Analysis
-
max time kernel
54s -
max time network
60s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
02/03/2023, 23:46
Static task
static1
Behavioral task
behavioral1
Sample
91517b6d27a8fb3866677aec0331d57e50e6fc87b6c07e0c5bc708cf5012a006.exe
Resource
win10-20230220-en
General
-
Target
91517b6d27a8fb3866677aec0331d57e50e6fc87b6c07e0c5bc708cf5012a006.exe
-
Size
693KB
-
MD5
5a33e377371553472537ecde4eefc08b
-
SHA1
3565fb5cc86902b30168f11ff85ca0c87cf99e10
-
SHA256
91517b6d27a8fb3866677aec0331d57e50e6fc87b6c07e0c5bc708cf5012a006
-
SHA512
5b16dc6d95a648d711f48e2a36a624f9fbe32ade4f74bfec2e0a89e801daac0fcde861d711c9501e612e0a4e697dc7b4d32af4b980bbc54079a03f553f5aa97d
-
SSDEEP
12288:nMrpy90yDgVcEQXlyGzqYumJzDB8PTv5HE9amOAe+x8W7KlOJZ:yy9kVcb1yG+xmJzSPTv5HUuUreQZ
Malware Config
Extracted
redline
ruzhpe
pepunn.com:4162
-
auth_value
f735ced96ae8d01d0bd1d514240e54e0
Extracted
redline
fchan
pepunn.com:4162
-
auth_value
127bd53d55e8c4f0dd2f6e1ea60deef4
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" urff66Dr08.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" urff66Dr08.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" urff66Dr08.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" urff66Dr08.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" urff66Dr08.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/4384-177-0x0000000004880000-0x00000000048C6000-memory.dmp family_redline behavioral1/memory/4384-178-0x0000000007140000-0x0000000007184000-memory.dmp family_redline behavioral1/memory/4384-180-0x0000000007140000-0x000000000717E000-memory.dmp family_redline behavioral1/memory/4384-182-0x0000000007140000-0x000000000717E000-memory.dmp family_redline behavioral1/memory/4384-179-0x0000000007140000-0x000000000717E000-memory.dmp family_redline behavioral1/memory/4384-184-0x0000000007140000-0x000000000717E000-memory.dmp family_redline behavioral1/memory/4384-186-0x0000000007140000-0x000000000717E000-memory.dmp family_redline behavioral1/memory/4384-188-0x0000000007140000-0x000000000717E000-memory.dmp family_redline behavioral1/memory/4384-190-0x0000000007140000-0x000000000717E000-memory.dmp family_redline behavioral1/memory/4384-192-0x0000000007140000-0x000000000717E000-memory.dmp family_redline behavioral1/memory/4384-194-0x0000000007140000-0x000000000717E000-memory.dmp family_redline behavioral1/memory/4384-198-0x0000000007140000-0x000000000717E000-memory.dmp family_redline behavioral1/memory/4384-200-0x0000000007140000-0x000000000717E000-memory.dmp family_redline behavioral1/memory/4384-196-0x0000000007140000-0x000000000717E000-memory.dmp family_redline behavioral1/memory/4384-202-0x0000000007140000-0x000000000717E000-memory.dmp family_redline behavioral1/memory/4384-204-0x0000000007140000-0x000000000717E000-memory.dmp family_redline behavioral1/memory/4384-206-0x0000000007140000-0x000000000717E000-memory.dmp family_redline behavioral1/memory/4384-208-0x0000000007140000-0x000000000717E000-memory.dmp family_redline behavioral1/memory/4384-210-0x0000000007140000-0x000000000717E000-memory.dmp family_redline behavioral1/memory/4384-212-0x0000000007140000-0x000000000717E000-memory.dmp family_redline behavioral1/memory/4384-299-0x00000000072C0000-0x00000000072D0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3988 ycYB40jN62.exe 4056 urff66Dr08.exe 4384 wriS63lt78.exe 4216 xuJk17NU23.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features urff66Dr08.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" urff66Dr08.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 91517b6d27a8fb3866677aec0331d57e50e6fc87b6c07e0c5bc708cf5012a006.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 91517b6d27a8fb3866677aec0331d57e50e6fc87b6c07e0c5bc708cf5012a006.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ycYB40jN62.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ycYB40jN62.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4056 urff66Dr08.exe 4056 urff66Dr08.exe 4384 wriS63lt78.exe 4384 wriS63lt78.exe 4216 xuJk17NU23.exe 4216 xuJk17NU23.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4056 urff66Dr08.exe Token: SeDebugPrivilege 4384 wriS63lt78.exe Token: SeDebugPrivilege 4216 xuJk17NU23.