Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
12/05/2023, 18:25
Static task
static1
Behavioral task
behavioral1
Sample
100ddd4c404dc0ac79dfba3e7b07334fd7e3be00dff91bad4a51f3d016ceba9a.exe
Resource
win10v2004-20230220-en
General
-
Target
100ddd4c404dc0ac79dfba3e7b07334fd7e3be00dff91bad4a51f3d016ceba9a.exe
-
Size
1.2MB
-
MD5
08a94e694b988f03b214ebd2439f8986
-
SHA1
05085b96b8935bd54a8dfcc165036ea1cbd0807c
-
SHA256
100ddd4c404dc0ac79dfba3e7b07334fd7e3be00dff91bad4a51f3d016ceba9a
-
SHA512
8f6ea7785860567b7e4eaa713121abca3c67756e1362763b2de374485f847f90750e62f13398f4df2c0f830aa688071de4e40cfcc646645590992392a37211ad
-
SSDEEP
24576:yygW/ahz40l+M5iyCY12GB56F0PznAjkV+vWXKFrmR3:ZghM0lj1CYQGKF0PbAAVuL
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Extracted
redline
fuga
185.161.248.75:4132
-
auth_value
7c5144ad645deb9fa21680fdaee0d51f
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 9 IoCs
pid Process 1276 x0975109.exe 2600 x8291102.exe 4304 f8380313.exe 460 g0543359.exe 984 g0543359.exe 1456 h1876638.exe 708 h1876638.exe 1628 i9069447.exe 2000 i9069447.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 100ddd4c404dc0ac79dfba3e7b07334fd7e3be00dff91bad4a51f3d016ceba9a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 100ddd4c404dc0ac79dfba3e7b07334fd7e3be00dff91bad4a51f3d016ceba9a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x0975109.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x0975109.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x8291102.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x8291102.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 460 set thread context of 984 460 g0543359.exe 91 PID 1456 set thread context of 708 1456 h1876638.exe 93 PID 1628 set thread context of 2000 1628 i9069447.exe 98 -
Program crash 1 IoCs
pid pid_target Process procid_target 4152 708 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 4304 f8380313.exe 4304 f8380313.exe 984 g0543359.exe 2000 i9069447.exe 2000 i9069447.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4304 f8380313.exe Token: SeDebugPrivilege 460 g0543359.exe Token: SeDebugPrivilege 1456 h1876638.exe Token: SeDebugPrivilege 984 g0543359.exe Token: SeDebugPrivilege 1628 i9069447.exe Token: SeDebugPrivilege 2000 i9069447.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 708 h1876638.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 4812 wrote to memory of 1276 4812 100ddd4c404dc0ac79dfba3e7b07334fd7e3be00dff91bad4a51f3d016ceba9a.exe 81 PID 4812 wrote to memory of 1276 4812 100ddd4c404dc0ac79dfba3e7b07334fd7e3be00dff91bad4a51f3d016ceba9a.exe 81 PID 4812 wrote to memory of 1276 4812 100ddd4c404dc0ac79dfba3e7b07334fd7e3be00dff91bad4a51f3d016ceba9a.exe 81 PID 1276 wrote to memory of 2600 1276 x0975109.exe 82 PID 1276 wrote to memory of 2600 1276 x0975109.exe 82 PID 1276 wrote to memory of 2600 1276 x0975109.exe 82 PID 2600 wrote to memory of 4304 2600 x8291102.exe 83 PID 2600 wrote to memory of 4304 2600 x8291102.exe 83 PID 2600 wrote to memory of 4304 2600 x8291102.exe 83 PID 2600 wrote to memory of 460 2600 x8291102.exe 90 PID 2600 wrote to memory of 460 2600 x8291102.exe 90 PID 2600 wrote to memory of 460 2600 x8291102.exe 90 PID 460 wrote to memory of 984 460 g0543359.exe 91 PID 460 wrote to memory of 984 460 g0543359.exe 91 PID 460 wrote to memory of 984 460 g0543359.exe 91 PID 460 wrote to memory of 984 460 g0543359.exe 91 PID 460 wrote to memory of 984 460 g0543359.exe 91 PID 460 wrote to memory of 984 460 g0543359.exe 91 PID 460 wrote to memory of 984 460 g0543359.exe 91 PID 460 wrote to memory of 984 460 g0543359.exe 91 PID 1276 wrote to memory of 1456 1276 x0975109.exe 92 PID 1276 wrote to memory of 1456 1276 x0975109.exe 92 PID 1276 wrote to memory of 1456 1276 x0975109.exe 92 PID 1456 wrote to memory of 708 