Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/06/2023, 15:04
Static task
static1
Behavioral task
behavioral1
Sample
e0675e5b80a6637c4cb279f070f68c3aff5adf7f93ba4b84ec608bcc9fdbce3a.exe
Resource
win10v2004-20230220-en
General
-
Target
e0675e5b80a6637c4cb279f070f68c3aff5adf7f93ba4b84ec608bcc9fdbce3a.exe
-
Size
857KB
-
MD5
38406b6f196feaa3f0d82d3693786977
-
SHA1
3f69a2fe5394f5eb9d3bcafb9595970fbda58026
-
SHA256
e0675e5b80a6637c4cb279f070f68c3aff5adf7f93ba4b84ec608bcc9fdbce3a
-
SHA512
31fd394743b6aceacba89f4d3be3167126db6b1766f149b3e66a4f2fe2ad351ba7d6f217668471cc179fc2ed61098ec59e7f0b97077c23a54b450e1bb72fe6c9
-
SSDEEP
12288:YMroy90ltewCKRvpu1KCVdyU07hr1HokfrIafJpiBv2BRsV6+wywdpKvkNKZhsUg:wyARpu11dyUm0afJphH+Uds8NKjXE
Malware Config
Extracted
redline
lupa
83.97.73.126:19048
-
auth_value
6a764aa41830c77712442516d143bc9c
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection o4494257.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o4494257.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o4494257.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o4494257.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o4494257.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o4494257.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 4796 z9893173.exe 3564 z7607190.exe 4228 o4494257.exe 264 p6599543.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" o4494257.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z9893173.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z9893173.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z7607190.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z7607190.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e0675e5b80a6637c4cb279f070f68c3aff5adf7f93ba4b84ec608bcc9fdbce3a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e0675e5b80a6637c4cb279f070f68c3aff5adf7f93ba4b84ec608bcc9fdbce3a.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 4228 o4494257.exe 4228 o4494257.exe 264 p6599543.exe 264 p6599543.exe 264 p6599543.exe 264 p6599543.exe 264 p6599543.exe 264 p6599543.exe 264 p6599543.exe 264 p6599543.exe 264 p6599543.exe 264 p6599543.exe 264 p6599543.exe 264 p6599543.exe 264 p6599543.exe 264 p6599543.exe 264 p6599543.exe 264 p6599543.exe 264 p6599543.exe 264 p6599543.exe 264 p6599543.exe 264 p6599543.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4228 o4494257.exe Token: SeDebugPrivilege 264 p6599543.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 852 wrote to memory of 4796 852 e0675e5b80a6637c4cb279f070f68c3aff5adf7f93ba4b84ec608bcc9fdbce3a.exe 85 PID 852 wrote to memory of 4796 852 e0675e5b80a6637c4cb279f070f68c3aff5adf7f93ba4b84ec608bcc9fdbce3a.exe 85 PID 852 wrote to memory of 4796 852 e0675e5b80a6637c4cb279f070f68c3aff5adf7f93ba4b84ec608bcc9fdbce3a.exe 85 PID 4796 wrote to memory of 3564 4796 z9893173.exe 86 PID 4796 wrote to memory of 3564 4796 z9893173.exe 86 PID 4796 wrote to memory of 3564 4796 z9893173.exe 86 PID 3564 wrote to memory of 4228 3564 z7607190.exe 87 PID 3564 wrote to memory of 4228 3564 z7607190.exe 87 PID 3564 wrote to memory of 264 3564 z7607190.exe 92 PID 3564 wrote to memory of 264 3564 z7607190.exe 92 PID 3564 wrote to memory of 264 3564 z7607190.