Analysis
-
max time kernel
143s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/03/2023, 18:50
Static task
static1
Behavioral task
behavioral1
Sample
250f855a783446caf29f2e44b0c3e8227d4269073ef373563d6b0df940e4d580.exe
Resource
win10v2004-20230220-en
General
-
Target
250f855a783446caf29f2e44b0c3e8227d4269073ef373563d6b0df940e4d580.exe
-
Size
536KB
-
MD5
cb365dc0e729bf457ea3f77af824bc7e
-
SHA1
ec538147b23a314f288ce6c3b477ef3588a0d10e
-
SHA256
250f855a783446caf29f2e44b0c3e8227d4269073ef373563d6b0df940e4d580
-
SHA512
fa04862a5d51a1c208bad1788b009f8958909f1fc03057cc2770f2e122d504e8de632db49f214392e314d1da287c5b67a00339080cf7d11de6b818937dd81208
-
SSDEEP
12288:EMray90nSALTqYkBgUu5q/kfjkoH9BNZt9fwxAD7Q5t:2yUfL+YKgUcfAxA4t
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Extracted
redline
fuba
193.56.146.11:4162
-
auth_value
43015841fc23c63b15ca6ffe1d278d5e
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sw06kq91LO74.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw06kq91LO74.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw06kq91LO74.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw06kq91LO74.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw06kq91LO74.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw06kq91LO74.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/3448-158-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/3448-161-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/3448-159-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/3448-163-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/3448-165-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/3448-167-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/3448-169-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/3448-171-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/3448-173-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/3448-175-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/3448-179-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/3448-177-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/3448-181-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/3448-183-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/3448-185-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/3448-187-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/3448-189-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/3448-191-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/3448-193-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/3448-195-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/3448-199-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/3448-197-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/3448-203-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/3448-201-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/3448-205-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/3448-207-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/3448-209-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/3448-211-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/3448-213-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/3448-215-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/3448-217-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/3448-219-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/3448-221-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4720 vde3890AQ.exe 916 sw06kq91LO74.exe 3448 tHo90sQ98.exe 1120 uIf61iC78.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw06kq91LO74.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 250f855a783446caf29f2e44b0c3e8227d4269073ef373563d6b0df940e4d580.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 250f855a783446caf29f2e44b0c3e8227d4269073ef373563d6b0df940e4d580.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vde3890AQ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vde3890AQ.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1904 3448 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 916 sw06kq91LO74.exe 916 sw06kq91LO74.exe 3448 tHo90sQ98.exe 3448 tHo90sQ98.exe 1120 uIf61iC78.exe 1120 uIf61iC78.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 916 sw06kq91LO74.exe Token: SeDebugPrivilege 3448 tHo90sQ98.exe Token: SeDebugPrivilege 1120 uIf61iC78.