Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06-06-2023 15:33
Static task
static1
Behavioral task
behavioral1
Sample
01712599.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
01712599.exe
Resource
win10v2004-20230220-en
General
-
Target
01712599.exe
-
Size
857KB
-
MD5
6dbc342c87bdd6517274f79d35384b80
-
SHA1
de1105af13f299a77ea2266a76390cf6b70d35fa
-
SHA256
4ef5409ec3adb8b4e8735fb2d2312a3e135e25a086f89c3f2c1cc4e55dbf78d8
-
SHA512
9a9d067395ea36256024b48bcced24ee7a0c58977abe75e53542b13629e28384306eefae7aff4e098103d895525093f9a5eec9108970cad4f2aec4f650259b5a
-
SSDEEP
24576:9ymSp5YlCg1DmAjFTJWzL3J5rC2bP4b5:Ydp5YlCgZtjNJWzr7bgb
Malware Config
Extracted
redline
lupa
83.97.73.126:19048
-
auth_value
6a764aa41830c77712442516d143bc9c
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o5868670.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o5868670.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection o5868670.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o5868670.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o5868670.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o5868670.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 1752 z7427497.exe 968 z3277501.exe 520 o5868670.exe 1656 p0269656.exe -
Loads dropped DLL 7 IoCs
pid Process 1992 01712599.exe 1752 z7427497.exe 1752 z7427497.exe 968 z3277501.exe 968 z3277501.exe 968 z3277501.exe 1656 p0269656.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features o5868670.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" o5868670.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z7427497.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z3277501.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z3277501.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 01712599.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 01712599.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z7427497.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 520 o5868670.exe 520 o5868670.exe 1656 p0269656.exe 1656 p0269656.exe 1656 p0269656.exe 1656 p0269656.exe 1656 p0269656.exe 1656 p0269656.exe 1656 p0269656.exe 1656 p0269656.exe 1656 p0269656.exe 1656 p0269656.exe 1656 p0269656.exe 1656 p0269656.exe 1656 p0269656.exe 1656 p0269656.exe 1656 p0269656.exe 1656 p0269656.exe 1656 p0269656.exe 1656 p0269656.exe 1656 p0269656.exe 1656 p0269656.exe 1656 p0269656.exe 1656 p0269656.exe 1656 p0269656.exe 1656 p0269656.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 520 o5868670.exe Token: SeDebugPrivilege 1656 p0269656.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1992 wrote to memory of 1752 1992 01712599.exe 28 PID 1992 wrote to memory of 1752 1992 01712599.exe 28 PID 1992 wrote to memory of 1752 1992 01712599.exe 28 PID 1992 wrote to memory of 1752 1992 01712599.exe 28 PID 1992 wrote to memory of 1752 1992 01712599.exe 28 PID 1992 wrote to memory of 1752 1992 01712599.exe 28 PID 1992 wrote to memory of 1752 1992 01712599.exe 28 PID 1752 wrote to memory of 968 1752 z7427497.exe 29 PID 1752 wrote to memory of 968 1752 z7427497.exe 29 PID 1752 wrote to memory of 968 1752 z7427497.exe 29 PID 1752 wrote to memory of 968 1752 z7427497.exe 29 PID 1752 wrote to memory of 968 1752 z7427497.exe 29 PID 1752 wrote to memory of 968 1752 z7427497.exe 29 PID 1752 wrote to memory of 968 1752 z7427497.exe 29 PID 968 wrote to memory of 520 968 z3277501.exe 30 PID 968 wrote to memory of 520 968 z3277501.exe 30 PID 968 wrote to memory of 520 968 z3277501.exe 30 PID 968 wrote to memory of 520 968 z3277501.exe 30 PID 968 wrote to memory of 520 968 z3277501.exe 30 PID 968 wrote to memory of 520 968 z3277501.exe 30 PID 968 wrote to memory of 520 968 z3277501.exe 30 PID 968 wrote to memory of 1656 968 z3277501.exe 31 PID 968 wrote to memory of 1656 968 z3277501.exe 31 PID 968 wrote to memory of 1656 968 z3277501.exe 31 PID 968 wrote to memory of 1656 968 z3277501.exe 31 PID 968 wrote to memory of 1656 968 z3277501.exe 31 PID 968 wrote to memory of 1656 968 z3277501.exe 31 PID 968 wrote to memory of 1656 968 z3277501.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\01712599.exe"C:\Users\Admin\AppData\Local\Temp\01712599.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7427497.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7427497.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3277501.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3277501.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o5868670.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o5868670.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:520
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p0269656.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p0269656.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1656
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
412KB
MD53005f6b9280dc1c54d402fb6f5c03b0a
SHA169e9a69bce04438964fef47f71f2e069315a9e9a
SHA256993d005ebf9b6fdfac74448bc051ffd87c3352f81b0608df39eee10ad075fdc5
SHA5123ed844483b6282906aead03fed6dbe4dac4287106ddd0ca200eba5fdc683068ab4a7ccbe4b4f5b5519a86a02314991685f587c1d6b285b94dc7941f8ace10fb6
-
Filesize
412KB
MD53005f6b9280dc1c54d402fb6f5c03b0a
SHA169e9a69bce04438964fef47f71f2e069315a9e9a
SHA256993d005ebf9b6fdfac74448bc051ffd87c3352f81b0608df39eee10ad075fdc5
SHA5123ed844483b6282906aead03fed6dbe4dac4287106ddd0ca200eba5fdc683068ab4a7ccbe4b4f5b5519a86a02314991685f587c1d6b285b94dc7941f8ace10fb6
-
Filesize
206KB
MD52bd62f9712e214246da254e2eb52f967
SHA158644e4dde82f8f972d1e66e1843e5941c9d39ff
SHA256559401601fe32c2bee0a41cea7890f59b31b2b6f634215c6630f8cf700b0f1c8
SHA51296c66afe9fcdaee2c5ea312503ed49fabce336e824312fe8b6a32968ad009b96de4f23da77b02cb29a4f1b857b24c585251d03d8696d3fdc69e57a86cd4994aa
-
Filesize
206KB
MD52bd62f9712e214246da254e2eb52f967
SHA158644e4dde82f8f972d1e66e1843e5941c9d39ff
SHA256559401601fe32c2bee0a41cea7890f59b31b2b6f634215c6630f8cf700b0f1c8
SHA51296c66afe9fcdaee2c5ea312503ed49fabce336e824312fe8b6a32968ad009b96de4f23da77b02cb29a4f1b857b24c585251d03d8696d3fdc69e57a86cd4994aa
-
Filesize
14KB
MD5f8f002c770ac7c8d7580119d3f111d5b
SHA190325762c5db5749b06a00865955957fbc911390
SHA256d6e983502ef0f24863e88947d23a0203ca3b066fd3c07c9a6b6fc4193687cafb
SHA51202d817ea06ad2aa52be74da465a4761bd90d9ec9afe4cb1ea8908e3d4d61c72d95e03d9ffe9cb24c1d27d4329b90f6e2593c75c602c4fa48168b9830e0ef959b
-
Filesize
14KB
MD5f8f002c770ac7c8d7580119d3f111d5b
SHA190325762c5db5749b06a00865955957fbc911390
SHA256d6e983502ef0f24863e88947d23a0203ca3b066fd3c07c9a6b6fc4193687cafb
SHA51202d817ea06ad2aa52be74da465a4761bd90d9ec9afe4cb1ea8908e3d4d61c72d95e03d9ffe9cb24c1d27d4329b90f6e2593c75c602c4fa48168b9830e0ef959b
-
Filesize
172KB
MD5484f331a555c81578115a3729ed2080b
SHA123285dea5c7b913d7357f82d87f727a006cb56a0
SHA25648b7de6813a3684740fb3c26c80eb34e9953d48bdf56925bc7e07115e9386f07
SHA512949df93b91604cee0cd565d99c8aebfae0c13aedcd9efe84beee4f6319d1ba496b051cdfd565d1addc943c33770553739ec7334d367bd907f1378d3437c4c03f
-
Filesize
172KB
MD5484f331a555c81578115a3729ed2080b
SHA123285dea5c7b913d7357f82d87f727a006cb56a0
SHA25648b7de6813a3684740fb3c26c80eb34e9953d48bdf56925bc7e07115e9386f07
SHA512949df93b91604cee0cd565d99c8aebfae0c13aedcd9efe84beee4f6319d1ba496b051cdfd565d1addc943c33770553739ec7334d367bd907f1378d3437c4c03f
-
Filesize
412KB
MD53005f6b9280dc1c54d402fb6f5c03b0a
SHA169e9a69bce04438964fef47f71f2e069315a9e9a
SHA256993d005ebf9b6fdfac74448bc051ffd87c3352f81b0608df39eee10ad075fdc5
SHA5123ed844483b6282906aead03fed6dbe4dac4287106ddd0ca200eba5fdc683068ab4a7ccbe4b4f5b5519a86a02314991685f587c1d6b285b94dc7941f8ace10fb6
-
Filesize
412KB
MD53005f6b9280dc1c54d402fb6f5c03b0a
SHA169e9a69bce04438964fef47f71f2e069315a9e9a
SHA256993d005ebf9b6fdfac74448bc051ffd87c3352f81b0608df39eee10ad075fdc5
SHA5123ed844483b6282906aead03fed6dbe4dac4287106ddd0ca200eba5fdc683068ab4a7ccbe4b4f5b5519a86a02314991685f587c1d6b285b94dc7941f8ace10fb6
-
Filesize
206KB
MD52bd62f9712e214246da254e2eb52f967
SHA158644e4dde82f8f972d1e66e1843e5941c9d39ff
SHA256559401601fe32c2bee0a41cea7890f59b31b2b6f634215c6630f8cf700b0f1c8
SHA51296c66afe9fcdaee2c5ea312503ed49fabce336e824312fe8b6a32968ad009b96de4f23da77b02cb29a4f1b857b24c585251d03d8696d3fdc69e57a86cd4994aa
-
Filesize
206KB
MD52bd62f9712e214246da254e2eb52f967
SHA158644e4dde82f8f972d1e66e1843e5941c9d39ff
SHA256559401601fe32c2bee0a41cea7890f59b31b2b6f634215c6630f8cf700b0f1c8
SHA51296c66afe9fcdaee2c5ea312503ed49fabce336e824312fe8b6a32968ad009b96de4f23da77b02cb29a4f1b857b24c585251d03d8696d3fdc69e57a86cd4994aa
-
Filesize
14KB
MD5f8f002c770ac7c8d7580119d3f111d5b
SHA190325762c5db5749b06a00865955957fbc911390
SHA256d6e983502ef0f24863e88947d23a0203ca3b066fd3c07c9a6b6fc4193687cafb
SHA51202d817ea06ad2aa52be74da465a4761bd90d9ec9afe4cb1ea8908e3d4d61c72d95e03d9ffe9cb24c1d27d4329b90f6e2593c75c602c4fa48168b9830e0ef959b
-
Filesize
172KB
MD5484f331a555c81578115a3729ed2080b
SHA123285dea5c7b913d7357f82d87f727a006cb56a0
SHA25648b7de6813a3684740fb3c26c80eb34e9953d48bdf56925bc7e07115e9386f07
SHA512949df93b91604cee0cd565d99c8aebfae0c13aedcd9efe84beee4f6319d1ba496b051cdfd565d1addc943c33770553739ec7334d367bd907f1378d3437c4c03f
-
Filesize
172KB
MD5484f331a555c81578115a3729ed2080b
SHA123285dea5c7b913d7357f82d87f727a006cb56a0
SHA25648b7de6813a3684740fb3c26c80eb34e9953d48bdf56925bc7e07115e9386f07
SHA512949df93b91604cee0cd565d99c8aebfae0c13aedcd9efe84beee4f6319d1ba496b051cdfd565d1addc943c33770553739ec7334d367bd907f1378d3437c4c03f