261F000-memory.dmp family_redline behavioral1/memory/1288-210-0x00000000025E0000-0x000000000261F000-memory.dmp family_redline behavioral1/memory/1288-212-0x00000000025E0000-0x000000000261F000-memory.dmp family_redline behavioral1/memory/1288-214-0x00000000025E0000-0x000000000261F000-memory.dmp family_redline behavioral1/memory/1288-216-0x00000000025E0000-0x000000000261F000-memory.dmp family_redline behavioral1/memory/1288-218-0x00000000025E0000-0x000000000261F000-memory.dmp family_redline behavioral1/memory/1288-220-0x00000000025E0000-0x000000000261F000-memory.dmp family_redline behavioral1/memory/1288-222-0x00000000025E0000-0x000000000261F000-memory.dmp family_redline behavioral1/memory/1288-224-0x00000000025E0000-0x000000000261F000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
Processes:
un098047.exeun967455.exepr818675.exequ402761.exerk143509.exesi137010.exepid process 2520 un098047.exe 2904 un967455.exe 3812 pr818675.exe 1288 qu402761.exe 4928 rk143509.exe 3788 si137010.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pr818675.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr818675.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr818675.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
8da6ee7b8add1a7f4d15d02fc61ada0cdeffd28f30a9290bfc340174e1fe0781.exeun098047.exeun967455.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 8da6ee7b8add1a7f4d15d02fc61ada0cdeffd28f30a9290bfc340174e1fe0781.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8da6ee7b8add1a7f4d15d02fc61ada0cdeffd28f30a9290bfc340174e1fe0781.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un098047.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un098047.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un967455.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un967455.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 7 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4040 3788 WerFault.exe si137010.exe 3148 3788 WerFault.exe si137010.exe 4716 3788 WerFault.exe si137010.exe 4352 3788 WerFault.exe si137010.exe 3412 3788 WerFault.exe si137010.exe 760 3788 WerFault.exe si137010.exe 4336 3788 WerFault.exe si137010.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pr818675.exequ402761.exerk143509.exepid process 3812 pr818675.exe 3812 pr818675.exe 1288 qu402761.exe 1288 qu402761.exe 4928 rk143509.exe 4928 rk143509.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pr818675.exequ402761.exerk143509.exedescription pid process Token: SeDebugPrivilege 3812 pr818675.exe Token: SeDebugPrivilege 1288 qu402761.exe Token: SeDebugPrivilege 4928 rk143509.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
8da6ee7b8add1a7f4d15d02fc61ada0cdeffd28f30a9290bfc340174e1fe0781.exeun098047.exeun967455.exedescription pid process target process PID 2284 wrote to memory of 2520 2284 8da6ee7b8add1a7f4d15d02fc61ada0cdeffd28f30a9290bfc340174e1fe0781.exe un098047.exe PID 2284 wrote to memory of 2520 2284 8da6ee7b8add1a7f4d15d02fc61ada0cdeffd28f30a9290bfc340174e1fe0781.exe un098047.exe PID 2284 wrote to memory of 2520 2284 8da6ee7b8add1a7f4d15d02fc61ada0cdeffd28f30a9290bfc340174e1fe0781.exe un098047.exe PID 2520 wrote to memory of 2904 2520 un098047.exe un967455.exe PID 2520 wrote to memory of 2904 2520 un098047.exe un967455.exe PID 2520 wrote to memory of 2904 2520 un098047.exe un967455.exe PID 2904 wrote to memory of 3812 2904 un967455.exe pr818675.exe PID 2904 wrote to memory of 3812 2904 un967455.exe pr818675.exe PID 2904 wrote to memory of 3812 2904 un967455.exe pr818675.exe PID 2904 wrote to memory of 1288 2904 un967455.exe qu402761.exe PID 2904 wrote to memory of 1288 2904 un967455.exe qu402761.exe PID 2904 wrote to memory of 1288 2904 un967455.exe qu402761.exe PID 2520 wrote to memory of 4928 2520 un098047.exe rk143509.exe PID 2520 wrote to memory of 4928 2520 un098047.exe rk143509.exe PID 2520 wrote to memory of 4928 2520 un098047.exe rk143509.exe PID 2284 wrote to memory of 3788 2284 8da6ee7b8add1a7f4d15d02fc61ada0cdeffd28f30a9290bfc340174e1fe0781.exe si137010.exe PID 2284 wrote to memory of 3788 2284 8da6ee7b8add1a7f4d15d02fc61ada0cdeffd28f30a9290bfc340174e1fe0781.exe si137010.exe PID 2284 wrote to memory of 3788 2284 8da6ee7b8add1a7f4d15d02fc61ada0cdeffd28f30a9290bfc340174e1fe0781.exe si137010.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8da6ee7b8add1a7f4d15d02fc61ada0cdeffd28f30a9290bfc340174e1fe0781.exe"C:\Users\Admin\AppData\Local\Temp\8da6ee7b8add1a7f4d15d02fc61ada0cdeffd28f30a9290bfc340174e1fe0781.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un098047.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un098047.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un967455.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un967455.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr818675.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr818675.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu402761.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu402761.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk143509.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk143509.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4928 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si137010.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si137010.exe2⤵
- Executes dropped EXE
PID:3788 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3788 -s 6203⤵
- Program crash
PID:4040 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3788 -s 7003⤵
- Program crash
PID:3148 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3788 -s 7723⤵
- Program crash
PID:4716 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3788 -s 8443⤵
- Program crash
PID:4352 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3788 -s 8763⤵
- Program crash
PID:3412 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3788 -s 7563⤵
- Program crash
PID:760 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3788 -s 10723⤵
- Program crash
PID:4336
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
231KB
MD55a531a1495614605383afe7a35731a7a
SHA1f00c58c5745c7adeb14b5b176fc0cd8d6d694bb6
SHA2562aa40e53a153a68c6fd28793fdd06fa3bcbe4658820261607f6f4f8ecd3b8c2d
SHA512906eb4afa865e09a68e5f40e48837bf576ced8218e8545daa25bd1ac0bea2087f77c9905d143c243cb3cbf04b3472c049620e2b51ccf243ac75f7134376e4aa3
-
Filesize
231KB
MD55a531a1495614605383afe7a35731a7a
SHA1f00c58c5745c7adeb14b5b176fc0cd8d6d694bb6
