Analysis
-
max time kernel
138s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20230621-en -
resource tags
arch:x64arch:x86image:win10-20230621-enlocale:en-usos:windows10-1703-x64system -
submitted
22-06-2023 14:25
Static task
static1
Behavioral task
behavioral1
Sample
d81b4f74b3e1dff095d5357fc90a73f461629ef7209f27fcc6f5457a1e89241d.exe
Resource
win10-20230621-en
General
-
Target
d81b4f74b3e1dff095d5357fc90a73f461629ef7209f27fcc6f5457a1e89241d.exe
-
Size
713KB
-
MD5
0ea6db5aa42444f6c1415cdb582b734f
-
SHA1
e4a4fe706aa049554ec73c647d4411e7e1c8419c
-
SHA256
d81b4f74b3e1dff095d5357fc90a73f461629ef7209f27fcc6f5457a1e89241d
-
SHA512
7464d953716e05ea24f8d15ee9dda232d0be849b41decc4c95f214114d4ced3e2f38b7567adb89ced8041817eeaa14d2eea3102ca7d828120645244500584a9d
-
SSDEEP
12288:2ztKeEjWeeIOkQ6CWJSn/1/XYDsQBiRdwy+xXpyC7TXPoZpF:2kOeefn/1/oDjB37ICfQZ
Malware Config
Extracted
redline
furga
83.97.73.128:19071
-
auth_value
1b7af6db7a79a3475798fcf494818be7
Extracted
amadey
3.84
77.91.68.63/doma/net/index.php
Signatures
-
Processes:
k3352280.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k3352280.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k3352280.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k3352280.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k3352280.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k3352280.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
Processes:
y0771999.exek3352280.exel2752905.exen9527270.exerugen.exerugen.exerugen.exepid process 2348 y0771999.exe 2584 k3352280.exe 3644 l2752905.exe 2864 n9527270.exe 1292 rugen.exe 3392 rugen.exe 4404 rugen.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 3320 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
k3352280.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k3352280.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k3352280.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
d81b4f74b3e1dff095d5357fc90a73f461629ef7209f27fcc6f5457a1e89241d.exey0771999.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d81b4f74b3e1dff095d5357fc90a73f461629ef7209f27fcc6f5457a1e89241d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y0771999.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y0771999.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d81b4f74b3e1dff095d5357fc90a73f461629ef7209f27fcc6f5457a1e89241d.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
k3352280.exel2752905.exepid process 2584 k3352280.exe 2584 k3352280.exe 3644 l2752905.exe 3644 l2752905.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
k3352280.exel2752905.exedescription pid process Token: SeDebugPrivilege 2584 k3352280.exe Token: SeDebugPrivilege 3644 l2752905.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
n9527270.exepid process 2864 n9527270.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
d81b4f74b3e1dff095d5357fc90a73f461629ef7209f27fcc6f5457a1e89241d.exey0771999.exen9527270.exerugen.execmd.exedescription pid process target process PID 1628 wrote to memory of 2348 1628 d81b4f74b3e1dff095d5357fc90a73f461629ef7209f27fcc6f5457a1e89241d.exe y0771999.exe PID 1628 wrote to memory of 2348 1628 d81b4f74b3e1dff095d5357fc90a73f461629ef7209f27fcc6f5457a1e89241d.exe y0771999.exe PID 1628 wrote to memory of 2348 1628 d81b4f74b3e1dff095d5357fc90a73f461629ef7209f27fcc6f5457a1e89241d.exe y0771999.exe PID 2348 wrote to memory of 2584 2348 y0771999.exe k3352280.exe PID 2348 wrote to memory of 2584 2348 y0771999.exe k3352280.exe PID 2348 wrote to memory of 2584 2348 y0771999.exe k3352280.exe PID 2348 wrote to memory of 3644 2348 y0771999.exe l2752905.exe PID 2348 wrote to memory of 3644 2348 y0771999.exe l2752905.exe PID 2348 wrote to memory of 3644 2348 y0771999.exe l2752905.exe PID 1628 wrote to memory of 2864 1628 d81b4f74b3e1dff095d5357fc90a73f461629ef7209f27fcc6f5457a1e89241d.exe n9527270.exe PID 1628 wrote to memory of 2864 1628 d81b4f74b3e1dff095d5357fc90a73f461629ef7209f27fcc6f5457a1e89241d.exe n9527270.exe PID 1628 wrote to memory of 2864 1628 d81b4f74b3e1dff095d5357fc90a73f461629ef7209f27fcc6f5457a1e89241d.exe n9527270.exe PID 2864 wrote to memory of 1292 2864 n9527270.exe rugen.exe PID 2864 wrote to memory of 1292 2864 n9527270.exe rugen.exe PID 2864 wrote to memory of 1292 2864 n9527270.exe rugen.exe PID 1292 wrote to memory of 3756 1292 rugen.exe schtasks.exe PID 1292 wrote to memory of 3756 1292 rugen.exe schtasks.exe PID 1292 wrote to memory of 3756 1292 rugen.exe schtasks.exe PID 1292 wrote to memory of 3464 1292 rugen.exe cmd.exe PID 1292 wrote to memory of 3464 1292 rugen.exe cmd.exe PID 1292 wrote to memory of 3464 1292 rugen.exe cmd.exe PID 3464 wrote to memory of 4324 3464 cmd.exe cmd.exe PID 3464 wrote to memory of 4324 3464 cmd.exe cmd.exe PID 3464 wrote to memory of 4324 3464 cmd.exe cmd.exe PID 3464 wrote to memory of 3396 3464 cmd.exe cacls.exe PID 3464 wrote to memory of 3396 3464 cmd.exe