Analysis
-
max time kernel
143s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01-03-2023 19:09
Static task
static1
Behavioral task
behavioral1
Sample
d49743de9d24ac1fb13f571caa8d17f62cb9345ec6c7fae31bc5a8a9f1940e04.exe
Resource
win10v2004-20230220-en
General
-
Target
d49743de9d24ac1fb13f571caa8d17f62cb9345ec6c7fae31bc5a8a9f1940e04.exe
-
Size
1.3MB
-
MD5
430495ef053d688e1dfd58a0c5f8b591
-
SHA1
af9b9ac615390eb66c9741c2eb5314387deadd87
-
SHA256
d49743de9d24ac1fb13f571caa8d17f62cb9345ec6c7fae31bc5a8a9f1940e04
-
SHA512
fa5d9c46fab089a344d06382ca96a7603a78f6ba6bfc8c311cedaea3f0a7ae32d14c3e5f5a46b73637cb3b7f9f2cad70d5c4fe7d2b3e5a6ce6beeb9a0c51eca2
-
SSDEEP
24576:iyrof08WinvAHzxCJej4v1xLA78NmrVSE/vcJrlWv9MLKHoL6X8He:JEf08xvATaej8bcrPirov9ML6gHH
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" beOC19Om41.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" beOC19Om41.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" beOC19Om41.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" beOC19Om41.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection beOC19Om41.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" beOC19Om41.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/3296-186-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/3296-187-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/3296-189-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/3296-191-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/3296-193-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/3296-195-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/3296-197-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/3296-199-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/3296-201-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/3296-203-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/3296-205-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/3296-207-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/3296-209-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/3296-211-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/3296-213-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/3296-215-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/3296-217-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/3296-219-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/3296-221-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/3296-223-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/3296-225-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/3296-227-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/3296-229-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/3296-231-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/3296-233-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/3296-235-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/3296-237-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/3296-239-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/3296-241-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/3296-243-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/3296-245-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/3296-247-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/3296-249-0x0000000002610000-0x000000000264E000-memory.dmp family_redline -
Executes dropped EXE 7 IoCs
pid Process 2172 ptiz9930lX.exe 4624 ptjN7720Ij.exe 1812 ptdA6660VW.exe 1192 ptcv2260xY.exe 328 ptjE1228gb.exe 2544 beOC19Om41.exe 3296 cuTP22re85.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" beOC19Om41.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" ptdA6660VW.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" ptcv2260xY.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d49743de9d24ac1fb13f571caa8d17f62cb9345ec6c7fae31bc5a8a9f1940e04.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptiz9930lX.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptjN7720Ij.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptdA6660VW.