Analysis
-
max time kernel
145s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02-03-2023 17:42
Static task
static1
Behavioral task
behavioral1
Sample
c96602cd266993e42a3a65537ca6529b33a51e6b0dcb5aea75f756cba31d1566.exe
Resource
win10v2004-20230220-en
General
-
Target
c96602cd266993e42a3a65537ca6529b33a51e6b0dcb5aea75f756cba31d1566.exe
-
Size
684KB
-
MD5
03c6b140f41c0bab065f254dbd7ac6ea
-
SHA1
db7c0a1e5dfd924abc24f42b189ed2ac067fcdf9
-
SHA256
c96602cd266993e42a3a65537ca6529b33a51e6b0dcb5aea75f756cba31d1566
-
SHA512
93b03f49f9841be660234b78ff2e91ae4024c0622df2c766aa120971d8f688256a87baaa847ca0a0e1acfb537654be3919a51f845deedb3f537fe4ead0e36d3b
-
SSDEEP
12288:YMr4y907Qod/T7cJ9oBIRK2TVfUsVrFykWvymWJkCgWqF/Xe:gysQYTMK27ZJkr5O
Malware Config
Extracted
redline
stek
melevv.eu:4162
-
auth_value
4205381daf6946b2df5fe3bc7eacc918
Extracted
redline
fomich
melevv.eu:4162
-
auth_value
b018e52ac946001794d8b8c23e901859
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" urFW04GQ13.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" urFW04GQ13.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" urFW04GQ13.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection urFW04GQ13.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" urFW04GQ13.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" urFW04GQ13.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/5008-192-0x00000000071B0000-0x00000000071EE000-memory.dmp family_redline behavioral1/memory/5008-190-0x00000000071B0000-0x00000000071EE000-memory.dmp family_redline behavioral1/memory/5008-196-0x00000000071B0000-0x00000000071EE000-memory.dmp family_redline behavioral1/memory/5008-200-0x00000000071B0000-0x00000000071EE000-memory.dmp family_redline behavioral1/memory/5008-198-0x00000000071B0000-0x00000000071EE000-memory.dmp family_redline behavioral1/memory/5008-202-0x00000000071B0000-0x00000000071EE000-memory.dmp family_redline behavioral1/memory/5008-204-0x00000000071B0000-0x00000000071EE000-memory.dmp family_redline behavioral1/memory/5008-206-0x00000000071B0000-0x00000000071EE000-memory.dmp family_redline behavioral1/memory/5008-208-0x00000000071B0000-0x00000000071EE000-memory.dmp family_redline behavioral1/memory/5008-210-0x00000000071B0000-0x00000000071EE000-memory.dmp family_redline behavioral1/memory/5008-212-0x00000000071B0000-0x00000000071EE000-memory.dmp family_redline behavioral1/memory/5008-214-0x00000000071B0000-0x00000000071EE000-memory.dmp family_redline behavioral1/memory/5008-216-0x00000000071B0000-0x00000000071EE000-memory.dmp family_redline behavioral1/memory/5008-218-0x00000000071B0000-0x00000000071EE000-memory.dmp family_redline behavioral1/memory/5008-220-0x00000000071B0000-0x00000000071EE000-memory.dmp family_redline behavioral1/memory/5008-222-0x00000000071B0000-0x00000000071EE000-memory.dmp family_redline behavioral1/memory/5008-224-0x00000000071B0000-0x00000000071EE000-memory.dmp family_redline behavioral1/memory/5008-226-0x00000000071B0000-0x00000000071EE000-memory.dmp family_redline behavioral1/memory/5008-1107-0x0000000007200000-0x0000000007210000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2840 ycGw19Qs38.exe 4648 urFW04GQ13.exe 5008 wriB60fy69.exe 3624 xutP82Sx39.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features urFW04GQ13.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" urFW04GQ13.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ycGw19Qs38.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ycGw19Qs38.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c96602cd266993e42a3a65537ca6529b33a51e6b0dcb5aea75f756cba31d1566.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c96602cd266993e42a3a65537ca6529b33a51e6b0dcb5aea75f756cba31d1566.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2800 4648 WerFault.exe 88 1944 5008 WerFault.exe 94 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4648 urFW04GQ13.exe 4648 urFW04GQ13.exe 5008 wriB60fy69.exe 5008 wriB60fy69.exe 3624 xutP82Sx39.exe 3624 xutP82Sx39.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4648 urFW04GQ13.exe Token: SeDebugPrivilege 5008 wriB60fy69.exe Token: SeDebugPrivilege 3624 xutP82Sx39.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1900 wrote to memory of 2840 1900 c96602cd266993e42a3a65537ca6529b33a51e6b0dcb5aea75f756cba31d1566.exe 87 PID 1900 wrote to memory of 2840 1900 c96602cd266993e42a3a65537ca6529b33a51e6b0dcb5aea75f756cba31d1566.exe 87 PID 1900 wrote to memory of 2840 1900 c96602cd266993e42a3a65537ca6529b33a51e6b0dcb5aea75f756cba31d1566.exe 87 PID 2840 wrote to memory of 4648 2840 ycGw19Qs38.exe 88 PID 2840 wrote to memory of 4648 2840 ycGw19Qs38.exe 88 PID 2840 wrote to memory of 4648 2840 ycGw19Qs38.exe 88 PID 2840 wrote to memory of 5008 2840 ycGw19Qs38.exe 94 PID 2840 wrote to memory of 5008 2840 ycGw19Qs38.exe 94 PID 2840 wrote to memory of 5008 2840 ycGw19Qs38.exe 94 PID 1900 wrote to memory of 3624 1900 c96602cd266993e42a3a65537ca6529b33a51e6b0dcb5aea75f756cba31d1566.exe 98 PID 1900 wrote to memory of 3624 1900 c96602cd266993e42a3a65537ca6529b33a51e6b0dcb5aea75f756cba31d1566.exe 98 PID 1900 wrote to memory of 3624 1900 c96602cd266993e42a3a65537ca6529b33a51e6b0dcb5aea75f756cba31d1566.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\c96602cd266993e42a3a65537ca6529b33a51e6b0dcb5aea75f756cba31d1566.exe"C:\Users\Admin\AppData\Local\Temp\c96602cd266993e42a3a65537ca6529b33a51e6b0dcb5aea75f756cba31d1566.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycGw19Qs38.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycGw19Qs38.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urFW04GQ13.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urFW04GQ13.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4648 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4648 -s 10084⤵
- Program crash
PID:2800
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wriB60fy69.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wriB60fy69.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5008 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5008 -s 21004⤵
- Program crash
PID:1944
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xutP82Sx39.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xutP82Sx39.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4648 -ip 46481⤵PID:1228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 5008 -ip 50081⤵PID:1056
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD58b1bc075a69a9adb33d053da69e9a48c
SHA1d87015fdadef59dc91e386693e263cd5fc6fed3b
SHA256989b2073934c76146a0cdcdf5e8af76623e9e6d571530dd45601decac1eed038
SHA5121fe694440d4ff05d2fbf2c978cc36256e523d36534c1f37afc19278e94d2e1c390a425169c0aac87f348a9d684e424de72b448215c1da4ef9deb23cc7eb214c7
-
Filesize
175KB
MD58b1bc075a69a9adb33d053da69e9a48c
SHA1d87015fdadef59dc91e386693e263cd5fc6fed3b
SHA256989b2073934c76146a0cdcdf5e8af76623e9e6d571530dd45601decac1eed038
SHA5121fe694440d4ff05d2fbf2c978cc36256e523d36534c1f37afc19278e94d2e1c390a425169c0aac87f348a9d684e424de72b448215c1da4ef9deb23cc7eb214c7
-
Filesize
540KB
MD5f14c810e685ae5f9623133fc0f21c2dc
SHA100b1f11c640e2c9ff1145ac77198b3e919bb6943
SHA256af67f9ce95337d197113dcea1dd9bda7b9f0531d36c1b7205e43db3d449d1a75
SHA51218a2584193df834829bc8117bcab2cb5ac29dc2087c69846091223dd4b3ae3e61757157f7c9c9c29e113f1feef1d3eea5165ab14d3fd767fb2fbece37161b0fb
-
Filesize
540KB
MD5f14c810e685ae5f9623133fc0f21c2dc
SHA100b1f11c640e2c9ff1145ac77198b3e919bb6943
SHA256af67f9ce95337d197113dcea1dd9bda7b9f0531d36c1b7205e43db3d449d1a75
SHA51218a2584193df834829bc8117bcab2cb5ac29dc2087c69846091223dd4b3ae3e61757157f7c9c9c29e113f1feef1d3eea5165ab14d3fd767fb2fbece37161b0fb
-
Filesize
319KB
MD5d66666c84435499c7ff17a7899997658
SHA1b4714a70e2c3054eab6687df28d086708fce4489
SHA25692c01f94cb7694542fca697168dd658c8dce53633421e047924ba239dae68023
SHA512bae8889189fcd9e0800f1fbb188adeb8ac54e136386c80800792b66e69db04aaf0ea527ad6282725b3b985a20d03d94a70b6bea16fc90b2270f66c84b4f6d07c
-
Filesize
319KB
MD5d66666c84435499c7ff17a7899997658
SHA1b4714a70e2c3054eab6687df28d086708fce4489
SHA25692c01f94cb7694542fca697168dd658c8dce53633421e047924ba239dae68023
SHA512bae8889189fcd9e0800f1fbb188adeb8ac54e136386c80800792b66e69db04aaf0ea527ad6282725b3b985a20d03d94a70b6bea16fc90b2270f66c84b4f6d07c
-
Filesize
377KB
MD5a9bb941524fc5973d45dad1da3e23d17
SHA1357a2a768bbec255880067c4a774ca2d4bee0588
SHA256e2e687091711d776f73e3877ee7020f8ed6472855af0db8ee6f5ea796fc34659
SHA5124beab17e28078481420dfdf5425a6829695cdfdf50c1231c509654bdcaf21d6de21f12ee44b4cbe9c3b555bed3a91542b2dc37b25b2d093e03af9941723d9256
-
Filesize
377KB
MD5a9bb941524fc5973d45dad1da3e23d17
SHA1357a2a768bbec255880067c4a774ca2d4bee0588
SHA256e2e687091711d776f73e3877ee7020f8ed6472855af0db8ee6f5ea796fc34659
SHA5124beab17e28078481420dfdf5425a6829695cdfdf50c1231c509654bdcaf21d6de21f12ee44b4cbe9c3b555bed3a91542b2dc37b25b2d093e03af9941723d9256