Analysis
-
max time kernel
128s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
02/03/2023, 20:07
Static task
static1
Behavioral task
behavioral1
Sample
d59df8ca70d9790f2a75757e983465e937e61e4c9afacd1577da9fe6c8160e10.exe
Resource
win10v2004-20230221-en
General
-
Target
d59df8ca70d9790f2a75757e983465e937e61e4c9afacd1577da9fe6c8160e10.exe
-
Size
686KB
-
MD5
67d9f0211a140e7a8a9e87736687ffbc
-
SHA1
6979718e1d98c34bc7f435b992f50d472530cbd0
-
SHA256
d59df8ca70d9790f2a75757e983465e937e61e4c9afacd1577da9fe6c8160e10
-
SHA512
0d1605ac7eb925c20bf48d6bba33d9daabdfadb0ab8f9372e3e037689c60d54284485640db284c2eeb1d79b4220e08d5119cf0f27abbe061da0f8d5d1b15be69
-
SSDEEP
12288:eMrfy90zas6MV9HZW1EaPd8BnSFrw+Z/1BAqX+lGlGa94zAB:hyi6S9HZuEaPknCjbWqOlGlMzU
Malware Config
Extracted
redline
stek
melevv.eu:4162
-
auth_value
4205381daf6946b2df5fe3bc7eacc918
Extracted
redline
fomich
melevv.eu:4162
-
auth_value
b018e52ac946001794d8b8c23e901859
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" urBG01Ox29.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" urBG01Ox29.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection urBG01Ox29.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" urBG01Ox29.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" urBG01Ox29.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" urBG01Ox29.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/1436-196-0x00000000071A0000-0x00000000071DE000-memory.dmp family_redline behavioral1/memory/1436-194-0x00000000071A0000-0x00000000071DE000-memory.dmp family_redline behavioral1/memory/1436-198-0x00000000071A0000-0x00000000071DE000-memory.dmp family_redline behavioral1/memory/1436-200-0x00000000071A0000-0x00000000071DE000-memory.dmp family_redline behavioral1/memory/1436-202-0x00000000071A0000-0x00000000071DE000-memory.dmp family_redline behavioral1/memory/1436-204-0x00000000071A0000-0x00000000071DE000-memory.dmp family_redline behavioral1/memory/1436-206-0x00000000071A0000-0x00000000071DE000-memory.dmp family_redline behavioral1/memory/1436-208-0x00000000071A0000-0x00000000071DE000-memory.dmp family_redline behavioral1/memory/1436-210-0x00000000071A0000-0x00000000071DE000-memory.dmp family_redline behavioral1/memory/1436-212-0x00000000071A0000-0x00000000071DE000-memory.dmp family_redline behavioral1/memory/1436-214-0x00000000071A0000-0x00000000071DE000-memory.dmp family_redline behavioral1/memory/1436-216-0x00000000071A0000-0x00000000071DE000-memory.dmp family_redline behavioral1/memory/1436-218-0x00000000071A0000-0x00000000071DE000-memory.dmp family_redline behavioral1/memory/1436-220-0x00000000071A0000-0x00000000071DE000-memory.dmp family_redline behavioral1/memory/1436-222-0x00000000071A0000-0x00000000071DE000-memory.dmp family_redline behavioral1/memory/1436-224-0x00000000071A0000-0x00000000071DE000-memory.dmp family_redline behavioral1/memory/1436-226-0x00000000071A0000-0x00000000071DE000-memory.dmp family_redline behavioral1/memory/1436-228-0x00000000071A0000-0x00000000071DE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2828 ycKP13Tv39.exe 2396 urBG01Ox29.exe 1436 wrcB50cH51.exe 2244 xugT63hb65.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features urBG01Ox29.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" urBG01Ox29.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d59df8ca70d9790f2a75757e983465e937e61e4c9afacd1577da9fe6c8160e10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d59df8ca70d9790f2a75757e983465e937e61e4c9afacd1577da9fe6c8160e10.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ycKP13Tv39.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ycKP13Tv39.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3956 sc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4100 2396 WerFault.exe 86 2336 1436 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2396 urBG01Ox29.exe 2396 urBG01Ox29.exe 1436 wrcB50cH51.exe 1436 wrcB50cH51.exe 2244 xugT63hb65.exe 2244 xugT63hb65.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2396 urBG01Ox29.exe Token: SeDebugPrivilege 1436 wrcB50cH51.exe Token: SeDebugPrivilege 2244 xugT63hb65.