Analysis
-
max time kernel
135s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2023, 10:36
Static task
static1
Behavioral task
behavioral1
Sample
b028e48f7cc37b30f8e3763fca40ece34398c56d4eb329534c41d66b25510536.exe
Resource
win10v2004-20230220-en
General
-
Target
b028e48f7cc37b30f8e3763fca40ece34398c56d4eb329534c41d66b25510536.exe
-
Size
1.1MB
-
MD5
9fcbf94f8e1c3abf7145ca47b4b7cfe6
-
SHA1
4cba592a35ead3b26c9df1cb4e31650608757f08
-
SHA256
b028e48f7cc37b30f8e3763fca40ece34398c56d4eb329534c41d66b25510536
-
SHA512
4f0ab46f575a06d97d979d3fcc913eacde1703b004227c598a839524ce993c36f249dfc4945670fd82a55b427c737c4bc601e4a2c29a010c8738b7700ae60a33
-
SSDEEP
24576:gynVFdpBZ7i8bEsixWDpW1b3OzrGlYRBhES9ZZ7d7bQAMH7:nVFdpBlPEsb9W13KxES97d7bQ/
Malware Config
Extracted
redline
muxan
185.161.248.75:4132
-
auth_value
d605be949bb645b0759bf765eb7e6a47
Extracted
redline
srala
185.161.248.75:4132
-
auth_value
c90de493c232a904fb467fa366785cb6
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a4931055.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a4931055.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a4931055.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a4931055.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a4931055.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a4931055.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 9 IoCs
pid Process 2064 v0980060.exe 3184 v8711039.exe 3980 a4931055.exe 2616 b2380151.exe 1144 c9569300.exe 3488 c9569300.exe 2892 c9569300.exe 5048 d6381154.exe 2000 d6381154.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a4931055.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a4931055.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v8711039.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b028e48f7cc37b30f8e3763fca40ece34398c56d4eb329534c41d66b25510536.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b028e48f7cc37b30f8e3763fca40ece34398c56d4eb329534c41d66b25510536.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v0980060.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v0980060.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v8711039.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1144 set thread context of 2892 1144 c9569300.exe 93 PID 5048 set thread context of 2000 5048 d6381154.exe 97 -
Program crash 1 IoCs
pid pid_target Process procid_target 1444 2892 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3980 a4931055.exe 3980 a4931055.exe 2616 b2380151.exe 2616 b2380151.exe 2000 d6381154.exe 2000 d6381154.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3980 a4931055.exe Token: SeDebugPrivilege 2616 b2380151.exe Token: SeDebugPrivilege 1144 c9569300.exe Token: SeDebugPrivilege 5048 d6381154.exe Token: SeDebugPrivilege 2000 d6381154.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2892 c9569300.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 4908 wrote to memory of 2064 4908 b028e48f7cc37b30f8e3763fca40ece34398c56d4eb329534c41d66b25510536.exe 84 PID 4908 wrote to memory of 2064 4908 b028e48f7cc37b30f8e3763fca40ece34398c56d4eb329534c41d66b25510536.exe 84 PID 4908 wrote to memory of 2064 4908 b028e48f7cc37b30f8e3763fca40ece34398c56d4eb329534c41d66b25510536.exe 84 PID 2064 wrote to memory of 3184 2064 v0980060.exe 85 PID 2064 wrote to memory of 3184 2064 v0980060.exe 85 PID 2064 wrote to memory of 3184 2064 v0980060.exe 85 PID 3184 wrote to memory of 3980 3184 v8711039.exe 86 PID 3184 wrote to memory of 3980 3184 v8711039.exe 86 PID 3184 wrote to memory of 3980 3184 v8711039.exe 86 PID 3184 wrote to memory of 2616 3184 v8711039.exe 90 PID 3184 wrote to memory of 2616 3184 v8711039.exe 90 PID 3184 wrote to memory of 2616 3184 v8711039.exe 90 PID 2064 wrote to memory of 1144 2064 v0980060.exe 91 PID 2064 wrote to memory of 1144 2064 v0980060.exe 91 PID 2064 wrote to memory of 1144 2064 v0980060.exe 91 PID 1144 wrote to memory of 3488 