Analysis
-
max time kernel
117s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01-03-2023 15:53
Static task
static1
Behavioral task
behavioral1
Sample
6b2570440fa2adf51b8f8135575290688bcdc01720c51ac27f257357bce076dd.exe
Resource
win10v2004-20230220-en
General
-
Target
6b2570440fa2adf51b8f8135575290688bcdc01720c51ac27f257357bce076dd.exe
-
Size
537KB
-
MD5
a56ccd9667bf03ac08ef8963848a07c2
-
SHA1
30dc242a6efcf6f205ab93827f544fc4f8c964e6
-
SHA256
6b2570440fa2adf51b8f8135575290688bcdc01720c51ac27f257357bce076dd
-
SHA512
6e452475a518be9661c331089c3aa9d2217362a407ae852a8b33be20819cd43d8c480730672df8c3e607f5f2401c1476c4c7c171c7c68fdbf712e50273f0e090
-
SSDEEP
12288:ZMr5y90ERLraoA8X9yK7oBgaufBvm3XmbHZ:EyNxN3Jm3Xmb5
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Extracted
redline
forma
193.233.20.24:4123
-
auth_value
50b8e065d7cb1e9e30786f7a370368f9
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sw89bt33xe01.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw89bt33xe01.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw89bt33xe01.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw89bt33xe01.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw89bt33xe01.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw89bt33xe01.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/4752-158-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/4752-161-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/4752-159-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/4752-163-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/4752-165-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/4752-167-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/4752-169-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/4752-171-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/4752-173-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/4752-175-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/4752-177-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/4752-179-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/4752-181-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/4752-183-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/4752-185-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/4752-187-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/4752-189-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/4752-191-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/4752-193-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/4752-195-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/4752-197-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/4752-199-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/4752-201-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/4752-203-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/4752-205-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/4752-207-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/4752-209-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/4752-211-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/4752-213-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/4752-215-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/4752-217-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/4752-219-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/4752-221-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1664 vxY3832fl.exe 4392 sw89bt33xe01.exe 4752 tga78bZ74.exe 3276 uwX99gq67.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw89bt33xe01.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6b2570440fa2adf51b8f8135575290688bcdc01720c51ac27f257357bce076dd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6b2570440fa2adf51b8f8135575290688bcdc01720c51ac27f257357bce076dd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vxY3832fl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vxY3832fl.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2004 4752 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4392 sw89bt33xe01.exe 4392 sw89bt33xe01.exe 4752 tga78bZ74.exe 4752 tga78bZ74.exe 3276 uwX99gq67.exe 3276 uwX99gq67.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4392 sw89bt33xe01.exe Token: SeDebugPrivilege 4752 tga78bZ74.exe Token: SeDebugPrivilege 3276 uwX99gq67.