SHA2562aa40e53a153a68c6fd28793fdd06fa3bcbe4658820261607f6f4f8ecd3b8c2d
SHA512906eb4afa865e09a68e5f40e48837bf576ced8218e8545daa25bd1ac0bea2087f77c9905d143c243cb3cbf04b3472c049620e2b51ccf243ac75f7134376e4aa3
-
Filesize
674KB
MD5bb37510d91485d5248d84af826935052
SHA1c3eb2e1fd5ca8b47927a965784c4d92a90e4128a
SHA256f10e06d50d8514a271e956291ecca191b378c868a11214e0a24573a73c7fad20
SHA512d62234010b916083723a426211d70459b1e227e4bdd506cc5a3b06272f9b91db09b7561c66bc1623ca21f609cb0b56bed05ce38bdf22f0213123051a393707f7
-
Filesize
674KB
MD5bb37510d91485d5248d84af826935052
SHA1c3eb2e1fd5ca8b47927a965784c4d92a90e4128a
SHA256f10e06d50d8514a271e956291ecca191b378c868a11214e0a24573a73c7fad20
SHA512d62234010b916083723a426211d70459b1e227e4bdd506cc5a3b06272f9b91db09b7561c66bc1623ca21f609cb0b56bed05ce38bdf22f0213123051a393707f7
-
Filesize
169KB
MD5e62e94d50978c5bbada3c0277af7909a
SHA12778c40df14b4825c375481ba57fb287a7ed0b3a
SHA25605d28c48aca4a7caa545857d8cf77fd7757f5d172519ca02dbef46b15043815e
SHA5124759f14a6c4263633895f0a97eecedac05fda058c33ef13b53917c6142d7ad0ce6e11a162c2c1e8c2917dec338ef768913318547d9d0a5ec0f09cd6ee54f4e18
-
Filesize
169KB
MD5e62e94d50978c5bbada3c0277af7909a
SHA12778c40df14b4825c375481ba57fb287a7ed0b3a
SHA25605d28c48aca4a7caa545857d8cf77fd7757f5d172519ca02dbef46b15043815e
SHA5124759f14a6c4263633895f0a97eecedac05fda058c33ef13b53917c6142d7ad0ce6e11a162c2c1e8c2917dec338ef768913318547d9d0a5ec0f09cd6ee54f4e18
-
Filesize
520KB
MD56ac607143d6a7d8bbb321703b500ff63
SHA173c03c88311dbe951cea8a7f426c71fe834cbfb8
SHA25659a331fb32727262354e3da58f27ebf5762ab73684a6a45258c0078eae787191
SHA5126851009faadb003b9c0da4632f2c668e0ab46fe69738ac0747972a50f92b3d60c2107230c72bed70baf7d1a5649ec6a881cf2995af66434de9e959cf1e28fa18
-
Filesize
520KB
MD56ac607143d6a7d8bbb321703b500ff63
SHA173c03c88311dbe951cea8a7f426c71fe834cbfb8
SHA25659a331fb32727262354e3da58f27ebf5762ab73684a6a45258c0078eae787191
SHA5126851009faadb003b9c0da4632f2c668e0ab46fe69738ac0747972a50f92b3d60c2107230c72bed70baf7d1a5649ec6a881cf2995af66434de9e959cf1e28fa18
-
Filesize
239KB
MD52079dfd8c9f8bfd0c2e55a5eae289755
SHA13a03e81ce0b6b14a9d6af75957d93a719340059e
SHA25668bdbcc610d4d6b6fe292e52e1b6ef1cb0e1f85f39fc1791e5367b50a01b1019
SHA512021430313c245f81782fbcca25ed9a5f30ebe4c9b98c53b60f4f634ea9959d4fa7cb599b40bcb1bdc786f6cd900d10bf6a61a0ce47ef73e109b14fd9214b9d38
-
Filesize
239KB
MD52079dfd8c9f8bfd0c2e55a5eae289755
SHA13a03e81ce0b6b14a9d6af75957d93a719340059e
SHA25668bdbcc610d4d6b6fe292e52e1b6ef1cb0e1f85f39fc1791e5367b50a01b1019
SHA512021430313c245f81782fbcca25ed9a5f30ebe4c9b98c53b60f4f634ea9959d4fa7cb599b40bcb1bdc786f6cd900d10bf6a61a0ce47ef73e109b14fd9214b9d38
-
Filesize
297KB
MD5e34be74adfe872fb8516f9fa05cd39ab
SHA113ea2e7075f559315d89d9989c168ae2b04da538
SHA2566d205dbc63c0160fe064f97e2640dd3f57e96fb08d2f5b3d2dedbace160ee53e
SHA512af7ee5dc3d8a9d14acefd09ccf1342ae1ccf2d71a74c27d7184ecc1d7929ed993d9ee623a104e899f51237654d7429b0ae977ce784e95705502a08b1e455527e
-
Filesize
297KB
MD5e34be74adfe872fb8516f9fa05cd39ab
SHA113ea2e7075f559315d89d9989c168ae2b04da538
SHA2566d205dbc63c0160fe064f97e2640dd3f57e96fb08d2f5b3d2dedbace160ee53e
SHA512af7ee5dc3d8a9d14acefd09ccf1342ae1ccf2d71a74c27d7184ecc1d7929ed993d9ee623a104e899f51237654d7429b0ae977ce784e95705502a08b1e455527e