Analysis
-
max time kernel
95s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2023, 16:12
Static task
static1
Behavioral task
behavioral1
Sample
e59ac7fb7c80fa011f500a6065ea349b01b4651c3b672031549190286c6141bf.exe
Resource
win10v2004-20230220-en
General
-
Target
e59ac7fb7c80fa011f500a6065ea349b01b4651c3b672031549190286c6141bf.exe
-
Size
1.1MB
-
MD5
cbcd9f45b2389c825a3d1db3acf49816
-
SHA1
f333b34f47aeafe21e2c6371f7fb904c31448240
-
SHA256
e59ac7fb7c80fa011f500a6065ea349b01b4651c3b672031549190286c6141bf
-
SHA512
f005b13a5dd89d499be2ff10a5686441e0a02af04e3be1cb46fbc61a40e16256f16742d009eb95220bb79ce831516c68fa56a037e2c55e87060343eb35ebbdd0
-
SSDEEP
24576:uy4HUN3lFzyjtKvPPdZjcfWtOT8kdtAgTYcCsdwWTXe:9IUByjt6jcfW+8YYG+W
Malware Config
Extracted
redline
messi
185.161.248.75:4132
-
auth_value
b602b28664bb738e322d37baab91db28
Extracted
redline
warum
185.161.248.75:4132
-
auth_value
0bdb2dda91dadc65f555dee088a6a2a4
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a5988208.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a5988208.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a5988208.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a5988208.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a5988208.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a5988208.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 8 IoCs
pid Process 4112 v8181139.exe 3528 v0217839.exe 376 a5988208.exe 1412 b4958343.exe 3716 c5044675.exe 3888 c5044675.exe 2836 d6546237.exe 856 d6546237.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a5988208.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a5988208.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e59ac7fb7c80fa011f500a6065ea349b01b4651c3b672031549190286c6141bf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e59ac7fb7c80fa011f500a6065ea349b01b4651c3b672031549190286c6141bf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v8181139.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v8181139.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v0217839.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v0217839.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3716 set thread context of 3888 3716 c5044675.exe 97 PID 2836 set thread context of 856 2836 d6546237.exe 101 -
Program crash 1 IoCs
pid pid_target Process procid_target 3364 3888 WerFault.exe 97 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 376 a5988208.exe 376 a5988208.exe 1412 b4958343.exe 1412 b4958343.exe 856 d6546237.exe 856 d6546237.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 376 a5988208.exe Token: SeDebugPrivilege 1412 b4958343.exe Token: SeDebugPrivilege 3716 c5044675.exe Token: SeDebugPrivilege 2836 d6546237.exe Token: SeDebugPrivilege 856 d6546237.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3888 c5044675.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1712 wrote to memory of 4112 1712 e59ac7fb7c80fa011f500a6065ea349b01b4651c3b672031549190286c6141bf.exe 84 PID 1712 wrote to memory of 4112 1712 e59ac7fb7c80fa011f500a6065ea349b01b4651c3b672031549190286c6141bf.exe 84 PID 1712 wrote to memory of 4112 1712 e59ac7fb7c80fa011f500a6065ea349b01b4651c3b672031549190286c6141bf.exe 84 PID 4112 wrote to memory of 3528 4112 v8181139.exe 85 PID 4112 wrote to memory of 3528 4112 v8181139.exe 85 PID 4112 wrote to memory of 3528 4112 v8181139.exe 85 PID 3528 wrote to memory of 376 3528 v0217839.exe 86 PID 3528 wrote to memory of 376 3528 v0217839.exe 86 PID 3528 wrote to memory of 376 3528 v0217839.exe 86 PID 3528 wrote to memory of 1412 3528 v0217839.exe 92 PID 3528 wrote to memory of 1412 3528 v0217839.exe 92 PID 3528 wrote to memory of 1412 3528 v0217839.exe 92 PID 4112 wrote to memory of 3716 4112 v8181139.exe 96 PID 4112 wrote to memory of 3716 4112 v8181139.exe 96 PID 4112 wrote to memory of 3716 4112 v8181139.exe 96 PID 3716 wrote to memory of 3888 3716 c5044675.exe 97 PID 3716 wrote to memory of 3888 3716 c5044675.exe 97 PID 3716 wrote to memory of 3888 3716 c5044675.exe 97 PID 3716 wrote to memory of 3888 3716 c5044675.exe 97 PID 3716 wrote to memory of 3888 3716 c5044675.exe 97 PID 3716 wrote to memory of 3888 3716 c5044675.exe 97 PID 3716 wrote to memory of 3888 3716 c5044675.exe 97 PID 3716 wrote to memory of 3888 3716 c5044675.exe 97 PID 3716 wrote to memory of 3888 3716 c5044675.exe 97 PID 3716 wrote to memory of 3888 3716 c5044675.exe 97 PID 1712 wrote to memory of 2836 1712 e59ac7fb7c80fa011f500a6065ea349b01b4651c3b672031549190286c6141bf.exe 99 PID 1712 wrote to memory of 2836 1712 e59ac7fb7c80fa011f500a6065ea349b01b4651c3b672031549190286c6141bf.exe 99 PID 1712 wrote to memory of 2836 1712 e59ac7fb7c80fa011f500a6065ea349b01b4651c3b672031549190286c6141bf.exe 99 PID 2836 wrote to memory of 856 2836 d6546237.exe 101 PID 2836 wrote to memory of 856 2836 d6546237.exe 101 PID 2836 wrote to memory of 856 2836 d6546237.exe 101 PID 2836 wrote to memory of 856 2836 d6546237.exe 101 PID 2836 wrote to memory of 856 2836 d6546237.exe 101 PID 2836 wrote to memory of 856 2836 d6546237.exe 101 PID 2836 wrote to memory of 856 2836 d6546237.exe 101 PID 2836 wrote to memory of 856 2836 d6546237.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\e59ac7fb7c80fa011f500a6065ea349b01b4651c3b672031549190286c6141bf.exe"C:\Users\Admin\AppData\Local\Temp\e59ac7fb7c80fa011f500a6065ea349b01b4651c3b672031549190286c6141bf.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8181139.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8181139.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0217839.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0217839.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a5988208.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a5988208.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:376
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4958343.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4958343.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1412
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c5044675.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c5044675.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c5044675.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c5044675.exe4⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3888 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3888 -s 125⤵
- Program crash
PID:3364
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d6546237.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d6546237.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d6546237.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d6546237.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:856
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3888 -ip 38881⤵PID:408
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
903KB
MD5ad046635f0e7246b1c96980ae5010765
SHA10617ef10ac7a2fd407f49bd40fa85be9148a4c2c
SHA2561a2a79dc38292f40ad62b9962e67c780b29698a3f7981fda3d5bc0dfba230655
SHA5122a9a278357fc5dd53a254e9106db91a6e3e34893da2d3a5b849589d6b8d03bbe3b9ae9cf6d68988f0789368fb9f0e324171f9b24e1501b9aa722c5762a3faade
-
Filesize
903KB
MD5ad046635f0e7246b1c96980ae5010765
SHA10617ef10ac7a2fd407f49bd40fa85be9148a4c2c
SHA2561a2a79dc38292f40ad62b9962e67c780b29698a3f7981fda3d5bc0dfba230655
SHA5122a9a278357fc5dd53a254e9106db91a6e3e34893da2d3a5b849589d6b8d03bbe3b9ae9cf6d68988f0789368fb9f0e324171f9b24e1501b9aa722c5762a3faade
-
Filesize
903KB
MD5ad046635f0e7246b1c96980ae5010765
SHA10617ef10ac7a2fd407f49bd40fa85be9148a4c2c
SHA2561a2a79dc38292f40ad62b9962e67c780b29698a3f7981fda3d5bc0dfba230655
SHA5122a9a278357fc5dd53a254e9106db91a6e3e34893da2d3a5b849589d6b8d03bbe3b9ae9cf6d68988f0789368fb9f0e324171f9b24e1501b9aa722c5762a3faade
-
Filesize
749KB
MD5f73bbb82500a26a089516047b36d9b2f
SHA13c07df03d66858df18080a7dd4c91937b3a4a62d
SHA2566f414609645c776a1c97c51c5eb197bb8a662ce88e9465b37682f1902696fc38
SHA512192f3906711195f89a9fdbaddb4708b57477b01e2ff0d68cbcae080f1abcba7c826603ff047c44557518bbf712fcd575eb3a44eeff78196c7d4a0b74b88c3f8f
-
Filesize
749KB
MD5f73bbb82500a26a089516047b36d9b2f
SHA13c07df03d66858df18080a7dd4c91937b3a4a62d
SHA2566f414609645c776a1c97c51c5eb197bb8a662ce88e9465b37682f1902696fc38
SHA512192f3906711195f89a9fdbaddb4708b57477b01e2ff0d68cbcae080f1abcba7c826603ff047c44557518bbf712fcd575eb3a44eeff78196c7d4a0b74b88c3f8f
-
Filesize
963KB
MD5e1f514ed10f24a5cc055bc328cad9f9e
SHA1f71a13e20b8d03aeacd889974a1faa9ffe2a9eb7
SHA256d74e1127512afe431d1831fefcc714a0331a656ba2647e7129b6f33b0e3d9467
SHA512f0772a638ba3656e7971d945835aca2ab3272fdf5e97e4a9ad6b1a622f4717cf5a57a20a50fb0a7e2aaae0cb4d2bcf5556ff13f3cbc26ab851e9af027efb534d
-
Filesize
963KB
MD5e1f514ed10f24a5cc055bc328cad9f9e
SHA1f71a13e20b8d03aeacd889974a1faa9ffe2a9eb7
SHA256d74e1127512afe431d1831fefcc714a0331a656ba2647e7129b6f33b0e3d9467
SHA512f0772a638ba3656e7971d945835aca2ab3272fdf5e97e4a9ad6b1a622f4717cf5a57a20a50fb0a7e2aaae0cb4d2bcf5556ff13f3cbc26ab851e9af027efb534d
-
Filesize
963KB
MD5e1f514ed10f24a5cc055bc328cad9f9e
SHA1f71a13e20b8d03aeacd889974a1faa9ffe2a9eb7
SHA256d74e1127512afe431d1831fefcc714a0331a656ba2647e7129b6f33b0e3d9467
SHA512f0772a638ba3656e7971d945835aca2ab3272fdf5e97e4a9ad6b1a622f4717cf5a57a20a50fb0a7e2aaae0cb4d2bcf5556ff13f3cbc26ab851e9af027efb534d
-
Filesize
305KB
MD5982c69b5a9de0b8ec090f5065425ef92
SHA10467f855f02d96ee02369b68e0b4aed8718877a8
SHA2569fb0c78d67b4de88eaebb51e497678174f04252c5981ce3d24ff5dc1e04c1b6d
SHA5123b009b17f4b096990681e50078c8430c3b55154568a203652b55c75d7d987e2ed20257d27dd5bfe02707d2f902bb4cdead4cb54f598f8b3d992f0ffb9f7fb1e9
-
Filesize
305KB
MD5982c69b5a9de0b8ec090f5065425ef92
SHA10467f855f02d96ee02369b68e0b4aed8718877a8
SHA2569fb0c78d67b4de88eaebb51e497678174f04252c5981ce3d24ff5dc1e04c1b6d
SHA5123b009b17f4b096990681e50078c8430c3b55154568a203652b55c75d7d987e2ed20257d27dd5bfe02707d2f902bb4cdead4cb54f598f8b3d992f0ffb9f7fb1e9
-
Filesize
184KB
MD52c1b6abab3f965d3aa3bfe869ce08f15
SHA1859dd765afd571df77c97780a22945c8f1a57b82
SHA256732567182b5990ba090af3ed635dcafe0c8f0c1600236dc8db212023eafc919f
SHA5126c14df1ff4c40588d1d2aa6c24a45997c842bde2112a3f15c441a61667b15cda6840e357c861c34eaba81a248ee0bd04868ad81eb4d225e79171ec214dc725bf
-
Filesize
184KB
MD52c1b6abab3f965d3aa3bfe869ce08f15
SHA1859dd765afd571df77c97780a22945c8f1a57b82
SHA256732567182b5990ba090af3ed635dcafe0c8f0c1600236dc8db212023eafc919f
SHA5126c14df1ff4c40588d1d2aa6c24a45997c842bde2112a3f15c441a61667b15cda6840e357c861c34eaba81a248ee0bd04868ad81eb4d225e79171ec214dc725bf
-
Filesize
145KB
MD5b1e80c3c72c516baf894a7ecacd42cbb
SHA1097b99ccc7f830099bf112fdec565589cb0c8991
SHA256d96f6f379adc82262d2d7c999cf6c92d6c9e3b77238c9296560a1914a9b859e9
SHA5122442b1048099c35508c56b231276da6b22198aa9d462641fe6cf26808eedc38b917285437dd00d71dc0fed8c35f9e141ac7295fdacc3e74fd8a2f17a41f6af43
-
Filesize
145KB
MD5b1e80c3c72c516baf894a7ecacd42cbb
SHA1097b99ccc7f830099bf112fdec565589cb0c8991
SHA256d96f6f379adc82262d2d7c999cf6c92d6c9e3b77238c9296560a1914a9b859e9
SHA5122442b1048099c35508c56b231276da6b22198aa9d462641fe6cf26808eedc38b917285437dd00d71dc0fed8c35f9e141ac7295fdacc3e74fd8a2f17a41f6af43