Analysis
-
max time kernel
113s -
max time network
152s -
platform
windows10-1703_x64 -
resource
win10-20230621-en -
resource tags
arch:x64arch:x86image:win10-20230621-enlocale:en-usos:windows10-1703-x64system -
submitted
22-06-2023 11:03
Static task
static1
Behavioral task
behavioral1
Sample
35ccc280f88beff012c7f933464e9dab867d4b70f015e02518eaf7f8d6ec1b80.exe
Resource
win10-20230621-en
General
-
Target
35ccc280f88beff012c7f933464e9dab867d4b70f015e02518eaf7f8d6ec1b80.exe
-
Size
713KB
-
MD5
4b72fafbc8bab6dcc7e511ff5552b0b2
-
SHA1
19d466759dd79b02d4c5f27d1abb55a85c484049
-
SHA256
35ccc280f88beff012c7f933464e9dab867d4b70f015e02518eaf7f8d6ec1b80
-
SHA512
47916dd889402a30deec4e2c8269e437604e16787a94fb2360ecab9a9e9dba08d69f43d27a4f0ec1e60d00e034cfa1d418e96dcc1da2ed5beef5c9b32bdbaea6
-
SSDEEP
12288:aztKe+jWeeIOFwzCEWJSn/94lsC01MH1Z03RbxAJt+UFmOeKBN+0DLi4u:akseeiBn/ilsCZHL03Rbc0wJrTDL3u
Malware Config
Extracted
redline
furga
83.97.73.128:19071
-
auth_value
1b7af6db7a79a3475798fcf494818be7
Extracted
amadey
3.84
77.91.68.63/doma/net/index.php
Signatures
-
Processes:
k4488783.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k4488783.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k4488783.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k4488783.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k4488783.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k4488783.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
Processes:
y2317131.exek4488783.exel1737141.exen0022585.exerugen.exerugen.exerugen.exepid process 4680 y2317131.exe 3504 k4488783.exe 4804 l1737141.exe 4984 n0022585.exe 2556 rugen.exe 4520 rugen.exe 4112 rugen.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 2116 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
k4488783.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k4488783.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k4488783.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
35ccc280f88beff012c7f933464e9dab867d4b70f015e02518eaf7f8d6ec1b80.exey2317131.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 35ccc280f88beff012c7f933464e9dab867d4b70f015e02518eaf7f8d6ec1b80.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 35ccc280f88beff012c7f933464e9dab867d4b70f015e02518eaf7f8d6ec1b80.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y2317131.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y2317131.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
k4488783.exel1737141.exepid process 3504 k4488783.exe 3504 k4488783.exe 4804 l1737141.exe 4804 l1737141.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
k4488783.exel1737141.exedescription pid process Token: SeDebugPrivilege 3504 k4488783.exe Token: SeDebugPrivilege 4804 l1737141.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
n0022585.exepid process 4984 n0022585.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
35ccc280f88beff012c7f933464e9dab867d4b70f015e02518eaf7f8d6ec1b80.exey2317131.exen0022585.exerugen.execmd.exedescription pid process target process PID 4148 wrote to memory of 4680 4148 35ccc280f88beff012c7f933464e9dab867d4b70f015e02518eaf7f8d6ec1b80.exe y2317131.exe PID 4148 wrote to memory of 4680 4148 35ccc280f88beff012c7f933464e9dab867d4b70f015e02518eaf7f8d6ec1b80.exe y2317131.exe PID 4148 wrote to memory of 4680 4148 35ccc280f88beff012c7f933464e9dab867d4b70f015e02518eaf7f8d6ec1b80.exe y2317131.exe PID 4680 wrote to memory of 3504 4680 y2317131.exe k4488783.exe PID 4680 wrote to memory of 3504 4680 y2317131.exe k4488783.exe PID 4680 wrote to memory of 3504 4680 y2317131.exe k4488783.exe PID 4680 wrote to memory of 4804 4680 y2317131.exe l1737141.exe PID 4680 wrote to memory of 4804 4680 y2317131.exe l1737141.exe PID 4680 wrote to memory of 4804 4680 y2317131.exe l1737141.exe PID 4148 wrote to memory of 4984 4148 35ccc280f88beff012c7f933464e9dab867d4b70f015e02518eaf7f8d6ec1b80.exe n0022585.exe PID 4148 wrote to memory of 4984 4148 35ccc280f88beff012c7f933464e9dab867d4b70f015e02518eaf7f8d6ec1b80.exe n0022585.exe PID 4148 wrote to memory of 4984 4148 35ccc280f88beff012c7f933464e9dab867d4b70f015e02518eaf7f8d6ec1b80.exe n0022585.exe PID 4984 wrote to memory of 2556 4984 n0022585.exe rugen.exe PID 4984 wrote to memory of 2556 4984 n0022585.exe rugen.exe PID 4984 wrote to memory of 2556 4984 n0022585.exe rugen.exe PID 2556 wrote to memory of 3952 2556 rugen.exe schtasks.exe PID 2556 wrote to memory of 3952 2556 rugen.exe schtasks.exe PID 2556 wrote to memory of 3952 2556 rugen.exe schtasks.exe PID 2556 wrote to memory of 4952 2556 rugen.exe cmd.exe PID 2556 wrote to memory of 4952 2556 rugen.exe cmd.exe PID 2556 wrote to memory of 4952 2556 rugen.exe cmd.exe PID 4952 wrote to memory of 4444 4952 cmd.exe cmd.exe PID 4952 wrote to memory of 4444 4952 cmd.exe cmd.exe PID 4952 wrote to memory of 4444 4952 cmd.exe cmd.exe PID 4952 wrote to memory of 4416 4952 cmd.exe cacls.exe PID 4952 wrote to memory of 4416 4952 cmd.exe cacls.exe PID 4952 wrote to memory of 4416 4952 cmd.exe cacls.exe PID 4952 wrote to memory of 4352 4952 cmd.exe cacls.exe PID 4952 wrote to memory of 4352 4952 cmd.exe cacls.exe PID 4952 wrote to memory of 4352 4952 cmd.exe cacls.exe PID 4952 wrote to memory of 4456 4952 cmd.exe cmd.exe PID 4952 wrote to memory of 4456 4952 cmd.exe cmd.exe PID 4952 wrote to memory of 4456 4952 cmd.exe cmd.exe PID 4952 wrote to memory of 5056 4952 cmd.exe cacls.exe PID 4952 wrote to memory of 5056 4952 cmd.exe cacls.exe PID 4952 wrote to memory of 5056 4952 cmd.exe cacls.exe PID 4952 wrote to memory of 5044 4952 cmd.exe cacls.exe PID 4952 wrote to memory of 5044 4952 cmd.exe cacls.exe PID 4952 wrote to memory of 5044 4952 cmd.exe cacls.exe PID 2556 wrote to memory of 2116 2556 rugen.exe rundll32.exe PID 2556 wrote to memory of 2116 2556 rugen.exe rundll32.exe PID 2556 wrote to memory of 2116 2556 rugen.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\35ccc280f88beff012c7f933464e9dab867d4b70f015e02518eaf7f8d6ec1b80.exe"C:\Users\Admin\AppData\Local\Temp\35ccc280f88beff012c7f933464e9dab867d4b70f015e02518eaf7f8d6ec1b80.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2317131.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2317131.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k4488783.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k4488783.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3504
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l1737141.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l1737141.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4804
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n0022585.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n0022585.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rugen.exe /TR "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe" /F4⤵
- Creates scheduled task(s)
PID:3952
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rugen.exe" /P "Admin:N"&&CACLS "rugen.exe" /P "Admin:R" /E&&echo Y|CACLS "..\200f691d32" /P "Admin:N"&&CACLS "..\200f691d32" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4444
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:N"5⤵PID:4416
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:R" /E5⤵PID:4352
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4456
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:N"5⤵PID:5056
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:R" /E5⤵PID:5044
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2116
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:4520
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:4112
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5957779c42144282d8cd83192b8fbc7cf
SHA1de83d08d2cca06b9ff3d1ef239d6b60b705d25fe
SHA2560d7ca7ba65e2b465e4878e324ceab8f8981f5ec06dcf5bc32559a4467a9c7d51
SHA512f1549c61b4f2906d13b2aabb74772c2bc826cd42373d7bb6c48cbb125d5aa2ec17617e6b5e67e8aae3bb5790cc831cdba48a45008ed01df4fba8be448cce39fd
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
325KB
MD58bf9e734f8aa0fbb1f395536d3c65638
SHA19b523e21ef349950bd5b45d2f1b63d4eb46f1460
SHA256b1399f2e6a25a98044e6fcbd265b58d4811458cfbd8d379bafda70f44c49f18b
SHA512ec7198e8ed6bcafffd6c9257ee444ed540d0455d87839aa66c4840eaae1ceeeadf47f177d7a2d4e985af99b5c768e0523722c11df8d08ea485d4f6f69bf83ff9
-
Filesize
325KB
MD58bf9e734f8aa0fbb1f395536d3c65638
SHA19b523e21ef349950bd5b45d2f1b63d4eb46f1460
SHA256b1399f2e6a25a98044e6fcbd265b58d4811458cfbd8d379bafda70f44c49f18b
SHA512ec7198e8ed6bcafffd6c9257ee444ed540d0455d87839aa66c4840eaae1ceeeadf47f177d7a2d4e985af99b5c768e0523722c11df8d08ea485d4f6f69bf83ff9
-
Filesize
227KB
MD508e4255c84864e1d1c5f767043f54316
SHA154869f5375dc6326425835675958d94b9b1ce442
SHA25662c5720cbcfb1af8163bae7ee77cc2133d92e607b1b976224d227a46f6bf5aaa
SHA512fcb50cfef787694154f5a7fa02c88e695670915652ed8010d6bbeb0a7733a9d23afbd489d04a24631cceb857f03dd60748cf5909c281ee7e0bdaf3315028d66b
-
Filesize
227KB
MD508e4255c84864e1d1c5f767043f54316
SHA154869f5375dc6326425835675958d94b9b1ce442
SHA25662c5720cbcfb1af8163bae7ee77cc2133d92e607b1b976224d227a46f6bf5aaa
SHA512fcb50cfef787694154f5a7fa02c88e695670915652ed8010d6bbeb0a7733a9d23afbd489d04a24631cceb857f03dd60748cf5909c281ee7e0bdaf3315028d66b
-
Filesize
388KB
MD564e25b119bc9a7b939eddae69d3d8dca
SHA1a58c07136b3341af3d5ba230933d23e6014f6267
SHA256e11614f20ca90b00dd89f565346eafd388fbafe5d470cd70f5d68424722a2ac3
SHA512c97c6d4a2bad431c4e382b5cac1e2b29938c10a45cde0fa9f097bc5cf499137021f4012924424a52954e63a76c040277b6b5ab97561c4a31f201f23283474b7e
-
Filesize
388KB
MD564e25b119bc9a7b939eddae69d3d8dca
SHA1a58c07136b3341af3d5ba230933d23e6014f6267
SHA256e11614f20ca90b00dd89f565346eafd388fbafe5d470cd70f5d68424722a2ac3
SHA512c97c6d4a2bad431c4e382b5cac1e2b29938c10a45cde0fa9f097bc5cf499137021f4012924424a52954e63a76c040277b6b5ab97561c4a31f201f23283474b7e
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf