Analysis
-
max time kernel
146s -
max time network
94s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
04/05/2023, 07:48
Static task
static1
Behavioral task
behavioral1
Sample
be76a066b210baca199783fa8738a670e904db65263f726c3c160783fae708e0.exe
Resource
win10-20230220-en
General
-
Target
be76a066b210baca199783fa8738a670e904db65263f726c3c160783fae708e0.exe
-
Size
1.5MB
-
MD5
09561a100b1576f09fb7f518174bed05
-
SHA1
5916ee531c7a10e4ec5e601695370a211d3d1c16
-
SHA256
be76a066b210baca199783fa8738a670e904db65263f726c3c160783fae708e0
-
SHA512
656515275c790f298aa8e9ccb158f28a3434777742bb7c30a727a8a964b22d86db555ce9fbd7ceadc688c3b2e2fc0c391be61ae2b6468c660a7909e99c57373c
-
SSDEEP
49152:juLgpUVaEEo2fmX0FZDfQT9K1btlHOqnU:7pFEFymeDf7fHRU
Malware Config
Extracted
redline
mazda
217.196.96.56:4138
-
auth_value
3d2870537d84a4c6d7aeecd002871c51
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a7035701.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a7035701.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a7035701.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a7035701.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a7035701.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 4556 v3875541.exe 4752 v1864090.exe 4824 v3094298.exe 4904 v5794959.exe 4948 a7035701.exe 3648 b5506962.exe 4416 c0710220.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a7035701.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a7035701.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v3875541.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v3094298.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v3094298.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v5794959.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v3875541.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" be76a066b210baca199783fa8738a670e904db65263f726c3c160783fae708e0.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v1864090.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v1864090.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v5794959.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce be76a066b210baca199783fa8738a670e904db65263f726c3c160783fae708e0.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 9 IoCs
pid pid_target Process procid_target 4376 4416 WerFault.exe 73 3080 4416 WerFault.exe 73 5000 4416 WerFault.exe 73 4224 4416 WerFault.exe 73 4984 4416 WerFault.exe 73 3852 4416 WerFault.exe 73 1500 4416 WerFault.exe 73 3204 4416 WerFault.exe 73 1000 4416 WerFault.exe 73 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4948 a7035701.exe 4948 a7035701.exe 3648 b5506962.exe 3648 b5506962.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4948 a7035701.exe Token: SeDebugPrivilege 3648 b5506962.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4416 c0710220.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4188 wrote to memory of 4556 4188 be76a066b210baca199783fa8738a670e904db65263f726c3c160783fae708e0.exe 66 PID 4188 wrote to memory of 4556 4188 be76a066b210baca199783fa8738a670e904db65263f726c3c160783fae708e0.exe 66 PID 4188 wrote to memory of 4556 4188 be76a066b210baca199783fa8738a670e904db65263f726c3c160783fae708e0.exe 66 PID 4556 wrote to memory of 4752 4556 v3875541.exe 67 PID 4556 wrote to memory of 4752 4556 v3875541.exe 67 PID 4556 wrote to memory of 4752 4556 v3875541.exe 67 PID 4752 wrote to memory of 4824 4752 v1864090.exe 68 PID 4752 wrote to memory of 4824 4752 v1864090.exe 68 PID 4752 wrote to memory of 4824 4752 v1864090.exe 68 PID 4824 wrote to memory of 4904 4824 v3094298.exe 69 PID 4824 wrote to memory of 4904 4824 v3094298.exe 69 PID 4824 wrote to memory of 4904 4824 v3094298.exe 69 PID 4904 wrote to memory of 4948 4904 v5794959.exe 70 PID 4904 wrote to memory of 4948 4904 v5794959.exe 70 PID 4904 wrote to memory of 4948 4904 v5794959.exe 70 PID 4904 wrote to memory of 3648 4904 v5794959.exe 71 PID 4904 wrote to memory of 3648 4904 v5794959.exe 71 PID 4904 wrote to memory of 3648 4904 v5794959.exe 71 PID 4824 wrote to memory of 4416 4824 v3094298.exe 73 PID 4824 wrote to memory of 4416 4824 v3094298.exe 73 PID 4824 wrote to memory of 4416 4824 v3094298.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\be76a066b210baca199783fa8738a670e904db65263f726c3c160783fae708e0.exe"C:\Users\Admin\AppData\Local\Temp\be76a066b210baca199783fa8738a670e904db65263f726c3c160783fae708e0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3875541.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3875541.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1864090.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1864090.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3094298.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3094298.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v5794959.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v5794959.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a7035701.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a7035701.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4948
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b5506962.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b5506962.exe6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3648
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c0710220.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c0710220.exe5⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:4416 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4416 -s 6246⤵
- Program crash
PID:4376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4416 -s 7046⤵
- Program crash
PID:3080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4416 -s 8446⤵
- Program crash
PID:5000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4416 -s 8526⤵
- Program crash
PID:4224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4416 -s 8926⤵
- Program crash
PID:4984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4416 -s 8126⤵
- Program crash
PID:3852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4416 -s 11246⤵
- Program crash
PID:1500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4416 -s 11566⤵
- Program crash
PID:3204
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4416 -s 11806⤵
- Program crash
PID:1000
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD55dae4e1904b309eb772966ff932ad006
SHA14aeb588c4918f912f5d04164db5c97b3493886ae
SHA25695ecb8db2ef445db93c42e4363baee54b719b6ddf3dcd730b471b288805b5825
SHA5127aef43a451a1db000ff9dab4ca2628bfe9c92968d358098c4602e92004ef00a9919607f6e357e02e13db8016a12339ce546be6a164aad63320e127b082369be9
-
Filesize
1.4MB
MD55dae4e1904b309eb772966ff932ad006
SHA14aeb588c4918f912f5d04164db5c97b3493886ae
SHA25695ecb8db2ef445db93c42e4363baee54b719b6ddf3dcd730b471b288805b5825
SHA5127aef43a451a1db000ff9dab4ca2628bfe9c92968d358098c4602e92004ef00a9919607f6e357e02e13db8016a12339ce546be6a164aad63320e127b082369be9
-
Filesize
915KB
MD56931b76644bcd76f2fac255b0295fb26
SHA18b8b8b0fc31a41c60631c56cee874b9d79b6847a
SHA256ea41e42b8b97768c2e08dc2c8b81277f0d733f9054c026ad6398fc4752368133
SHA512333ef8ed88bbe1eea9b23e371caced17d0b31c21c428d902017d107631853c6cbbe0a1b7b96841d021e4aa9434e95fdd33028ca0c848cd09d8e70e940a4ee85c
-
Filesize
915KB
MD56931b76644bcd76f2fac255b0295fb26
SHA18b8b8b0fc31a41c60631c56cee874b9d79b6847a
SHA256ea41e42b8b97768c2e08dc2c8b81277f0d733f9054c026ad6398fc4752368133
SHA512333ef8ed88bbe1eea9b23e371caced17d0b31c21c428d902017d107631853c6cbbe0a1b7b96841d021e4aa9434e95fdd33028ca0c848cd09d8e70e940a4ee85c
-
Filesize
711KB
MD56cd0b504389ae69995824f569a2dac75
SHA1ce82b163040d939c31838eea431e5018f633b969
SHA256c188a0f0b9626d968bd3e36fa81550ef0e505441c70ced7ab1514dd68b603cc0
SHA5122444f1c431936ec858738eaa55429af89ac6a3626e6e38200ba7cde159de14b9a6b5fa957ad69a3f743034dfba7691451f3659a0160f5e7ca30fd57b44fbcf2b
-
Filesize
711KB
MD56cd0b504389ae69995824f569a2dac75
SHA1ce82b163040d939c31838eea431e5018f633b969
SHA256c188a0f0b9626d968bd3e36fa81550ef0e505441c70ced7ab1514dd68b603cc0
SHA5122444f1c431936ec858738eaa55429af89ac6a3626e6e38200ba7cde159de14b9a6b5fa957ad69a3f743034dfba7691451f3659a0160f5e7ca30fd57b44fbcf2b
-
Filesize
349KB
MD592e0d3c0259ab700515feb200638cca5
SHA1ddebf5ed73fa0f5dea77433bbfa65e0c791ef51f
SHA256a5da072488d149b82f11348291eea03e4955809c07a3f01dc3f0f80aa5107ea8
SHA512ddbd3ed184d1afd2d3bc40e16d369c580ac53e5d938e9d982e41e506c4ec53a899d374aa44ccdc88e9e00f6fc7d20c1d71be405a98d0757482237744fe38f0bf
-
Filesize
349KB
MD592e0d3c0259ab700515feb200638cca5
SHA1ddebf5ed73fa0f5dea77433bbfa65e0c791ef51f
SHA256a5da072488d149b82f11348291eea03e4955809c07a3f01dc3f0f80aa5107ea8
SHA512ddbd3ed184d1afd2d3bc40e16d369c580ac53e5d938e9d982e41e506c4ec53a899d374aa44ccdc88e9e00f6fc7d20c1d71be405a98d0757482237744fe38f0bf
-
Filesize
416KB
MD579e60a60ae628044bed5268ad0ddc5d9
SHA1c0ae7d992652db605f288743fe93bce67090e739
SHA256a37c97dbf610e902607003737696cebc9ae021947cd247eb4351e9434c9c376c
SHA51286052956f5158b55cac249a5aa23c95d1552e889c90477a91cad96bcf8c5979a42a683582023f64d666fbd553a4ec111e9e442a370f632d91b672a49facf14c0
-
Filesize
416KB
MD579e60a60ae628044bed5268ad0ddc5d9
SHA1c0ae7d992652db605f288743fe93bce67090e739
SHA256a37c97dbf610e902607003737696cebc9ae021947cd247eb4351e9434c9c376c
SHA51286052956f5158b55cac249a5aa23c95d1552e889c90477a91cad96bcf8c5979a42a683582023f64d666fbd553a4ec111e9e442a370f632d91b672a49facf14c0
-
Filesize
360KB
MD59c2dbb974871de26d611455fa8143bef
SHA11ff50dd2c0af360b18afe73ba4fca981770f7a91
SHA2567f0ed1254a7b740b3e1de375b10f963f27db2a02861becc6b315813a5b18638d
SHA51246acf22850ecedd2cabc5827961d7bb795e69bffe81e3e96071613e57822c3fdc14395ca2373d145af386d4d1e8fd682e09ccd807870a7768ddae43405147421
-
Filesize
360KB
MD59c2dbb974871de26d611455fa8143bef
SHA11ff50dd2c0af360b18afe73ba4fca981770f7a91
SHA2567f0ed1254a7b740b3e1de375b10f963f27db2a02861becc6b315813a5b18638d
SHA51246acf22850ecedd2cabc5827961d7bb795e69bffe81e3e96071613e57822c3fdc14395ca2373d145af386d4d1e8fd682e09ccd807870a7768ddae43405147421
-
Filesize
168KB
MD510f873310e7516ed33229f4416f75108
SHA1ae13ebf13210139e3f4e7170a125ea887e1ea4dd
SHA256f482fb05c2a3e42309f5c10547433942b99b20484876f949320a4b2b56932db0
SHA51222d0f49049a45fbb8587b46202676c215c4845bbdd678e61cde751ef4a0cb15704976abb3ba73902da480be12772f9806222cd5312053cb35f77702fb56eeaf4
-
Filesize
168KB
MD510f873310e7516ed33229f4416f75108
SHA1ae13ebf13210139e3f4e7170a125ea887e1ea4dd
SHA256f482fb05c2a3e42309f5c10547433942b99b20484876f949320a4b2b56932db0
SHA51222d0f49049a45fbb8587b46202676c215c4845bbdd678e61cde751ef4a0cb15704976abb3ba73902da480be12772f9806222cd5312053cb35f77702fb56eeaf4