Analysis
-
max time kernel
90s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02/05/2023, 07:44
Static task
static1
Behavioral task
behavioral1
Sample
6e29abe52375408e42c3a9cb9ff421d22872e51983c6dff59788ae0e09b29b65.exe
Resource
win10v2004-20230220-en
General
-
Target
6e29abe52375408e42c3a9cb9ff421d22872e51983c6dff59788ae0e09b29b65.exe
-
Size
849KB
-
MD5
00fef243108a8b82413db2561578cae4
-
SHA1
20ce8e4a9cfaaad8f006902bf02f48fea066e7db
-
SHA256
6e29abe52375408e42c3a9cb9ff421d22872e51983c6dff59788ae0e09b29b65
-
SHA512
310159c5cf7bb2e33d3885daa67b184a54fc7d206b91205f6aff4406afaacb21a8b26d3727563bf0b0b3341db70064fb6621cfd78c34b01e237f0fae25dbfcf1
-
SSDEEP
24576:4yw7e1KyMgHygNOPTOODBY3GXZOwKRqfM4l:/pQaHyhdYAX
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dante
185.161.248.73:4164
-
auth_value
f4066af6b8a6f23125c8ee48288a3f90
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" s06020330.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" s06020330.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection s06020330.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" s06020330.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" s06020330.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" s06020330.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation p17687719.exe -
Executes dropped EXE 5 IoCs
pid Process 3212 y48409278.exe 1288 p17687719.exe 1476 1.exe 4444 r91556505.exe 5008 s06020330.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features s06020330.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" s06020330.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y48409278.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6e29abe52375408e42c3a9cb9ff421d22872e51983c6dff59788ae0e09b29b65.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6e29abe52375408e42c3a9cb9ff421d22872e51983c6dff59788ae0e09b29b65.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y48409278.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1844 1288 WerFault.exe 80 3236 5008 WerFault.exe 94 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1476 1.exe 1476 1.exe 4444 r91556505.exe 4444 r91556505.exe 5008 s06020330.exe 5008 s06020330.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1288 p17687719.exe Token: SeDebugPrivilege 1476 1.exe Token: SeDebugPrivilege 4444 r91556505.exe Token: SeDebugPrivilege 5008 s06020330.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 384 wrote to memory of 3212 384 6e29abe52375408e42c3a9cb9ff421d22872e51983c6dff59788ae0e09b29b65.exe 79 PID 384 wrote to memory of 3212 384 6e29abe52375408e42c3a9cb9ff421d22872e51983c6dff59788ae0e09b29b65.exe 79 PID 384 wrote to memory of 3212 384 6e29abe52375408e42c3a9cb9ff421d22872e51983c6dff59788ae0e09b29b65.exe 79 PID 3212 wrote to memory of 1288 3212 y48409278.exe 80 PID 3212 wrote to memory of 1288 3212 y48409278.exe 80 PID 3212 wrote to memory of 1288 3212 y48409278.exe 80 PID 1288 wrote to memory of 1476 1288 p17687719.exe 84 PID 1288 wrote to memory of 1476 1288 p17687719.exe 84 PID 1288 wrote to memory of 1476 1288 p17687719.exe 84 PID 3212 wrote to memory of 4444 3212 y48409278.exe 90 PID 3212 wrote to memory of 4444 3212 y48409278.exe 90 PID 3212 wrote to memory of 4444 3212 y48409278.exe 90 PID 384 wrote to memory of 5008 384 6e29abe52375408e42c3a9cb9ff421d22872e51983c6dff59788ae0e09b29b65.exe 94 PID 384 wrote to memory of 5008 384 6e29abe52375408e42c3a9cb9ff421d22872e51983c6dff59788ae0e09b29b65.exe 94 PID 384 wrote to memory of 5008 384 6e29abe52375408e42c3a9cb9ff421d22872e51983c6dff59788ae0e09b29b65.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e29abe52375408e42c3a9cb9ff421d22872e51983c6dff59788ae0e09b29b65.exe"C:\Users\Admin\AppData\Local\Temp\6e29abe52375408e42c3a9cb9ff421d22872e51983c6dff59788ae0e09b29b65.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y48409278.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y48409278.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p17687719.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p17687719.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1288 -s 15284⤵