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 448 wrote to memory of 1664 448 6b2570440fa2adf51b8f8135575290688bcdc01720c51ac27f257357bce076dd.exe 84 PID 448 wrote to memory of 1664 448 6b2570440fa2adf51b8f8135575290688bcdc01720c51ac27f257357bce076dd.exe 84 PID 448 wrote to memory of 1664 448 6b2570440fa2adf51b8f8135575290688bcdc01720c51ac27f257357bce076dd.exe 84 PID 1664 wrote to memory of 4392 1664 vxY3832fl.exe 85 PID 1664 wrote to memory of 4392 1664 vxY3832fl.exe 85 PID 1664 wrote to memory of 4752 1664 vxY3832fl.exe 92 PID 1664 wrote to memory of 4752 1664 vxY3832fl.exe 92 PID 1664 wrote to memory of 4752 1664 vxY3832fl.exe 92 PID 448 wrote to memory of 3276 448 6b2570440fa2adf51b8f8135575290688bcdc01720c51ac27f257357bce076dd.exe 97 PID 448 wrote to memory of 3276 448 6b2570440fa2adf51b8f8135575290688bcdc01720c51ac27f257357bce076dd.exe 97 PID 448 wrote to memory of 3276 448 6b2570440fa2adf51b8f8135575290688bcdc01720c51ac27f257357bce076dd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b2570440fa2adf51b8f8135575290688bcdc01720c51ac27f257357bce076dd.exe"C:\Users\Admin\AppData\Local\Temp\6b2570440fa2adf51b8f8135575290688bcdc01720c51ac27f257357bce076dd.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vxY3832fl.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vxY3832fl.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw89bt33xe01.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw89bt33xe01.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4392
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tga78bZ74.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tga78bZ74.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4752 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4752 -s 16484⤵
- Program crash
PID:2004
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uwX99gq67.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uwX99gq67.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4752 -ip 47521⤵PID:4672
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
177KB
MD552e95f2c67a8ccce1ed75ab905036a5e
SHA1b1a51679014ba67643b9c247c331e691687c6564
SHA25642f8cbae2216a8faa2dba170a92079e651864d1caeb5c213c5dcc77acea6bcc1
SHA512f04132f8cd4cfdd75f9f2c2be7039dc3c835119ce55005b8e91837cb56adb0e090fac9f4c015c63e738871ea7c0556a04c59df6b26693172e66178eae81fa16a
-
Filesize
177KB
MD552e95f2c67a8ccce1ed75ab905036a5e
SHA1b1a51679014ba67643b9c247c331e691687c6564
SHA25642f8cbae2216a8faa2dba170a92079e651864d1caeb5c213c5dcc77acea6bcc1
SHA512f04132f8cd4cfdd75f9f2c2be7039dc3c835119ce55005b8e91837cb56adb0e090fac9f4c015c63e738871ea7c0556a04c59df6b26693172e66178eae81fa16a
-
Filesize
392KB
MD5504b4d7a7e1688e87da80a1138b4a20d
SHA1233d855158b529f56f40ac3ffcc9f6bf03cbd11a
SHA256b9643b045ea78fd941328c362f7147ddf76f1833b80d9b383d40417f3a1e82c7
SHA5124c240f99ca0be27d754b8ccb2ed792f4c3bfe4271fe5d49a97430f72f5dac781e531f1ef35d304cd0bbf9a198212478cb6f08df538a5b2e984b947f9f5722db9
-
Filesize
392KB
MD5504b4d7a7e1688e87da80a1138b4a20d
SHA1233d855158b529f56f40ac3ffcc9f6bf03cbd11a
SHA256b9643b045ea78fd941328c362f7147ddf76f1833b80d9b383d40417f3a1e82c7
SHA5124c240f99ca0be27d754b8ccb2ed792f4c3bfe4271fe5d49a97430f72f5dac781e531f1ef35d304cd0bbf9a198212478cb6f08df538a5b2e984b947f9f5722db9
-
Filesize
17KB
MD57a73bff4ec5226bcdfc89a73238ba292
SHA19b885b9fdca40e0b9f906574a61480ad9c70e51e
SHA256dc5f57df2f512a5f1d3d8b15eda8fd16ce26600ee01005ef9c858e7454979beb
SHA5121bc4c1de89b63c564f4616d3f99ba9ab3e5befee03c1edc8f458a2524db7dac61ac13190ceed4506f422005c6c978e91e622c7d247ef21d407f2ff7394643882
-
Filesize
17KB
MD57a73bff4ec5226bcdfc89a73238ba292
SHA19b885b9fdca40e0b9f906574a61480ad9c70e51e
SHA256dc5f57df2f512a5f1d3d8b15eda8fd16ce26600ee01005ef9c858e7454979beb
SHA5121bc4c1de89b63c564f4616d3f99ba9ab3e5befee03c1edc8f458a2524db7dac61ac13190ceed4506f422005c6c978e91e622c7d247ef21d407f2ff7394643882
-
Filesize
304KB
MD5bc94778948460579a0739b42d8018118
SHA1f960e87471a354673dc63408a7cfd07052a18561
SHA256164e02a2c9318020d3b3db0e977aadf0890dd6ad139cfcd07195e62578f44d8b
SHA512ff267c27af132c2ce96ca075011a96596d045f771c3439d72b1ea1f567fe585f139b0e7dc8f5c97d340209f478d7e9cad374fc0497345998702f06e234ca657b
-
Filesize
304KB
MD5bc94778948460579a0739b42d8018118
SHA1f960e87471a354673dc63408a7cfd07052a18561
SHA256164e02a2c9318020d3b3db0e977aadf0890dd6ad139cfcd07195e62578f44d8b
SHA512ff267c27af132c2ce96ca075011a96596d045f771c3439d72b1ea1f567fe585f139b0e7dc8f5c97d340209f478d7e9cad374fc0497345998702f06e234ca657b