Analysis
-
max time kernel
91s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
27/06/2023, 02:05
Static task
static1
Behavioral task
behavioral1
Sample
5b850a5738478d8973e71f4ff93f40668ce24ebb8b83277f4df93adcabd8181b.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
5b850a5738478d8973e71f4ff93f40668ce24ebb8b83277f4df93adcabd8181b.exe
Resource
win10v2004-20230621-en
General
-
Target
5b850a5738478d8973e71f4ff93f40668ce24ebb8b83277f4df93adcabd8181b.exe
-
Size
3.9MB
-
MD5
d2db1075fea9ef50bc28b740d2ef564a
-
SHA1
28c55ff2bae7147af41d8764aa7876457e26ac12
-
SHA256
5b850a5738478d8973e71f4ff93f40668ce24ebb8b83277f4df93adcabd8181b
-
SHA512
f4eba57fa23c2626b72667dc49c066c99a29c82965af565476815870507f83542bdf7055fd2dcd008ce0a27822508eb4d2fecfb620c969220e266c3b324a51e7
-
SSDEEP
98304:hLqvY3ZBtshIHeCCNrR96XNGDEv2gKb4EEB0IxYaA6fY5+w47XEnWHGBK+VNFfij:hLT+u3ER96XNGFgU4EEBvx3wAwSXEnWI
Malware Config
Extracted
redline
drake
83.97.73.131:19071
-
auth_value
74ce6ffe4025a2e4027fb727915e7d7c
Extracted
amadey
3.84
77.91.68.63/doma/net/index.php
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k3065207.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k3065207.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k3065207.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k3065207.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k3065207.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k3065207.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2178924671-3779044592-2825503497-1000\Control Panel\International\Geo\Nation n3440246.exe Key value queried \REGISTRY\USER\S-1-5-21-2178924671-3779044592-2825503497-1000\Control Panel\International\Geo\Nation rugen.exe -
Executes dropped EXE 7 IoCs
pid Process 3232 y7295577.exe 3004 k3065207.exe 3808 l6414521.exe 5068 n3440246.exe 1804 rugen.exe 3732 rugen.exe 3876 rugen.exe -
Loads dropped DLL 1 IoCs
pid Process 4588 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k3065207.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k3065207.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5b850a5738478d8973e71f4ff93f40668ce24ebb8b83277f4df93adcabd8181b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5b850a5738478d8973e71f4ff93f40668ce24ebb8b83277f4df93adcabd8181b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y7295577.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y7295577.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4440 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3004 k3065207.exe 3004 k3065207.exe 3808 l6414521.exe 3808 l6414521.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3004 k3065207.exe Token: SeDebugPrivilege 3808 l6414521.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5068 n3440246.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 1624 wrote to memory of 3232 1624 5b850a5738478d8973e71f4ff93f40668ce24ebb8b83277f4df93adcabd8181b.exe 83 PID 1624 wrote to memory of 3232 1624 5b850a5738478d8973e71f4ff93f40668ce24ebb8b83277f4df93adcabd8181b.exe 83 PID 1624 wrote to memory of 3232 1624 5b850a5738478d8973e71f4ff93f40668ce24ebb8b83277f4df93adcabd8181b.exe 83 PID 3232 wrote to memory of 3004 3232 y7295577.exe 84 PID 3232 wrote to memory of 3004 3232 y7295577.exe 84 PID 3232 wrote to memory of 3004 3232 y7295577.exe 84 PID 3232 wrote to memory of 3808 3232 y7295577.exe 86 PID 3232 wrote to memory of 3808 3232 y7295577.exe 86 PID 3232 wrote to memory of 3808 3232 y7295577.exe 86 PID 1624 wrote to memory of 5068 1624 5b850a5738478d8973e71f4ff93f40668ce24ebb8b83277f4df93adcabd8181b.exe 88 PID 1624 wrote to memory of 5068 1624 5b850a5738478d8973e71f4ff93f40668ce24ebb8b83277f4df93adcabd8181b.exe 88 PID 1624 wrote to memory of 5068 1624 5b850a5738478d8973e71f4ff93f40668ce24ebb8b83277f4df93adcabd8181b.exe 88 PID 5068 wrote to memory of 1804 5068 n3440246.exe 89 PID 5068 wrote to memory of 1804 5068 n3440246.exe 89 PID 5068 wrote to memory of 1804 5068 n3440246.exe 89 PID 1804 wrote to memory of 4440 1804 rugen.exe 90 PID 1804 wrote to memory of 4440 1804 rugen.exe 90 PID 1804 wrote to memory of 4440 1804 rugen.exe 90 PID 1804 wrote to memory of 4656 1804 rugen.exe 92 PID 1804 wrote to memory of 4656 1804 rugen.exe 92 PID 1804 wrote to memory of 4656 1804 rugen.exe 92 PID 4656 wrote to memory of 3464 4656 cmd.exe 94 PID 4656 wrote to memory of 3464 4656 cmd.exe 94 PID 4656 wrote to memory of 3464 4656 cmd.exe 94 PID 4656 wrote to memory of 1148 4656 cmd.exe 95 PID 4656 wrote to memory of 1148 4656 cmd.exe 95 PID 4656 wrote to memory of 1148 4656 cmd.exe 95 PID 4656 wrote to memory of 1364 4656 cmd.exe 96 PID 4656 wrote to memory of 1364 4656 cmd.exe 96 PID 4656 wrote to memory of 1364 4656 cmd.exe 96 PID 4656 wrote to memory of 1564 4656 cmd.exe 97 PID 4656 wrote to memory of 1564 4656 cmd.exe 97 PID 4656 wrote to memory of 1564 4656 cmd.exe 97 PID 4656 wrote to memory of 1768 4656 cmd.exe 98 PID 4656 wrote to memory of 1768 4656 cmd.exe 98 PID 4656 wrote to memory of 1768 4656 cmd.exe 98 PID 4656 wrote to memory of 4460 4656 cmd.exe 99 PID 4656 wrote to memory of 4460 4656 cmd.exe 99 PID 4656 wrote to memory of 4460 4656 cmd.exe 99 PID 1804 wrote to memory of 4588 1804 rugen.exe 103 PID 1804 wrote to memory of 4588 1804 rugen.exe 103 PID 1804 wrote to memory of 4588 1804 rugen.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b850a5738478d8973e71f4ff93f40668ce24ebb8b83277f4df93adcabd8181b.exe"C:\Users\Admin\AppData\Local\Temp\5b850a5738478d8973e71f4ff93f40668ce24ebb8b83277f4df93adcabd8181b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7295577.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7295577.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k3065207.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k3065207.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3004
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l6414521.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l6414521.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3808
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n3440246.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n3440246.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rugen.exe /TR "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe" /F4⤵
- Creates scheduled task(s)
PID:4440
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rugen.exe" /P "Admin:N"&&CACLS "rugen.exe" /P "Admin:R" /E&&echo Y|CACLS "..\200f691d32" /P "Admin:N"&&CACLS "..\200f691d32" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3464
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:N"5⤵PID:1148
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:R" /E5⤵PID:1364
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1564
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:N"5⤵PID:1768
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:R" /E5⤵PID:4460
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4588
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:3732
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:3876
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
409KB
MD5cf43e37339ddbb010486d928d4be99d3
SHA11ae9036838f8944e39850fb002848db6f6a2fa5d
SHA256537033034ec07392130882e679d2982edaa3ff2a546655756df5d054e687eb9c
SHA512419f49a3d8ec1aba5a9f7a46a4df15799c760092b502cd44918c43ffee03d29aa9a50b964a009bed52270ddceffaff60d3d6069d0d6baaad7394662ee87525d9
-
Filesize
409KB
MD5cf43e37339ddbb010486d928d4be99d3
SHA11ae9036838f8944e39850fb002848db6f6a2fa5d
SHA256537033034ec07392130882e679d2982edaa3ff2a546655756df5d054e687eb9c
SHA512419f49a3d8ec1aba5a9f7a46a4df15799c760092b502cd44918c43ffee03d29aa9a50b964a009bed52270ddceffaff60d3d6069d0d6baaad7394662ee87525d9
-
Filesize
196KB
MD5936ecc67564c64946cdce46d7bd7c37c
SHA168c48284bd53edb3649ea1c2ce9884375e118b96
SHA256e3ad3267587bdb8890392acab644f602bbb19d41d207942804e0540cf8e11651
SHA51237204826305e0414fdcf4ed53b6a24eba734de6e47a89d5464e985bfa6651ddd0bcdea55edbb02619a38b323689a82dfa5ec8cec4a6e6c5b15ff8781d4c3d6a5
-
Filesize
196KB
MD5936ecc67564c64946cdce46d7bd7c37c
SHA168c48284bd53edb3649ea1c2ce9884375e118b96
SHA256e3ad3267587bdb8890392acab644f602bbb19d41d207942804e0540cf8e11651
SHA51237204826305e0414fdcf4ed53b6a24eba734de6e47a89d5464e985bfa6651ddd0bcdea55edbb02619a38b323689a82dfa5ec8cec4a6e6c5b15ff8781d4c3d6a5
-
Filesize
1.3MB
MD51ee29eaec3d1f1b50e99f55befa946bb
SHA1bb445bd3a97849b7b521d8c8479c9d1317c01149
SHA2569818c0a26dd6b45cb58b8ceda63cca2a52c547ca0ff794d5d6aecb2aedb896fc
SHA5124b746d356beb904618c07dcc52cdf33125a5654ebb532c0d8313ea02b2c0788e19f474062eefdddc6662a82a042451856a139e6c3eece741920621a68ccd5e84
-
Filesize
1.3MB
MD51ee29eaec3d1f1b50e99f55befa946bb
SHA1bb445bd3a97849b7b521d8c8479c9d1317c01149
SHA2569818c0a26dd6b45cb58b8ceda63cca2a52c547ca0ff794d5d6aecb2aedb896fc
SHA5124b746d356beb904618c07dcc52cdf33125a5654ebb532c0d8313ea02b2c0788e19f474062eefdddc6662a82a042451856a139e6c3eece741920621a68ccd5e84
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
273B
MD504a943771990ab49147e63e8c2fbbed0
SHA1a2bde564bef4f63749716621693a3cfb7bd4d55e
SHA256587c2fb0cf025a255a077b24fe6433fd67bdfac451d74d321d86db96c369841e
SHA51240e325e6e50e2d7b6c9dd0c555e23c85c4a45bd1829a76efa0383dcc05ac5fd19a14804079a5d2523ded92b03b6e3051c3e8780053795be3359bf32dd3094a6d