Analysis
-
max time kernel
142s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03/03/2023, 22:48
Static task
static1
Behavioral task
behavioral1
Sample
19554a710d31fede5f63e45523c8b0783325817c6edc8c9ecb31bb3f79e934ed.exe
Resource
win10v2004-20230220-en
General
-
Target
19554a710d31fede5f63e45523c8b0783325817c6edc8c9ecb31bb3f79e934ed.exe
-
Size
531KB
-
MD5
51bfe8eeaa90a700f774cec1783c2b15
-
SHA1
e27ffdf5c02941045f59dfad8990b540ff16374f
-
SHA256
19554a710d31fede5f63e45523c8b0783325817c6edc8c9ecb31bb3f79e934ed
-
SHA512
b1858170274943dc2cf30cfb93df1bf8f5c7080d37b5fe243edf798a00d4ad46bc776f6c763d3b515b239d87edf2c77d9e6f7c6bb002345f57adbc3ef948bc0d
-
SSDEEP
12288:pMryy90UX5yTDYdeiYXhfR5RCycG6bZm4osmY:PyL5QD0Yx30ycKsmY
Malware Config
Extracted
redline
rosto
hueref.eu:4162
-
auth_value
07d81eba8cad42bbd0ae60042d48eac6
Extracted
redline
foksa
hueref.eu:4162
-
auth_value
6a9b2601a21672b285de3ed41b5402e4
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw99Ms93KQ58.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw99Ms93KQ58.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw99Ms93KQ58.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw99Ms93KQ58.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sw99Ms93KQ58.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw99Ms93KQ58.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/1692-158-0x0000000005260000-0x000000000529E000-memory.dmp family_redline behavioral1/memory/1692-161-0x0000000005260000-0x000000000529E000-memory.dmp family_redline behavioral1/memory/1692-163-0x0000000005260000-0x000000000529E000-memory.dmp family_redline behavioral1/memory/1692-159-0x0000000005260000-0x000000000529E000-memory.dmp family_redline behavioral1/memory/1692-165-0x0000000005260000-0x000000000529E000-memory.dmp family_redline behavioral1/memory/1692-167-0x0000000005260000-0x000000000529E000-memory.dmp family_redline behavioral1/memory/1692-169-0x0000000005260000-0x000000000529E000-memory.dmp family_redline behavioral1/memory/1692-171-0x0000000005260000-0x000000000529E000-memory.dmp family_redline behavioral1/memory/1692-173-0x0000000005260000-0x000000000529E000-memory.dmp family_redline behavioral1/memory/1692-175-0x0000000005260000-0x000000000529E000-memory.dmp family_redline behavioral1/memory/1692-177-0x0000000005260000-0x000000000529E000-memory.dmp family_redline behavioral1/memory/1692-179-0x0000000005260000-0x000000000529E000-memory.dmp family_redline behavioral1/memory/1692-181-0x0000000005260000-0x000000000529E000-memory.dmp family_redline behavioral1/memory/1692-183-0x0000000005260000-0x000000000529E000-memory.dmp family_redline behavioral1/memory/1692-185-0x0000000005260000-0x000000000529E000-memory.dmp family_redline behavioral1/memory/1692-187-0x0000000005260000-0x000000000529E000-memory.dmp family_redline behavioral1/memory/1692-189-0x0000000005260000-0x000000000529E000-memory.dmp family_redline behavioral1/memory/1692-191-0x0000000005260000-0x000000000529E000-memory.dmp family_redline behavioral1/memory/1692-193-0x0000000005260000-0x000000000529E000-memory.dmp family_redline behavioral1/memory/1692-195-0x0000000005260000-0x000000000529E000-memory.dmp family_redline behavioral1/memory/1692-197-0x0000000005260000-0x000000000529E000-memory.dmp family_redline behavioral1/memory/1692-199-0x0000000005260000-0x000000000529E000-memory.dmp family_redline behavioral1/memory/1692-201-0x0000000005260000-0x000000000529E000-memory.dmp family_redline behavioral1/memory/1692-203-0x0000000005260000-0x000000000529E000-memory.dmp family_redline behavioral1/memory/1692-205-0x0000000005260000-0x000000000529E000-memory.dmp family_redline behavioral1/memory/1692-207-0x0000000005260000-0x000000000529E000-memory.dmp family_redline behavioral1/memory/1692-209-0x0000000005260000-0x000000000529E000-memory.dmp family_redline behavioral1/memory/1692-211-0x0000000005260000-0x000000000529E000-memory.dmp family_redline behavioral1/memory/1692-213-0x0000000005260000-0x000000000529E000-memory.dmp family_redline behavioral1/memory/1692-215-0x0000000005260000-0x000000000529E000-memory.dmp family_redline behavioral1/memory/1692-217-0x0000000005260000-0x000000000529E000-memory.dmp family_redline behavioral1/memory/1692-219-0x0000000005260000-0x000000000529E000-memory.dmp family_redline behavioral1/memory/1692-221-0x0000000005260000-0x000000000529E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4272 vktj2384JX.exe 4924 sw99Ms93KQ58.exe 1692 tkDo68DP72mC.exe 4100 uphw57Zx27cj.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw99Ms93KQ58.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 19554a710d31fede5f63e45523c8b0783325817c6edc8c9ecb31bb3f79e934ed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 19554a710d31fede5f63e45523c8b0783325817c6edc8c9ecb31bb3f79e934ed.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vktj2384JX.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vktj2384JX.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4952 sc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2480 1692 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4924 sw99Ms93KQ58.exe 4924 sw99Ms93KQ58.exe 1692 tkDo68DP72mC.exe 1692 tkDo68DP72mC.exe 4100 uphw57Zx27cj.exe 4100 uphw57Zx27cj.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4924 sw99Ms93KQ58.exe Token: SeDebugPrivilege 1692 tkDo68DP72mC.exe Token: SeDebugPrivilege 4100 uphw57Zx27cj.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 5044 wrote to memory of 4272 5044 19554a710d31fede5f63e45523c8b0783325817c6edc8c9ecb31bb3f79e934ed.exe 86 PID 5044 wrote to memory of 4272 5044 19554a710d31fede5f63e45523c8b0783325817c6edc8c9ecb31bb3f79e934ed.exe 86 PID 5044 wrote to memory of 4272 5044 19554a710d31fede5f63e45523c8b0783325817c6edc8c9ecb31bb3f79e934ed.exe 86 PID 4272 wrote to memory of 4924 4272 vktj2384JX.exe 87 PID 4272 wrote to memory of 4924 4272 vktj2384JX.exe 87 PID 4272 wrote to memory of 1692 4272 vktj2384JX.exe 91 PID 4272 wrote to memory of 1692 4272 vktj2384JX.exe 91 PID 4272 wrote to memory of 1692 4272 vktj2384JX.exe 91 PID 5044 wrote to memory of 4100 5044 19554a710d31fede5f63e45523c8b0783325817c6edc8c9ecb31bb3f79e934ed.exe 95 PID 5044 wrote to memory of 4100 5044 19554a710d31fede5f63e45523c8b0783325817c6edc8c9ecb31bb3f79e934ed.exe 95 PID 5044 wrote to memory of 4100 5044 19554a710d31fede5f63e45523c8b0783325817c6edc8c9ecb31bb3f79e934ed.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\19554a710d31fede5f63e45523c8b0783325817c6edc8c9ecb31bb3f79e934ed.exe"C:\Users\Admin\AppData\Local\Temp\19554a710d31fede5f63e45523c8b0783325817c6edc8c9ecb31bb3f79e934ed.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vktj2384JX.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vktj2384JX.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw99Ms93KQ58.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw99Ms93KQ58.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4924
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkDo68DP72mC.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkDo68DP72mC.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1692 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1692 -s 20244⤵
- Program crash
PID:2480
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uphw57Zx27cj.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uphw57Zx27cj.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1692 -ip 16921⤵PID:1404
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4952
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD575ced8ad0d8cd237ebc9cb7b00852651
SHA1adab63df3e0a40fd9f170ab57da66f01f226141c
SHA256a35a264162c124ffd066dd867ed96359131d37b243cb0445c1c9eba6a58de819
SHA512f565a49b14671683a1e48cece82a437a79bf8bdb456a3c6f35fac020e5fef3cd666399208633b7d2da9407f7b334a311a416b0a969c8b62ff28e15e7d4a0c431
-
Filesize
175KB
MD575ced8ad0d8cd237ebc9cb7b00852651
SHA1adab63df3e0a40fd9f170ab57da66f01f226141c
SHA256a35a264162c124ffd066dd867ed96359131d37b243cb0445c1c9eba6a58de819
SHA512f565a49b14671683a1e48cece82a437a79bf8bdb456a3c6f35fac020e5fef3cd666399208633b7d2da9407f7b334a311a416b0a969c8b62ff28e15e7d4a0c431
-
Filesize
386KB
MD5fb6c3d5cc794fa1c62b35d326df6f517
SHA14a405188aae700cb11e7df700271907e13e4866f
SHA256f5a3a471246529223987bfe14a341a10b3c6fd31eb151af2aaa6155d92f3f3b2
SHA5124697b23535c5ced759c34d0d95994ef6477591c5f9329a6514e6bf9dad463348c088bee417e7e220b3e44f0fdf9a07d0c320ab36a303afd75be1d75fa4c52575
-
Filesize
386KB
MD5fb6c3d5cc794fa1c62b35d326df6f517
SHA14a405188aae700cb11e7df700271907e13e4866f
SHA256f5a3a471246529223987bfe14a341a10b3c6fd31eb151af2aaa6155d92f3f3b2
SHA5124697b23535c5ced759c34d0d95994ef6477591c5f9329a6514e6bf9dad463348c088bee417e7e220b3e44f0fdf9a07d0c320ab36a303afd75be1d75fa4c52575
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
290KB
MD575160aa498b0f13e4f6106ffe98857f3
SHA1154296294b8700f46187245fdb9a2c4d5aa7da3c
SHA25657ad72d53871e2d2f5576eca5bbf30e6c86fffef549ab740e9b2f89a81968547
SHA5128aade9003760df690e83dd35a309c64a67d7f10a37fb3e3138d4373d69a420885883417a1421f3bcdfb78776f5d6d38f83dab13b1f3f824186eae94ee1263813
-
Filesize
290KB
MD575160aa498b0f13e4f6106ffe98857f3
SHA1154296294b8700f46187245fdb9a2c4d5aa7da3c
SHA25657ad72d53871e2d2f5576eca5bbf30e6c86fffef549ab740e9b2f89a81968547
SHA5128aade9003760df690e83dd35a309c64a67d7f10a37fb3e3138d4373d69a420885883417a1421f3bcdfb78776f5d6d38f83dab13b1f3f824186eae94ee1263813