1144 c9569300.exe 92 PID 1144 wrote to memory of 3488 1144 c9569300.exe 92 PID 1144 wrote to memory of 3488 1144 c9569300.exe 92 PID 1144 wrote to memory of 3488 1144 c9569300.exe 92 PID 1144 wrote to memory of 2892 1144 c9569300.exe 93 PID 1144 wrote to memory of 2892 1144 c9569300.exe 93 PID 1144 wrote to memory of 2892 1144 c9569300.exe 93 PID 1144 wrote to memory of 2892 1144 c9569300.exe 93 PID 1144 wrote to memory of 2892 1144 c9569300.exe 93 PID 1144 wrote to memory of 2892 1144 c9569300.exe 93 PID 1144 wrote to memory of 2892 1144 c9569300.exe 93 PID 1144 wrote to memory of 2892 1144 c9569300.exe 93 PID 1144 wrote to memory of 2892 1144 c9569300.exe 93 PID 1144 wrote to memory of 2892 1144 c9569300.exe 93 PID 4908 wrote to memory of 5048 4908 b028e48f7cc37b30f8e3763fca40ece34398c56d4eb329534c41d66b25510536.exe 96 PID 4908 wrote to memory of 5048 4908 b028e48f7cc37b30f8e3763fca40ece34398c56d4eb329534c41d66b25510536.exe 96 PID 4908 wrote to memory of 5048 4908 b028e48f7cc37b30f8e3763fca40ece34398c56d4eb329534c41d66b25510536.exe 96 PID 5048 wrote to memory of 2000 5048 d6381154.exe 97 PID 5048 wrote to memory of 2000 5048 d6381154.exe 97 PID 5048 wrote to memory of 2000 5048 d6381154.exe 97 PID 5048 wrote to memory of 2000 5048 d6381154.exe 97 PID 5048 wrote to memory of 2000 5048 d6381154.exe 97 PID 5048 wrote to memory of 2000 5048 d6381154.exe 97 PID 5048 wrote to memory of 2000 5048 d6381154.exe 97 PID 5048 wrote to memory of 2000 5048 d6381154.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\b028e48f7cc37b30f8e3763fca40ece34398c56d4eb329534c41d66b25510536.exe"C:\Users\Admin\AppData\Local\Temp\b028e48f7cc37b30f8e3763fca40ece34398c56d4eb329534c41d66b25510536.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0980060.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0980060.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8711039.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8711039.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4931055.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4931055.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3980
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2380151.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2380151.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c9569300.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c9569300.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c9569300.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c9569300.exe4⤵
- Executes dropped EXE
PID:3488
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c9569300.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c9569300.exe4⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2892 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2892 -s 125⤵
- Program crash
PID:1444
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d6381154.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d6381154.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d6381154.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d6381154.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2000
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 2892 -ip 28921⤵PID:1076
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
903KB
MD5b335535ca18b34823d653833d9385dfd
SHA1fc1fa00da523d4f39fb4f35677a48993592eee4c
SHA256383515f10b12aa807806106317ab888787d45accfa6ff0d65a466cb6932b7427
SHA5129f6938deb2dcfe792f46957d71d98bf2e4acc86230e366f6c27d468331ceedf2d3a80a5c72d662fb1fa245e0b789e25eba0f5d4b4baac8729a3462ef511f290d
-
Filesize
903KB
MD5b335535ca18b34823d653833d9385dfd
SHA1fc1fa00da523d4f39fb4f35677a48993592eee4c
SHA256383515f10b12aa807806106317ab888787d45accfa6ff0d65a466cb6932b7427
SHA5129f6938deb2dcfe792f46957d71d98bf2e4acc86230e366f6c27d468331ceedf2d3a80a5c72d662fb1fa245e0b789e25eba0f5d4b4baac8729a3462ef511f290d
-
Filesize
903KB
MD5b335535ca18b34823d653833d9385dfd
