Analysis
-
max time kernel
135s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13/05/2023, 17:28
Static task
static1
Behavioral task
behavioral1
Sample
33e885f6e0becebbb81fd015a24cb013da0b077bc0c081a986404293470cc356.exe
Resource
win10v2004-20230220-en
General
-
Target
33e885f6e0becebbb81fd015a24cb013da0b077bc0c081a986404293470cc356.exe
-
Size
1.1MB
-
MD5
b2c461e2d943176a6da0dd8225e2775e
-
SHA1
9aab87c6191b80beabc5ed84eb6cff0cfc8e57dd
-
SHA256
33e885f6e0becebbb81fd015a24cb013da0b077bc0c081a986404293470cc356
-
SHA512
afd55f17cf030742505cecd71e21dd59c59d5b794a8e6faa845c10059005e781449a2b29ffc9c82668dc4a203503acd415089d353eb0d4ab49b62eb4ca4cd106
-
SSDEEP
24576:zy81uEs6RbF30Zjo0ALEy2tICtuZld3FHmf/RhcnIveBW7BO+HS7a:GC6Kp23Ox2kZlnH6/HeU7DS7
Malware Config
Extracted
redline
motor
185.161.248.75:4132
-
auth_value
ec19ab9989a783983c5cbbc0e5ac4a5f
Extracted
redline
terra
185.161.248.75:4132
-
auth_value
60df3f535f8aa4e264f78041983592d2
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a3804811.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a3804811.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a3804811.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a3804811.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a3804811.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a3804811.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 9 IoCs
pid Process 4764 v1064941.exe 3620 v7036880.exe 5016 a3804811.exe 2724 b7177375.exe 976 c0802220.exe 3788 c0802220.exe 3532 c0802220.exe 2072 d2728717.exe 368 d2728717.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a3804811.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a3804811.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 33e885f6e0becebbb81fd015a24cb013da0b077bc0c081a986404293470cc356.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 33e885f6e0becebbb81fd015a24cb013da0b077bc0c081a986404293470cc356.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v1064941.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v1064941.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v7036880.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v7036880.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 976 set thread context of 3532 976 c0802220.exe 92 PID 2072 set thread context of 368 2072 d2728717.exe 96 -
Program crash 1 IoCs
pid pid_target Process procid_target 3588 3532 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5016 a3804811.exe 5016 a3804811.exe 2724 b7177375.exe 2724 b7177375.exe 368 d2728717.exe 368 d2728717.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 5016 a3804811.exe Token: SeDebugPrivilege 2724 b7177375.exe Token: SeDebugPrivilege 976 c0802220.exe Token: SeDebugPrivilege 2072 d2728717.exe Token: SeDebugPrivilege 368 d2728717.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3532 c0802220.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 980 wrote to memory of 4764 980 33e885f6e0becebbb81fd015a24cb013da0b077bc0c081a986404293470cc356.exe 82 PID 980 wrote to memory of 4764 980 33e885f6e0becebbb81fd015a24cb013da0b077bc0c081a986404293470cc356.exe 82 PID 980 wrote to memory of 4764 980 33e885f6e0becebbb81fd015a24cb013da0b077bc0c081a986404293470cc356.exe 82 PID 4764 wrote to memory of 3620 4764 v1064941.exe 83 PID 4764 wrote to memory of 3620 4764 v1064941.exe 83 PID 4764 wrote to memory of 3620 4764 v1064941.exe 83 PID 3620 wrote to memory of 5016 3620 v7036880.exe 84 PID 3620 wrote to memory of 5016 3620 v7036880.exe 84 PID 3620 wrote to memory of 5016 3620 v7036880.exe 84 PID 3620 wrote to memory of 2724 3620 v7036880.exe 88 PID 3620 wrote to memory of 2724 3620 v7036880.exe 88 PID 3620 wrote to memory of 2724 3620 v7036880.exe 88 PID 4764 wrote to memory of 976 4764 v1064941.exe 89 PID 4764 wrote to memory of 976 4764 v1064941.exe 89 PID 4764 wrote to memory of 976 4764 v1064941.exe 89 PID 976 wrote to memory of 3788 976 c0802220.exe 90 PID 976 wrote to memory of 3788 976 c0802220.exe 90 PID 976 wrote to memory of 3788 976 c0802220.exe 90 PID 976 wrote to memory of 3788 976 c0802220.exe 90 PID 976 wrote to memory of 3532 976 c0802220.exe 92 PID 976 wrote to memory of 3532 976 c0802220.exe 92 PID 976 wrote to memory of 3532 976 c0802220.exe 92 PID 976 wrote to memory of 3532 976 c0802220.exe 92 PID 976 wrote to memory of 3532 976 c0802220.exe 92 PID 976 wrote to memory of 3532 976 c0802220.exe 92 PID 976 wrote to memory of 3532 976 c0802220.exe 92 PID 976 wrote to memory of 3532 976 c0802220.exe 92 PID 976 wrote to memory of 3532 976 c0802220.exe 92 PID 976 wrote to memory of 3532 976 c0802220.exe 92 PID 980 wrote to memory of 2072 980 33e885f6e0becebbb81fd015a24cb013da0b077bc0c081a986404293470cc356.exe 94 PID 980 wrote to memory of 2072 980 33e885f6e0becebbb81fd015a24cb013da0b077bc0c081a986404293470cc356.exe 94 PID 980 wrote to memory of 2072 980 33e885f6e0becebbb81fd015a24cb013da0b077bc0c081a986404293470cc356.exe 94 PID 2072 wrote to memory of 368 2072 d2728717.exe 96 PID 2072 wrote to memory of 368 2072 d2728717.exe 96 PID 2072 wrote to memory of 368 2072 d2728717.exe 96 PID 2072 wrote to memory of 368 2072 d2728717.exe 96 PID 2072 wrote to memory of 368 2072 d2728717.exe 96 PID 2072 wrote to memory of 368 2072 d2728717.exe 96 PID 2072 wrote to memory of 368 2072 d2728717.exe 96 PID 2072 wrote to memory of 368 2072 d2728717.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\33e885f6e0becebbb81fd015a24cb013da0b077bc0c081a986404293470cc356.exe"C:\Users\Admin\AppData\Local\Temp\33e885f6e0becebbb81fd015a24cb013da0b077bc0c081a986404293470cc356.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1064941.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1064941.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7036880.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7036880.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a3804811.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a3804811.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5016
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7177375.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7177375.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2724
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c0802220.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c0802220.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c0802220.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c0802220.exe4⤵
- Executes dropped EXE
PID:3788
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c0802220.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c0802220.exe4⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3532 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3532 -s 125⤵
- Program crash
PID:3588
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2728717.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2728717.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2728717.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2728717.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:368
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3532 -ip 35321⤵PID:2164
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
904KB
MD5016644d302de916560ba26618f0cfd92
SHA1da3cc54d8d6910160910d32d1837b92541d8a439
SHA256586744816672eab99d219e0f3791b7be2d6cd5056de7cb6bc375552e0fae21b6
SHA512581287c5d98450cb2f15d594d45029b71c64e439cefdf896dbcaad9133a07b8a7e98bafa425c45bd97d882e4a04ef24f61e9562b2407dd5475b588b8906022e4
-
Filesize
904KB
MD5016644d302de916560ba26618f0cfd92
SHA1da3cc54d8d6910160910d32d1837b92541d8a439
SHA256586744816672eab99d219e0f3791b7be2d6cd5056de7cb6bc375552e0fae21b6
SHA512581287c5d98450cb2f15d594d45029b71c64e439cefdf896dbcaad9133a07b8a7e98bafa425c45bd97d882e4a04ef24f61e9562b2407dd5475b588b8906022e4
-
Filesize
904KB
MD5016644d302de916560ba26618f0cfd92
SHA1da3cc54d8d6910160910d32d1837b92541d8a439
SHA256586744816672eab99d219e0f3791b7be2d6cd5056de7cb6bc375552e0fae21b6
SHA512581287c5d98450cb2f15d594d45029b71c64e439cefdf896dbcaad9133a07b8a7e98bafa425c45bd97d882e4a04ef24f61e9562b2407dd5475b588b8906022e4
-
Filesize
750KB
MD5fb9f493881a689f34e1ae630523a8620
SHA177bfcf1d8e559f634b47f80da9d17a16e3ffed54
SHA256ab77edec58b439f10cfab1d3b2409ff99864b8753c5517dadb19b399fbd03116
SHA5122b31b38599b1d3611fae2abd1480c1178b8e5ba14d34b4fc527488055d0699e677b556d228eb8c361a43532c07bb056c7dcf555b67dcb055e5bf0d810506b6ee
-
Filesize
750KB
MD5fb9f493881a689f34e1ae630523a8620
SHA177bfcf1d8e559f634b47f80da9d17a16e3ffed54
SHA256ab77edec58b439f10cfab1d3b2409ff99864b8753c5517dadb19b399fbd03116
SHA5122b31b38599b1d3611fae2abd1480c1178b8e5ba14d34b4fc527488055d0699e677b556d228eb8c361a43532c07bb056c7dcf555b67dcb055e5bf0d810506b6ee
-
Filesize
962KB
MD5d878469e38137d87dde3c8b5ad1096b8
SHA1c684e2b486d72b4d6d76c2c07dd942f0508b9385
SHA2569b881e3f4a44d15c55051d3790919c48018a40bc1e4f252fd6805f2357756490
SHA512ee6e38bb6283e5992e86d1a35063f1f29586ed65a78179556fc1582583524f8e67ec91d50a6423542987309f47dffd8704b3571d028208a8b432db559647f10d
-
Filesize
962KB
MD5d878469e38137d87dde3c8b5ad1096b8
SHA1c684e2b486d72b4d6d76c2c07dd942f0508b9385
SHA2569b881e3f4a44d15c55051d3790919c48018a40bc1e4f252fd6805f2357756490
SHA512ee6e38bb6283e5992e86d1a35063f1f29586ed65a78179556fc1582583524f8e67ec91d50a6423542987309f47dffd8704b3571d028208a8b432db559647f10d
-
Filesize
962KB
MD5d878469e38137d87dde3c8b5ad1096b8
SHA1c684e2b486d72b4d6d76c2c07dd942f0508b9385
SHA2569b881e3f4a44d15c55051d3790919c48018a40bc1e4f252fd6805f2357756490
SHA512ee6e38bb6283e5992e86d1a35063f1f29586ed65a78179556fc1582583524f8e67ec91d50a6423542987309f47dffd8704b3571d028208a8b432db559647f10d
-
Filesize
962KB
MD5d878469e38137d87dde3c8b5ad1096b8
SHA1c684e2b486d72b4d6d76c2c07dd942f0508b9385
SHA2569b881e3f4a44d15c55051d3790919c48018a40bc1e4f252fd6805f2357756490
SHA512ee6e38bb6283e5992e86d1a35063f1f29586ed65a78179556fc1582583524f8e67ec91d50a6423542987309f47dffd8704b3571d028208a8b432db559647f10d
-
Filesize
306KB
MD55aacb6a71bae9cd5bedfa8c281a58082
SHA15235aab93bfe62f2866eea431e7506c8c1008c47
SHA2566ba85526ca031c3cad3fc4df16c7a2152f5e0a82591111c0293484bcb34bd1b8
SHA512d8a32df2a03f2a2b45e7d18541c88bd7d6d6a230f58ddbef640cef8702412d742f278a06fe3d1b6675d6a0b5f64fba684e78c51b38b5624186d75b31a1f3908d
-
Filesize
306KB
MD55aacb6a71bae9cd5bedfa8c281a58082
SHA15235aab93bfe62f2866eea431e7506c8c1008c47
SHA2566ba85526ca031c3cad3fc4df16c7a2152f5e0a82591111c0293484bcb34bd1b8
SHA512d8a32df2a03f2a2b45e7d18541c88bd7d6d6a230f58ddbef640cef8702412d742f278a06fe3d1b6675d6a0b5f64fba684e78c51b38b5624186d75b31a1f3908d
-
Filesize
184KB
MD536df452fdda4179809bf54ccc450a04e
SHA182fae88df48ab2b8d2fa4850513b20e048bb9b35
SHA256ee09c6495dd35cb0597a80b22ad30991c5f91a1acf2c0774cd6edbbf36c27dba
SHA51261fccde76500051685ecedb2e1cd58a769439a89331166d43c22eb25ca9badcc6cf3adb6275e43972dd7e17295a0ce3d8f6cfc4df775c534c18d55a1fa4acfc5
-
Filesize
184KB
MD536df452fdda4179809bf54ccc450a04e
SHA182fae88df48ab2b8d2fa4850513b20e048bb9b35
SHA256ee09c6495dd35cb0597a80b22ad30991c5f91a1acf2c0774cd6edbbf36c27dba
SHA51261fccde76500051685ecedb2e1cd58a769439a89331166d43c22eb25ca9badcc6cf3adb6275e43972dd7e17295a0ce3d8f6cfc4df775c534c18d55a1fa4acfc5
-
Filesize
145KB
MD5e13ba337cdcc485d856d7fe81d4b6e53
SHA14b4830fa9472b0a46fc8b0249a144260cfc39eec
SHA25615f57c4f2beb57f8a09bf6e537b143c37fde0bc1275d9366b43befc60d934c45
SHA5128b0e0742cac8ae88ac4bb32e9cfcda748138ebd06fb8c683e03681c89f557e7bdc016d451334384d3ff011c50253382199dbd05223d8db14621bdc9f505cb5de
-
Filesize
145KB
MD5e13ba337cdcc485d856d7fe81d4b6e53
SHA14b4830fa9472b0a46fc8b0249a144260cfc39eec
SHA25615f57c4f2beb57f8a09bf6e537b143c37fde0bc1275d9366b43befc60d934c45
SHA5128b0e0742cac8ae88ac4bb32e9cfcda748138ebd06fb8c683e03681c89f557e7bdc016d451334384d3ff011c50253382199dbd05223d8db14621bdc9f505cb5de