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptjE1228gb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup5 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" ptjE1228gb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d49743de9d24ac1fb13f571caa8d17f62cb9345ec6c7fae31bc5a8a9f1940e04.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ptiz9930lX.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ptjN7720Ij.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptcv2260xY.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2544 beOC19Om41.exe 2544 beOC19Om41.exe 3296 cuTP22re85.exe 3296 cuTP22re85.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2544 beOC19Om41.exe Token: SeDebugPrivilege 3296 cuTP22re85.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1700 wrote to memory of 2172 1700 d49743de9d24ac1fb13f571caa8d17f62cb9345ec6c7fae31bc5a8a9f1940e04.exe 86 PID 1700 wrote to memory of 2172 1700 d49743de9d24ac1fb13f571caa8d17f62cb9345ec6c7fae31bc5a8a9f1940e04.exe 86 PID 1700 wrote to memory of 2172 1700 d49743de9d24ac1fb13f571caa8d17f62cb9345ec6c7fae31bc5a8a9f1940e04.exe 86 PID 2172 wrote to memory of 4624 2172 ptiz9930lX.exe 87 PID 2172 wrote to memory of 4624 2172 ptiz9930lX.exe 87 PID 2172 wrote to memory of 4624 2172 ptiz9930lX.exe 87 PID 4624 wrote to memory of 1812 4624 ptjN7720Ij.exe 88 PID 4624 wrote to memory of 1812 4624 ptjN7720Ij.exe 88 PID 4624 wrote to memory of 1812 4624 ptjN7720Ij.exe 88 PID 1812 wrote to memory of 1192 1812 ptdA6660VW.exe 89 PID 1812 wrote to memory of 1192 1812 ptdA6660VW.exe 89 PID 1812 wrote to memory of 1192 1812 ptdA6660VW.exe 89 PID 1192 wrote to memory of 328 1192 ptcv2260xY.exe 90 PID 1192 wrote to memory of 328 1192 ptcv2260xY.exe 90 PID 1192 wrote to memory of 328 1192 ptcv2260xY.exe 90 PID 328 wrote to memory of 2544 328 ptjE1228gb.exe 91 PID 328 wrote to memory of 2544 328 ptjE1228gb.exe 91 PID 328 wrote to memory of 3296 328 ptjE1228gb.exe 95 PID 328 wrote to memory of 3296 328 ptjE1228gb.exe 95 PID 328 wrote to memory of 3296 328 ptjE1228gb.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\d49743de9d24ac1fb13f571caa8d17f62cb9345ec6c7fae31bc5a8a9f1940e04.exe"C:\Users\Admin\AppData\Local\Temp\d49743de9d24ac1fb13f571caa8d17f62cb9345ec6c7fae31bc5a8a9f1940e04.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptiz9930lX.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptiz9930lX.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptjN7720Ij.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptjN7720Ij.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptdA6660VW.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptdA6660VW.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ptcv2260xY.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ptcv2260xY.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ptjE1228gb.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ptjE1228gb.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:328 -
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\beOC19Om41.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\beOC19Om41.exe7⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2544
-
-
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cuTP22re85.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cuTP22re85.exe7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3296
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5af318ad2b75220b952ba15d8e58b2268
SHA131debc50a71d1fd6235a4cb8021f65e1af86c382
SHA256b5d901b6a84851aadf85923ecbaec91227ccb81207984338db6dd7a5d79dd3f3
SHA5124a031e541647dc9c9bb6d0bc789a66d3174e8042355604a7cb33b09a2949c445b84b88f5bb9733d3f440eca66cd67abd703c70d2e71945ec4855926453a03c47
-
Filesize
1.2MB
MD5af318ad2b75220b952ba15d8e58b2268
SHA131debc50a71d1fd6235a4cb8021f65e1af86c382
SHA256b5d901b6a84851aadf85923ecbaec91227ccb81207984338db6dd7a5d79dd3f3
SHA5124a031e541647dc9c9bb6d0bc789a66d3174e8042355604a7cb33b09a2949c445b84b88f5bb9733d3f440eca66cd67abd703c70d2e71945ec4855926453a03c47
-
Filesize
996KB
MD5e82db278c1ac73899db27a072a14a7a3
SHA133bfbdcee14ea66451397a7a419c318582b545fb
SHA256ff65cc4e94dc30005c594ecd7ba0adf3aa9c6d16969aac86613d58e9284216ef