1456 h1876638.exe 93 PID 1456 wrote to memory of 708 1456 h1876638.exe 93 PID 1456 wrote to memory of 708 1456 h1876638.exe 93 PID 1456 wrote to memory of 708 1456 h1876638.exe 93 PID 1456 wrote to memory of 708 1456 h1876638.exe 93 PID 1456 wrote to memory of 708 1456 h1876638.exe 93 PID 1456 wrote to memory of 708 1456 h1876638.exe 93 PID 1456 wrote to memory of 708 1456 h1876638.exe 93 PID 1456 wrote to memory of 708 1456 h1876638.exe 93 PID 1456 wrote to memory of 708 1456 h1876638.exe 93 PID 4812 wrote to memory of 1628 4812 100ddd4c404dc0ac79dfba3e7b07334fd7e3be00dff91bad4a51f3d016ceba9a.exe 95 PID 4812 wrote to memory of 1628 4812 100ddd4c404dc0ac79dfba3e7b07334fd7e3be00dff91bad4a51f3d016ceba9a.exe 95 PID 4812 wrote to memory of 1628 4812 100ddd4c404dc0ac79dfba3e7b07334fd7e3be00dff91bad4a51f3d016ceba9a.exe 95 PID 1628 wrote to memory of 2000 1628 i9069447.exe 98 PID 1628 wrote to memory of 2000 1628 i9069447.exe 98 PID 1628 wrote to memory of 2000 1628 i9069447.exe 98 PID 1628 wrote to memory of 2000 1628 i9069447.exe 98 PID 1628 wrote to memory of 2000 1628 i9069447.exe 98 PID 1628 wrote to memory of 2000 1628 i9069447.exe 98 PID 1628 wrote to memory of 2000 1628 i9069447.exe 98 PID 1628 wrote to memory of 2000 1628 i9069447.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\100ddd4c404dc0ac79dfba3e7b07334fd7e3be00dff91bad4a51f3d016ceba9a.exe"C:\Users\Admin\AppData\Local\Temp\100ddd4c404dc0ac79dfba3e7b07334fd7e3be00dff91bad4a51f3d016ceba9a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0975109.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0975109.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8291102.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8291102.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f8380313.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f8380313.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4304
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g0543359.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g0543359.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g0543359.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g0543359.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:984
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1876638.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1876638.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1876638.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1876638.exe4⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:708 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 708 -s 125⤵
- Program crash
PID:4152
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i9069447.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i9069447.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i9069447.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i9069447.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2000
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 708 -ip 7081⤵PID:4048
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
902KB
MD50f93e5cca6ee94466d0a90d59d44ee99
SHA162d751773da3c2c37b020c74dbaac5ecff853560
SHA256c05f389d4a8e698de732149c8b0d040fd15576f4c631f88de305d05e6d5feb04
SHA512f271d1a016dc0083f6e57d535cd6dfb3cef005d45ed415d8447d5c21db8fa23794907c80500714e6a1615200c07303c727cca41c126538af1862c25e00aff999
-
Filesize
902KB
MD50f93e5cca6ee94466d0a90d59d44ee99
SHA162d751773da3c2c37b020c74dbaac5ecff853560
SHA256c05f389d4a8e698de732149c8b0d040fd15576f4c631f88de305d05e6d5feb04
SHA512f271d1a016dc0083f6e57d535cd6dfb3cef005d45ed415d8447d5c21db8fa23794907c80500714e6a1615200c07303c727cca41c126538af1862c25e00aff999
-
Filesize
902KB
MD50f93e5cca6ee94466d0a90d59d44ee99
SHA162d751773da3c2c37b020c74dbaac5ecff853560
SHA256c05f389d4a8e698de732149c8b0d040fd15576f4c631f88de305d05e6d5feb04
SHA512f271d1a016dc0083f6e57d535cd6dfb3cef005d45ed415d8447d5c21db8fa23794907c80500714e6a1615200c07303c727cca41c126538af1862c25e00aff999
-
Filesize
868KB
MD59efbb140157014b6ba812946f0b4576e
SHA1afdc94b58bb2f096c036910407071b512d146078
SHA2561acdee527b7d53cc3526d7873e7cde2f1114accc43edc5438059e7fcfaddb11e
SHA51259cc99f2ec15d7f4bb3ed8e29329ae2003e0eaecd7243f8dd222734a1752601fce2eccf2bcb55c66c5336739310a8f0f923a9f75f0c7d1ed582de533ccd88242
-
Filesize
868KB
MD59efbb140157014b6ba812946f0b4576e
SHA1afdc94b58bb2f096c036910407071b512d146078
SHA2561acdee527b7d53cc3526d7873e7cde2f1114accc43edc5438059e7fcfaddb11e
SHA51259cc99f2ec15d7f4bb3ed8e29329ae2003e0eaecd7243f8dd222734a1752601fce2eccf2bcb55c66c5336739310a8f0f923a9f75f0c7d1ed582de533ccd88242
-
Filesize
962KB
MD5ac9c53b2a662e8ac2708f631bff35270
SHA11a3183661087790e4dbfad999d25910ded5b2b6e
SHA256eda106cd4c94d193c976495ea0ea599bececea87258c95204898c28f12e38e45
SHA51227538383f0cf8d2e6715aa83aa861d0ce43c2071e2636f405f2255e8014ff57e5d824cfe31624024b266f8ec14cc23458384e82653910152e8593a41b8e512a0
-
Filesize
962KB
MD5ac9c53b2a662e8ac2708f631bff35270
SHA11a3183661087790e4dbfad999d25910ded5b2b6e
SHA256eda106cd4c94d193c976495ea0ea599bececea87258c95204898c28f12e38e45
SHA51227538383f0cf8d2e6715aa83aa861d0ce43c2071e2636f405f2255e8014ff57e5d824cfe31624024b266f8ec14cc23458384e82653910152e8593a41b8e512a0
-
Filesize
962KB
MD5ac9c53b2a662e8ac2708f631bff35270
SHA11a3183661087790e4dbfad999d25910ded5b2b6e
SHA256eda106cd4c94d193c976495ea0ea599bececea87258c95204898c28f12e38e45
SHA51227538383f0cf8d2e6715aa83aa861d0ce43c2071e2636f405f2255e8014ff57e5d824cfe31624024b266f8ec14cc23458384e82653910152e8593a41b8e512a0
-
Filesize
424KB
MD5cfa1716124b4ba56c341e1401d312219
SHA15008bd508a83dbca99e2fe902ac891fdee9be987
SHA256a482c259d5f377d48865804c04bbe0eba1cd173147ccc6da0bcb0c370f96e218
SHA51273a4160b8a185de7cb5c67e53fa325b9ed295a8935c9b4c03175e593d2e2df3c73552aa27fe8f274d84d3492c078481abac007ed3c0aaf82f333c3731ce2df5c
-
Filesize
424KB
MD5cfa1716124b4ba56c341e1401d312219
SHA15008bd508a83dbca99e2fe902ac891fdee9be987
SHA256a482c259d5f377d48865804c04bbe0eba1cd173147ccc6da0bcb0c370f96e218
SHA51273a4160b8a185de7cb5c67e53fa325b9ed295a8935c9b4c03175e593d2e2df3c73552aa27fe8f274d84d3492c078481abac007ed3c0aaf82f333c3731ce2df5c
-
Filesize
145KB
MD536279fcfbcd097e0765df001da8bd45c
SHA1bddca867c2a949d44f1d5d3aae34d0d23adf027a
SHA25688ae2f97bcf03f797c8e430b339cf541159f5712e09aa6f550a2296109423d3e
SHA5125d2c1845e88d9da4f3361cc89808e12c71f752a2566426aa7015a620f2a5f854b658e61d15857409a7ef3e2caeb98713ecaac8b0d0ab9df8d78d43b75852b3ce
-
Filesize
145KB
MD536279fcfbcd097e0765df001da8bd45c
SHA1bddca867c2a949d44f1d5d3aae34d0d23adf027a
SHA25688ae2f97bcf03f797c8e430b339cf541159f5712e09aa6f550a2296109423d3e
SHA5125d2c1845e88d9da4f3361cc89808e12c71f752a2566426aa7015a620f2a5f854b658e61d15857409a7ef3e2caeb98713ecaac8b0d0ab9df8d78d43b75852b3ce
-
Filesize
770KB
MD5305615202ebe3728d0d21bcb7e6629bd
SHA102873403ab575ac4e095f6b1d40c492d5c327587
SHA2560a7ca5475d0ba0b184ef7e0295452404871b87ff99a9fe8a795f3175621e98bd
SHA51254c93ba211f1f7b07d294baed692c1d67be9bb6aeec69241eb435ab13e60aaab7a2fc71f7fe7c7a7195f8cf659dc9dcf32f5abb5a00d77b8fa2d67be51ead366
-
Filesize
770KB
MD5305615202ebe3728d0d21bcb7e6629bd
SHA102873403ab575ac4e095f6b1d40c492d5c327587
SHA2560a7ca5475d0ba0b184ef7e0295452404871b87ff99a9fe8a795f3175621e98bd
SHA51254c93ba211f1f7b07d294baed692c1d67be9bb6aeec69241eb435ab13e60aaab7a2fc71f7fe7c7a7195f8cf659dc9dcf32f5abb5a00d77b8fa2d67be51ead366
-
Filesize
770KB
MD5305615202ebe3728d0d21bcb7e6629bd
SHA102873403ab575ac4e095f6b1d40c492d5c327587
SHA2560a7ca5475d0ba0b184ef7e0295452404871b87ff99a9fe8a795f3175621e98bd
SHA51254c93ba211f1f7b07d294baed692c1d67be9bb6aeec69241eb435ab13e60aaab7a2fc71f7fe7c7a7195f8cf659dc9dcf32f5abb5a00d77b8fa2d67be51ead366