Analysis
-
max time kernel
142s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02-03-2023 23:58
Static task
static1
Behavioral task
behavioral1
Sample
11b7e6d3a96c7cd83e9cf586fd02dc4a122d541951d2ac176228d542ce164641.exe
Resource
win10v2004-20230220-en
General
-
Target
11b7e6d3a96c7cd83e9cf586fd02dc4a122d541951d2ac176228d542ce164641.exe
-
Size
556KB
-
MD5
c26b7d27d625baf49046ee4038e1d501
-
SHA1
5eefddad07c24fdb2d8bb4f6dd2a85a6cb6ab162
-
SHA256
11b7e6d3a96c7cd83e9cf586fd02dc4a122d541951d2ac176228d542ce164641
-
SHA512
3dfe5d03da40cfae4bdbbd024dbcbae5c073afdcddf6215d78a110dda31365e3a1a4c6f358ce4b676a7df0b99505973d0739b8f4e75841237a645d16b3f16eb6
-
SSDEEP
12288:6MrFy90HEyfXMuWOvkbJPlHSstDS5Ynn9fRSRHAyRC2BympOdc3T:/yaEy4JSs7nn9foRH/RC2BDac3T
Malware Config
Extracted
redline
ruzhpe
pepunn.com:4162
-
auth_value
f735ced96ae8d01d0bd1d514240e54e0
Extracted
redline
fchan
pepunn.com:4162
-
auth_value
127bd53d55e8c4f0dd2f6e1ea60deef4
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sw49ts62AS07.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw49ts62AS07.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw49ts62AS07.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw49ts62AS07.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw49ts62AS07.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw49ts62AS07.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/2432-158-0x00000000072C0000-0x00000000072FE000-memory.dmp family_redline behavioral1/memory/2432-161-0x00000000072C0000-0x00000000072FE000-memory.dmp family_redline behavioral1/memory/2432-159-0x00000000072C0000-0x00000000072FE000-memory.dmp family_redline behavioral1/memory/2432-163-0x00000000072C0000-0x00000000072FE000-memory.dmp family_redline behavioral1/memory/2432-165-0x00000000072C0000-0x00000000072FE000-memory.dmp family_redline behavioral1/memory/2432-167-0x00000000072C0000-0x00000000072FE000-memory.dmp family_redline behavioral1/memory/2432-169-0x00000000072C0000-0x00000000072FE000-memory.dmp family_redline behavioral1/memory/2432-171-0x00000000072C0000-0x00000000072FE000-memory.dmp family_redline behavioral1/memory/2432-173-0x00000000072C0000-0x00000000072FE000-memory.dmp family_redline behavioral1/memory/2432-175-0x00000000072C0000-0x00000000072FE000-memory.dmp family_redline behavioral1/memory/2432-177-0x00000000072C0000-0x00000000072FE000-memory.dmp family_redline behavioral1/memory/2432-179-0x00000000072C0000-0x00000000072FE000-memory.dmp family_redline behavioral1/memory/2432-181-0x00000000072C0000-0x00000000072FE000-memory.dmp family_redline behavioral1/memory/2432-183-0x00000000072C0000-0x00000000072FE000-memory.dmp family_redline behavioral1/memory/2432-185-0x00000000072C0000-0x00000000072FE000-memory.dmp family_redline behavioral1/memory/2432-187-0x00000000072C0000-0x00000000072FE000-memory.dmp family_redline behavioral1/memory/2432-189-0x00000000072C0000-0x00000000072FE000-memory.dmp family_redline behavioral1/memory/2432-191-0x00000000072C0000-0x00000000072FE000-memory.dmp family_redline behavioral1/memory/2432-193-0x00000000072C0000-0x00000000072FE000-memory.dmp family_redline behavioral1/memory/2432-195-0x00000000072C0000-0x00000000072FE000-memory.dmp family_redline behavioral1/memory/2432-197-0x00000000072C0000-0x00000000072FE000-memory.dmp family_redline behavioral1/memory/2432-199-0x00000000072C0000-0x00000000072FE000-memory.dmp family_redline behavioral1/memory/2432-201-0x00000000072C0000-0x00000000072FE000-memory.dmp family_redline behavioral1/memory/2432-203-0x00000000072C0000-0x00000000072FE000-memory.dmp family_redline behavioral1/memory/2432-205-0x00000000072C0000-0x00000000072FE000-memory.dmp family_redline behavioral1/memory/2432-207-0x00000000072C0000-0x00000000072FE000-memory.dmp family_redline behavioral1/memory/2432-209-0x00000000072C0000-0x00000000072FE000-memory.dmp family_redline behavioral1/memory/2432-211-0x00000000072C0000-0x00000000072FE000-memory.dmp family_redline behavioral1/memory/2432-213-0x00000000072C0000-0x00000000072FE000-memory.dmp family_redline behavioral1/memory/2432-215-0x00000000072C0000-0x00000000072FE000-memory.dmp family_redline behavioral1/memory/2432-217-0x00000000072C0000-0x00000000072FE000-memory.dmp family_redline behavioral1/memory/2432-219-0x00000000072C0000-0x00000000072FE000-memory.dmp family_redline behavioral1/memory/2432-221-0x00000000072C0000-0x00000000072FE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2016 vkWm0593Ws.exe 2020 sw49ts62AS07.exe 2432 tkPR38zf30dl.exe 4276 upaF79LL85hd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw49ts62AS07.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vkWm0593Ws.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 11b7e6d3a96c7cd83e9cf586fd02dc4a122d541951d2ac176228d542ce164641.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 11b7e6d3a96c7cd83e9cf586fd02dc4a122d541951d2ac176228d542ce164641.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vkWm0593Ws.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1456 2432 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2020 sw49ts62AS07.exe 2020 sw49ts62AS07.exe 2432 tkPR38zf30dl.exe 2432 tkPR38zf30dl.exe 4276 upaF79LL85hd.exe 4276 upaF79LL85hd.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2020 sw49ts62AS07.exe Token: SeDebugPrivilege 2432 tkPR38zf30dl.exe Token: SeDebugPrivilege 4276 upaF79LL85hd.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2628 wrote to memory of 2016 2628 11b7e6d3a96c7cd83e9cf586fd02dc4a122d541951d2ac176228d542ce164641.exe 83 PID 2628 wrote to memory of 2016 2628 11b7e6d3a96c7cd83e9cf586fd02dc4a122d541951d2ac176228d542ce164641.exe 83 PID 2628 wrote to memory of 2016 2628 11b7e6d3a96c7cd83e9cf586fd02dc4a122d541951d2ac176228d542ce164641.exe 83 PID 2016 wrote to memory of 2020 2016 vkWm0593Ws.exe 84 PID 2016 wrote to memory of 2020 2016 vkWm0593Ws.exe 84 PID 2016 wrote to memory of 2432 2016 vkWm0593Ws.exe 89 PID 2016 wrote to memory of 2432 2016 vkWm0593Ws.exe 89 PID 2016 wrote to memory of 2432 2016 vkWm0593Ws.exe 89 PID 2628 wrote to memory of 4276 2628 11b7e6d3a96c7cd83e9cf586fd02dc4a122d541951d2ac176228d542ce164641.exe 95 PID 2628 wrote to memory of 4276 2628 11b7e6d3a96c7cd83e9cf586fd02dc4a122d541951d2ac176228d542ce164641.exe 95 PID 2628 wrote to memory of 4276 2628 11b7e6d3a96c7cd83e9cf586fd02dc4a122d541951d2ac176228d542ce164641.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\11b7e6d3a96c7cd83e9cf586fd02dc4a122d541951d2ac176228d542ce164641.exe"C:\Users\Admin\AppData\Local\Temp\11b7e6d3a96c7cd83e9cf586fd02dc4a122d541951d2ac176228d542ce164641.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vkWm0593Ws.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vkWm0593Ws.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw49ts62AS07.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw49ts62AS07.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2020