cacls.exe PID 3464 wrote to memory of 3396 3464 cmd.exe cacls.exe PID 3464 wrote to memory of 1856 3464 cmd.exe cacls.exe PID 3464 wrote to memory of 1856 3464 cmd.exe cacls.exe PID 3464 wrote to memory of 1856 3464 cmd.exe cacls.exe PID 3464 wrote to memory of 2112 3464 cmd.exe cmd.exe PID 3464 wrote to memory of 2112 3464 cmd.exe cmd.exe PID 3464 wrote to memory of 2112 3464 cmd.exe cmd.exe PID 3464 wrote to memory of 3092 3464 cmd.exe cacls.exe PID 3464 wrote to memory of 3092 3464 cmd.exe cacls.exe PID 3464 wrote to memory of 3092 3464 cmd.exe cacls.exe PID 3464 wrote to memory of 4892 3464 cmd.exe cacls.exe PID 3464 wrote to memory of 4892 3464 cmd.exe cacls.exe PID 3464 wrote to memory of 4892 3464 cmd.exe cacls.exe PID 1292 wrote to memory of 3320 1292 rugen.exe rundll32.exe PID 1292 wrote to memory of 3320 1292 rugen.exe rundll32.exe PID 1292 wrote to memory of 3320 1292 rugen.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d81b4f74b3e1dff095d5357fc90a73f461629ef7209f27fcc6f5457a1e89241d.exe"C:\Users\Admin\AppData\Local\Temp\d81b4f74b3e1dff095d5357fc90a73f461629ef7209f27fcc6f5457a1e89241d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0771999.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0771999.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k3352280.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k3352280.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2584
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2752905.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2752905.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3644
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n9527270.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n9527270.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rugen.exe /TR "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe" /F4⤵
- Creates scheduled task(s)
PID:3756
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rugen.exe" /P "Admin:N"&&CACLS "rugen.exe" /P "Admin:R" /E&&echo Y|CACLS "..\200f691d32" /P "Admin:N"&&CACLS "..\200f691d32" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4324
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:N"5⤵PID:3396
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:R" /E5⤵PID:1856
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2112
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:N"5⤵PID:3092
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:R" /E5⤵PID:4892
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3320
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:3392
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:4404
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5957779c42144282d8cd83192b8fbc7cf
SHA1de83d08d2cca06b9ff3d1ef239d6b60b705d25fe
SHA2560d7ca7ba65e2b465e4878e324ceab8f8981f5ec06dcf5bc32559a4467a9c7d51
SHA512f1549c61b4f2906d13b2aabb74772c2bc826cd42373d7bb6c48cbb125d5aa2ec17617e6b5e67e8aae3bb5790cc831cdba48a45008ed01df4fba8be448cce39fd
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
325KB
MD58828f4a3086d23d904d4cc291c16a956
SHA10c0d33a398e7c20178600290bd5c108133e79c72
SHA256bf3bbff8cd5a9ae3f335fcc46138be4eaddcb5cabc71cd867ad58c5c7cd16c01
SHA512eff3a699d501c8e2e04547c68d2d917596fe389b6bb84b599adabddf2e2c6babe67260b2200b5a47bd9a770287717a8d48cd82161d22a292c0621f3cbff245f9
-
Filesize
325KB
MD58828f4a3086d23d904d4cc291c16a956
SHA10c0d33a398e7c20178600290bd5c108133e79c72
SHA256bf3bbff8cd5a9ae3f335fcc46138be4eaddcb5cabc71cd867ad58c5c7cd16c01
SHA512eff3a699d501c8e2e04547c68d2d917596fe389b6bb84b599adabddf2e2c6babe67260b2200b5a47bd9a770287717a8d48cd82161d22a292c0621f3cbff245f9
-
Filesize
227KB
MD5881685065c033a1260a5f7a6fb5b7322
SHA1c0119f3bbbf92b940d08e71181e6ab94c668605f
SHA2562498a933be087bacae6df76b31a68c076ef402b1ec4446551e9f3385a158f328
SHA51242499099327c8e8f6e994b543507b57d484ab91c8bf8f31cf65e3c2e775080984eab27cd77163e3770a0011c8597b32ea76a480414afc4e8f4e41a52991a2ba6
-
Filesize
227KB
MD5881685065c033a1260a5f7a6fb5b7322
SHA1c0119f3bbbf92b940d08e71181e6ab94c668605f
SHA2562498a933be087bacae6df76b31a68c076ef402b1ec4446551e9f3385a158f328
SHA51242499099327c8e8f6e994b543507b57d484ab91c8bf8f31cf65e3c2e775080984eab27cd77163e3770a0011c8597b32ea76a480414afc4e8f4e41a52991a2ba6
-
Filesize
388KB
MD511871229b524c4ce6a74b65d90854e7f
SHA1ebee21cfe329051d4d1417165c491f62d93c749f
SHA2563aec95d5a341d8e9bc7199f288fa7bc45f0df1732488c1d790ebf830623f601b
SHA5129e6126cfed7a15f42b4183ad5bd6ebc9ce3f38249c0ed6a7c8420e1858c7305b2d7a002fb523bea36b4613e05a6f977e194e40c4b122e827e170cd978e73fd3c
-
Filesize
388KB
MD511871229b524c4ce6a74b65d90854e7f
SHA1ebee21cfe329051d4d1417165c491f62d93c749f
SHA2563aec95d5a341d8e9bc7199f288fa7bc45f0df1732488c1d790ebf830623f601b
SHA5129e6126cfed7a15f42b4183ad5bd6ebc9ce3f38249c0ed6a7c8420e1858c7305b2d7a002fb523bea36b4613e05a6f977e194e40c4b122e827e170cd978e73fd3c
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf