Analysis
-
max time kernel
124s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
22-06-2023 12:58
Static task
static1
Behavioral task
behavioral1
Sample
2549f49700c34152ce4eb055bdf42210dcf23904a6c761c420751f03080e49aa.exe
Resource
win10v2004-20230621-en
General
-
Target
2549f49700c34152ce4eb055bdf42210dcf23904a6c761c420751f03080e49aa.exe
-
Size
719KB
-
MD5
942300890a6fdbde6b03aeb516c22761
-
SHA1
00562f95a46b86c8997871a6d2b2fe34737cc75f
-
SHA256
2549f49700c34152ce4eb055bdf42210dcf23904a6c761c420751f03080e49aa
-
SHA512
5760f70f8c71d7d2f875a5ca60361b46893cd5567060509c4ffdaedf4886f7c997d787301dd40bafbc44c71b9f5e7859c1d5bf15f143df00d4b76794a889415c
-
SSDEEP
12288:xztKeujWeeIOFjytWJSn/OfxeeMY0pkMz53njbOSlxmv+YmnCspw:xk8ee2n/Ofx1MPJd/OSlEv+XPp
Malware Config
Extracted
redline
furga
83.97.73.128:19071
-
auth_value
1b7af6db7a79a3475798fcf494818be7
Extracted
amadey
3.84
77.91.68.63/doma/net/index.php
Signatures
-
Processes:
k9551486.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k9551486.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k9551486.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k9551486.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k9551486.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k9551486.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k9551486.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
n9357654.exerugen.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4129409437-3162877118-52503038-1000\Control Panel\International\Geo\Nation n9357654.exe Key value queried \REGISTRY\USER\S-1-5-21-4129409437-3162877118-52503038-1000\Control Panel\International\Geo\Nation rugen.exe -
Executes dropped EXE 7 IoCs
Processes:
y4606708.exek9551486.exel2814379.exen9357654.exerugen.exerugen.exerugen.exepid process 4888 y4606708.exe 1704 k9551486.exe 4136 l2814379.exe 2584 n9357654.exe 3524 rugen.exe 2196 rugen.exe 3432 rugen.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 4600 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
k9551486.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k9551486.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k9551486.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
y4606708.exe2549f49700c34152ce4eb055bdf42210dcf23904a6c761c420751f03080e49aa.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y4606708.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y4606708.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2549f49700c34152ce4eb055bdf42210dcf23904a6c761c420751f03080e49aa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2549f49700c34152ce4eb055bdf42210dcf23904a6c761c420751f03080e49aa.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
k9551486.exel2814379.exepid process 1704 k9551486.exe 1704 k9551486.exe 4136 l2814379.exe 4136 l2814379.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
k9551486.exel2814379.exedescription pid process Token: SeDebugPrivilege 1704 k9551486.exe Token: SeDebugPrivilege 4136 l2814379.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
n9357654.exepid process 2584 n9357654.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
2549f49700c34152ce4eb055bdf42210dcf23904a6c761c420751f03080e49aa.exey4606708.exen9357654.exerugen.execmd.exedescription pid process target process PID 5068 wrote to memory of 4888 5068 2549f49700c34152ce4eb055bdf42210dcf23904a6c761c420751f03080e49aa.exe y4606708.exe PID 5068 wrote to memory of 4888 5068 2549f49700c34152ce4eb055bdf42210dcf23904a6c761c420751f03080e49aa.exe y4606708.exe PID 5068 wrote to memory of 4888 5068 2549f49700c34152ce4eb055bdf42210dcf23904a6c761c420751f03080e49aa.exe y4606708.exe PID 4888 wrote to memory of 1704 4888 y4606708.exe k9551486.exe PID 4888 wrote to memory of 1704 4888 y4606708.exe k9551486.exe PID 4888 wrote to memory of 1704 4888 y4606708.exe k9551486.exe PID 4888 wrote to memory of 4136 4888 y4606708.exe l2814379.exe PID 4888 wrote to memory of 4136 4888 y4606708.exe l2814379.exe PID 4888 wrote to memory of 4136 4888 y4606708.exe l2814379.exe PID 5068 wrote to memory of 2584 5068 2549f49700c34152ce4eb055bdf42210dcf23904a6c761c420751f03080e49aa.exe n9357654.exe PID 5068 wrote to memory of 2584 5068 2549f49700c34152ce4eb055bdf42210dcf23904a6c761c420751f03080e49aa.exe n9357654.exe PID 5068 wrote to memory of 2584 5068 2549f49700c34152ce4eb055bdf42210dcf23904a6c761c420751f03080e49aa.exe n9357654.exe PID 2584 wrote to memory of 3524 2584 n9357654.exe rugen.exe PID 2584 wrote to memory of 3524 2584 n9357654.exe rugen.exe PID 2584 wrote to memory of 3524 2584 n9357654.exe rugen.exe PID 3524 wrote to memory of 4820 3524 rugen.exe schtasks.exe PID 3524 wrote to memory of 4820 3524 rugen.exe schtasks.exe PID 3524 wrote to memory of 4820 3524 rugen.exe schtasks.exe PID 3524 wrote to memory of 980 3524 rugen.exe cmd.exe PID 3524 wrote to memory of 980 3524 rugen.exe cmd.exe PID 3524 wrote to memory of 980 3524 rugen.exe cmd.exe PID 980 wrote to memory of 5072 980 cmd.exe cmd.exe PID 980 wrote to memory of 5072 980 cmd.exe cmd.exe PID 980 wrote to memory of 5072 980 cmd.exe cmd.exe PID 980 wrote to memory of 4384 980 cmd.exe cacls.exe PID 980 wrote to memory of 4384 980 cmd.exe cacls.exe PID 980 wrote to memory of 4384 980 cmd.exe cacls.exe PID 980 wrote to memory of 3356 980 cmd.exe cacls.exe PID 980 wrote to memory of 3356 980 cmd.exe cacls.exe PID 980 wrote to memory of 3356 980 cmd.exe cacls.exe PID 980 wrote to memory of 744 980 cmd.exe cmd.exe PID 980 wrote to memory of 744 980 cmd.exe cmd.exe PID 980 wrote to memory of 744 980 cmd.exe cmd.exe PID 980 wrote to memory of 3552 980 cmd.exe cacls.exe PID 980 wrote to memory of 3552 980 cmd.exe cacls.exe PID 980 wrote to memory of 3552 980 cmd.exe cacls.exe PID 980 wrote to memory of 4704 980 cmd.exe cacls.exe PID 980 wrote to memory of 4704 980 cmd.exe cacls.exe PID 980 wrote to memory of 4704 980 cmd.exe cacls.exe PID 3524 wrote to memory of 4600 3524 rugen.exe rundll32.exe PID 3524 wrote to memory of 4600 3524 rugen.exe rundll32.exe PID 3524 wrote to memory of 4600 3524 rugen.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2549f49700c34152ce4eb055bdf42210dcf23904a6c761c420751f03080e49aa.exe"C:\Users\Admin\AppData\Local\Temp\2549f49700c34152ce4eb055bdf42210dcf23904a6c761c420751f03080e49aa.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4606708.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4606708.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k9551486.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k9551486.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1704
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2814379.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2814379.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4136
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n9357654.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n9357654.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rugen.exe /TR "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe" /F4⤵
- Creates scheduled task(s)
PID:4820
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rugen.exe" /P "Admin:N"&&CACLS "rugen.exe" /P "Admin:R" /E&&echo Y|CACLS "..\200f691d32" /P "Admin:N"&&CACLS "..\200f691d32" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:5072
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:N"5⤵PID:4384
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:R" /E5⤵PID:3356
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:744
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:N"5⤵PID:3552
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:R" /E5⤵PID:4704
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4600
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:2196
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:3432
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
332KB
MD56e670660a4cc85717ff9c48c3f31eece
SHA1fb8b5e40169e2eccd6b83ca06b87e2e0fc34a12b
SHA2561f20be376f390c39c6cd07f687f76de772715f1802fdd19f2c8223ba7076007b
SHA512649bf452f49950f1229102fbe83d523042019cdf22846e5cc2383c97845545c67b61c018d123cc7ad73739d96f51e0a29ad7fc1782d1f5cb1e32966da67932a7
-
Filesize
332KB
MD56e670660a4cc85717ff9c48c3f31eece
SHA1fb8b5e40169e2eccd6b83ca06b87e2e0fc34a12b
SHA2561f20be376f390c39c6cd07f687f76de772715f1802fdd19f2c8223ba7076007b
SHA512649bf452f49950f1229102fbe83d523042019cdf22846e5cc2383c97845545c67b61c018d123cc7ad73739d96f51e0a29ad7fc1782d1f5cb1e32966da67932a7
-
Filesize
227KB
MD5bdda2014efe4c807708ca779ffab52f6
SHA1d54b4217d1f74ea3f142f74e52f7168d4f7cebee
SHA256f61641520456ce2be3be61c56243154a25e1949ea6a8c3ca2f6fb42cef497e83
SHA512e4f586031237b8f8b8caf73323fea9cf16a413ad135bf781bb6ce092594b7d8532eef415f9bd7c02acd1a234df797d2809eb331ec8d7987bcb1eb5fd53b7256d
-
Filesize
227KB
MD5bdda2014efe4c807708ca779ffab52f6
SHA1d54b4217d1f74ea3f142f74e52f7168d4f7cebee
SHA256f61641520456ce2be3be61c56243154a25e1949ea6a8c3ca2f6fb42cef497e83
SHA512e4f586031237b8f8b8caf73323fea9cf16a413ad135bf781bb6ce092594b7d8532eef415f9bd7c02acd1a234df797d2809eb331ec8d7987bcb1eb5fd53b7256d
-
Filesize
389KB
MD5eea98bb283645961c0a6cb76f02eac69
SHA143d135294669e83e8dd05a3f1e58f974bfa0697d
SHA2560c0d6f6cf1a71ca26458f12dd895782d6a5a51e11d0e178aceb500628de96b30
SHA51214cd6c511a5546c77649255336c974538dede1ac3058d8f96fb667a621185909a24e356dc25a8dd60278c7e7544624a6a818559787b770b381e8adbae947bbf9
-
Filesize
389KB
MD5eea98bb283645961c0a6cb76f02eac69
SHA143d135294669e83e8dd05a3f1e58f974bfa0697d
SHA2560c0d6f6cf1a71ca26458f12dd895782d6a5a51e11d0e178aceb500628de96b30
SHA51214cd6c511a5546c77649255336c974538dede1ac3058d8f96fb667a621185909a24e356dc25a8dd60278c7e7544624a6a818559787b770b381e8adbae947bbf9
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5