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1904 wrote to memory of 2828 1904 d59df8ca70d9790f2a75757e983465e937e61e4c9afacd1577da9fe6c8160e10.exe 85 PID 1904 wrote to memory of 2828 1904 d59df8ca70d9790f2a75757e983465e937e61e4c9afacd1577da9fe6c8160e10.exe 85 PID 1904 wrote to memory of 2828 1904 d59df8ca70d9790f2a75757e983465e937e61e4c9afacd1577da9fe6c8160e10.exe 85 PID 2828 wrote to memory of 2396 2828 ycKP13Tv39.exe 86 PID 2828 wrote to memory of 2396 2828 ycKP13Tv39.exe 86 PID 2828 wrote to memory of 2396 2828 ycKP13Tv39.exe 86 PID 2828 wrote to memory of 1436 2828 ycKP13Tv39.exe 92 PID 2828 wrote to memory of 1436 2828 ycKP13Tv39.exe 92 PID 2828 wrote to memory of 1436 2828 ycKP13Tv39.exe 92 PID 1904 wrote to memory of 2244 1904 d59df8ca70d9790f2a75757e983465e937e61e4c9afacd1577da9fe6c8160e10.exe 96 PID 1904 wrote to memory of 2244 1904 d59df8ca70d9790f2a75757e983465e937e61e4c9afacd1577da9fe6c8160e10.exe 96 PID 1904 wrote to memory of 2244 1904 d59df8ca70d9790f2a75757e983465e937e61e4c9afacd1577da9fe6c8160e10.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\d59df8ca70d9790f2a75757e983465e937e61e4c9afacd1577da9fe6c8160e10.exe"C:\Users\Admin\AppData\Local\Temp\d59df8ca70d9790f2a75757e983465e937e61e4c9afacd1577da9fe6c8160e10.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycKP13Tv39.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycKP13Tv39.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urBG01Ox29.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urBG01Ox29.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2396 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2396 -s 10764⤵
- Program crash
PID:4100
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrcB50cH51.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrcB50cH51.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1436 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1436 -s 14084⤵
- Program crash
PID:2336
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xugT63hb65.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xugT63hb65.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2244
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2396 -ip 23961⤵PID:4180
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1436 -ip 14361⤵PID:4980
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3956
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD50d997a20ce10bd11a3aae00e3eb59156
SHA1b9b268dec0ca5612e12232e685a50894964ac996
SHA256c8e5ac58578942e82efbd497af07a88b6f66238614021862196cdf9a88679ac7
SHA512f2473949dd8de3404a6cad232653d947412a007c85a863146dadafce2c76929cd9727978dcb4e1bcbc84d93f242f6148ab5ea05b2511a91939080a6f02c45d62
-
Filesize
175KB
MD50d997a20ce10bd11a3aae00e3eb59156
SHA1b9b268dec0ca5612e12232e685a50894964ac996
SHA256c8e5ac58578942e82efbd497af07a88b6f66238614021862196cdf9a88679ac7
SHA512f2473949dd8de3404a6cad232653d947412a007c85a863146dadafce2c76929cd9727978dcb4e1bcbc84d93f242f6148ab5ea05b2511a91939080a6f02c45d62
-
Filesize
542KB
MD523d5fdce1acbfafc8a3cbfe602cdd3d0
SHA1a2edb9ec53ff7a95c10b6f8ff6b200d2eb7ae807
SHA25605556b79e22b1dbc5f1b2db291465be10f4ec10597d9eb0bfb0f503c9b21c40f
SHA512a18f5401476ab15451b9cfe93453e2ff4d74136742b55c5b938b19c8361ada83e61e043cdf3658a63b7950bd54e69fa846988710093268d04dc9ce769e95bf82
-
Filesize
542KB
MD523d5fdce1acbfafc8a3cbfe602cdd3d0
SHA1a2edb9ec53ff7a95c10b6f8ff6b200d2eb7ae807
SHA25605556b79e22b1dbc5f1b2db291465be10f4ec10597d9eb0bfb0f503c9b21c40f
SHA512a18f5401476ab15451b9cfe93453e2ff4d74136742b55c5b938b19c8361ada83e61e043cdf3658a63b7950bd54e69fa846988710093268d04dc9ce769e95bf82
-
Filesize
318KB
MD56bf70eb1f13bb5f9dc61eef7d7016664
SHA1704a3f23de746bf164ca205f1b03a9ee2c752877
SHA256e11eb0b06cc9a208a2de0a01f190bfae2f0484e84a68a4d822731c9bc92abce0
SHA5122846e76f2ac6cfa272c87e77bd5579133585654e5c1725aaf471209d04ff6749a4ab02f4180a66af637cba0e6a5468bce0a957ff1ac7d8a0f1698fa12f750b4f
-
Filesize
318KB
MD56bf70eb1f13bb5f9dc61eef7d7016664
SHA1704a3f23de746bf164ca205f1b03a9ee2c752877
SHA256e11eb0b06cc9a208a2de0a01f190bfae2f0484e84a68a4d822731c9bc92abce0
SHA5122846e76f2ac6cfa272c87e77bd5579133585654e5c1725aaf471209d04ff6749a4ab02f4180a66af637cba0e6a5468bce0a957ff1ac7d8a0f1698fa12f750b4f
-
Filesize
376KB
MD5d59f82338e5d937f8762de73d2fe5bfd
SHA1405e65a38c7677eaed8a28a9b9ef72a0ad7bdacb
SHA256138b6143c345a24a8f866d24f461d19ce4c9ed06204f12eb4d09207baff6ebf1
SHA512bf1cfe667b92ecdfd20625a50245e2640ddcc7f0320ae842b28ebd9e48582a437ed68360745d997d0cb5064926b84ec7de4450bf9f3d89692ea5f1ddf4775e75
-
Filesize
376KB
MD5d59f82338e5d937f8762de73d2fe5bfd
SHA1405e65a38c7677eaed8a28a9b9ef72a0ad7bdacb
SHA256138b6143c345a24a8f866d24f461d19ce4c9ed06204f12eb4d09207baff6ebf1
SHA512bf1cfe667b92ecdfd20625a50245e2640ddcc7f0320ae842b28ebd9e48582a437ed68360745d997d0cb5064926b84ec7de4450bf9f3d89692ea5f1ddf4775e75