Analysis
-
max time kernel
135s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2023, 10:39
Static task
static1
Behavioral task
behavioral1
Sample
8bb911b96ed2c9ff118ceaa0a850b07edb98379607415e20dac6471d1aef7f33.exe
Resource
win10v2004-20230220-en
General
-
Target
8bb911b96ed2c9ff118ceaa0a850b07edb98379607415e20dac6471d1aef7f33.exe
-
Size
1.1MB
-
MD5
66d42ef7d4d672e37076007d7c4ab94d
-
SHA1
2b7d267958554b50370cd4168bf1f26105aa2158
-
SHA256
8bb911b96ed2c9ff118ceaa0a850b07edb98379607415e20dac6471d1aef7f33
-
SHA512
5d05a1ba0969460e76fcd4d6230eb55b102babe8abc24817af864e10bd2b38d1b11f6f0328ae606cbcf69e268e3cc5534bb6358b5abec221297840e407fde213
-
SSDEEP
24576:RyIwMFNg2d4tnD7M+napmMBJ8e4koQoCVVANoqJ5nL:E6Nnd+7n2O879AN
Malware Config
Extracted
redline
larry
185.161.248.75:4132
-
auth_value
9039557bb7a08f5f2f60e2b71e1dee0e
Extracted
redline
warum
185.161.248.75:4132
-
auth_value
0bdb2dda91dadc65f555dee088a6a2a4
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection o5337176.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o5337176.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o5337176.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o5337176.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o5337176.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o5337176.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 8 IoCs
pid Process 1960 z0298953.exe 3312 z2706756.exe 1328 o5337176.exe 4588 p8779201.exe 3256 r3790043.exe 4276 r3790043.exe 1700 s2052208.exe 4640 s2052208.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o5337176.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features o5337176.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z2706756.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z2706756.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 8bb911b96ed2c9ff118ceaa0a850b07edb98379607415e20dac6471d1aef7f33.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8bb911b96ed2c9ff118ceaa0a850b07edb98379607415e20dac6471d1aef7f33.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z0298953.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z0298953.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3256 set thread context of 4276 3256 r3790043.exe 95 PID 1700 set thread context of 4640 1700 s2052208.exe 97 -
Program crash 1 IoCs
pid pid_target Process procid_target 1492 4640 WerFault.exe 97 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1328 o5337176.exe 1328 o5337176.exe 4588 p8779201.exe 4588 p8779201.exe 4276 r3790043.exe 4276 r3790043.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1328 o5337176.exe Token: SeDebugPrivilege 4588 p8779201.exe Token: SeDebugPrivilege 3256 r3790043.exe Token: SeDebugPrivilege 1700 s2052208.exe Token: SeDebugPrivilege 4276 r3790043.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 4640 s2052208.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2864 wrote to memory of 1960 2864 8bb911b96ed2c9ff118ceaa0a850b07edb98379607415e20dac6471d1aef7f33.exe 83 PID 2864 wrote to memory of 1960 2864 8bb911b96ed2c9ff118ceaa0a850b07edb98379607415e20dac6471d1aef7f33.exe 83 PID 2864 wrote to memory of 1960 2864 8bb911b96ed2c9ff118ceaa0a850b07edb98379607415e20dac6471d1aef7f33.exe 83 PID 1960 wrote to memory of 3312 1960 z0298953.exe 84 PID 1960 wrote to memory of 3312 1960 z0298953.exe 84 PID 1960 wrote to memory of 3312 1960 z0298953.exe 84 PID 3312 wrote to memory of 1328 3312 z2706756.exe 85 PID 3312 wrote to memory of 1328 3312 z2706756.exe 85 PID 3312 wrote to memory of 1328 3312 z2706756.exe 85 PID 3312 wrote to memory of 4588 3312 z2706756.exe 90 PID 3312 wrote to memory of 4588 3312 z2706756.exe 90 PID 3312 wrote to memory of 4588 3312 z2706756.exe 90 PID 1960 wrote to memory of 3256 1960 z0298953.exe 94 PID 1960 wrote to memory of 3256 1960 z0298953.exe 94 PID 1960 wrote to memory of 3256 1960 z0298953.exe 94 PID 3256 wrote to memory of 4276 3256 r3790043.exe 95 PID 3256 wrote to memory of 4276 3256 r3790043.exe 95 PID 3256 wrote to memory of 4276 3256 r3790043.exe 95 PID 3256 wrote to memory of 4276 3256 r3790043.exe 95 PID 3256 wrote to memory of 4276 3256 r3790043.exe 95 PID 3256 wrote to memory of 4276 3256 r3790043.exe 95 PID 3256 wrote to memory of 4276 3256 r3790043.exe 95 PID 3256 wrote to memory of 4276 3256 r3790043.exe 95 PID 2864 wrote to memory of 1700 2864 8bb911b96ed2c9ff118ceaa0a850b07edb98379607415e20dac6471d1aef7f33.exe 96 PID 2864 wrote to memory of 1700 2864 8bb911b96ed2c9ff118ceaa0a850b07edb98379607415e20dac6471d1aef7f33.exe 96 PID 2864 wrote to memory of 1700 2864 8bb911b96ed2c9ff118ceaa0a850b07edb98379607415e20dac6471d1aef7f33.exe 96 PID 1700 wrote to memory of 4640 1700 s2052208.exe 97 PID 1700 wrote to memory of 4640 1700 s2052208.exe 97 PID 1700 wrote to memory of 4640 1700 s2052208.exe 97 PID 1700 wrote to memory of 4640 1700 s2052208.exe 97 PID 1700 wrote to memory of 4640 1700 s2052208.exe 97 PID 1700 wrote to memory of 4640 1700 s2052208.exe 97 PID 1700 wrote to memory of 4640 1700 s2052208.exe 97 PID 1700 wrote to memory of 4640 1700 s2052208.exe 97 PID 1700 wrote to memory of 4640 1700 s2052208.exe 97 PID 1700 wrote to memory of 4640 1700 s2052208.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\8bb911b96ed2c9ff118ceaa0a850b07edb98379607415e20dac6471d1aef7f33.exe"C:\Users\Admin\AppData\Local\Temp\8bb911b96ed2c9ff118ceaa0a850b07edb98379607415e20dac6471d1aef7f33.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0298953.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0298953.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2706756.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2706756.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o5337176.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o5337176.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1328
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p8779201.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p8779201.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4588
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r3790043.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r3790043.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r3790043.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r3790043.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4276
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s2052208.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s2052208.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s2052208.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s2052208.exe3⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4640 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4640 -s 124⤵
- Program crash
PID:1492
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 4640 -ip 46401⤵PID:4544
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
962KB
MD571333d172a69562cb33882a73182f829
SHA186ca15709efcf0dcb756744c4b87f2698da7ff5d
SHA256411d5f497bb9968c58e68b9f9a7eee1ebe9bb7e1c7038004c3084bc76a6573a6
SHA51212433cb2f2fcce41ea70e3d1a3777d0e0730ca4ecae3d26fd180474512a464d6320625f61ad4f19671e5ae5c7177e49a1753006eed536eaed80d03cabf3fefae
-
Filesize
962KB
MD571333d172a69562cb33882a73182f829
SHA186ca15709efcf0dcb756744c4b87f2698da7ff5d
SHA256411d5f497bb9968c58e68b9f9a7eee1ebe9bb7e1c7038004c3084bc76a6573a6
SHA51212433cb2f2fcce41ea70e3d1a3777d0e0730ca4ecae3d26fd180474512a464d6320625f61ad4f19671e5ae5c7177e49a1753006eed536eaed80d03cabf3fefae
-
Filesize
962KB
MD571333d172a69562cb33882a73182f829
SHA186ca15709efcf0dcb756744c4b87f2698da7ff5d
SHA256411d5f497bb9968c58e68b9f9a7eee1ebe9bb7e1c7038004c3084bc76a6573a6
SHA51212433cb2f2fcce41ea70e3d1a3777d0e0730ca4ecae3d26fd180474512a464d6320625f61ad4f19671e5ae5c7177e49a1753006eed536eaed80d03cabf3fefae
-
Filesize
702KB
MD54e7b2a27eea97f6fe01a4ba29ab6840f
SHA1ea7e0fa85d2e6d4ad3002fe2048061f3f38daff7
SHA256f3c72dc0c368bc9eb2332529d2e851e3692471aec6f5a5f1f22f3eb1c422f69e
SHA512bd7f8596202b066cf4c8ba13dcf02dcb58f9c58605357a849aed50699325725dd45ccff8bce274eec409d8f1878928680fe4582b81aa6377fe4d77a9a6849c27
-
Filesize
702KB
MD54e7b2a27eea97f6fe01a4ba29ab6840f
SHA1ea7e0fa85d2e6d4ad3002fe2048061f3f38daff7
SHA256f3c72dc0c368bc9eb2332529d2e851e3692471aec6f5a5f1f22f3eb1c422f69e
SHA512bd7f8596202b066cf4c8ba13dcf02dcb58f9c58605357a849aed50699325725dd45ccff8bce274eec409d8f1878928680fe4582b81aa6377fe4d77a9a6849c27
-
Filesize
903KB
MD5f01e580a70128abe075d7daf0742db03
SHA18d526d5e26815f901008f6ba08f5643785a72f5f
SHA25648511165593f0e40a1b8274ff460369bf8175b65b3c34f1162a19e033842e019
SHA5128c0e536c27cf55e01cf9ef5231613d40e827c78899558d341a6d125999edc02d75774d9f937408ce03dd142d80aacbe05dfb16ea82d00b12c5f342622d186cd7
-
Filesize
903KB
MD5f01e580a70128abe075d7daf0742db03
SHA18d526d5e26815f901008f6ba08f5643785a72f5f
SHA25648511165593f0e40a1b8274ff460369bf8175b65b3c34f1162a19e033842e019
SHA5128c0e536c27cf55e01cf9ef5231613d40e827c78899558d341a6d125999edc02d75774d9f937408ce03dd142d80aacbe05dfb16ea82d00b12c5f342622d186cd7
-
Filesize
903KB
MD5f01e580a70128abe075d7daf0742db03
SHA18d526d5e26815f901008f6ba08f5643785a72f5f
SHA25648511165593f0e40a1b8274ff460369bf8175b65b3c34f1162a19e033842e019
SHA5128c0e536c27cf55e01cf9ef5231613d40e827c78899558d341a6d125999edc02d75774d9f937408ce03dd142d80aacbe05dfb16ea82d00b12c5f342622d186cd7
-
Filesize
305KB
MD5c955b482a5fe4a4fcd5ca2a858eee37c
SHA1f253dffa5dfcae918ad5cb9de3f9d804c39e9028
SHA2563b044d41cf3fcd683a65104b605cd77b0c17de7b33b8b13c3c1feacffab5573d
SHA51266fa1ceea79f693a660f2064504b1d9bd5e931d309aef53809dd6d9b4a85163f3a7f247303aabea72a661371a9982bdd391cb62869ced42d6a7df75737e221b1
-
Filesize
305KB
MD5c955b482a5fe4a4fcd5ca2a858eee37c
SHA1f253dffa5dfcae918ad5cb9de3f9d804c39e9028
SHA2563b044d41cf3fcd683a65104b605cd77b0c17de7b33b8b13c3c1feacffab5573d
SHA51266fa1ceea79f693a660f2064504b1d9bd5e931d309aef53809dd6d9b4a85163f3a7f247303aabea72a661371a9982bdd391cb62869ced42d6a7df75737e221b1
-
Filesize
183KB
MD53063ac38cb9a09ec7d301e613a4d5ac2
SHA127547dc3b188811956a3b08f1312b2c4b4fb0faf
SHA2564aabb7f5123c2fa1571f093f6e501efd8238eded1bc59acab6520da1486787b4
SHA5128980b2b9c7fc391d38bcdb0e36643ea89cf2e4c3bc214c3f99ef8839692f4eb514a5bc33e9eea4bdbb19ae00d3a3cad3cb4b0d15e8a1644be83cf6606252b596
-
Filesize
183KB
MD53063ac38cb9a09ec7d301e613a4d5ac2
SHA127547dc3b188811956a3b08f1312b2c4b4fb0faf
SHA2564aabb7f5123c2fa1571f093f6e501efd8238eded1bc59acab6520da1486787b4
SHA5128980b2b9c7fc391d38bcdb0e36643ea89cf2e4c3bc214c3f99ef8839692f4eb514a5bc33e9eea4bdbb19ae00d3a3cad3cb4b0d15e8a1644be83cf6606252b596
-
Filesize
145KB
MD539ad360d8425725a4e0cf4d24a7b9fa6
SHA15a871b7e3bff294c7bacb16698547fd4622c27a8
SHA2563db25c835f9726bb4e99829335389ef9abc26b48d2f08ddaca82402eb68e14ab
SHA51215af4f7feb5ba59d9dd5d729a343a8060501917e7ab41d971904e352003c1244ab94f8b82b2bf826030b20d1ed35bef5273af04aac30ee66fd8e728f00faf561
-
Filesize
145KB
MD539ad360d8425725a4e0cf4d24a7b9fa6
SHA15a871b7e3bff294c7bacb16698547fd4622c27a8
SHA2563db25c835f9726bb4e99829335389ef9abc26b48d2f08ddaca82402eb68e14ab
SHA51215af4f7feb5ba59d9dd5d729a343a8060501917e7ab41d971904e352003c1244ab94f8b82b2bf826030b20d1ed35bef5273af04aac30ee66fd8e728f00faf561