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkPR38zf30dl.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkPR38zf30dl.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2432 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2432 -s 14084⤵
- Program crash
PID:1456
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\upaF79LL85hd.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\upaF79LL85hd.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2432 -ip 24321⤵PID:4428
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5670d6e7d78fc74e94663f88ca0a95f8e
SHA13e46f97b1d5ba1280bc51cf1401eabb10350a529
SHA2569588c1894038a11a5369ef080b11069862e450caf3c3f54370eb1e09e6543956
SHA512359c605d003c6aadef9b3d8a6cc086ee6b1d379e7c5c5ff0f5a9452f16d525e41f5eed15999195a7d6a96f12942fe498426414866b9de12ff3b4919097d71d2a
-
Filesize
175KB
MD5670d6e7d78fc74e94663f88ca0a95f8e
SHA13e46f97b1d5ba1280bc51cf1401eabb10350a529
SHA2569588c1894038a11a5369ef080b11069862e450caf3c3f54370eb1e09e6543956
SHA512359c605d003c6aadef9b3d8a6cc086ee6b1d379e7c5c5ff0f5a9452f16d525e41f5eed15999195a7d6a96f12942fe498426414866b9de12ff3b4919097d71d2a
-
Filesize
411KB
MD5c9df218abfee5df90f52186b9dd6d5b6
SHA16bd03a74ec18c6d4a378daba9c44fa8980fb65ea
SHA256c8c6a88b2490983b04c3cef43db371c840c1b760430de79640d6226ee25f9c06
SHA5124b0f17e626e0b569ec4484426ac595306e129b0c399d0807c967078082a99be39ff51d3ed6d6638d734911642bed593e7a2ef79b11a251b6747039916974c90d
-
Filesize
411KB
MD5c9df218abfee5df90f52186b9dd6d5b6
SHA16bd03a74ec18c6d4a378daba9c44fa8980fb65ea
SHA256c8c6a88b2490983b04c3cef43db371c840c1b760430de79640d6226ee25f9c06
SHA5124b0f17e626e0b569ec4484426ac595306e129b0c399d0807c967078082a99be39ff51d3ed6d6638d734911642bed593e7a2ef79b11a251b6747039916974c90d
-
Filesize
17KB
MD5d645ddfa141c5e4c2787697a5c216c7c
SHA1c7caf6246c02fc4dd7940df539a12e344f6d9181
SHA256309a690d7f24e4b52ea1c6ead52bdc25bb3a54036177a955757e9c5fbab946c5
SHA51295c835f00c0c6e9f9956f11781eb82a1ea5c842d327b40e17536fb2a552fe04c1bfae3a08c9a2fc88821d7905d13af4a2813af79922a5bc0332734b6692d80a3
-
Filesize
17KB
MD5d645ddfa141c5e4c2787697a5c216c7c
SHA1c7caf6246c02fc4dd7940df539a12e344f6d9181
SHA256309a690d7f24e4b52ea1c6ead52bdc25bb3a54036177a955757e9c5fbab946c5
SHA51295c835f00c0c6e9f9956f11781eb82a1ea5c842d327b40e17536fb2a552fe04c1bfae3a08c9a2fc88821d7905d13af4a2813af79922a5bc0332734b6692d80a3
-
Filesize
410KB
MD5cc1e39c942634bbd04ef3eb880af3cb4
SHA1390ee64e70074c204d8c7fc736e69b91940375bc
SHA25698f330627fe244da794aa21cd74d45861fab6d06f9fedc1bcc02eaf434adacec
SHA512f66cac5ccd3318e7c9baca955b64b22f9cb96693557dcf13a7e334878a0e3c2bc18f1757432b78b6c06c28c91881fb2436fc0641f6eb75a57167a4254cb470d2
-
Filesize
410KB
MD5cc1e39c942634bbd04ef3eb880af3cb4
SHA1390ee64e70074c204d8c7fc736e69b91940375bc
SHA25698f330627fe244da794aa21cd74d45861fab6d06f9fedc1bcc02eaf434adacec
SHA512f66cac5ccd3318e7c9baca955b64b22f9cb96693557dcf13a7e334878a0e3c2bc18f1757432b78b6c06c28c91881fb2436fc0641f6eb75a57167a4254cb470d2