Analysis
-
max time kernel
50s -
max time network
71s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
01-05-2023 22:47
Static task
static1
Behavioral task
behavioral1
Sample
84deb4d8d09a84288de4cdca1cd0a1eed78e0274461c11239db1507361a89a21.exe
Resource
win10-20230220-en
General
-
Target
84deb4d8d09a84288de4cdca1cd0a1eed78e0274461c11239db1507361a89a21.exe
-
Size
890KB
-
MD5
c7b11512b935231da032058e1c7fe4d3
-
SHA1
ae35c7fec289072d36b5b9835392ffbfb19dd08a
-
SHA256
84deb4d8d09a84288de4cdca1cd0a1eed78e0274461c11239db1507361a89a21
-
SHA512
968f56a9b3ea8e04f76923d1d57791a2f6a690e1c022bb22e5aaa660d09882e70ea6361ace743f3fff1faea915ffe09134c50ae85512dc7958ef9b1b3f9ea83a
-
SSDEEP
12288:4y90CxYWJKHagfrN/55AqlQR+Uy6NUTo85X9ngA9FzN804nvZENlw33z9ukT0:4yrYGK6mJnAxj+rngA9FyvZAmzo00
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dante
185.161.248.73:4164
-
auth_value
f4066af6b8a6f23125c8ee48288a3f90
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" s74998023.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" s74998023.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" s74998023.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" s74998023.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" s74998023.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 3924 y88413588.exe 4960 p04431087.exe 2268 1.exe 2252 r10217544.exe 2764 s74998023.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features s74998023.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" s74998023.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 84deb4d8d09a84288de4cdca1cd0a1eed78e0274461c11239db1507361a89a21.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 84deb4d8d09a84288de4cdca1cd0a1eed78e0274461c11239db1507361a89a21.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y88413588.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y88413588.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2268 1.exe 2252 r10217544.exe 2252 r10217544.exe 2268 1.exe 2764 s74998023.exe 2764 s74998023.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4960 p04431087.exe Token: SeDebugPrivilege 2268 1.exe Token: SeDebugPrivilege 2252 r10217544.exe Token: SeDebugPrivilege 2764 s74998023.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4140 wrote to memory of 3924 4140 84deb4d8d09a84288de4cdca1cd0a1eed78e0274461c11239db1507361a89a21.exe 66 PID 4140 wrote to memory of 3924 4140 84deb4d8d09a84288de4cdca1cd0a1eed78e0274461c11239db1507361a89a21.exe 66 PID 4140 wrote to memory of 3924 4140 84deb4d8d09a84288de4cdca1cd0a1eed78e0274461c11239db1507361a89a21.exe 66 PID 3924 wrote to memory of 4960 3924 y88413588.exe 67 PID 3924 wrote to memory of 4960 3924 y88413588.exe 67 PID 3924 wrote to memory of 4960 3924 y88413588.exe 67 PID 4960 wrote to memory of 2268 4960 p04431087.exe 68 PID 4960 wrote to memory of 2268 4960 p04431087.exe 68 PID 4960 wrote to memory of 2268 4960 p04431087.exe 68 PID 3924 wrote to memory of 2252 3924 y88413588.exe 69 PID 3924 wrote to memory of 2252 3924 y88413588.exe 69 PID 3924 wrote to memory of 2252 3924 y88413588.exe 69 PID 4140 wrote to memory of 2764 4140 84deb4d8d09a84288de4cdca1cd0a1eed78e0274461c11239db1507361a89a21.exe 71 PID 4140 wrote to memory of 2764 4140 84deb4d8d09a84288de4cdca1cd0a1eed78e0274461c11239db1507361a89a21.exe 71 PID 4140 wrote to memory of 2764 4140 84deb4d8d09a84288de4cdca1cd0a1eed78e0274461c11239db1507361a89a21.exe 71
Processes