- Program crash
PID:1844
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r91556505.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r91556505.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4444
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s06020330.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s06020330.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5008 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5008 -s 10803⤵
- Program crash
PID:3236
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1288 -ip 12881⤵PID:1996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 5008 -ip 50081⤵PID:1544
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
294KB
MD51de90774a36d9b52369e89cb23a06ffb
SHA1158dfaf81687b55a0375369d07a3f266978e9fce
SHA256068f8fce5f14532ca0886bae6506c39970ff6f5d470237ba1233353c0e6569b4
SHA512ed982f45cff1c27b9aad2071087f0d9a9083ae63f62e49a9f462a1479b478957ec370997dd6bc1e4f7147bc0bf8b3922535fcbfc0e30a4cd1b7d53694337cd37
-
Filesize
294KB
MD51de90774a36d9b52369e89cb23a06ffb
SHA1158dfaf81687b55a0375369d07a3f266978e9fce
SHA256068f8fce5f14532ca0886bae6506c39970ff6f5d470237ba1233353c0e6569b4
SHA512ed982f45cff1c27b9aad2071087f0d9a9083ae63f62e49a9f462a1479b478957ec370997dd6bc1e4f7147bc0bf8b3922535fcbfc0e30a4cd1b7d53694337cd37
-
Filesize
569KB
MD506785247019760d7f86bb5e4deea4400
SHA156a8483361016750b4bc05bc9dd561e8ae877620
SHA256a84e857c1370c1e721102be5863e655a05c4c8aa8ef09f5133654e064eff3dfe
SHA512f78be0203b765147bb110ddad2dd102f2565832ba07e089ae469f6c988d5b4eacf50535f6818aa19f02a186f87e20e860b4cb6d4b3fea646852ff58a354456d4
-
Filesize
569KB
MD506785247019760d7f86bb5e4deea4400
SHA156a8483361016750b4bc05bc9dd561e8ae877620
SHA256a84e857c1370c1e721102be5863e655a05c4c8aa8ef09f5133654e064eff3dfe
SHA512f78be0203b765147bb110ddad2dd102f2565832ba07e089ae469f6c988d5b4eacf50535f6818aa19f02a186f87e20e860b4cb6d4b3fea646852ff58a354456d4
-
Filesize
479KB
MD56801d2d22a9762428ffa87af84370a1e
SHA1228bfcf90ae47353809051c595bd964bf4b3542a
SHA2562d626212794b7b33ef493611506839c4e4db04cef6f77150f5853e2f44abcfa6
SHA512bf6a7ab4e32a16d5f5a7117a37a5c1c0d9efcd48b056d0267752dafb6fefc428718efafb71454299039b6d488f8229835f5f1455c68d7d8c44c92271d7913172
-
Filesize
479KB
MD56801d2d22a9762428ffa87af84370a1e
SHA1228bfcf90ae47353809051c595bd964bf4b3542a
SHA2562d626212794b7b33ef493611506839c4e4db04cef6f77150f5853e2f44abcfa6
SHA512bf6a7ab4e32a16d5f5a7117a37a5c1c0d9efcd48b056d0267752dafb6fefc428718efafb71454299039b6d488f8229835f5f1455c68d7d8c44c92271d7913172
-
Filesize
169KB
MD519fbe6da5616752a9597cc1172374f9c
SHA146554141a875d93cbb905cb18bdef76acad0d6dc
SHA2566b37f5630a8eb4f1cf9000c8a2b801f8d4ea32c0ca8d17ac5e98e00811d9ccb5
SHA51260bc1cd75773401631b74779b2bd6009f4d6ba76c91ec0de2bbee0cbb8eda1a45d3f0b9c2af3f04bd8121e6ca4d449134e92450d377be5f47d149989ca34e316
-
Filesize
169KB
MD519fbe6da5616752a9597cc1172374f9c
SHA146554141a875d93cbb905cb18bdef76acad0d6dc
SHA2566b37f5630a8eb4f1cf9000c8a2b801f8d4ea32c0ca8d17ac5e98e00811d9ccb5
SHA51260bc1cd75773401631b74779b2bd6009f4d6ba76c91ec0de2bbee0cbb8eda1a45d3f0b9c2af3f04bd8121e6ca4d449134e92450d377be5f47d149989ca34e316
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf