Analysis
-
max time kernel
146s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03/03/2023, 23:32
Static task
static1
Behavioral task
behavioral1
Sample
1cd85574c046c12d188d4a2eb616fb5ffdce0631358ba1e739917573629394c4.exe
Resource
win10v2004-20230220-en
General
-
Target
1cd85574c046c12d188d4a2eb616fb5ffdce0631358ba1e739917573629394c4.exe
-
Size
658KB
-
MD5
28cbaad470cdb810c8b0f545c7916f7c
-
SHA1
1000b6eeed9766e9965a496578f8e3928ff4ec2c
-
SHA256
1cd85574c046c12d188d4a2eb616fb5ffdce0631358ba1e739917573629394c4
-
SHA512
d7b79980fedeaa2ab579a537fb1f670f6d60bf8163bc0bcec8574f2d9edb61e29c14efcbd04990710fc9637a4840bdb06ec012e494aa3584bd12112e0a5c47b3
-
SSDEEP
12288:WMrOy90BHwYYs43dmMboF559o9FBatBG9VHy6L8XkVpKOxFnv8MDzPdZZPF:oyyHwG43dAD2atYV/LDTVUM/1LF
Malware Config
Extracted
redline
rosto
hueref.eu:4162
-
auth_value
07d81eba8cad42bbd0ae60042d48eac6
Extracted
redline
foksa
hueref.eu:4162
-
auth_value
6a9b2601a21672b285de3ed41b5402e4
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection urwA90RL32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" urwA90RL32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" urwA90RL32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" urwA90RL32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" urwA90RL32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" urwA90RL32.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/1208-191-0x0000000005120000-0x000000000515E000-memory.dmp family_redline behavioral1/memory/1208-193-0x0000000005120000-0x000000000515E000-memory.dmp family_redline behavioral1/memory/1208-190-0x0000000005120000-0x000000000515E000-memory.dmp family_redline behavioral1/memory/1208-195-0x0000000005120000-0x000000000515E000-memory.dmp family_redline behavioral1/memory/1208-199-0x0000000005120000-0x000000000515E000-memory.dmp family_redline behavioral1/memory/1208-197-0x0000000005120000-0x000000000515E000-memory.dmp family_redline behavioral1/memory/1208-201-0x0000000005120000-0x000000000515E000-memory.dmp family_redline behavioral1/memory/1208-203-0x0000000005120000-0x000000000515E000-memory.dmp family_redline behavioral1/memory/1208-205-0x0000000005120000-0x000000000515E000-memory.dmp family_redline behavioral1/memory/1208-207-0x0000000005120000-0x000000000515E000-memory.dmp family_redline behavioral1/memory/1208-209-0x0000000005120000-0x000000000515E000-memory.dmp family_redline behavioral1/memory/1208-211-0x0000000005120000-0x000000000515E000-memory.dmp family_redline behavioral1/memory/1208-213-0x0000000005120000-0x000000000515E000-memory.dmp family_redline behavioral1/memory/1208-215-0x0000000005120000-0x000000000515E000-memory.dmp family_redline behavioral1/memory/1208-217-0x0000000005120000-0x000000000515E000-memory.dmp family_redline behavioral1/memory/1208-219-0x0000000005120000-0x000000000515E000-memory.dmp family_redline behavioral1/memory/1208-221-0x0000000005120000-0x000000000515E000-memory.dmp family_redline behavioral1/memory/1208-223-0x0000000005120000-0x000000000515E000-memory.dmp family_redline behavioral1/memory/1208-269-0x0000000004B60000-0x0000000004B70000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2296 ycTf35CE00.exe 4240 urwA90RL32.exe 1208 wrjN62SN32.exe 4108 xugS63dJ51.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features urwA90RL32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" urwA90RL32.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1cd85574c046c12d188d4a2eb616fb5ffdce0631358ba1e739917573629394c4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1cd85574c046c12d188d4a2eb616fb5ffdce0631358ba1e739917573629394c4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ycTf35CE00.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ycTf35CE00.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4768 4240 WerFault.exe 87 4356 1208 WerFault.exe 95 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4240 urwA90RL32.exe 4240 urwA90RL32.exe 1208 wrjN62SN32.exe 1208 wrjN62SN32.exe 4108 xugS63dJ51.exe 4108 xugS63dJ51.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4240 urwA90RL32.exe Token: SeDebugPrivilege 1208 wrjN62SN32.exe Token: SeDebugPrivilege 4108 xugS63dJ51.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1252 wrote to memory of 2296 1252 1cd85574c046c12d188d4a2eb616fb5ffdce0631358ba1e739917573629394c4.exe 86 PID 1252 wrote to memory of 2296 1252 1cd85574c046c12d188d4a2eb616fb5ffdce0631358ba1e739917573629394c4.exe 86 PID 1252 wrote to memory of 2296 1252 1cd85574c046c12d188d4a2eb616fb5ffdce0631358ba1e739917573629394c4.exe 86 PID 2296 wrote to memory of 4240 2296 ycTf35CE00.exe 87 PID 2296 wrote to memory of 4240 2296 ycTf35CE00.exe 87 PID 2296 wrote to memory of 4240 2296 ycTf35CE00.exe 87 PID 2296 wrote to memory of 1208 2296 ycTf35CE00.exe 95 PID 2296 wrote to memory of 1208 2296 ycTf35CE00.exe 95 PID 2296 wrote to memory of 1208 2296 ycTf35CE00.exe 95 PID 1252 wrote to memory of 4108 1252 1cd85574c046c12d188d4a2eb616fb5ffdce0631358ba1e739917573629394c4.exe 99 PID 1252 wrote to memory of 4108 1252 1cd85574c046c12d188d4a2eb616fb5ffdce0631358ba1e739917573629394c4.exe 99 PID 1252 wrote to memory of 4108 1252 1cd85574c046c12d188d4a2eb616fb5ffdce0631358ba1e739917573629394c4.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\1cd85574c046c12d188d4a2eb616fb5ffdce0631358ba1e739917573629394c4.exe"C:\Users\Admin\AppData\Local\Temp\1cd85574c046c12d188d4a2eb616fb5ffdce0631358ba1e739917573629394c4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycTf35CE00.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycTf35CE00.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urwA90RL32.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urwA90RL32.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4240 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4240 -s 10804⤵
- Program crash
PID:4768
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrjN62SN32.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrjN62SN32.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1208 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1208 -s 13884⤵
- Program crash
PID:4356
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xugS63dJ51.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xugS63dJ51.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4240 -ip 42401⤵PID:4832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1208 -ip 12081⤵PID:2768
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD575ced8ad0d8cd237ebc9cb7b00852651
SHA1adab63df3e0a40fd9f170ab57da66f01f226141c
SHA256a35a264162c124ffd066dd867ed96359131d37b243cb0445c1c9eba6a58de819
SHA512f565a49b14671683a1e48cece82a437a79bf8bdb456a3c6f35fac020e5fef3cd666399208633b7d2da9407f7b334a311a416b0a969c8b62ff28e15e7d4a0c431
-
Filesize
175KB
MD575ced8ad0d8cd237ebc9cb7b00852651
SHA1adab63df3e0a40fd9f170ab57da66f01f226141c
SHA256a35a264162c124ffd066dd867ed96359131d37b243cb0445c1c9eba6a58de819
SHA512f565a49b14671683a1e48cece82a437a79bf8bdb456a3c6f35fac020e5fef3cd666399208633b7d2da9407f7b334a311a416b0a969c8b62ff28e15e7d4a0c431
-
Filesize
514KB
MD55606572156cdbb580c268580b3ae52da
SHA15b23a142029b349692a04a0f87777252017beba8
SHA256d642da60ab0565c89898a3aa350d8dbeb4ad1c6830348f54d8be9ff620237af2
SHA51256840adec14360e69718b1263a60c85590955011d98836de6e70e89590e67f4fab911497cb7e1c17e57f75b818c2db8db6981465661d7e3e58fa1cb489dc5b09
-
Filesize
514KB
MD55606572156cdbb580c268580b3ae52da
SHA15b23a142029b349692a04a0f87777252017beba8
SHA256d642da60ab0565c89898a3aa350d8dbeb4ad1c6830348f54d8be9ff620237af2
SHA51256840adec14360e69718b1263a60c85590955011d98836de6e70e89590e67f4fab911497cb7e1c17e57f75b818c2db8db6981465661d7e3e58fa1cb489dc5b09
-
Filesize
232KB
MD52e26dba8fb0f0a5e89760ad7ed6912fe
SHA1b66d29da92a60aefa3fc5e84e11f6b1af5c4c5a4
SHA25663cf4d05b6d3365cc059f683e6a5b50ed6e5c1c47e9cdf68f99e0fd481853a5f
SHA512527e97acdf0ee505b30a23f7a721324e643aaf2d2c5dbcf1b4918de8eeafa84d1225c048f0fd6bfbdaa568789e81559ca92ab4e9b21c4929ef25b8e6e8a1115b
-
Filesize
232KB
MD52e26dba8fb0f0a5e89760ad7ed6912fe
SHA1b66d29da92a60aefa3fc5e84e11f6b1af5c4c5a4
SHA25663cf4d05b6d3365cc059f683e6a5b50ed6e5c1c47e9cdf68f99e0fd481853a5f
SHA512527e97acdf0ee505b30a23f7a721324e643aaf2d2c5dbcf1b4918de8eeafa84d1225c048f0fd6bfbdaa568789e81559ca92ab4e9b21c4929ef25b8e6e8a1115b
-
Filesize
290KB
MD50dcb6db316be04c378daade20a9aa75c
SHA1a283f1bdbd0ba99857ad42799b6cf07d9520aac3
SHA256ae562efa5f83ca3cb53ca51d5748ee68a89f17a14457f73bed7f0d379ebdf3b6
SHA512c292ad785c6765630f957b17f75ce0398647c84ca98148a2228f12271971b4bf08ae4d25da08e6b8bc55bea6d976bf4835756af03e760cef98c05c3c1019bce6
-
Filesize
290KB
MD50dcb6db316be04c378daade20a9aa75c
SHA1a283f1bdbd0ba99857ad42799b6cf07d9520aac3
SHA256ae562efa5f83ca3cb53ca51d5748ee68a89f17a14457f73bed7f0d379ebdf3b6
SHA512c292ad785c6765630f957b17f75ce0398647c84ca98148a2228f12271971b4bf08ae4d25da08e6b8bc55bea6d976bf4835756af03e760cef98c05c3c1019bce6