Analysis
-
max time kernel
135s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02/05/2023, 03:18
Static task
static1
Behavioral task
behavioral1
Sample
dcf65c2cf0babcb76d18cf50624b855e1ed50ff085bb3d44f0f0494577c41ff7.exe
Resource
win10v2004-20230220-en
General
-
Target
dcf65c2cf0babcb76d18cf50624b855e1ed50ff085bb3d44f0f0494577c41ff7.exe
-
Size
793KB
-
MD5
2268a4562404b7c1933826775aa3c222
-
SHA1
3ca41707b561552de974691010e19d22ce46d524
-
SHA256
dcf65c2cf0babcb76d18cf50624b855e1ed50ff085bb3d44f0f0494577c41ff7
-
SHA512
c9dc903b3a385ccad9670255d1331cf42b662a01891f886ebafbd74fbb73030dc8ebca3c846353233abe05cf6ad47e3df0c75820187dd214d3e0b56d1cf6d4a1
-
SSDEEP
24576:ZydHh9dN21nvRYeKha0DOP8+cXhWb+T0qC:MdHJY1v30OPTcXk+TL
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dante
185.161.248.73:4164
-
auth_value
f4066af6b8a6f23125c8ee48288a3f90
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o64855612.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o64855612.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o64855612.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection o64855612.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o64855612.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o64855612.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation m99987968.exe -
Executes dropped EXE 5 IoCs
pid Process 3880 x47385169.exe 4120 m99987968.exe 3452 1.exe 2708 n31242500.exe 2924 o64855612.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features o64855612.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o64855612.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x47385169.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x47385169.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dcf65c2cf0babcb76d18cf50624b855e1ed50ff085bb3d44f0f0494577c41ff7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" dcf65c2cf0babcb76d18cf50624b855e1ed50ff085bb3d44f0f0494577c41ff7.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4300 4120 WerFault.exe 84 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2708 n31242500.exe 3452 1.exe 2708 n31242500.exe 3452 1.exe 2924 o64855612.exe 2924 o64855612.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4120 m99987968.exe Token: SeDebugPrivilege 2708 n31242500.exe Token: SeDebugPrivilege 3452 1.exe Token: SeDebugPrivilege 2924 o64855612.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1920 wrote to memory of 3880 1920 dcf65c2cf0babcb76d18cf50624b855e1ed50ff085bb3d44f0f0494577c41ff7.exe 83 PID 1920 wrote to memory of 3880 1920 dcf65c2cf0babcb76d18cf50624b855e1ed50ff085bb3d44f0f0494577c41ff7.exe 83 PID 1920 wrote to memory of 3880 1920 dcf65c2cf0babcb76d18cf50624b855e1ed50ff085bb3d44f0f0494577c41ff7.exe 83 PID 3880 wrote to memory of 4120 3880 x47385169.exe 84 PID 3880 wrote to memory of 4120 3880 x47385169.exe 84 PID 3880 wrote to memory of 4120 3880 x47385169.exe 84 PID 4120 wrote to memory of 3452 4120 m99987968.exe 87 PID 4120 wrote to memory of 3452 4120 m99987968.exe 87 PID 4120 wrote to memory of 3452 4120 m99987968.exe 87 PID 3880 wrote to memory of 2708 3880 x47385169.exe 91 PID 3880 wrote to memory of 2708 3880 x47385169.exe 91 PID 3880 wrote to memory of 2708 3880 x47385169.exe 91 PID 1920 wrote to memory of 2924 1920 dcf65c2cf0babcb76d18cf50624b855e1ed50ff085bb3d44f0f0494577c41ff7.exe 95 PID 1920 wrote to memory of 2924 1920 dcf65c2cf0babcb76d18cf50624b855e1ed50ff085bb3d44f0f0494577c41ff7.exe 95 PID 1920 wrote to memory of 2924 1920 dcf65c2cf0babcb76d18cf50624b855e1ed50ff085bb3d44f0f0494577c41ff7.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\dcf65c2cf0babcb76d18cf50624b855e1ed50ff085bb3d44f0f0494577c41ff7.exe"C:\Users\Admin\AppData\Local\Temp\dcf65c2cf0babcb76d18cf50624b855e1ed50ff085bb3d44f0f0494577c41ff7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x47385169.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x47385169.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m99987968.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m99987968.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4120 -s 13764⤵
- Program crash
PID:4300
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n31242500.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n31242500.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2708
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\o64855612.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\o64855612.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4120 -ip 41201⤵PID:3380
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD5a094f169121b8b94cd3f06c90c210743
SHA1424bcedfaab7a19f6ec1ae8e9e31049bc6736a22
SHA2561ccfd5d7a32c8eea20d212d23e9041ad3339991fe4b3986ca5af11b0fe50ea16
SHA5129f90587ed46cfa4f3d0efeac0ff669e17f4596a2ec71d69885832362650c04469feeafd6a0bf6b90a391cc4b41f693a4858ba8f9a126b3f0ca3daec2a9946f60
-
Filesize
176KB
MD5a094f169121b8b94cd3f06c90c210743
SHA1424bcedfaab7a19f6ec1ae8e9e31049bc6736a22
SHA2561ccfd5d7a32c8eea20d212d23e9041ad3339991fe4b3986ca5af11b0fe50ea16
SHA5129f90587ed46cfa4f3d0efeac0ff669e17f4596a2ec71d69885832362650c04469feeafd6a0bf6b90a391cc4b41f693a4858ba8f9a126b3f0ca3daec2a9946f60
-
Filesize
589KB
MD5771bf92802432ba741cd994731779d5a
SHA196344b132338ff45a83e30f5e8af88c752cab397
SHA2569b1172de72a161700019c788c2b65bd7fd1a8be1be59ea0136b8080b9f50e2dc
SHA512785f304dea5398478137d49512ff1bd2bae964d23dfdcdcc3bda946a57839d2dcae6585f62efb59f741c8a67d765559a8fa46b28e15650756c6a94a4a89c2634
-
Filesize
589KB
MD5771bf92802432ba741cd994731779d5a
SHA196344b132338ff45a83e30f5e8af88c752cab397
SHA2569b1172de72a161700019c788c2b65bd7fd1a8be1be59ea0136b8080b9f50e2dc
SHA512785f304dea5398478137d49512ff1bd2bae964d23dfdcdcc3bda946a57839d2dcae6585f62efb59f741c8a67d765559a8fa46b28e15650756c6a94a4a89c2634
-
Filesize
530KB
MD5d4fe896f57e55d601a5b34f537c1aef9
SHA1ada72fe2ee1c96113b2c9804c90afb647fc81a71
SHA25661e3e56f0c89f9f7ae8f4f82d7b6f194dea23b00d38e91fb3defc0643a1affe2
SHA512115d954431b362f663aa6ff71a79dfe80360c2b70abc08cd8afafb0406417411d0f42d9911758bc707dd9200210a004cbe3adbd724ab05aa7a6bd84307ab0330
-
Filesize
530KB
MD5d4fe896f57e55d601a5b34f537c1aef9
SHA1ada72fe2ee1c96113b2c9804c90afb647fc81a71
SHA25661e3e56f0c89f9f7ae8f4f82d7b6f194dea23b00d38e91fb3defc0643a1affe2
SHA512115d954431b362f663aa6ff71a79dfe80360c2b70abc08cd8afafb0406417411d0f42d9911758bc707dd9200210a004cbe3adbd724ab05aa7a6bd84307ab0330
-
Filesize
168KB
MD5f8cc0efeed85cfb6e14e11cfc96bc2f4
SHA1f622555e30e0ce07f5f78ff0c6a6e101ca2a8272
SHA256353e0330b6a17e485708c5bec59170eef1a26da04f4d4f2c269fc677232e7dea
SHA51278515b830a6b72e03f91a0eeca95d812a21bf2ecd29f6af0408382c2719794e89a84aaa68a916b94d705839655685735f1b0ffcd3e1c87394071a192d1b123ba
-
Filesize
168KB
MD5f8cc0efeed85cfb6e14e11cfc96bc2f4
SHA1f622555e30e0ce07f5f78ff0c6a6e101ca2a8272
SHA256353e0330b6a17e485708c5bec59170eef1a26da04f4d4f2c269fc677232e7dea
SHA51278515b830a6b72e03f91a0eeca95d812a21bf2ecd29f6af0408382c2719794e89a84aaa68a916b94d705839655685735f1b0ffcd3e1c87394071a192d1b123ba
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf