Analysis
-
max time kernel
55s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
15-05-2023 08:27
Static task
static1
Behavioral task
behavioral1
Sample
53bafacf5dbce251d4ef8411f7b60608d4891d0fcc786acb1d7b5bf0954c440b.exe
Resource
win10-20230220-en
General
-
Target
53bafacf5dbce251d4ef8411f7b60608d4891d0fcc786acb1d7b5bf0954c440b.exe
-
Size
1.1MB
-
MD5
5cf03847cc6a6b72695aa889b28b9616
-
SHA1
79c28a63e445fd715b81c2c7cd9370d33d3cea51
-
SHA256
53bafacf5dbce251d4ef8411f7b60608d4891d0fcc786acb1d7b5bf0954c440b
-
SHA512
8f41fcdad8f1a9006e00689ac716a88f9b2a4baf1d74bf026a4b15d50416236a62825fcdc4d963bc3293cb6a4c62fdf64e3045911a04ddbd2dc757c71104489e
-
SSDEEP
24576:EygE45A8WZVz1q9ZxvL6tgCXYTrIDiPPfMLy9tJ7E0:ThUuZ11qPotgCXCrIDWPf4y9/4
Malware Config
Extracted
redline
muza
185.161.248.75:4132
-
auth_value
99f39e1ac98e0c0a729ab27594e72bc3
Extracted
redline
rumba
185.161.248.75:4132
-
auth_value
35dbb4006087a5d5c211b21be41adb90
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a2681798.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a2681798.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a2681798.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a2681798.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a2681798.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 9 IoCs
pid Process 5096 v0152005.exe 2104 v6593661.exe 4108 a2681798.exe 4600 b5939696.exe 4512 c6442507.exe 1836 c6442507.exe 3000 c6442507.exe 4676 d7200007.exe 3396 d7200007.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a2681798.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a2681798.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 53bafacf5dbce251d4ef8411f7b60608d4891d0fcc786acb1d7b5bf0954c440b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 53bafacf5dbce251d4ef8411f7b60608d4891d0fcc786acb1d7b5bf0954c440b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v0152005.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v0152005.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v6593661.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v6593661.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4512 set thread context of 3000 4512 c6442507.exe 73 PID 4676 set thread context of 3396 4676 d7200007.exe 77 -
Program crash 1 IoCs
pid pid_target Process procid_target 2600 3000 WerFault.exe 73 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4108 a2681798.exe 4108 a2681798.exe 4600 b5939696.exe 4600 b5939696.exe 3396 d7200007.exe 3396 d7200007.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4108 a2681798.exe Token: SeDebugPrivilege 4600 b5939696.exe Token: SeDebugPrivilege 4512 c6442507.exe Token: SeDebugPrivilege 4676 d7200007.exe Token: SeDebugPrivilege 3396 d7200007.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 4756 wrote to memory of 5096 4756 53bafacf5dbce251d4ef8411f7b60608d4891d0fcc786acb1d7b5bf0954c440b.exe 66 PID 4756 wrote to memory of 5096 4756 53bafacf5dbce251d4ef8411f7b60608d4891d0fcc786acb1d7b5bf0954c440b.exe 66 PID 4756 wrote to memory of 5096 4756 53bafacf5dbce251d4ef8411f7b60608d4891d0fcc786acb1d7b5bf0954c440b.exe 66 PID 5096 wrote to memory of 2104 5096 v0152005.exe 67 PID 5096 wrote to memory of 2104 5096 v0152005.exe 67 PID 5096 wrote to memory of 2104 5096 v0152005.exe 67 PID 2104 wrote to memory of 4108 2104 v6593661.exe 68 PID 2104 wrote to memory of 4108 2104 v6593661.exe 68 PID 2104 wrote to memory of 4108 2104 v6593661.exe 68 PID 2104 wrote to memory of 4600 2104 v6593661.exe 69 PID 2104 wrote to memory of 4600 2104 v6593661.exe 69 PID 2104 wrote to memory of 4600 2104 v6593661.exe 69 PID 5096 wrote to memory of 4512 5096 v0152005.exe 71 PID 5096 wrote to memory of 4512 5096 v0152005.exe 71 PID 5096 wrote to memory of 4512 5096 v0152005.exe 71 PID 4512 wrote to memory of 1836 4512 c6442507.exe 72 PID 4512 wrote to memory of 1836 4512 c6442507.exe 72 PID 4512 wrote to memory of 1836 4512 c6442507.exe 72 PID 4512 wrote to memory of 1836 4512 c6442507.exe 72 PID 4512 wrote to memory of 3000 4512 c6442507.exe 73 PID 4512 wrote to memory of 3000 4512 c6442507.exe 73 PID 4512 wrote to memory of 3000 4512 c6442507.exe 73 PID 4512 wrote to memory of 3000 4512 c6442507.exe 73 PID 4512 wrote to memory of 3000 4512 c6442507.exe 73 PID 4512 wrote to memory of 3000 4512 c6442507.exe 73 PID 4512 wrote to memory of 3000 4512 c6442507.exe 73 PID 4512 wrote to memory of 3000 4512 c6442507.exe 73 PID 4512 wrote to memory of 3000 4512 c6442507.exe 73 PID 4512 wrote to memory of 3000 4512 c6442507.exe 73 PID 4756 wrote to memory of 4676 4756 53bafacf5dbce251d4ef8411f7b60608d4891d0fcc786acb1d7b5bf0954c440b.exe 75 PID 4756 wrote to memory of 4676 4756 53bafacf5dbce251d4ef8411f7b60608d4891d0fcc786acb1d7b5bf0954c440b.exe 75 PID 4756 wrote to memory of 4676 4756 53bafacf5dbce251d4ef8411f7b60608d4891d0fcc786acb1d7b5bf0954c440b.exe 75 PID 4676 wrote to memory of 3396 4676 d7200007.exe 77 PID 4676 wrote to memory of 3396 4676 d7200007.exe 77 PID 4676 wrote to memory of 3396 4676 d7200007.exe 77 PID 4676 wrote to memory of 3396 4676 d7200007.exe 77 PID 4676 wrote to memory of 3396 4676 d7200007.exe 77 PID 4676 wrote to memory of 3396 4676 d7200007.exe 77 PID 4676 wrote to memory of 3396 4676 d7200007.exe 77 PID 4676 wrote to memory of 3396 4676 d7200007.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\53bafacf5dbce251d4ef8411f7b60608d4891d0fcc786acb1d7b5bf0954c440b.exe"C:\Users\Admin\AppData\Local\Temp\53bafacf5dbce251d4ef8411f7b60608d4891d0fcc786acb1d7b5bf0954c440b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0152005.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0152005.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6593661.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6593661.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a2681798.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a2681798.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4108
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5939696.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5939696.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4600
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6442507.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6442507.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6442507.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6442507.exe4⤵
- Executes dropped EXE
PID:1836
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6442507.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6442507.exe4⤵
- Executes dropped EXE
PID:3000 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3000 -s 245⤵
- Program crash
PID:2600
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d7200007.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d7200007.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d7200007.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d7200007.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3396
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
425B
MD5605f809fab8c19729d39d075f7ffdb53
SHA1c546f877c9bd53563174a90312a8337fdfc5fdd9
SHA2566904d540649e76c55f99530b81be17e099184bb4cad415aa9b9b39cc3677f556
SHA51282cc12c3186ae23884b8d5c104638c8206272c4389ade56b926dfc1d437b03888159b3c790b188b54d277a262e731927e703e680ea642e1417faee27443fd5b3
-
Filesize
904KB
MD5143d21bc3dc622f18724fd5441f96062
SHA1c92c5729bb1cbfb79413ee3ddc7a49803ea683e3
SHA2566d0f972dc821b3806831af093fc82a91f675651b26ca8ea4e1eabe7fc24979e7
SHA5120207f609b6373d5104dc4e7c474a92b622c6c5cea28f3c8b6505df4d8ad9af90f50a865ecd2763ebe9080111c292f35fba59cf7da53ccf3a1b5a1cd112aa8353
-
Filesize
904KB
MD5143d21bc3dc622f18724fd5441f96062
SHA1c92c5729bb1cbfb79413ee3ddc7a49803ea683e3
SHA2566d0f972dc821b3806831af093fc82a91f675651b26ca8ea4e1eabe7fc24979e7
SHA5120207f609b6373d5104dc4e7c474a92b622c6c5cea28f3c8b6505df4d8ad9af90f50a865ecd2763ebe9080111c292f35fba59cf7da53ccf3a1b5a1cd112aa8353
-
Filesize
904KB
MD5143d21bc3dc622f18724fd5441f96062
SHA1c92c5729bb1cbfb79413ee3ddc7a49803ea683e3
SHA2566d0f972dc821b3806831af093fc82a91f675651b26ca8ea4e1eabe7fc24979e7
SHA5120207f609b6373d5104dc4e7c474a92b622c6c5cea28f3c8b6505df4d8ad9af90f50a865ecd2763ebe9080111c292f35fba59cf7da53ccf3a1b5a1cd112aa8353
-
Filesize
750KB
MD5a9bee5e9a3de8f0349100d94eab16c4f
SHA11bcb49cd1de98714eef520f9ab484c6fe54112ba
SHA2566bc32fb7535be3a9bfecc9ee28d75b3afc441276893783ad89164b54c38eeaa5
SHA5123bba671143e4fcec34d54ac8055cd6cad5e67496558bd007f1443d9e55e0ac967abdda9017edc7799c0f2976218e5c1556dd3093d88ecc228a4ff427ca248575
-
Filesize
750KB
MD5a9bee5e9a3de8f0349100d94eab16c4f
SHA11bcb49cd1de98714eef520f9ab484c6fe54112ba
SHA2566bc32fb7535be3a9bfecc9ee28d75b3afc441276893783ad89164b54c38eeaa5
SHA5123bba671143e4fcec34d54ac8055cd6cad5e67496558bd007f1443d9e55e0ac967abdda9017edc7799c0f2976218e5c1556dd3093d88ecc228a4ff427ca248575
-
Filesize
963KB
MD57c6bf3252c4cfdaee8f24c396f2aa683
SHA1621de026e22ac736eb0607d2e74df74ba67f5ee1
SHA2569a92f5cda3b6c1b1533d789873ce0aa47592f52275c3507230e2b2bf2fa08842
SHA5126222eef91750818ca59013f41a614d51805ba8210e5a65c9b2ebc94603989d613e86ab538e6ddd779be70d6df3292bffa5a2e5212a8a5d9df7f623304920a1a4
-
Filesize
963KB
MD57c6bf3252c4cfdaee8f24c396f2aa683
SHA1621de026e22ac736eb0607d2e74df74ba67f5ee1
SHA2569a92f5cda3b6c1b1533d789873ce0aa47592f52275c3507230e2b2bf2fa08842
SHA5126222eef91750818ca59013f41a614d51805ba8210e5a65c9b2ebc94603989d613e86ab538e6ddd779be70d6df3292bffa5a2e5212a8a5d9df7f623304920a1a4
-
Filesize
963KB
MD57c6bf3252c4cfdaee8f24c396f2aa683
SHA1621de026e22ac736eb0607d2e74df74ba67f5ee1
SHA2569a92f5cda3b6c1b1533d789873ce0aa47592f52275c3507230e2b2bf2fa08842
SHA5126222eef91750818ca59013f41a614d51805ba8210e5a65c9b2ebc94603989d613e86ab538e6ddd779be70d6df3292bffa5a2e5212a8a5d9df7f623304920a1a4
-
Filesize
963KB
MD57c6bf3252c4cfdaee8f24c396f2aa683
SHA1621de026e22ac736eb0607d2e74df74ba67f5ee1
SHA2569a92f5cda3b6c1b1533d789873ce0aa47592f52275c3507230e2b2bf2fa08842
SHA5126222eef91750818ca59013f41a614d51805ba8210e5a65c9b2ebc94603989d613e86ab538e6ddd779be70d6df3292bffa5a2e5212a8a5d9df7f623304920a1a4
-
Filesize
305KB
MD50adcac59a81f3cbf6c3e2d9470eba1dd
SHA11003d7aaf3ae432282df50bfe785fe7a504eeb8a
SHA256c31bc07098b255706e132be1c88b7ab0af0a1f9ec93777176f241abe18d3707b
SHA51235a450416351437837b879747a2abd209b525af89cde767fd7eaf5946a79033d0d5d4a556fbd6d4522b29c29538161abb360f7959b8bb3ea4fca68987551efca
-
Filesize
305KB
MD50adcac59a81f3cbf6c3e2d9470eba1dd
SHA11003d7aaf3ae432282df50bfe785fe7a504eeb8a
SHA256c31bc07098b255706e132be1c88b7ab0af0a1f9ec93777176f241abe18d3707b
SHA51235a450416351437837b879747a2abd209b525af89cde767fd7eaf5946a79033d0d5d4a556fbd6d4522b29c29538161abb360f7959b8bb3ea4fca68987551efca
-
Filesize
185KB
MD5d24434cc1ac38dafa7a1dbb03784fe8c
SHA1ea602594a0566652b426df318be672ff85361eb5
SHA25617290ac3f40c3283e78d0d5b30879382e76f51742ffa9f691bda2c7800ec4800
SHA51218f60f906c4f62794981fe58a00265777b37d6893d88510a45013137dadf6ea581db1fb7a569b0eefcec91c37541f67e917eaf1a78086b386a469a4889c8003f
-
Filesize
185KB
MD5d24434cc1ac38dafa7a1dbb03784fe8c
SHA1ea602594a0566652b426df318be672ff85361eb5
SHA25617290ac3f40c3283e78d0d5b30879382e76f51742ffa9f691bda2c7800ec4800
SHA51218f60f906c4f62794981fe58a00265777b37d6893d88510a45013137dadf6ea581db1fb7a569b0eefcec91c37541f67e917eaf1a78086b386a469a4889c8003f
-
Filesize
146KB
MD5a2362ea6cda447c60d1cd88804d47e6a
SHA1f7c08bd2d960f033b930d6bfec3d37f4174fd998
SHA2568ef1ffd850a05f60e8a02d9541a8563afbf88f515a86960fb399324a4fcb425a
SHA51278f9e8789edca301eddad77481ef3ced8eb9ba0e8dd1aaff0677d8a6ce46d413a33d927dfbe243fcdff0d893541bf8fe514f238f667034202594dbe4db7a8e3a
-
Filesize
146KB
MD5a2362ea6cda447c60d1cd88804d47e6a
SHA1f7c08bd2d960f033b930d6bfec3d37f4174fd998
SHA2568ef1ffd850a05f60e8a02d9541a8563afbf88f515a86960fb399324a4fcb425a
SHA51278f9e8789edca301eddad77481ef3ced8eb9ba0e8dd1aaff0677d8a6ce46d413a33d927dfbe243fcdff0d893541bf8fe514f238f667034202594dbe4db7a8e3a