Analysis
-
max time kernel
144s -
max time network
93s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
03/05/2023, 17:45
Static task
static1
Behavioral task
behavioral1
Sample
f444cc75ecc83b4a51efb524a7ef9c08767f5347b6974d287d3c348a039a531e.exe
Resource
win10-20230220-en
General
-
Target
f444cc75ecc83b4a51efb524a7ef9c08767f5347b6974d287d3c348a039a531e.exe
-
Size
567KB
-
MD5
99daf4300b4c86edaba87d1016401224
-
SHA1
c0b7ab8d387881b3a273e5a3d14ec1eab718046b
-
SHA256
f444cc75ecc83b4a51efb524a7ef9c08767f5347b6974d287d3c348a039a531e
-
SHA512
2f31d3028cb47090a6cd340f685badbf58b9913c1446e5a98d5d67628d5392bd11f6fab5f4bc4931519dd97ea4e51a5c1abbea14a6b16144410503c822d7e18f
-
SSDEEP
12288:6Mr3y90LhdGp2smzGncldwvT9ARTx8SRMDcEgLT:1y0hd9NKcldOTwPMY9T
Malware Config
Extracted
redline
darm
217.196.96.56:4138
-
auth_value
d88ac8ccc04ab9979b04b46313db1648
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" l6810198.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" l6810198.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" l6810198.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" l6810198.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" l6810198.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 2256 y1874770.exe 2580 k6112013.exe 4224 l6810198.exe 3012 m6777217.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features l6810198.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" l6810198.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f444cc75ecc83b4a51efb524a7ef9c08767f5347b6974d287d3c348a039a531e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f444cc75ecc83b4a51efb524a7ef9c08767f5347b6974d287d3c348a039a531e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y1874770.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y1874770.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 9 IoCs
pid pid_target Process procid_target 4672 3012 WerFault.exe 70 1076 3012 WerFault.exe 70 4788 3012 WerFault.exe 70 4808 3012 WerFault.exe 70 2136 3012 WerFault.exe 70 3860 3012 WerFault.exe 70 4540 3012 WerFault.exe 70 2756 3012 WerFault.exe 70 760 3012 WerFault.exe 70 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2580 k6112013.exe 2580 k6112013.exe 4224 l6810198.exe 4224 l6810198.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2580 k6112013.exe Token: SeDebugPrivilege 4224 l6810198.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3012 m6777217.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2256 2060 f444cc75ecc83b4a51efb524a7ef9c08767f5347b6974d287d3c348a039a531e.exe 66 PID 2060 wrote to memory of 2256 2060 f444cc75ecc83b4a51efb524a7ef9c08767f5347b6974d287d3c348a039a531e.exe 66 PID 2060 wrote to memory of 2256 2060 f444cc75ecc83b4a51efb524a7ef9c08767f5347b6974d287d3c348a039a531e.exe 66 PID 2256 wrote to memory of 2580 2256 y1874770.exe 67 PID 2256 wrote to memory of 2580 2256 y1874770.exe 67 PID 2256 wrote to memory of 2580 2256 y1874770.exe 67 PID 2256 wrote to memory of 4224 2256 y1874770.exe 69 PID 2256 wrote to memory of 4224 2256 y1874770.exe 69 PID 2256 wrote to memory of 4224 2256 y1874770.exe 69 PID 2060 wrote to memory of 3012 2060 f444cc75ecc83b4a51efb524a7ef9c08767f5347b6974d287d3c348a039a531e.exe 70 PID 2060 wrote to memory of 3012 2060 f444cc75ecc83b4a51efb524a7ef9c08767f5347b6974d287d3c348a039a531e.exe 70 PID 2060 wrote to memory of 3012 2060 f444cc75ecc83b4a51efb524a7ef9c08767f5347b6974d287d3c348a039a531e.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\f444cc75ecc83b4a51efb524a7ef9c08767f5347b6974d287d3c348a039a531e.exe"C:\Users\Admin\AppData\Local\Temp\f444cc75ecc83b4a51efb524a7ef9c08767f5347b6974d287d3c348a039a531e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1874770.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1874770.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k6112013.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k6112013.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2580