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0675e5b80a6637c4cb279f070f68c3aff5adf7f93ba4b84ec608bcc9fdbce3a.exe"C:\Users\Admin\AppData\Local\Temp\e0675e5b80a6637c4cb279f070f68c3aff5adf7f93ba4b84ec608bcc9fdbce3a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9893173.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9893173.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7607190.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7607190.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o4494257.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o4494257.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4228
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p6599543.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p6599543.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:264
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
412KB
MD5c5eb84cec5bd60c20828ce3051e8e167
SHA1ff8a6fe48ecdf8faa15d9a401fec395578134951
SHA256ea12dc1ea6ffa4c105b03ba5bc8621f151d4c71d0fd0dbfb6a4a31d23f51953a
SHA512bde94f8d06e057d439940d0da358ce2144d586f363afa5d9b3a27cec1d87ac9f257c37337d4970a69bf7f7567cdca8156a1033709f12c36caee5681a1b714434
-
Filesize
412KB
MD5c5eb84cec5bd60c20828ce3051e8e167
SHA1ff8a6fe48ecdf8faa15d9a401fec395578134951
SHA256ea12dc1ea6ffa4c105b03ba5bc8621f151d4c71d0fd0dbfb6a4a31d23f51953a
SHA512bde94f8d06e057d439940d0da358ce2144d586f363afa5d9b3a27cec1d87ac9f257c37337d4970a69bf7f7567cdca8156a1033709f12c36caee5681a1b714434
-
Filesize
206KB
MD59a2a075174fa0b1da4234b26d146fb2a
SHA1972ea5c7c9a6a1876745b48d5a444df30da9a73c
SHA256269229e5c15b93ff53b4f1920f46567cd2843a03268b1a029fe1659650d7dd66
SHA512987b9382998f4c7c6280bfdd1f682b27b500ce0e5bf94bc83062c42bcf0a6a1dbf86e751864678e0fa48f1a677609e9c7a24c2de98fc6a3b3a32ae48e8ea3138
-
Filesize
206KB
MD59a2a075174fa0b1da4234b26d146fb2a
SHA1972ea5c7c9a6a1876745b48d5a444df30da9a73c
SHA256269229e5c15b93ff53b4f1920f46567cd2843a03268b1a029fe1659650d7dd66
SHA512987b9382998f4c7c6280bfdd1f682b27b500ce0e5bf94bc83062c42bcf0a6a1dbf86e751864678e0fa48f1a677609e9c7a24c2de98fc6a3b3a32ae48e8ea3138
-
Filesize
14KB
MD54e60508044a17c985590e8d1ac94d6d7
SHA1d1d5964a0703a26a247ba2dc99d19f2482b7e384
SHA256c55c7cad5af3a10a6bcf1bed6646f2a7d69440a53898dafa47a14bb9ff5ca3e6
SHA5126d5526d2915668df1e042d1347c31f1216892442c322bb410e42112edbbe802286c37b021cf72289c47462fcb600bfe674c72ada1239477d22186723828b9276
-
Filesize
14KB
MD54e60508044a17c985590e8d1ac94d6d7
SHA1d1d5964a0703a26a247ba2dc99d19f2482b7e384
SHA256c55c7cad5af3a10a6bcf1bed6646f2a7d69440a53898dafa47a14bb9ff5ca3e6
SHA5126d5526d2915668df1e042d1347c31f1216892442c322bb410e42112edbbe802286c37b021cf72289c47462fcb600bfe674c72ada1239477d22186723828b9276
-
Filesize
172KB
MD59c80e9ba748d545f3d50f3d728b21e1b
SHA12bc26d18e0f9d98e407b8db8f3b8fd84d2d93d5f
SHA2568f4b85f549faf3e5a958189ef035145e696211874626cd6c81d93793d5f49c1d
SHA512f0a22c18bce599e31476bdf84cb9f53f6451f28b55a8d82c269ee24f1bc0098a6e42089c0a5c6bead34af3dd5c88509141cb726fc1d16e4dce5655c4ab5712d1
-
Filesize
172KB
MD59c80e9ba748d545f3d50f3d728b21e1b
SHA12bc26d18e0f9d98e407b8db8f3b8fd84d2d93d5f
SHA2568f4b85f549faf3e5a958189ef035145e696211874626cd6c81d93793d5f49c1d
SHA512f0a22c18bce599e31476bdf84cb9f53f6451f28b55a8d82c269ee24f1bc0098a6e42089c0a5c6bead34af3dd5c88509141cb726fc1d16e4dce5655c4ab5712d1