-
C:\Users\Admin\AppData\Local\Temp\84deb4d8d09a84288de4cdca1cd0a1eed78e0274461c11239db1507361a89a21.exe"C:\Users\Admin\AppData\Local\Temp\84deb4d8d09a84288de4cdca1cd0a1eed78e0274461c11239db1507361a89a21.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y88413588.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y88413588.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p04431087.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p04431087.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2268
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r10217544.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r10217544.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2252
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s74998023.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s74998023.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2764
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344KB
MD5669efc675cfa589709988babe58a3809
SHA12413f181c1bcc85d5ffc917d7cb67b9726472039
SHA25663bfcdb346576792eaea78941b0bc4530838c8a743359cf3357b96cae0c6cde3
SHA512c1d759d0860ffd1a7046ef11b72e1667704c0678ad9b2f1a209495aee949abe7c6bfb59c4044af76acc4ce2c49f4912fde355cd4db8fa630e66e42b48a8ed05e
-
Filesize
344KB
MD5669efc675cfa589709988babe58a3809
SHA12413f181c1bcc85d5ffc917d7cb67b9726472039
SHA25663bfcdb346576792eaea78941b0bc4530838c8a743359cf3357b96cae0c6cde3
SHA512c1d759d0860ffd1a7046ef11b72e1667704c0678ad9b2f1a209495aee949abe7c6bfb59c4044af76acc4ce2c49f4912fde355cd4db8fa630e66e42b48a8ed05e
-
Filesize
590KB
MD59bcfd9b31737bf900ad1e15216c8d8ff
SHA1dc5f533f78315f00cd341142104ddf9dc63abe58
SHA256d9246266b422d208bfa1e213d5cec17b6e2ce6a11630025613c3d5fe7b058817
SHA5120b4650fc6c665435efcf1c73e4f0d61c260ec8828f2f4e7e0cfd38e49659f9b1ad04e74183e4aaa348cc31da63a580144868cbb7bc8d36e8705aa57b1825295d
-
Filesize
590KB
MD59bcfd9b31737bf900ad1e15216c8d8ff
SHA1dc5f533f78315f00cd341142104ddf9dc63abe58
SHA256d9246266b422d208bfa1e213d5cec17b6e2ce6a11630025613c3d5fe7b058817
SHA5120b4650fc6c665435efcf1c73e4f0d61c260ec8828f2f4e7e0cfd38e49659f9b1ad04e74183e4aaa348cc31da63a580144868cbb7bc8d36e8705aa57b1825295d
-
Filesize
530KB
MD58efe9db6782b75bb716a889c987ae588
SHA198d7bc829d5259c393d8fb42a2f440fce59de4f8
SHA256730810098d50b326cebb4d9b6d875b49ffa137cd0761637b024f33e9d7cf3c50
SHA512f9ccc00de67d14def4b510e9fe58726206ace671dc1a7a113620e508ead8635b92ce06ea5984c6dfc75c2f3e722d4162fd60985fe6fe6deca14daba396af2bdb
-
Filesize
530KB
MD58efe9db6782b75bb716a889c987ae588
SHA198d7bc829d5259c393d8fb42a2f440fce59de4f8
SHA256730810098d50b326cebb4d9b6d875b49ffa137cd0761637b024f33e9d7cf3c50
SHA512f9ccc00de67d14def4b510e9fe58726206ace671dc1a7a113620e508ead8635b92ce06ea5984c6dfc75c2f3e722d4162fd60985fe6fe6deca14daba396af2bdb
-
Filesize
168KB
MD5641ded0bf2aab2858dee9b10e68e0533
SHA1849f9f0b0a690e7abe232a8c3ebfca81da37fcf4
SHA256d1634ac362cf4f6b0548c81895b039d8e0761277a906c929bedd056f4a87b48b
SHA51294609bf0ed02777639822bb579100439e4cc35f60a3e8880cf452be397e99d82cb880f92d86ea0c7079d6717823c8855f190a0afe9d9c2d6a7b7c7f225ac147b
-
Filesize
168KB
MD5641ded0bf2aab2858dee9b10e68e0533
SHA1849f9f0b0a690e7abe232a8c3ebfca81da37fcf4
SHA256d1634ac362cf4f6b0548c81895b039d8e0761277a906c929bedd056f4a87b48b
SHA51294609bf0ed02777639822bb579100439e4cc35f60a3e8880cf452be397e99d82cb880f92d86ea0c7079d6717823c8855f190a0afe9d9c2d6a7b7c7f225ac147b
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf