Analysis
-
max time kernel
144s -
max time network
92s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
03/05/2023, 20:59
Static task
static1
Behavioral task
behavioral1
Sample
b6edffb354a9ba86f3b231c852efa52e0d70e1c6344d5852137851e9d9c396aa.exe
Resource
win10-20230220-en
General
-
Target
b6edffb354a9ba86f3b231c852efa52e0d70e1c6344d5852137851e9d9c396aa.exe
-
Size
566KB
-
MD5
3018e1b1a967b8b7dee26d6bccd2d479
-
SHA1
b5579dac9d1a8ac7771660d98e35ff3095a3c101
-
SHA256
b6edffb354a9ba86f3b231c852efa52e0d70e1c6344d5852137851e9d9c396aa
-
SHA512
6e837fd5e18dfa9bf82f6708b1dc9c23ca39eaad34ebf826bfbc5c5df3c6f0367c5a0ee3a07bacf21732c33b99fde158c975feca96bf4a4ad64175b9d95a7f97
-
SSDEEP
12288:4Mrzy90GRqejk2BC/7ATDfSH1MyprE79IaLCNm8h725J:byrjk2BCkv6HFrs9I4I7yJ
Malware Config
Extracted
redline
darm
217.196.96.56:4138
-
auth_value
d88ac8ccc04ab9979b04b46313db1648
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" l7352402.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" l7352402.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" l7352402.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" l7352402.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" l7352402.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 2052 y7726120.exe 4316 k8961287.exe 1088 l7352402.exe 3788 m5035530.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features l7352402.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" l7352402.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b6edffb354a9ba86f3b231c852efa52e0d70e1c6344d5852137851e9d9c396aa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y7726120.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y7726120.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b6edffb354a9ba86f3b231c852efa52e0d70e1c6344d5852137851e9d9c396aa.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 9 IoCs
pid pid_target Process procid_target 3728 3788 WerFault.exe 70 4820 3788 WerFault.exe 70 3052 3788 WerFault.exe 70 60 3788 WerFault.exe 70 796 3788 WerFault.exe 70 4372 3788 WerFault.exe 70 4416 3788 WerFault.exe 70 4424 3788 WerFault.exe 70 4336 3788 WerFault.exe 70 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4316 k8961287.exe 4316 k8961287.exe 1088 l7352402.exe 1088 l7352402.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4316 k8961287.exe Token: SeDebugPrivilege 1088 l7352402.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3788 m5035530.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1760 wrote to memory of 2052 1760 b6edffb354a9ba86f3b231c852efa52e0d70e1c6344d5852137851e9d9c396aa.exe 66 PID 1760 wrote to memory of 2052 1760 b6edffb354a9ba86f3b231c852efa52e0d70e1c6344d5852137851e9d9c396aa.exe 66 PID 1760 wrote to memory of 2052 1760 b6edffb354a9ba86f3b231c852efa52e0d70e1c6344d5852137851e9d9c396aa.exe 66 PID 2052 wrote to memory of 4316 2052 y7726120.exe 67 PID 2052 wrote to memory of 4316 2052 y7726120.exe 67 PID 2052 wrote to memory of 4316 2052 y7726120.exe 67 PID 2052 wrote to memory of 1088 2052 y7726120.exe 69 PID 2052 wrote to memory of 1088 2052 y7726120.exe 69 PID 2052 wrote to memory of 1088 2052 y7726120.exe 69 PID 1760 wrote to memory of 3788 1760 b6edffb354a9ba86f3b231c852efa52e0d70e1c6344d5852137851e9d9c396aa.exe 70 PID 1760 wrote to memory of 3788 1760 b6edffb354a9ba86f3b231c852efa52e0d70e1c6344d5852137851e9d9c396aa.exe 70 PID 1760 wrote to memory of 3788 1760 b6edffb354a9ba86f3b231c852efa52e0d70e1c6344d5852137851e9d9c396aa.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6edffb354a9ba86f3b231c852efa52e0d70e1c6344d5852137851e9d9c396aa.exe"C:\Users\Admin\AppData\Local\Temp\b6edffb354a9ba86f3b231c852efa52e0d70e1c6344d5852137851e9d9c396aa.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7726120.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7726120.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k8961287.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k8961287.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4316
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l7352402.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l7352402.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1088
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m5035530.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m5035530.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:3788 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3788 -s 6163⤵
- Program crash
PID:3728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3788 -s 6963⤵
- Program crash
PID:4820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3788 -s 8003⤵
- Program crash
PID:3052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3788 -s 8363⤵
- Program crash
PID:60
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3788 -s 8723⤵
- Program crash
PID:796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3788 -s 8803⤵
- Program crash
PID:4372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3788 -s 11243⤵
- Program crash
PID:4416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3788 -s 11763⤵
- Program crash
PID:4424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3788 -s 12323⤵
- Program crash
PID:4336
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
268KB
MD5a4eb4e137792b30be6d940d42de0f60b
SHA1032d66d7c7fa344500d60a94eef5c8bed10097b1
SHA256239c3be17117f8f51c44b8f5f532902914308360a13a71e6107f82b3eb375406
SHA512c2fe547fe386d13ea2ed9154ca7521d2608c57c45b7d8cfbdf8845fb92b89c918f04ae21b703cb663c71a9645dae19828ac44d2f68ff43d675909dbda710d485
-
Filesize
268KB
MD5a4eb4e137792b30be6d940d42de0f60b
SHA1032d66d7c7fa344500d60a94eef5c8bed10097b1
SHA256239c3be17117f8f51c44b8f5f532902914308360a13a71e6107f82b3eb375406
SHA512c2fe547fe386d13ea2ed9154ca7521d2608c57c45b7d8cfbdf8845fb92b89c918f04ae21b703cb663c71a9645dae19828ac44d2f68ff43d675909dbda710d485
-
Filesize
307KB
MD5f2070eeeea1abf39df1d33b58fe9e08d
SHA12906ca832dcb9872ca9ace5df0aa169046ce0914
SHA2561a50e0125188669d086effe741fc9d31658aab155c8e5569bc13225c29b5c1f7
SHA5120d3f5d2be53195e9159bb2d8b235568909c438a044fe7a72c61a065966e15622e8a1fcc1ead51355fda21feab45f0850ff23152587219dfe9cd8ac9b41a45c43
-
Filesize
307KB
MD5f2070eeeea1abf39df1d33b58fe9e08d
SHA12906ca832dcb9872ca9ace5df0aa169046ce0914
SHA2561a50e0125188669d086effe741fc9d31658aab155c8e5569bc13225c29b5c1f7
SHA5120d3f5d2be53195e9159bb2d8b235568909c438a044fe7a72c61a065966e15622e8a1fcc1ead51355fda21feab45f0850ff23152587219dfe9cd8ac9b41a45c43
-
Filesize
168KB
MD5615c4d3fc81e66018298444d66df53a2
SHA11b6ff8670337f3df2bacf6aaa625b493ae7ec90e
SHA256e5ce3b8c6d634181ad63d1c75d21053f1140753c45e609a1b1526c7d79fca03d
SHA5123d3c18209422897c58ce6eddc99bdbcc4545b870070ef9bac1143cd6001e7e07cd69d1a3fad59243d5ec47838507abfada5c64d541caa4f0c4f4c3d3235e50f1
-
Filesize
168KB
MD5615c4d3fc81e66018298444d66df53a2
SHA11b6ff8670337f3df2bacf6aaa625b493ae7ec90e
SHA256e5ce3b8c6d634181ad63d1c75d21053f1140753c45e609a1b1526c7d79fca03d
SHA5123d3c18209422897c58ce6eddc99bdbcc4545b870070ef9bac1143cd6001e7e07cd69d1a3fad59243d5ec47838507abfada5c64d541caa4f0c4f4c3d3235e50f1
-
Filesize
178KB
MD546caf90e940afa162c0c30a5e07934d5
SHA1cf781e9a7e5b9f2a3f079a8392c838adc0c7a187
SHA2566b950428b745a73b7ec23f170c990c2f32a3f0cdbc28d66b6d3d83c26f2a8ebd
SHA51229f4b0ab42ef094c2b65e21e9af576c924a89a595016fa5b536f8524c7d70361182327b3b7b01fffb0391d8c8f88f81ca0ead736c8d570ea663b0774c7cf0223
-
Filesize
178KB
MD546caf90e940afa162c0c30a5e07934d5
SHA1cf781e9a7e5b9f2a3f079a8392c838adc0c7a187
SHA2566b950428b745a73b7ec23f170c990c2f32a3f0cdbc28d66b6d3d83c26f2a8ebd
SHA51229f4b0ab42ef094c2b65e21e9af576c924a89a595016fa5b536f8524c7d70361182327b3b7b01fffb0391d8c8f88f81ca0ead736c8d570ea663b0774c7cf0223