Analysis
-
max time kernel
106s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2023, 02:13
Static task
static1
Behavioral task
behavioral1
Sample
3485be0a5134e9babb29cf512d5e60dbf59057191c6e40288885b9a34738fae3.exe
Resource
win10v2004-20230220-en
General
-
Target
3485be0a5134e9babb29cf512d5e60dbf59057191c6e40288885b9a34738fae3.exe
-
Size
1.1MB
-
MD5
045e7dd30959fc4bcea29a4a4cb2cec1
-
SHA1
5d4f243b0b0dd56a249fca8b1cedbd3f0c73b1ab
-
SHA256
3485be0a5134e9babb29cf512d5e60dbf59057191c6e40288885b9a34738fae3
-
SHA512
efc4f70cfaea43f4d81db269c38fd8033fce0cc6e73d2a8e121911178b7e40ad6ec32e3829626a958859d0295cff66616488776bcc72619b5e9de91b57f16733
-
SSDEEP
24576:Cytc2V8aEVa6kfg+aRYf5hOiZbAdWfCpzINIak:ptX8g/fg5qfDKdXzICa
Malware Config
Extracted
redline
luka
185.161.248.75:4132
-
auth_value
44560bcd37d6bf076da309730fdb519a
Extracted
redline
terra
185.161.248.75:4132
-
auth_value
60df3f535f8aa4e264f78041983592d2
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o9414700.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection o9414700.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o9414700.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o9414700.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o9414700.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o9414700.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 10 IoCs
pid Process 4116 z8263802.exe 3304 z3549094.exe 3384 o9414700.exe 4036 p6690329.exe 2672 r9622622.exe 3272 r9622622.exe 1948 r9622622.exe 3432 r9622622.exe 4280 s8843131.exe 4576 s8843131.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features o9414700.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o9414700.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3485be0a5134e9babb29cf512d5e60dbf59057191c6e40288885b9a34738fae3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3485be0a5134e9babb29cf512d5e60dbf59057191c6e40288885b9a34738fae3.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z8263802.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z8263802.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z3549094.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z3549094.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2672 set thread context of 3432 2672 r9622622.exe 92 PID 4280 set thread context of 4576 4280 s8843131.exe 94 -
Program crash 2 IoCs
pid pid_target Process procid_target 1272 4036 WerFault.exe 86 2480 4576 WerFault.exe 94 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3384 o9414700.exe 3384 o9414700.exe 3432 r9622622.exe 3432 r9622622.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3384 o9414700.exe Token: SeDebugPrivilege 2672 r9622622.exe Token: SeDebugPrivilege 4280 s8843131.exe Token: SeDebugPrivilege 3432 r9622622.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 4576 s8843131.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 1400 wrote to memory of 4116 1400 3485be0a5134e9babb29cf512d5e60dbf59057191c6e40288885b9a34738fae3.exe 83 PID 1400 wrote to memory of 4116 1400 3485be0a5134e9babb29cf512d5e60dbf59057191c6e40288885b9a34738fae3.exe 83 PID 1400 wrote to memory of 4116 1400 3485be0a5134e9babb29cf512d5e60dbf59057191c6e40288885b9a34738fae3.exe 83 PID 4116 wrote to memory of 3304 4116 z8263802.exe 84 PID 4116 wrote to memory of 3304 4116 z8263802.exe 84 PID 4116 wrote to memory of 3304 4116 z8263802.exe 84 PID 3304 wrote to memory of 3384 3304 z3549094.exe 85 PID 3304 wrote to memory of 3384 3304 z3549094.exe 85 PID 3304 wrote to memory of 3384 3304 z3549094.exe 85 PID 3304 wrote to memory of 4036 3304 z3549094.exe 86 PID 3304 wrote to memory of 4036 3304 z3549094.exe 86 PID 3304 wrote to memory of 4036 3304 z3549094.exe 86 PID 4116 wrote to memory of 2672 4116 z8263802.exe 89 PID 4116 wrote to memory of 2672 4116 z8263802.exe 89 PID 4116 wrote to memory of 2672 4116 z8263802.exe 89 PID 2672 wrote to memory of 3272 2672 r9622622.exe 90 PID 2672 wrote to memory of 3272 2672 r9622622.exe 90 PID 2672 wrote to memory of 3272 2672 r9622622.exe 90 PID 2672 wrote to memory of 3272 2672 r9622622.exe 90 PID 2672 wrote to memory of 1948 2672 r9622622.exe 91 PID 2672 wrote to memory of 1948 2672 r9622622.exe 91 PID 2672 wrote to memory of 1948 2672 r9622622.exe 91 PID 2672 wrote to memory of 1948 2672 r9622622.exe 91 PID 2672 wrote to memory of 3432 2672 r9622622.exe 92 PID 2672 wrote to memory of 3432 2672 r9622622.exe 92 PID 2672 wrote to memory of 3432 2672 r9622622.exe 92 PID 2672 wrote to memory of 3432 2672 r9622622.exe 92 PID 2672 wrote to memory of 3432 2672 r9622622.exe 92 PID 2672 wrote to memory of 3432 2672 r9622622.exe 92 PID 2672 wrote to memory of 3432 2672 r9622622.exe 92 PID 2672 wrote to memory of 3432 2672 r9622622.exe 92 PID 1400 wrote to memory of 4280 1400 3485be0a5134e9babb29cf512d5e60dbf59057191c6e40288885b9a34738fae3.exe 93 PID 1400 wrote to memory of 4280 1400 3485be0a5134e9babb29cf512d5e60dbf59057191c6e40288885b9a34738fae3.exe 93 PID 1400 wrote to memory of 4280 1400 3485be0a5134e9babb29cf512d5e60dbf59057191c6e40288885b9a34738fae3.exe 93 PID 4280 wrote to memory of 4576 4280 s8843131.exe 94 PID 4280 wrote to memory of 4576 4280 s8843131.exe 94 PID 4280 wrote to memory of 4576 4280 s8843131.exe 94 PID 4280 wrote to memory of 4576 4280 s8843131.exe 94 PID 4280 wrote to memory of 4576 4280 s8843131.exe 94 PID 4280 wrote to memory of 4576 4280 s8843131.exe 94 PID 4280 wrote to memory of 4576 4280 s8843131.exe 94 PID 4280 wrote to memory of 4576 4280 s8843131.exe 94 PID 4280 wrote to memory of 4576 4280 s8843131.exe 94 PID 4280 wrote to memory of 4576 4280 s8843131.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\3485be0a5134e9babb29cf512d5e60dbf59057191c6e40288885b9a34738fae3.exe"C:\Users\Admin\AppData\Local\Temp\3485be0a5134e9babb29cf512d5e60dbf59057191c6e40288885b9a34738fae3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8263802.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8263802.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3549094.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3549094.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o9414700.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o9414700.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3384
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p6690329.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p6690329.exe4⤵
- Executes dropped EXE
PID:4036 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4036 -s 9285⤵
- Program crash
PID:1272
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r9622622.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r9622622.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r9622622.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r9622622.exe4⤵
- Executes dropped EXE
PID:3272
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r9622622.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r9622622.exe4⤵
- Executes dropped EXE
PID:1948
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r9622622.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r9622622.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3432
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s8843131.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s8843131.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s8843131.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s8843131.exe3⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4576 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4576 -s 124⤵
- Program crash
PID:2480
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4036 -ip 40361⤵PID:4540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4576 -ip 45761⤵PID:452
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
961KB
MD580fc746ab9c8ecd93489dda89fde6c51
SHA1f3f913dd1919abe137efa90b6464e0421f3318f3
SHA256142f09faafff988704bcef6c84d156336e1afe4d058d2cb28944c385a8872b4c
SHA512611956e021c499135f88cb6de540dfc31eaa2bb47eff499e015c93b4b46a82ab7ccb479959d2b0d7cf6753644500ce97e92e9f128608e9540dd5a7f23d141ec6
-
Filesize
961KB
MD580fc746ab9c8ecd93489dda89fde6c51
SHA1f3f913dd1919abe137efa90b6464e0421f3318f3
SHA256142f09faafff988704bcef6c84d156336e1afe4d058d2cb28944c385a8872b4c
SHA512611956e021c499135f88cb6de540dfc31eaa2bb47eff499e015c93b4b46a82ab7ccb479959d2b0d7cf6753644500ce97e92e9f128608e9540dd5a7f23d141ec6
-
Filesize
961KB
MD580fc746ab9c8ecd93489dda89fde6c51
SHA1f3f913dd1919abe137efa90b6464e0421f3318f3
SHA256142f09faafff988704bcef6c84d156336e1afe4d058d2cb28944c385a8872b4c
SHA512611956e021c499135f88cb6de540dfc31eaa2bb47eff499e015c93b4b46a82ab7ccb479959d2b0d7cf6753644500ce97e92e9f128608e9540dd5a7f23d141ec6
-
Filesize
703KB
MD5abb4521c84b7191d709da2caf66651aa
SHA14d92a815731d9968c724c429c67a87555357b96e
SHA2565910f8b988367519983118210efe9b03cf8ccd8880426c9e6c2e0b0072c36e3c
SHA512f0476c29ed590ef658e963ea4933f333c93effe65757690917a73bff07f7927b30f4540fc14415772a3bd5993708159ca7ca87044b38d71d245d09103308b8c8
-
Filesize
703KB
MD5abb4521c84b7191d709da2caf66651aa
SHA14d92a815731d9968c724c429c67a87555357b96e
SHA2565910f8b988367519983118210efe9b03cf8ccd8880426c9e6c2e0b0072c36e3c
SHA512f0476c29ed590ef658e963ea4933f333c93effe65757690917a73bff07f7927b30f4540fc14415772a3bd5993708159ca7ca87044b38d71d245d09103308b8c8
-
Filesize
904KB
MD54e9bed069476d28628052fca3267e786
SHA186cb60592b78bffe104ebec07e9108651ade2fd0
SHA256a5024028c8abce4171d7d6e31e7f05621862475e54ce89f1979e6b4ce5ffeee5
SHA512dc09a87365df4732a311532cc7d8d42bb74fac31b22c2094aee08d08523f600b5f7e04db9ea7127b1bcedbc8b054287cee1264a418acb663a44b7661d7e4153a
-
Filesize
904KB
MD54e9bed069476d28628052fca3267e786
SHA186cb60592b78bffe104ebec07e9108651ade2fd0
SHA256a5024028c8abce4171d7d6e31e7f05621862475e54ce89f1979e6b4ce5ffeee5
SHA512dc09a87365df4732a311532cc7d8d42bb74fac31b22c2094aee08d08523f600b5f7e04db9ea7127b1bcedbc8b054287cee1264a418acb663a44b7661d7e4153a
-
Filesize
904KB
MD54e9bed069476d28628052fca3267e786
SHA186cb60592b78bffe104ebec07e9108651ade2fd0
SHA256a5024028c8abce4171d7d6e31e7f05621862475e54ce89f1979e6b4ce5ffeee5
SHA512dc09a87365df4732a311532cc7d8d42bb74fac31b22c2094aee08d08523f600b5f7e04db9ea7127b1bcedbc8b054287cee1264a418acb663a44b7661d7e4153a
-
Filesize
904KB
MD54e9bed069476d28628052fca3267e786
SHA186cb60592b78bffe104ebec07e9108651ade2fd0
SHA256a5024028c8abce4171d7d6e31e7f05621862475e54ce89f1979e6b4ce5ffeee5
SHA512dc09a87365df4732a311532cc7d8d42bb74fac31b22c2094aee08d08523f600b5f7e04db9ea7127b1bcedbc8b054287cee1264a418acb663a44b7661d7e4153a
-
Filesize
904KB
MD54e9bed069476d28628052fca3267e786
SHA186cb60592b78bffe104ebec07e9108651ade2fd0
SHA256a5024028c8abce4171d7d6e31e7f05621862475e54ce89f1979e6b4ce5ffeee5
SHA512dc09a87365df4732a311532cc7d8d42bb74fac31b22c2094aee08d08523f600b5f7e04db9ea7127b1bcedbc8b054287cee1264a418acb663a44b7661d7e4153a
-
Filesize
306KB
MD57fe45f0b60489d2ed1988b95bcfb5391
SHA185b1bf9a5f88b1e70875351ad5e82272d072d3e5
SHA2568bad4015557951066f24cb7f69757aad0ca51b6a28f4958969d617ee14ac1055
SHA51235b5622213aacded5b56656bb4bce55ed2b83176b3f63a4a53788593f2e49c538595ba68f5dd47dfb63a63ab94025fa991d8ae981de96869fe2485a838f3e59a
-
Filesize
306KB
MD57fe45f0b60489d2ed1988b95bcfb5391
SHA185b1bf9a5f88b1e70875351ad5e82272d072d3e5
SHA2568bad4015557951066f24cb7f69757aad0ca51b6a28f4958969d617ee14ac1055
SHA51235b5622213aacded5b56656bb4bce55ed2b83176b3f63a4a53788593f2e49c538595ba68f5dd47dfb63a63ab94025fa991d8ae981de96869fe2485a838f3e59a
-
Filesize
185KB
MD5faf9ce533326bb2010c25a4890bcdfa4
SHA187f95424a4d4e6321c48d9a97b4bb91078ebb1e5
SHA25648906c159ed84fcb77528d36a2fe48b023f52aa8032891877ce51a166b5ee6f5
SHA512c3a261a1cf9ba8f410efc291802efec8a34df483b73e2050e0d540f51a412f696e5855549c5e5bfea4da4fca6257523c0d96393544a835599ed9a2c5d7c988e5
-
Filesize
185KB
MD5faf9ce533326bb2010c25a4890bcdfa4
SHA187f95424a4d4e6321c48d9a97b4bb91078ebb1e5
SHA25648906c159ed84fcb77528d36a2fe48b023f52aa8032891877ce51a166b5ee6f5
SHA512c3a261a1cf9ba8f410efc291802efec8a34df483b73e2050e0d540f51a412f696e5855549c5e5bfea4da4fca6257523c0d96393544a835599ed9a2c5d7c988e5
-
Filesize
145KB
MD5c38bafac28394392efbf4d3f54154071
SHA1bd17dcf6b4279e9ca5f534214136d21031863ea6
SHA256bf0fd7d8184acadd92df1b094c2978696edb245fc63b9784bcf683ba69bcbb1a
SHA512be98c461055ce1f2b6e091a51809067803abbe8bc9404da733ab5cdab7136f8862cdd3a40f3a61dea374a2c1a78e2c75a9c7e223037314edc2bc1e42a75c6799
-
Filesize
145KB
MD5c38bafac28394392efbf4d3f54154071
SHA1bd17dcf6b4279e9ca5f534214136d21031863ea6
SHA256bf0fd7d8184acadd92df1b094c2978696edb245fc63b9784bcf683ba69bcbb1a
SHA512be98c461055ce1f2b6e091a51809067803abbe8bc9404da733ab5cdab7136f8862cdd3a40f3a61dea374a2c1a78e2c75a9c7e223037314edc2bc1e42a75c6799