Analysis
-
max time kernel
146s -
max time network
131s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
03/05/2023, 17:42
Static task
static1
Behavioral task
behavioral1
Sample
009f8dc7aa023c97fddec135cd86c68a9478f115014e7fd72c3bea76388cf75e.exe
Resource
win10-20230220-en
General
-
Target
009f8dc7aa023c97fddec135cd86c68a9478f115014e7fd72c3bea76388cf75e.exe
-
Size
643KB
-
MD5
29858890051ad74ed52b303195ff9f21
-
SHA1
67b2ebdbe72ef72d92623994c8e10f020723b46e
-
SHA256
009f8dc7aa023c97fddec135cd86c68a9478f115014e7fd72c3bea76388cf75e
-
SHA512
70e8649db5b4f5491a15d95935fb17149b63d1cdf6288ae61dc15b3224a5d4496ae2d952f59306f385395af9aab209eb9a015fa6ba3c99f04fd05c3830deee6c
-
SSDEEP
12288:iMrny90Fr91Rz9HLgrhYa/R8AlyQbxmo6Jb/BiZnN4b8YmZS5cs:lykjL0Lp8PMKJ1EnNwFmZSis
Malware Config
Extracted
redline
darm
217.196.96.56:4138
-
auth_value
d88ac8ccc04ab9979b04b46313db1648
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h4284535.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h4284535.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h4284535.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h4284535.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h4284535.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 2368 x7985417.exe 2664 g9156487.exe 4636 h4284535.exe 3756 i6095783.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h4284535.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h4284535.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x7985417.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x7985417.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 009f8dc7aa023c97fddec135cd86c68a9478f115014e7fd72c3bea76388cf75e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 009f8dc7aa023c97fddec135cd86c68a9478f115014e7fd72c3bea76388cf75e.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 9 IoCs
pid pid_target Process procid_target 4832 3756 WerFault.exe 70 4316 3756 WerFault.exe 70 4928 3756 WerFault.exe 70 2588 3756 WerFault.exe 70 4700 3756 WerFault.exe 70 2088 3756 WerFault.exe 70 3516 3756 WerFault.exe 70 812 3756 WerFault.exe 70 4956 3756 WerFault.exe 70 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2664 g9156487.exe 2664 g9156487.exe 4636 h4284535.exe 4636 h4284535.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2664 g9156487.exe Token: SeDebugPrivilege 4636 h4284535.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3756 i6095783.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2052 wrote to memory of 2368 2052 009f8dc7aa023c97fddec135cd86c68a9478f115014e7fd72c3bea76388cf75e.exe 66 PID 2052 wrote to memory of 2368 2052 009f8dc7aa023c97fddec135cd86c68a9478f115014e7fd72c3bea76388cf75e.exe 66 PID 2052 wrote to memory of 2368 2052 009f8dc7aa023c97fddec135cd86c68a9478f115014e7fd72c3bea76388cf75e.exe 66 PID 2368 wrote to memory of 2664 2368 x7985417.exe 67 PID 2368 wrote to memory of 2664 2368 x7985417.exe 67 PID 2368 wrote to memory of 2664 2368 x7985417.exe 67 PID 2368 wrote to memory of 4636 2368 x7985417.exe 69 PID 2368 wrote to memory of 4636 2368 x7985417.exe 69 PID 2368 wrote to memory of 4636 2368 x7985417.exe 69 PID 2052 wrote to memory of 3756 2052 009f8dc7aa023c97fddec135cd86c68a9478f115014e7fd72c3bea76388cf75e.exe 70 PID 2052 wrote to memory of 3756 2052 009f8dc7aa023c97fddec135cd86c68a9478f115014e7fd72c3bea76388cf75e.exe 70 PID 2052 wrote to memory of 3756 2052 009f8dc7aa023c97fddec135cd86c68a9478f115014e7fd72c3bea76388cf75e.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\009f8dc7aa023c97fddec135cd86c68a9478f115014e7fd72c3bea76388cf75e.exe"C:\Users\Admin\AppData\Local\Temp\009f8dc7aa023c97fddec135cd86c68a9478f115014e7fd72c3bea76388cf75e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7985417.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7985417.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g9156487.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g9156487.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2664
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4284535.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4284535.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4636
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i6095783.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i6095783.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:3756 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3756 -s 6203⤵
- Program crash
PID:4832
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3756 -s 7123⤵
- Program crash
PID:4316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3756 -s 8403⤵
- Program crash
PID:4928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3756 -s 8483⤵
- Program crash
PID:2588
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3756 -s 8763⤵
- Program crash
PID:4700
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3756 -s 8403⤵
- Program crash
PID:2088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3756 -s 11243⤵
- Program crash
PID:3516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3756 -s 11563⤵
- Program crash
PID:812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3756 -s 11443⤵
- Program crash
PID:4956
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271KB
MD5d48b7d2aae5539fd75a388c79d9bc9eb
SHA1d841865b426e503ed1e7e1f2f564c16344d2b8a8
SHA256d07c631a6c5db5a2e17f8d382a3f1b143f86e28c27e019530293abb87a73a9e7
SHA5123e852fdf9c923895d3229a93999b1ab5051cbad12aa224cfefa4cdc99ee05ffe754684f1ac2d4834b54a6535164bb47262e9e26f54b02191f3239e1372c9f4aa
-
Filesize
271KB
MD5d48b7d2aae5539fd75a388c79d9bc9eb
SHA1d841865b426e503ed1e7e1f2f564c16344d2b8a8
SHA256d07c631a6c5db5a2e17f8d382a3f1b143f86e28c27e019530293abb87a73a9e7
SHA5123e852fdf9c923895d3229a93999b1ab5051cbad12aa224cfefa4cdc99ee05ffe754684f1ac2d4834b54a6535164bb47262e9e26f54b02191f3239e1372c9f4aa
-
Filesize
383KB
MD55d2b318a0d9992bb58d8dc7090c5a26b
SHA13496f2dad79c1035a84d5362c72ed91b0d22bf02
SHA256020d3dc25038d6c3ab0c237c4be2c533885fc4e105aaf657d90f93da471c7f7a
SHA512c6a50184553565a49099c09afbe6769c8265fb3dab73225daec90fb942ffef273893fcd57b56bb14e0dc179774cd709ad250ab2278ad92ff38f67e1d37f8790f
-
Filesize
383KB
MD55d2b318a0d9992bb58d8dc7090c5a26b
SHA13496f2dad79c1035a84d5362c72ed91b0d22bf02
SHA256020d3dc25038d6c3ab0c237c4be2c533885fc4e105aaf657d90f93da471c7f7a
SHA512c6a50184553565a49099c09afbe6769c8265fb3dab73225daec90fb942ffef273893fcd57b56bb14e0dc179774cd709ad250ab2278ad92ff38f67e1d37f8790f
-
Filesize
168KB
MD54fe8d66c297eb2f59a08afa04721c48a
SHA144d7b6d8f22b87ebad7af7eb6b814fc9c4e49313
SHA25652dae3ad409cba892826cf298c4907f6554c83d8d70433f0ede559d01ae365ef
SHA512ffe300b0b39c92f06b6bd45a3a0fa1e106a95690fc944e975cfa4560130270692744bf132adac3db23e0966c800061927e77d74a6ef89807cfef00d99eadbeb4
-
Filesize
168KB
MD54fe8d66c297eb2f59a08afa04721c48a
SHA144d7b6d8f22b87ebad7af7eb6b814fc9c4e49313
SHA25652dae3ad409cba892826cf298c4907f6554c83d8d70433f0ede559d01ae365ef
SHA512ffe300b0b39c92f06b6bd45a3a0fa1e106a95690fc944e975cfa4560130270692744bf132adac3db23e0966c800061927e77d74a6ef89807cfef00d99eadbeb4
-
Filesize
291KB
MD5a0eee3fb123cfe4cdac09ec33c61a4d5
SHA1de76d87177bec3be716f6168b024575b2f97cd02
SHA2561a45c3bbc4c93ed02eb68062bd99c7b03f6c7ff77523e8c90abd62b078336ffd
SHA51262c03fe5179f8a332f85d2f5e57d953e31d17f85001e6760f151bb37c4e8ea2dc824c94cb37acf9ce332fb6da5f48377219ae14820b092c9357ed52338cb66b0
-
Filesize
291KB
MD5a0eee3fb123cfe4cdac09ec33c61a4d5
SHA1de76d87177bec3be716f6168b024575b2f97cd02
SHA2561a45c3bbc4c93ed02eb68062bd99c7b03f6c7ff77523e8c90abd62b078336ffd
SHA51262c03fe5179f8a332f85d2f5e57d953e31d17f85001e6760f151bb37c4e8ea2dc824c94cb37acf9ce332fb6da5f48377219ae14820b092c9357ed52338cb66b0