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2152 wrote to memory of 4720 2152 250f855a783446caf29f2e44b0c3e8227d4269073ef373563d6b0df940e4d580.exe 86 PID 2152 wrote to memory of 4720 2152 250f855a783446caf29f2e44b0c3e8227d4269073ef373563d6b0df940e4d580.exe 86 PID 2152 wrote to memory of 4720 2152 250f855a783446caf29f2e44b0c3e8227d4269073ef373563d6b0df940e4d580.exe 86 PID 4720 wrote to memory of 916 4720 vde3890AQ.exe 87 PID 4720 wrote to memory of 916 4720 vde3890AQ.exe 87 PID 4720 wrote to memory of 3448 4720 vde3890AQ.exe 92 PID 4720 wrote to memory of 3448 4720 vde3890AQ.exe 92 PID 4720 wrote to memory of 3448 4720 vde3890AQ.exe 92 PID 2152 wrote to memory of 1120 2152 250f855a783446caf29f2e44b0c3e8227d4269073ef373563d6b0df940e4d580.exe 98 PID 2152 wrote to memory of 1120 2152 250f855a783446caf29f2e44b0c3e8227d4269073ef373563d6b0df940e4d580.exe 98 PID 2152 wrote to memory of 1120 2152 250f855a783446caf29f2e44b0c3e8227d4269073ef373563d6b0df940e4d580.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\250f855a783446caf29f2e44b0c3e8227d4269073ef373563d6b0df940e4d580.exe"C:\Users\Admin\AppData\Local\Temp\250f855a783446caf29f2e44b0c3e8227d4269073ef373563d6b0df940e4d580.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vde3890AQ.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vde3890AQ.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw06kq91LO74.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw06kq91LO74.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:916
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tHo90sQ98.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tHo90sQ98.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3448 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3448 -s 13404⤵
- Program crash
PID:1904
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uIf61iC78.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uIf61iC78.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1120
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3448 -ip 34481⤵PID:1240
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5d0e6f4315ef19511b39d0e77a5e9ec7a
SHA11363c14d06493d3ded8afa29615c55658075456b
SHA25649ad3a373d6c8b960894179085d5b05559b3b648f09f1cf377e673da3f3cce21
SHA512f6698c9b8d812d2b134c150ce15c6302fbd9f2f8c9e1559458abd5f20fce448f57a377d54b68477e1122df35e815a3ee7dabb2d19de4e4fbe934aa1d096aa716
-
Filesize
175KB
MD5d0e6f4315ef19511b39d0e77a5e9ec7a
SHA11363c14d06493d3ded8afa29615c55658075456b
SHA25649ad3a373d6c8b960894179085d5b05559b3b648f09f1cf377e673da3f3cce21
SHA512f6698c9b8d812d2b134c150ce15c6302fbd9f2f8c9e1559458abd5f20fce448f57a377d54b68477e1122df35e815a3ee7dabb2d19de4e4fbe934aa1d096aa716
-
Filesize
391KB
MD5744b2c56ba8cb13c9e0d2d052aa18a9b
SHA197f628806d214dc71f9982692c9a9fcc410340f5
SHA2567612bedd7603854a88df22e65ff56676d9ed1583739c2be1f28837805e4aff76
SHA512eae4dceb1583e4508651d16037ffe646cd6ea895c22923258cd2677b3ce718f1473c21f63efca8982f3da8961850450f96f8884632d266a90040428f2520e840
-
Filesize
391KB
MD5744b2c56ba8cb13c9e0d2d052aa18a9b
SHA197f628806d214dc71f9982692c9a9fcc410340f5
SHA2567612bedd7603854a88df22e65ff56676d9ed1583739c2be1f28837805e4aff76
SHA512eae4dceb1583e4508651d16037ffe646cd6ea895c22923258cd2677b3ce718f1473c21f63efca8982f3da8961850450f96f8884632d266a90040428f2520e840
-
Filesize
11KB
MD5c0d906a1ffda7971fda2303da0cd76f9
SHA13fef2e6bcc3f8139771bcdfd2ea35fc1ae2bc1d2
SHA256c643df1b9191347f705af74edcc094e276b349467045b37fa9abd33d574ce6fa
SHA512349d16a5d0547d8917ebf7489fba4505abe607a53bc548a8e1e3feb2c26bd46f5e5d903c6cf4dae557ab5b8dd8d599640e350366531b0029463f36a5a17026e0
-
Filesize
11KB
MD5c0d906a1ffda7971fda2303da0cd76f9
SHA13fef2e6bcc3f8139771bcdfd2ea35fc1ae2bc1d2
SHA256c643df1b9191347f705af74edcc094e276b349467045b37fa9abd33d574ce6fa
SHA512349d16a5d0547d8917ebf7489fba4505abe607a53bc548a8e1e3feb2c26bd46f5e5d903c6cf4dae557ab5b8dd8d599640e350366531b0029463f36a5a17026e0
-
Filesize
304KB
MD59c3e7c5879f2758bb2add2fbf488ed16
SHA1c5a2662767f97a4860f33a9fe6cace435a3c1b02
SHA2567ec2ec7a2ee43e8dc5523be5af507bcf31f19dfed1faa303314729d2fe456acf
SHA5120808e8e4d00ffe2201f792095081c7fc1678ef3d75d8ae1e6d18363d1693a4bf3c1458252209a6ebd13255d8eb43c9eed45d8029a409ed511fbe3020e8b7ae8a
-
Filesize
304KB
MD59c3e7c5879f2758bb2add2fbf488ed16
SHA1c5a2662767f97a4860f33a9fe6cace435a3c1b02
SHA2567ec2ec7a2ee43e8dc5523be5af507bcf31f19dfed1faa303314729d2fe456acf
SHA5120808e8e4d00ffe2201f792095081c7fc1678ef3d75d8ae1e6d18363d1693a4bf3c1458252209a6ebd13255d8eb43c9eed45d8029a409ed511fbe3020e8b7ae8a