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l6810198.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l6810198.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4224
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m6777217.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m6777217.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:3012 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3012 -s 6203⤵
- Program crash
PID:4672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3012 -s 7003⤵
- Program crash
PID:1076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3012 -s 8403⤵
- Program crash
PID:4788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3012 -s 8803⤵
- Program crash
PID:4808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3012 -s 8683⤵
- Program crash
PID:2136
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3012 -s 8923⤵
- Program crash
PID:3860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3012 -s 11203⤵
- Program crash
PID:4540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3012 -s 11523⤵
- Program crash
PID:2756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3012 -s 11603⤵
- Program crash
PID:760
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271KB
MD579fc672a1483d585f917bb4a780ae011
SHA1d3ee383f4660af7896a7b918cc5049397168d54c
SHA2566f6ccf5217262c28391bfedee6806f01dd0310cb9292f24863eb94c717312706
SHA512fa479321bd52961052943675139c5ed7de7acecd264dd44cab3b2f93da52f94cc138002cb1f21b7e9c08a3ead32921231da80fd259530fc67dc07cdfff178149
-
Filesize
271KB
MD579fc672a1483d585f917bb4a780ae011
SHA1d3ee383f4660af7896a7b918cc5049397168d54c
SHA2566f6ccf5217262c28391bfedee6806f01dd0310cb9292f24863eb94c717312706
SHA512fa479321bd52961052943675139c5ed7de7acecd264dd44cab3b2f93da52f94cc138002cb1f21b7e9c08a3ead32921231da80fd259530fc67dc07cdfff178149
-
Filesize
307KB
MD5454907a35ecb8ca556196286a993f4d4
SHA150f2b36d908e3b874f399882c47a45b6f9a23997
SHA25659ba74f06965847d6840efe3684134725260a3fd961f291fcf0d23dc98b95fa6
SHA5126e62c9ef1543796f8fad3d2b1045f3be16157719bba3c5a76cdb72a0b277a5671567efe96563410492343772726e0e0ffb552658519f7de831b86bea5b2b5d5e
-
Filesize
307KB
MD5454907a35ecb8ca556196286a993f4d4
SHA150f2b36d908e3b874f399882c47a45b6f9a23997
SHA25659ba74f06965847d6840efe3684134725260a3fd961f291fcf0d23dc98b95fa6
SHA5126e62c9ef1543796f8fad3d2b1045f3be16157719bba3c5a76cdb72a0b277a5671567efe96563410492343772726e0e0ffb552658519f7de831b86bea5b2b5d5e
-
Filesize
168KB
MD5ec918872d78cad1b782b37fb5e4ecb39
SHA1db7d00430f9228e57b1e64acef91a0712f00d9b6
SHA256e2e222aa8f2b683d2646d2942f965e800d30e3ba04c2fa6a2a14b37135279318
SHA512badbefd92f2b190d4c219124d78d50d0d70f845af49b7d934a97502263dab072b4f481439d7285c31f6e595d4a175e9deb220ac9c8e1655546a502559d2fa6ec
-
Filesize
168KB
MD5ec918872d78cad1b782b37fb5e4ecb39
SHA1db7d00430f9228e57b1e64acef91a0712f00d9b6
SHA256e2e222aa8f2b683d2646d2942f965e800d30e3ba04c2fa6a2a14b37135279318
SHA512badbefd92f2b190d4c219124d78d50d0d70f845af49b7d934a97502263dab072b4f481439d7285c31f6e595d4a175e9deb220ac9c8e1655546a502559d2fa6ec
-
Filesize
177KB
MD5d15972a5611924ada84f1587f182514e
SHA1086790c6815593d7efe74ca0c887d39a88a0729b
SHA256182ccde60c380acb150a690a256724091c2d33cfb6bea2b0532e081e6594a300
SHA512cfd75e7521f2d2864ea1f0ced4f61dc098884bc36ada51b44a56d45f223c8fdf90d161e53a08555b5139f7163659f3a2b659eb5986cd69b0f0ed374a2354d64d
-
Filesize
177KB
MD5d15972a5611924ada84f1587f182514e
SHA1086790c6815593d7efe74ca0c887d39a88a0729b
SHA256182ccde60c380acb150a690a256724091c2d33cfb6bea2b0532e081e6594a300
SHA512cfd75e7521f2d2864ea1f0ced4f61dc098884bc36ada51b44a56d45f223c8fdf90d161e53a08555b5139f7163659f3a2b659eb5986cd69b0f0ed374a2354d64d