Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
04-06-2023 22:46
Static task
static1
Behavioral task
behavioral1
Sample
17f856d1cc22f4b197f7b578e966521cf72482b8678df9102d9128a999f4d551.exe
Resource
win10-20230220-en
General
-
Target
17f856d1cc22f4b197f7b578e966521cf72482b8678df9102d9128a999f4d551.exe
-
Size
851KB
-
MD5
4ae10e95595d3853f1591b9ffd6582f3
-
SHA1
deea08ce19b594bce56eb89ae55c9e60c5e21b60
-
SHA256
17f856d1cc22f4b197f7b578e966521cf72482b8678df9102d9128a999f4d551
-
SHA512
314a78d4b22bd9b3037e7bbf700743a000775653c0efab46f53ca8e7ae08b99f6f207b6a354c077aa2d8ba75253e4f0c68baf442c78454a00442f7f489889176
-
SSDEEP
12288:YMr0y90KZFOuyDwaLJSu6a8hAhDvB85WA/PTaua7Bb6RsIbrWtMlY4Vx5y1xT:sypZ8X9Z8ihD+YgPSBQsqrWWlY+56B
Malware Config
Extracted
redline
lupa
83.97.73.126:19046
-
auth_value
6a764aa41830c77712442516d143bc9c
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o9300831.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o9300831.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o9300831.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o9300831.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o9300831.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 1908 z1809978.exe 2404 z2617184.exe 2592 o9300831.exe 3184 p9073462.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" o9300831.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z1809978.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z2617184.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z2617184.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 17f856d1cc22f4b197f7b578e966521cf72482b8678df9102d9128a999f4d551.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 17f856d1cc22f4b197f7b578e966521cf72482b8678df9102d9128a999f4d551.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z1809978.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 2592 o9300831.exe 2592 o9300831.exe 3184 p9073462.exe 3184 p9073462.exe 3184 p9073462.exe 3184 p9073462.exe 3184 p9073462.exe 3184 p9073462.exe 3184 p9073462.exe 3184 p9073462.exe 3184 p9073462.exe 3184 p9073462.exe 3184 p9073462.exe 3184 p9073462.exe 3184 p9073462.exe 3184 p9073462.exe 3184 p9073462.exe 3184 p9073462.exe 3184 p9073462.exe 3184 p9073462.exe 3184 p9073462.exe 3184 p9073462.exe 3184 p9073462.exe 3184 p9073462.exe 3184 p9073462.exe 3184 p9073462.exe 3184 p9073462.exe 3184 p9073462.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2592 o9300831.exe Token: SeDebugPrivilege 3184 p9073462.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2008 wrote to memory of 1908 2008 17f856d1cc22f4b197f7b578e966521cf72482b8678df9102d9128a999f4d551.exe 66 PID 2008 wrote to memory of 1908 2008 17f856d1cc22f4b197f7b578e966521cf72482b8678df9102d9128a999f4d551.exe 66 PID 2008 wrote to memory of 1908 2008 17f856d1cc22f4b197f7b578e966521cf72482b8678df9102d9128a999f4d551.exe 66 PID 1908 wrote to memory of 2404 1908 z1809978.exe 67 PID 1908 wrote to memory of 2404 1908 z1809978.exe 67 PID 1908 wrote to memory of 2404 1908 z1809978.exe 67 PID 2404 wrote to memory of 2592 2404 z2617184.exe 68 PID 2404 wrote to memory of 2592 2404 z2617184.exe 68 PID 2404 wrote to memory of 3184 2404 z2617184.exe 69 PID 2404 wrote to memory of 3184 2404 z2617184.exe 69 PID 2404 wrote to memory of 3184 2404 z2617184.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\17f856d1cc22f4b197f7b578e966521cf72482b8678df9102d9128a999f4d551.exe"C:\Users\Admin\AppData\Local\Temp\17f856d1cc22f4b197f7b578e966521cf72482b8678df9102d9128a999f4d551.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1809978.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1809978.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2617184.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2617184.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o9300831.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o9300831.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2592
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p9073462.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p9073462.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3184
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD5656ca112200e59e159f42992c522d34f
SHA1544fd3a65cd10ba5b3fdf55b0d08e629385218fe
SHA2562595bf3229546d56a95e05da12f9719197f0e6fbc6c888a142a084e20a92118e
SHA512304ba4eb3861510594d5782f82cde15b978c5b67981652022b032fc6c55ab73d7bdf2c208c2d1c11cadd8c67f1c953dc7ad47f9e8edc1899cbcfc3ee3eb373f0
-
Filesize
408KB
MD5656ca112200e59e159f42992c522d34f
SHA1544fd3a65cd10ba5b3fdf55b0d08e629385218fe
SHA2562595bf3229546d56a95e05da12f9719197f0e6fbc6c888a142a084e20a92118e
SHA512304ba4eb3861510594d5782f82cde15b978c5b67981652022b032fc6c55ab73d7bdf2c208c2d1c11cadd8c67f1c953dc7ad47f9e8edc1899cbcfc3ee3eb373f0
-
Filesize
206KB
MD5c4079f13739a5eb308c6f839265e61f0
SHA12636c877ba92085ff60686ce8abd9973e8fe2f87
SHA2563615a511a9b099d1f4a253a0b4eb88aa74321dfb6a58a3a4150b16ebdc315218
SHA512e521bc833ca006432d703b3444781bf5c78f91366de60ac8fefe13db37372517b92af6f06641c96258b0cc674f024fda43a64237b794729cd030f0fdf7a061e2
-
Filesize
206KB
MD5c4079f13739a5eb308c6f839265e61f0
SHA12636c877ba92085ff60686ce8abd9973e8fe2f87
SHA2563615a511a9b099d1f4a253a0b4eb88aa74321dfb6a58a3a4150b16ebdc315218
SHA512e521bc833ca006432d703b3444781bf5c78f91366de60ac8fefe13db37372517b92af6f06641c96258b0cc674f024fda43a64237b794729cd030f0fdf7a061e2
-
Filesize
11KB
MD5b530de265c83d5fe298e29c97e106d63
SHA1c895f9bb76f26056719c587e2e62e23751ef3bd0
SHA2563cefc7b492ac144052388b62f1491823b9559226fd315efa8486011907fc18f7
SHA5124c415590a9862fd6256998e986982d1e03590993349dd0eda21244acf950c143992aa6929747ab8ce82457513a65f54fda8b77434da54af28f603b464f7f1fe2
-
Filesize
11KB
MD5b530de265c83d5fe298e29c97e106d63
SHA1c895f9bb76f26056719c587e2e62e23751ef3bd0
SHA2563cefc7b492ac144052388b62f1491823b9559226fd315efa8486011907fc18f7
SHA5124c415590a9862fd6256998e986982d1e03590993349dd0eda21244acf950c143992aa6929747ab8ce82457513a65f54fda8b77434da54af28f603b464f7f1fe2
-
Filesize
172KB
MD5f0927d3180f9a72f31076afd941e1836
SHA1c534b84291c1ec3c3375a7d111659afee0ba90dc
SHA256a7e6e1796d0ac68120de55a41433fb928db98847388656cbbf5c46b411b6458e
SHA51223ae226ee29b108ae53863708734e4840bc525d8701f2c368081430b4c693f1b8d96f4e59768046967558b4d1b71eeedd64c8809ecda2f37f525599e13ac9e98
-
Filesize
172KB
MD5f0927d3180f9a72f31076afd941e1836
SHA1c534b84291c1ec3c3375a7d111659afee0ba90dc
SHA256a7e6e1796d0ac68120de55a41433fb928db98847388656cbbf5c46b411b6458e
SHA51223ae226ee29b108ae53863708734e4840bc525d8701f2c368081430b4c693f1b8d96f4e59768046967558b4d1b71eeedd64c8809ecda2f37f525599e13ac9e98