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3236 wrote to memory of 3988 3236 91517b6d27a8fb3866677aec0331d57e50e6fc87b6c07e0c5bc708cf5012a006.exe 66 PID 3236 wrote to memory of 3988 3236 91517b6d27a8fb3866677aec0331d57e50e6fc87b6c07e0c5bc708cf5012a006.exe 66 PID 3236 wrote to memory of 3988 3236 91517b6d27a8fb3866677aec0331d57e50e6fc87b6c07e0c5bc708cf5012a006.exe 66 PID 3988 wrote to memory of 4056 3988 ycYB40jN62.exe 67 PID 3988 wrote to memory of 4056 3988 ycYB40jN62.exe 67 PID 3988 wrote to memory of 4056 3988 ycYB40jN62.exe 67 PID 3988 wrote to memory of 4384 3988 ycYB40jN62.exe 68 PID 3988 wrote to memory of 4384 3988 ycYB40jN62.exe 68 PID 3988 wrote to memory of 4384 3988 ycYB40jN62.exe 68 PID 3236 wrote to memory of 4216 3236 91517b6d27a8fb3866677aec0331d57e50e6fc87b6c07e0c5bc708cf5012a006.exe 70 PID 3236 wrote to memory of 4216 3236 91517b6d27a8fb3866677aec0331d57e50e6fc87b6c07e0c5bc708cf5012a006.exe 70 PID 3236 wrote to memory of 4216 3236 91517b6d27a8fb3866677aec0331d57e50e6fc87b6c07e0c5bc708cf5012a006.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\91517b6d27a8fb3866677aec0331d57e50e6fc87b6c07e0c5bc708cf5012a006.exe"C:\Users\Admin\AppData\Local\Temp\91517b6d27a8fb3866677aec0331d57e50e6fc87b6c07e0c5bc708cf5012a006.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycYB40jN62.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycYB40jN62.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urff66Dr08.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urff66Dr08.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4056
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wriS63lt78.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wriS63lt78.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4384
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuJk17NU23.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuJk17NU23.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4216
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5270dc504167cc3926ad19560d0e900e4
SHA15119fccc03f0148ac4fed011d9eca4d94dad77ad
SHA2564b5d1a2bb26b7c65c01bcd4eb2a837a8427395a50092b1fba2f1ea2bf58bb4ff
SHA512fdc7a25055bdb1fc0f7214febf2fca454bf3ac18eba7af4da604298cbb7dab0a0f5664b636b51b61153bc67e5e785c7b739632acf0e989193587b200e05dace8
-
Filesize
175KB
MD5270dc504167cc3926ad19560d0e900e4
SHA15119fccc03f0148ac4fed011d9eca4d94dad77ad
SHA2564b5d1a2bb26b7c65c01bcd4eb2a837a8427395a50092b1fba2f1ea2bf58bb4ff
SHA512fdc7a25055bdb1fc0f7214febf2fca454bf3ac18eba7af4da604298cbb7dab0a0f5664b636b51b61153bc67e5e785c7b739632acf0e989193587b200e05dace8
-
Filesize
548KB
MD5ac99c5589eac2b141252a6363aedac96
SHA148dd56bbb715189d7d9f444918b468ef8bd5e0cf
SHA25622c98b744c0176d3e112da915e6c614027051af63233f5ec938e0135b1c58083
SHA512621241ce5422820a659655f1a3253a2cc154bb3b473023cc90302fc7df04cbefee8d1050153a147fd5530601becab7c095336f56fef0daba071d9a417fc68230
-
Filesize
548KB
MD5ac99c5589eac2b141252a6363aedac96
SHA148dd56bbb715189d7d9f444918b468ef8bd5e0cf
SHA25622c98b744c0176d3e112da915e6c614027051af63233f5ec938e0135b1c58083
SHA512621241ce5422820a659655f1a3253a2cc154bb3b473023cc90302fc7df04cbefee8d1050153a147fd5530601becab7c095336f56fef0daba071d9a417fc68230
-
Filesize
352KB
MD56345b3da7da3d9a3012ba87a252a29f6
SHA1a36f23e5d0802652705df132bce0a8589ff5e7bf
SHA256caf994d14f8b0767df1e38508af9bb7816673aa0b6fc7fbf591a135e3173b7df
SHA5123d82f717809ab81fa0fdb60d262af1547d12a69331b755d02ec94a250f4e25c5aa1adc910381e91bf4d9b32aa8f281f1252e5912068d0378461890a5893fae82
-
Filesize
352KB
MD56345b3da7da3d9a3012ba87a252a29f6
SHA1a36f23e5d0802652705df132bce0a8589ff5e7bf
SHA256caf994d14f8b0767df1e38508af9bb7816673aa0b6fc7fbf591a135e3173b7df
SHA5123d82f717809ab81fa0fdb60d262af1547d12a69331b755d02ec94a250f4e25c5aa1adc910381e91bf4d9b32aa8f281f1252e5912068d0378461890a5893fae82
-
Filesize
410KB
MD5cc1e39c942634bbd04ef3eb880af3cb4
SHA1390ee64e70074c204d8c7fc736e69b91940375bc
SHA25698f330627fe244da794aa21cd74d45861fab6d06f9fedc1bcc02eaf434adacec
SHA512f66cac5ccd3318e7c9baca955b64b22f9cb96693557dcf13a7e334878a0e3c2bc18f1757432b78b6c06c28c91881fb2436fc0641f6eb75a57167a4254cb470d2
-
Filesize
410KB
MD5cc1e39c942634bbd04ef3eb880af3cb4
SHA1390ee64e70074c204d8c7fc736e69b91940375bc
SHA25698f330627fe244da794aa21cd74d45861fab6d06f9fedc1bcc02eaf434adacec
SHA512f66cac5ccd3318e7c9baca955b64b22f9cb96693557dcf13a7e334878a0e3c2bc18f1757432b78b6c06c28c91881fb2436fc0641f6eb75a57167a4254cb470d2