SHA1fc1fa00da523d4f39fb4f35677a48993592eee4c
SHA256383515f10b12aa807806106317ab888787d45accfa6ff0d65a466cb6932b7427
SHA5129f6938deb2dcfe792f46957d71d98bf2e4acc86230e366f6c27d468331ceedf2d3a80a5c72d662fb1fa245e0b789e25eba0f5d4b4baac8729a3462ef511f290d
-
Filesize
752KB
MD5d0ce397e9a6166d2fd1e3edea11240b0
SHA13916b73f9854826d68ca5de6f36d3ee2e69e2c8e
SHA25698584801aee6d626e596cd820c9cef1f37785f07e3824f869a2416167c49a6c8
SHA51239508c43e9669bd369fb9941f95cf43a89fc00031f3d5215e8a3c1a15eb936f8a7c86c0ac7d9d54da8010a56a1d642cb49810fe07a634556cea4996cd436ae15
-
Filesize
752KB
MD5d0ce397e9a6166d2fd1e3edea11240b0
SHA13916b73f9854826d68ca5de6f36d3ee2e69e2c8e
SHA25698584801aee6d626e596cd820c9cef1f37785f07e3824f869a2416167c49a6c8
SHA51239508c43e9669bd369fb9941f95cf43a89fc00031f3d5215e8a3c1a15eb936f8a7c86c0ac7d9d54da8010a56a1d642cb49810fe07a634556cea4996cd436ae15
-
Filesize
963KB
MD579b7d096423917ceb217edcb0e1d00fa
SHA184c350e00414ed17c48e944b819ab9c598a5e9a0
SHA256a97c0e03801bfa91b78e19e8cf70f697cb957345add295c0a50a6f6fa3ca143a
SHA512e063334b9a49d39f4fe165029c98076783ec888fb89831797062d82adc4debf1df9936bc911842f35cd13d5177f80e8d3d59073e868902c0ad01a246c17cacf1
-
Filesize
963KB
MD579b7d096423917ceb217edcb0e1d00fa
SHA184c350e00414ed17c48e944b819ab9c598a5e9a0
SHA256a97c0e03801bfa91b78e19e8cf70f697cb957345add295c0a50a6f6fa3ca143a
SHA512e063334b9a49d39f4fe165029c98076783ec888fb89831797062d82adc4debf1df9936bc911842f35cd13d5177f80e8d3d59073e868902c0ad01a246c17cacf1
-
Filesize
963KB
MD579b7d096423917ceb217edcb0e1d00fa
SHA184c350e00414ed17c48e944b819ab9c598a5e9a0
SHA256a97c0e03801bfa91b78e19e8cf70f697cb957345add295c0a50a6f6fa3ca143a
SHA512e063334b9a49d39f4fe165029c98076783ec888fb89831797062d82adc4debf1df9936bc911842f35cd13d5177f80e8d3d59073e868902c0ad01a246c17cacf1
-
Filesize
963KB
MD579b7d096423917ceb217edcb0e1d00fa
SHA184c350e00414ed17c48e944b819ab9c598a5e9a0
SHA256a97c0e03801bfa91b78e19e8cf70f697cb957345add295c0a50a6f6fa3ca143a
SHA512e063334b9a49d39f4fe165029c98076783ec888fb89831797062d82adc4debf1df9936bc911842f35cd13d5177f80e8d3d59073e868902c0ad01a246c17cacf1
-
Filesize
306KB
MD5d1ffbb56d4cf11069545e20fa8472394
SHA1fe0f56e1c5eeb69e2f304fa3a65b146e9360ced7
SHA256fd290bdb83eca1576c49740be5e7526c6c7256a8b7fafaea0dfa0ba48bcee60a
SHA512e1670f1d77eafd1ba081061da5895575e9b225ed93aab5247c9640b70edf7d039bfe675a156789cfc125d3276d03da041010c71f9411e6ab72cd3a777d49d074
-
Filesize
306KB
MD5d1ffbb56d4cf11069545e20fa8472394
SHA1fe0f56e1c5eeb69e2f304fa3a65b146e9360ced7
SHA256fd290bdb83eca1576c49740be5e7526c6c7256a8b7fafaea0dfa0ba48bcee60a
SHA512e1670f1d77eafd1ba081061da5895575e9b225ed93aab5247c9640b70edf7d039bfe675a156789cfc125d3276d03da041010c71f9411e6ab72cd3a777d49d074
-
Filesize
184KB
MD562bb33fec51fc2cbcbf2025b3af3835a
SHA13ca9539f2bdb5c85629e86a622fcb4b02f6e8253
SHA25608430b31e2bbb39ffc7940615d787465fbbb96edcc89513afc81df6746e770d5
SHA512a82cbaf179b99e1f8ffb30086e6d34157e0dc0e3e01579874eab4e1b123a6a024ce19da650ae3f2e5bf49583365c8576aa14bea2fcd1594e2b10175da5f9cf95
-
Filesize
184KB
MD562bb33fec51fc2cbcbf2025b3af3835a
SHA13ca9539f2bdb5c85629e86a622fcb4b02f6e8253
SHA25608430b31e2bbb39ffc7940615d787465fbbb96edcc89513afc81df6746e770d5
SHA512a82cbaf179b99e1f8ffb30086e6d34157e0dc0e3e01579874eab4e1b123a6a024ce19da650ae3f2e5bf49583365c8576aa14bea2fcd1594e2b10175da5f9cf95
-
Filesize
145KB
MD582f8806a1a8e4fe373dd8a3df8e8797c
SHA12640a412515568382ad170a9f88eb561ef1edc0c
SHA25622c00c9d6a4e0fb13a0bae7d37c2b11199ead04342da1c0a2f9272ca6bb5b9ba
SHA5120fea76327a084fa8d546c934e3610e3c2ad084b977086bf3ea0a3761f5c387a323c730d94235a652c36c62914e7f6986a62ad545f0d79f6138f5c9d2cab99a10
-
Filesize
145KB
MD582f8806a1a8e4fe373dd8a3df8e8797c
SHA12640a412515568382ad170a9f88eb561ef1edc0c
SHA25622c00c9d6a4e0fb13a0bae7d37c2b11199ead04342da1c0a2f9272ca6bb5b9ba
SHA5120fea76327a084fa8d546c934e3610e3c2ad084b977086bf3ea0a3761f5c387a323c730d94235a652c36c62914e7f6986a62ad545f0d79f6138f5c9d2cab99a10