SHA512482462741bbd18a80d3b0965d2a84c0e8859b2f5dedf8ea650b2efd4fdf46fb04b92f03321b1dfbb4bbdc09ef8f6e8291e4373524cda2d18e4d7ffa2f8832800
-
Filesize
996KB
MD5e82db278c1ac73899db27a072a14a7a3
SHA133bfbdcee14ea66451397a7a419c318582b545fb
SHA256ff65cc4e94dc30005c594ecd7ba0adf3aa9c6d16969aac86613d58e9284216ef
SHA512482462741bbd18a80d3b0965d2a84c0e8859b2f5dedf8ea650b2efd4fdf46fb04b92f03321b1dfbb4bbdc09ef8f6e8291e4373524cda2d18e4d7ffa2f8832800
-
Filesize
893KB
MD5eea83b5ca893b21d31e54c645cf2581c
SHA1326cfa51c970b5bbc18a0efbcfc97d4845733187
SHA256e15e06aa5b051560a56eeed00410db3c4c2261e02b589f276182b3cc3e075113
SHA512239d53c4301d57035b7c206313b4395d323e7a5acc57f33012da26f1f3066a07b271d1cfdc84fe2f48c4899a4ba4934a274a5ec95c5f712191106239f4feefc0
-
Filesize
893KB
MD5eea83b5ca893b21d31e54c645cf2581c
SHA1326cfa51c970b5bbc18a0efbcfc97d4845733187
SHA256e15e06aa5b051560a56eeed00410db3c4c2261e02b589f276182b3cc3e075113
SHA512239d53c4301d57035b7c206313b4395d323e7a5acc57f33012da26f1f3066a07b271d1cfdc84fe2f48c4899a4ba4934a274a5ec95c5f712191106239f4feefc0
-
Filesize
666KB
MD5ed354ecc892c5abc9779e25769fcab34
SHA14ac898adb6879fb63b0d047ca13cd8c0165b4bba
SHA2563c4cb2c88330c5b3d7a3ca307a151b476adc7d0bd6fc603dc4152271754d8c34
SHA5125204c965e2a4d2907bd9513bee5fde4e354ca407f52f1fef252cac4f8c7d6bff0ede8bca69ccbc628dab7a35ff8fbbdee423a0e7f394d9fa0dd18ce75a8100e6
-
Filesize
666KB
MD5ed354ecc892c5abc9779e25769fcab34
SHA14ac898adb6879fb63b0d047ca13cd8c0165b4bba
SHA2563c4cb2c88330c5b3d7a3ca307a151b476adc7d0bd6fc603dc4152271754d8c34
SHA5125204c965e2a4d2907bd9513bee5fde4e354ca407f52f1fef252cac4f8c7d6bff0ede8bca69ccbc628dab7a35ff8fbbdee423a0e7f394d9fa0dd18ce75a8100e6
-
Filesize
391KB
MD5d49d8355bdc66f09a4653d3745116161
SHA12b4c3dbb692cc26b408f9e344322cc0cdfd133bc
SHA256092c4cf4d8e01b2c0f6cad2d1225af0998c17dda2615e66fab667e8dbd59bd6c
SHA51265ee0e07ec556d27d7ac00b05c57fe1e724cf32dc0791b5642936137eee3b413e024f8421cf4b97a90320d412bfba1a85af9e8c05409db9e16651003713536cf
-
Filesize
391KB
MD5d49d8355bdc66f09a4653d3745116161
SHA12b4c3dbb692cc26b408f9e344322cc0cdfd133bc
SHA256092c4cf4d8e01b2c0f6cad2d1225af0998c17dda2615e66fab667e8dbd59bd6c
SHA51265ee0e07ec556d27d7ac00b05c57fe1e724cf32dc0791b5642936137eee3b413e024f8421cf4b97a90320d412bfba1a85af9e8c05409db9e16651003713536cf
-
Filesize
11KB
MD57aec008cd290fd9e521fdf0a19947f8c
SHA1411cf2389fea5702b8840f3ef81476b9768b4c1d
SHA2568f84cc0b07859be47304976a8d33ce84ae72d40528aa937975a880d51c2ae7ae
SHA512f8233df3f2f5b63232ee6e1ab021b68db3c164073a162cc284d9e73c959b53ffc4f848b5565f59b3edd85e9fcc00e17f350b26a1a313549b1514b47b8db82eb9
-
Filesize
11KB
MD57aec008cd290fd9e521fdf0a19947f8c
SHA1411cf2389fea5702b8840f3ef81476b9768b4c1d
SHA2568f84cc0b07859be47304976a8d33ce84ae72d40528aa937975a880d51c2ae7ae
SHA512f8233df3f2f5b63232ee6e1ab021b68db3c164073a162cc284d9e73c959b53ffc4f848b5565f59b3edd85e9fcc00e17f350b26a1a313549b1514b47b8db82eb9
-
Filesize
11KB
MD57aec008cd290fd9e521fdf0a19947f8c
SHA1411cf2389fea5702b8840f3ef81476b9768b4c1d
SHA2568f84cc0b07859be47304976a8d33ce84ae72d40528aa937975a880d51c2ae7ae
SHA512f8233df3f2f5b63232ee6e1ab021b68db3c164073a162cc284d9e73c959b53ffc4f848b5565f59b3edd85e9fcc00e17f350b26a1a313549b1514b47b8db82eb9
-
Filesize
303KB
MD5003ebed48d2fda6c315c683d32b6a6dc
SHA1677088017218065e750a178b68fe2388ac74920a
SHA2560fddb3cac884f8ec784d8b989c3be838bab6db5d0c031deffe70950044a1d88c
SHA51226666394d314e9d1ee3e9cbc667fd4905523c8613eded7b399a7a53ee1dc738220414456e7396ed0ad3b4be4206feeca053b83d24005c8090b9c7744125ba72d
-
Filesize
303KB
MD5003ebed48d2fda6c315c683d32b6a6dc
SHA1677088017218065e750a178b68fe2388ac74920a
SHA2560fddb3cac884f8ec784d8b989c3be838bab6db5d0c031deffe70950044a1d88c
SHA51226666394d314e9d1ee3e9cbc667fd4905523c8613eded7b399a7a53ee1dc738220414456e7396ed0ad3b4be4206feeca053b83d24005c8090b9c7744125ba72d
-
Filesize
303KB
MD5003ebed48d2fda6c315c683d32b6a6dc
SHA1677088017218065e750a178b68fe2388ac74920a
SHA2560fddb3cac884f8ec784d8b989c3be838bab6db5d0c031deffe70950044a1d88c
SHA51226666394d314e9d1ee3e9cbc667fd4905523c8613eded7b399a7a53ee1dc738220414456e7396ed0ad3b4be4206feeca053b83d24005c8090b9c7744125ba72d