Analysis
-
max time kernel
102s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
02/03/2023, 05:43
Static task
static1
Behavioral task
behavioral1
Sample
ce6a1c67567aa4b17d3fa0113a1d50dd8748db34ab1cfa421bcfe40435c4d31a.exe
Resource
win10v2004-20230221-en
General
-
Target
ce6a1c67567aa4b17d3fa0113a1d50dd8748db34ab1cfa421bcfe40435c4d31a.exe
-
Size
549KB
-
MD5
65137342ff16a939e374c22b42bf4e97
-
SHA1
aee062a461d84b5b01d7d5b0abe5b1a70cf8fa13
-
SHA256
ce6a1c67567aa4b17d3fa0113a1d50dd8748db34ab1cfa421bcfe40435c4d31a
-
SHA512
9eeeef9adadf6521b93caf15ac03894debcb073621cdbfe0f955c3921610f88326cc0fc8881cc4e086b9519d8ce220b22258df5fe43db188d2d440ff66305055
-
SSDEEP
12288:PMr7y901VFFuXKw/un3zznvVZ+ObGH7ridgjwesU:symvuKL/+KdgR
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Extracted
redline
fuba
193.56.146.11:4162
-
auth_value
43015841fc23c63b15ca6ffe1d278d5e
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw98zb19mI31.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw98zb19mI31.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw98zb19mI31.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw98zb19mI31.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sw98zb19mI31.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw98zb19mI31.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/4128-158-0x0000000004E20000-0x0000000004E5E000-memory.dmp family_redline behavioral1/memory/4128-159-0x0000000004E20000-0x0000000004E5E000-memory.dmp family_redline behavioral1/memory/4128-161-0x0000000004E20000-0x0000000004E5E000-memory.dmp family_redline behavioral1/memory/4128-163-0x0000000004E20000-0x0000000004E5E000-memory.dmp family_redline behavioral1/memory/4128-165-0x0000000004E20000-0x0000000004E5E000-memory.dmp family_redline behavioral1/memory/4128-167-0x0000000004E20000-0x0000000004E5E000-memory.dmp family_redline behavioral1/memory/4128-169-0x0000000004E20000-0x0000000004E5E000-memory.dmp family_redline behavioral1/memory/4128-171-0x0000000004E20000-0x0000000004E5E000-memory.dmp family_redline behavioral1/memory/4128-173-0x0000000004E20000-0x0000000004E5E000-memory.dmp family_redline behavioral1/memory/4128-175-0x0000000004E20000-0x0000000004E5E000-memory.dmp family_redline behavioral1/memory/4128-177-0x0000000004E20000-0x0000000004E5E000-memory.dmp family_redline behavioral1/memory/4128-179-0x0000000004E20000-0x0000000004E5E000-memory.dmp family_redline behavioral1/memory/4128-181-0x0000000004E20000-0x0000000004E5E000-memory.dmp family_redline behavioral1/memory/4128-183-0x0000000004E20000-0x0000000004E5E000-memory.dmp family_redline behavioral1/memory/4128-185-0x0000000004E20000-0x0000000004E5E000-memory.dmp family_redline behavioral1/memory/4128-187-0x0000000004E20000-0x0000000004E5E000-memory.dmp family_redline behavioral1/memory/4128-189-0x0000000004E20000-0x0000000004E5E000-memory.dmp family_redline behavioral1/memory/4128-191-0x0000000004E20000-0x0000000004E5E000-memory.dmp family_redline behavioral1/memory/4128-193-0x0000000004E20000-0x0000000004E5E000-memory.dmp family_redline behavioral1/memory/4128-195-0x0000000004E20000-0x0000000004E5E000-memory.dmp family_redline behavioral1/memory/4128-197-0x0000000004E20000-0x0000000004E5E000-memory.dmp family_redline behavioral1/memory/4128-199-0x0000000004E20000-0x0000000004E5E000-memory.dmp family_redline behavioral1/memory/4128-201-0x0000000004E20000-0x0000000004E5E000-memory.dmp family_redline behavioral1/memory/4128-203-0x0000000004E20000-0x0000000004E5E000-memory.dmp family_redline behavioral1/memory/4128-205-0x0000000004E20000-0x0000000004E5E000-memory.dmp family_redline behavioral1/memory/4128-207-0x0000000004E20000-0x0000000004E5E000-memory.dmp family_redline behavioral1/memory/4128-211-0x0000000004E20000-0x0000000004E5E000-memory.dmp family_redline behavioral1/memory/4128-209-0x0000000004E20000-0x0000000004E5E000-memory.dmp family_redline behavioral1/memory/4128-213-0x0000000004E20000-0x0000000004E5E000-memory.dmp family_redline behavioral1/memory/4128-215-0x0000000004E20000-0x0000000004E5E000-memory.dmp family_redline behavioral1/memory/4128-217-0x0000000004E20000-0x0000000004E5E000-memory.dmp family_redline behavioral1/memory/4128-219-0x0000000004E20000-0x0000000004E5E000-memory.dmp family_redline behavioral1/memory/4128-221-0x0000000004E20000-0x0000000004E5E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4788 vBP6843NJ.exe 3592 sw98zb19mI31.exe 4128 tIW10KN39.exe 992 upG59Yi72.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw98zb19mI31.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ce6a1c67567aa4b17d3fa0113a1d50dd8748db34ab1cfa421bcfe40435c4d31a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ce6a1c67567aa4b17d3fa0113a1d50dd8748db34ab1cfa421bcfe40435c4d31a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vBP6843NJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vBP6843NJ.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3392 4128 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3592 sw98zb19mI31.exe 3592 sw98zb19mI31.exe 4128 tIW10KN39.exe 4128 tIW10KN39.exe 992 upG59Yi72.exe 992 upG59Yi72.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3592 sw98zb19mI31.exe Token: SeDebugPrivilege 4128 tIW10KN39.exe Token: SeDebugPrivilege 992 upG59Yi72.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2904 wrote to memory of 4788 2904 ce6a1c67567aa4b17d3fa0113a1d50dd8748db34ab1cfa421bcfe40435c4d31a.exe 87 PID 2904 wrote to memory of 4788 2904 ce6a1c67567aa4b17d3fa0113a1d50dd8748db34ab1cfa421bcfe40435c4d31a.exe 87 PID 2904 wrote to memory of 4788 2904 ce6a1c67567aa4b17d3fa0113a1d50dd8748db34ab1cfa421bcfe40435c4d31a.exe 87 PID 4788 wrote to memory of 3592 4788 vBP6843NJ.exe 88 PID 4788 wrote to memory of 3592 4788 vBP6843NJ.exe 88 PID 4788 wrote to memory of 4128 4788 vBP6843NJ.exe 92 PID 4788 wrote to memory of 4128 4788 vBP6843NJ.exe 92 PID 4788 wrote to memory of 4128 4788 vBP6843NJ.exe 92 PID 2904 wrote to memory of 992 2904 ce6a1c67567aa4b17d3fa0113a1d50dd8748db34ab1cfa421bcfe40435c4d31a.exe 96 PID 2904 wrote to memory of 992 2904 ce6a1c67567aa4b17d3fa0113a1d50dd8748db34ab1cfa421bcfe40435c4d31a.exe 96 PID 2904 wrote to memory of 992 2904 ce6a1c67567aa4b17d3fa0113a1d50dd8748db34ab1cfa421bcfe40435c4d31a.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce6a1c67567aa4b17d3fa0113a1d50dd8748db34ab1cfa421bcfe40435c4d31a.exe"C:\Users\Admin\AppData\Local\Temp\ce6a1c67567aa4b17d3fa0113a1d50dd8748db34ab1cfa421bcfe40435c4d31a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vBP6843NJ.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vBP6843NJ.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw98zb19mI31.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw98zb19mI31.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3592
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tIW10KN39.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tIW10KN39.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4128 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4128 -s 17684⤵
- Program crash
PID:3392
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\upG59Yi72.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\upG59Yi72.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4128 -ip 41281⤵PID:1704
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5d688d5eb18a8f51764026c262979a853
SHA1183c21a5cea88392309e3e479792338b7264fd71
SHA25684fb6f8f7f1682949585ea23173500318c3e986ac9c1522be23d01ba48955b07
SHA5120ade489cb6e1d6b3ecd2d62d0300a5b8ec3ffbf4958a0da47710ed176cf3f938175e25a65b6737b3ed201216db4efe8881c6b1f3da97c8a6754a62e0d4d886e2
-
Filesize
175KB
MD5d688d5eb18a8f51764026c262979a853
SHA1183c21a5cea88392309e3e479792338b7264fd71
SHA25684fb6f8f7f1682949585ea23173500318c3e986ac9c1522be23d01ba48955b07
SHA5120ade489cb6e1d6b3ecd2d62d0300a5b8ec3ffbf4958a0da47710ed176cf3f938175e25a65b6737b3ed201216db4efe8881c6b1f3da97c8a6754a62e0d4d886e2
-
Filesize
404KB
MD5f3dccdbc8cec122c6754ea1aefef3a05
SHA1203e325fd778f5e664b6393b2100bb42432c7553
SHA25620366724a0081c90d336e8e41fe1c4914485a4ea8d53f4d1e6fcb95ccb020e5e
SHA512e1d71cdf49b2b18be0cb28c5359fdb62729976f460fa328c53790b8558f78c0f9e6b5a3e2526286aa54045f83b1fcd9d2c8be37f640a860e288b306368f93949
-
Filesize
404KB
MD5f3dccdbc8cec122c6754ea1aefef3a05
SHA1203e325fd778f5e664b6393b2100bb42432c7553
SHA25620366724a0081c90d336e8e41fe1c4914485a4ea8d53f4d1e6fcb95ccb020e5e
SHA512e1d71cdf49b2b18be0cb28c5359fdb62729976f460fa328c53790b8558f78c0f9e6b5a3e2526286aa54045f83b1fcd9d2c8be37f640a860e288b306368f93949
-
Filesize
12KB
MD56d7fa0f8e72a2d81923ea483a5935451
SHA15d101bc189018b05dde2320e9b4f092f02258c87
SHA256b4a804aafb9b172fdd5131d362ec45dc189e196c5001b17e1581f936410bb0c3
SHA512584aa901782bab7623c806a243f02fce767cf46a73493b62fa2773653b6e81cd2dfcc0deff1ba7d9222d60ea16e030d65370ec53434b8b0fbe125fd4ca139b4f
-
Filesize
12KB
MD56d7fa0f8e72a2d81923ea483a5935451
SHA15d101bc189018b05dde2320e9b4f092f02258c87
SHA256b4a804aafb9b172fdd5131d362ec45dc189e196c5001b17e1581f936410bb0c3
SHA512584aa901782bab7623c806a243f02fce767cf46a73493b62fa2773653b6e81cd2dfcc0deff1ba7d9222d60ea16e030d65370ec53434b8b0fbe125fd4ca139b4f
-
Filesize
381KB
MD557b4e73c1d36751cb60a4d2e68594087
SHA10e371eaad20ebbb81735876f0f1703adee193117
SHA25639f6bf6cf9f7bfba26380635a4b052c5de0e1688c92bacc10411dad74886dd25
SHA512e5e81ce16ccd679b95cde5e1db79b62fe878d8c5e27d217bf0605433f47626261756b6b7da870333233023b1e8ea30af07af395b9078a7dd1c72834c254e279c
-
Filesize
381KB
MD557b4e73c1d36751cb60a4d2e68594087
SHA10e371eaad20ebbb81735876f0f1703adee193117
SHA25639f6bf6cf9f7bfba26380635a4b052c5de0e1688c92bacc10411dad74886dd25
SHA512e5e81ce16ccd679b95cde5e1db79b62fe878d8c5e27d217bf0605433f47626261756b6b7da870333233023b1e8ea30af07af395b9078a7dd1c72834c254e279c