Analysis
-
max time kernel
105s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2023, 10:40
Static task
static1
Behavioral task
behavioral1
Sample
984b555e4c75f0e9e05f34ce61242efd870fe1c40bf05865b38830133fefa4f4.exe
Resource
win10v2004-20230220-en
General
-
Target
984b555e4c75f0e9e05f34ce61242efd870fe1c40bf05865b38830133fefa4f4.exe
-
Size
1.1MB
-
MD5
dd948a5403a4d6d185c0fc346db13fce
-
SHA1
71941ff4e00b80cd171ca7cf14ca84ce5e75c333
-
SHA256
984b555e4c75f0e9e05f34ce61242efd870fe1c40bf05865b38830133fefa4f4
-
SHA512
407d118dd2d45b08af0efa42c8f35909c99dc44aa982a34cda1e4f6f38c89a1420cce321bed6ecd86b05c5d211b648c27540d9404f28272072aadf3e86ef1c11
-
SSDEEP
24576:nypj8wsmyyteHDfq73bM6FaZa3kq9xNwOv0z+ydd:ypQweytKeLvfNmz9
Malware Config
Extracted
redline
derek
185.161.248.75:4132
-
auth_value
c7030724b2b40537db5ba680b1d82ed2
Extracted
redline
warum
185.161.248.75:4132
-
auth_value
0bdb2dda91dadc65f555dee088a6a2a4
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g9821596.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection g9821596.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g9821596.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g9821596.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g9821596.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g9821596.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 8 IoCs
pid Process 4276 x5515290.exe 1120 x6859175.exe 1896 f6088459.exe 3556 g9821596.exe 3440 h4065100.exe 2228 h4065100.exe 2948 i9791747.exe 2564 i9791747.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features g9821596.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" g9821596.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 984b555e4c75f0e9e05f34ce61242efd870fe1c40bf05865b38830133fefa4f4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x5515290.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x5515290.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x6859175.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x6859175.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 984b555e4c75f0e9e05f34ce61242efd870fe1c40bf05865b38830133fefa4f4.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3440 set thread context of 2228 3440 h4065100.exe 99 PID 2948 set thread context of 2564 2948 i9791747.exe 103 -
Program crash 1 IoCs
pid pid_target Process procid_target 3360 2228 WerFault.exe 99 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1896 f6088459.exe 1896 f6088459.exe 3556 g9821596.exe 3556 g9821596.exe 2564 i9791747.exe 2564 i9791747.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1896 f6088459.exe Token: SeDebugPrivilege 3556 g9821596.exe Token: SeDebugPrivilege 3440 h4065100.exe Token: SeDebugPrivilege 2948 i9791747.exe Token: SeDebugPrivilege 2564 i9791747.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2228 h4065100.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 4956 wrote to memory of 4276 4956 984b555e4c75f0e9e05f34ce61242efd870fe1c40bf05865b38830133fefa4f4.exe 86 PID 4956 wrote to memory of 4276 4956 984b555e4c75f0e9e05f34ce61242efd870fe1c40bf05865b38830133fefa4f4.exe 86 PID 4956 wrote to memory of 4276 4956 984b555e4c75f0e9e05f34ce61242efd870fe1c40bf05865b38830133fefa4f4.exe 86 PID 4276 wrote to memory of 1120 4276 x5515290.exe 87 PID 4276 wrote to memory of 1120 4276 x5515290.exe 87 PID 4276 wrote to memory of 1120 4276 x5515290.exe 87 PID 1120 wrote to memory of 1896 1120 x6859175.exe 88 PID 1120 wrote to memory of 1896 1120 x6859175.exe 88 PID 1120 wrote to memory of 1896 1120 x6859175.exe 88 PID 1120 wrote to memory of 3556 1120 x6859175.exe 97 PID 1120 wrote to memory of 3556 1120 x6859175.exe 97 PID 1120 wrote to memory of 3556 1120 x6859175.exe 97 PID 4276 wrote to memory of 3440 4276 x5515290.exe 98 PID 4276 wrote to memory of 3440 4276 x5515290.exe 98 PID 4276 wrote to memory of 3440 4276 x5515290.exe 98 PID 3440 wrote to memory of 2228 3440 h4065100.exe 99 PID 3440 wrote to memory of 2228 3440 h4065100.exe 99 PID 3440 wrote to memory of 2228 3440 h4065100.exe 99 PID 3440 wrote to memory of 2228 3440 h4065100.exe 99 PID 3440 wrote to memory of 2228 3440 h4065100.exe 99 PID 3440 wrote to memory of 2228 3440 h4065100.exe 99 PID 3440 wrote to memory of 2228 3440 h4065100.exe 99 PID 3440 wrote to memory of 2228 3440 h4065100.exe 99 PID 3440 wrote to memory of 2228 3440 h4065100.exe 99 PID 3440 wrote to memory of 2228 3440 h4065100.exe 99 PID 4956 wrote to memory of 2948 4956 984b555e4c75f0e9e05f34ce61242efd870fe1c40bf05865b38830133fefa4f4.exe 102 PID 4956 wrote to memory of 2948 4956 984b555e4c75f0e9e05f34ce61242efd870fe1c40bf05865b38830133fefa4f4.exe 102 PID 4956 wrote to memory of 2948 4956 984b555e4c75f0e9e05f34ce61242efd870fe1c40bf05865b38830133fefa4f4.exe 102 PID 2948 wrote to memory of 2564 2948 i9791747.exe 103 PID 2948 wrote to memory of 2564 2948 i9791747.exe 103 PID 2948 wrote to memory of 2564 2948 i9791747.exe 103 PID 2948 wrote to memory of 2564 2948 i9791747.exe 103 PID 2948 wrote to memory of 2564 2948 i9791747.exe 103 PID 2948 wrote to memory of 2564 2948 i9791747.exe 103 PID 2948 wrote to memory of 2564 2948 i9791747.exe 103 PID 2948 wrote to memory of 2564 2948 i9791747.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\984b555e4c75f0e9e05f34ce61242efd870fe1c40bf05865b38830133fefa4f4.exe"C:\Users\Admin\AppData\Local\Temp\984b555e4c75f0e9e05f34ce61242efd870fe1c40bf05865b38830133fefa4f4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5515290.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5515290.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6859175.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6859175.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f6088459.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f6088459.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1896
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g9821596.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g9821596.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3556
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4065100.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4065100.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4065100.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4065100.exe4⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2228 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2228 -s 125⤵
- Program crash
PID:3360
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i9791747.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i9791747.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i9791747.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i9791747.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2564
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2228 -ip 22281⤵PID:2656
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
903KB
MD5d498c13e99111875578a64b1b920ad75
SHA19b8fb73fc8d7245e110ecb997af1da3b36371617
SHA25619048dfa7783c18ba97cb63db245f9b6053e2a42cd8bebbeb297567335f362f0
SHA51234b688fc2471531aadc1b8235a56e5d94f5146b47bd818f915b42aae0412a8e62c484380210d212922abb4e59ed9e1f73e68105785f1e0e2ac18fe9f863bc0df
-
Filesize
903KB
MD5d498c13e99111875578a64b1b920ad75
SHA19b8fb73fc8d7245e110ecb997af1da3b36371617
SHA25619048dfa7783c18ba97cb63db245f9b6053e2a42cd8bebbeb297567335f362f0
SHA51234b688fc2471531aadc1b8235a56e5d94f5146b47bd818f915b42aae0412a8e62c484380210d212922abb4e59ed9e1f73e68105785f1e0e2ac18fe9f863bc0df
-
Filesize
903KB
MD5d498c13e99111875578a64b1b920ad75
SHA19b8fb73fc8d7245e110ecb997af1da3b36371617
SHA25619048dfa7783c18ba97cb63db245f9b6053e2a42cd8bebbeb297567335f362f0
SHA51234b688fc2471531aadc1b8235a56e5d94f5146b47bd818f915b42aae0412a8e62c484380210d212922abb4e59ed9e1f73e68105785f1e0e2ac18fe9f863bc0df
-
Filesize
750KB
MD508a10f62875657f1a9f0d3f410cfc1dd
SHA193635c501ceea4286930b86fb712fb4502279f48
SHA256d3b9405477406003790084084f453ef095b956b625e005de0af7d3b028c50e09
SHA51296909e914fd72e29a0a6096170d5f46ae26b72b3191536eb7f22c54f43ec22b9965011244788ec019589bf27af756eaab2f89e48bedfe1b359f76f0e465f4277
-
Filesize
750KB
MD508a10f62875657f1a9f0d3f410cfc1dd
SHA193635c501ceea4286930b86fb712fb4502279f48
SHA256d3b9405477406003790084084f453ef095b956b625e005de0af7d3b028c50e09
SHA51296909e914fd72e29a0a6096170d5f46ae26b72b3191536eb7f22c54f43ec22b9965011244788ec019589bf27af756eaab2f89e48bedfe1b359f76f0e465f4277
-
Filesize
963KB
MD5b5fb9e9ebc61a5504f220dcb78583e33
SHA103f8cc6e3d0f448f37be354f9003430cc1aa12a5
SHA256611917d391e559ccc3a1a822586b0a9be2b0596419582caba8186eb177d7cb53
SHA512125307df9329f801df2b95c56739788982ecfa04c3c7329d8712ef517bee65a4fbb2246717b786de00439cb9ceb0ef48d370f8f191a48aaccbb536595ed30976
-
Filesize
963KB
MD5b5fb9e9ebc61a5504f220dcb78583e33
SHA103f8cc6e3d0f448f37be354f9003430cc1aa12a5
SHA256611917d391e559ccc3a1a822586b0a9be2b0596419582caba8186eb177d7cb53
SHA512125307df9329f801df2b95c56739788982ecfa04c3c7329d8712ef517bee65a4fbb2246717b786de00439cb9ceb0ef48d370f8f191a48aaccbb536595ed30976
-
Filesize
963KB
MD5b5fb9e9ebc61a5504f220dcb78583e33
SHA103f8cc6e3d0f448f37be354f9003430cc1aa12a5
SHA256611917d391e559ccc3a1a822586b0a9be2b0596419582caba8186eb177d7cb53
SHA512125307df9329f801df2b95c56739788982ecfa04c3c7329d8712ef517bee65a4fbb2246717b786de00439cb9ceb0ef48d370f8f191a48aaccbb536595ed30976
-
Filesize
305KB
MD579f822e17573b198c3691b73661dc998
SHA16697096af9984acf183ac1929031e7e5f3382dae
SHA2569241d7c97dddae7e5f8c1c86c1d42229a43405730df404eb33243be8deb5cfb3
SHA512f5079e16bea37e00454d0bb3a239a556dc47c61aba74c9001925ce4b7e8de5130dccb9d30362d4f30a97c45c5d2c22d5b95da2093d08baf0ffbf69172031dcf0
-
Filesize
305KB
MD579f822e17573b198c3691b73661dc998
SHA16697096af9984acf183ac1929031e7e5f3382dae
SHA2569241d7c97dddae7e5f8c1c86c1d42229a43405730df404eb33243be8deb5cfb3
SHA512f5079e16bea37e00454d0bb3a239a556dc47c61aba74c9001925ce4b7e8de5130dccb9d30362d4f30a97c45c5d2c22d5b95da2093d08baf0ffbf69172031dcf0
-
Filesize
145KB
MD5b882aaff224bbbf637e9703f1c1a61fe
SHA14f46ff45340be70b4adc07c37f1ac4c575b348e4
SHA2567d6f4a634ab38cb6c07272b0b6d3c1909e85be4a5b5dc1dcb2fca4e226fb82ca
SHA5122291f05ae73d1716d11e5ce65568e5d06799cce7c563c11b6f0715d7fe1057345cd1ad3ca0ffc6d5f168ef8180c545b970e756fb91be73d19964fced2a384a47
-
Filesize
145KB
MD5b882aaff224bbbf637e9703f1c1a61fe
SHA14f46ff45340be70b4adc07c37f1ac4c575b348e4
SHA2567d6f4a634ab38cb6c07272b0b6d3c1909e85be4a5b5dc1dcb2fca4e226fb82ca
SHA5122291f05ae73d1716d11e5ce65568e5d06799cce7c563c11b6f0715d7fe1057345cd1ad3ca0ffc6d5f168ef8180c545b970e756fb91be73d19964fced2a384a47
-
Filesize
183KB
MD5dd8ec52d28b50877ea6d31ede51616f5
SHA106aa6872085340fcb034587c187e55dabd4f662d
SHA256e7c3a7bcc77eae312029350d92687a293f92c0ce901ed86096e82660a8b79dab
SHA512e43d7f58ac1e2d45e21e6dd7374b5cde02c86ece362f374918eb5c3b76e50616a3552d8d2cf82208fbb99af1abc83b6b34af633037c79493169da862ab8b085b
-
Filesize
183KB
MD5dd8ec52d28b50877ea6d31ede51616f5
SHA106aa6872085340fcb034587c187e55dabd4f662d
SHA256e7c3a7bcc77eae312029350d92687a293f92c0ce901ed86096e82660a8b79dab
SHA512e43d7f58ac1e2d45e21e6dd7374b5cde02c86ece362f374918eb5c3b76e50616a3552d8d2cf82208fbb99af1abc83b6b34af633037c79493169da862ab8b085b