Analysis
-
max time kernel
82s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-03-2023 00:56
Static task
static1
Behavioral task
behavioral1
Sample
54754c2080fd2e99f408fbe9c329ed5d73da1a64089eef013ff54f209cd4d8a9.exe
Resource
win10v2004-20230220-en
General
-
Target
54754c2080fd2e99f408fbe9c329ed5d73da1a64089eef013ff54f209cd4d8a9.exe
-
Size
555KB
-
MD5
1e0d7aa55637fca15632ff7c65537ea6
-
SHA1
6506b86bb033eee5982f0778a79886dbfbe09e58
-
SHA256
54754c2080fd2e99f408fbe9c329ed5d73da1a64089eef013ff54f209cd4d8a9
-
SHA512
208045a6ef5106f0184179fa7d4e83c46a4524db2ef91f17d8149a6a361a6c4d209210b8361df8e93dbe8d40f1f49087ec7a8d1fac10030345538fc1402e1005
-
SSDEEP
12288:XMrUy901rHw/QWC4WcUfDUZfaTx2aAi3g+INM8rsYlDvxTQFlAlKWVtR:LyCrQYSWcIsCT4aAj+x8rVD5sF2lKir
Malware Config
Extracted
redline
ruzhpe
pepunn.com:4162
-
auth_value
f735ced96ae8d01d0bd1d514240e54e0
Extracted
redline
fchan
pepunn.com:4162
-
auth_value
127bd53d55e8c4f0dd2f6e1ea60deef4
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw93Xk03sv01.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw93Xk03sv01.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sw93Xk03sv01.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw93Xk03sv01.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw93Xk03sv01.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw93Xk03sv01.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/1412-158-0x0000000007910000-0x000000000794E000-memory.dmp family_redline behavioral1/memory/1412-159-0x0000000007910000-0x000000000794E000-memory.dmp family_redline behavioral1/memory/1412-161-0x0000000007910000-0x000000000794E000-memory.dmp family_redline behavioral1/memory/1412-163-0x0000000007910000-0x000000000794E000-memory.dmp family_redline behavioral1/memory/1412-165-0x0000000007910000-0x000000000794E000-memory.dmp family_redline behavioral1/memory/1412-167-0x0000000007910000-0x000000000794E000-memory.dmp family_redline behavioral1/memory/1412-169-0x0000000007910000-0x000000000794E000-memory.dmp family_redline behavioral1/memory/1412-171-0x0000000007910000-0x000000000794E000-memory.dmp family_redline behavioral1/memory/1412-173-0x0000000007910000-0x000000000794E000-memory.dmp family_redline behavioral1/memory/1412-175-0x0000000007910000-0x000000000794E000-memory.dmp family_redline behavioral1/memory/1412-177-0x0000000007910000-0x000000000794E000-memory.dmp family_redline behavioral1/memory/1412-179-0x0000000007910000-0x000000000794E000-memory.dmp family_redline behavioral1/memory/1412-181-0x0000000007910000-0x000000000794E000-memory.dmp family_redline behavioral1/memory/1412-183-0x0000000007910000-0x000000000794E000-memory.dmp family_redline behavioral1/memory/1412-185-0x0000000007910000-0x000000000794E000-memory.dmp family_redline behavioral1/memory/1412-187-0x0000000007910000-0x000000000794E000-memory.dmp family_redline behavioral1/memory/1412-189-0x0000000007910000-0x000000000794E000-memory.dmp family_redline behavioral1/memory/1412-191-0x0000000007910000-0x000000000794E000-memory.dmp family_redline behavioral1/memory/1412-193-0x0000000007910000-0x000000000794E000-memory.dmp family_redline behavioral1/memory/1412-195-0x0000000007910000-0x000000000794E000-memory.dmp family_redline behavioral1/memory/1412-197-0x0000000007910000-0x000000000794E000-memory.dmp family_redline behavioral1/memory/1412-199-0x0000000007910000-0x000000000794E000-memory.dmp family_redline behavioral1/memory/1412-201-0x0000000007910000-0x000000000794E000-memory.dmp family_redline behavioral1/memory/1412-203-0x0000000007910000-0x000000000794E000-memory.dmp family_redline behavioral1/memory/1412-205-0x0000000007910000-0x000000000794E000-memory.dmp family_redline behavioral1/memory/1412-207-0x0000000007910000-0x000000000794E000-memory.dmp family_redline behavioral1/memory/1412-209-0x0000000007910000-0x000000000794E000-memory.dmp family_redline behavioral1/memory/1412-211-0x0000000007910000-0x000000000794E000-memory.dmp family_redline behavioral1/memory/1412-213-0x0000000007910000-0x000000000794E000-memory.dmp family_redline behavioral1/memory/1412-215-0x0000000007910000-0x000000000794E000-memory.dmp family_redline behavioral1/memory/1412-217-0x0000000007910000-0x000000000794E000-memory.dmp family_redline behavioral1/memory/1412-219-0x0000000007910000-0x000000000794E000-memory.dmp family_redline behavioral1/memory/1412-221-0x0000000007910000-0x000000000794E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3312 vkxL8755Qt.exe 1796 sw93Xk03sv01.exe 1412 tkEA05zD42jf.exe 1536 uphG71kl50ye.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw93Xk03sv01.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 54754c2080fd2e99f408fbe9c329ed5d73da1a64089eef013ff54f209cd4d8a9.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vkxL8755Qt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vkxL8755Qt.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 54754c2080fd2e99f408fbe9c329ed5d73da1a64089eef013ff54f209cd4d8a9.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2732 1412 WerFault.exe 95 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1796 sw93Xk03sv01.exe 1796 sw93Xk03sv01.exe 1412 tkEA05zD42jf.exe 1412 tkEA05zD42jf.exe 1536 uphG71kl50ye.exe 1536 uphG71kl50ye.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1796 sw93Xk03sv01.exe Token: SeDebugPrivilege 1412 tkEA05zD42jf.exe Token: SeDebugPrivilege 1536 uphG71kl50ye.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 820 wrote to memory of 3312 820 54754c2080fd2e99f408fbe9c329ed5d73da1a64089eef013ff54f209cd4d8a9.exe 88 PID 820 wrote to memory of 3312 820 54754c2080fd2e99f408fbe9c329ed5d73da1a64089eef013ff54f209cd4d8a9.exe 88 PID 820 wrote to memory of 3312 820 54754c2080fd2e99f408fbe9c329ed5d73da1a64089eef013ff54f209cd4d8a9.exe 88 PID 3312 wrote to memory of 1796 3312 vkxL8755Qt.exe 89 PID 3312 wrote to memory of 1796 3312 vkxL8755Qt.exe 89 PID 3312 wrote to memory of 1412 3312 vkxL8755Qt.exe 95 PID 3312 wrote to memory of 1412 3312 vkxL8755Qt.exe 95 PID 3312 wrote to memory of 1412 3312 vkxL8755Qt.exe 95 PID 820 wrote to memory of 1536 820 54754c2080fd2e99f408fbe9c329ed5d73da1a64089eef013ff54f209cd4d8a9.exe 101 PID 820 wrote to memory of 1536 820 54754c2080fd2e99f408fbe9c329ed5d73da1a64089eef013ff54f209cd4d8a9.exe 101 PID 820 wrote to memory of 1536 820 54754c2080fd2e99f408fbe9c329ed5d73da1a64089eef013ff54f209cd4d8a9.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\54754c2080fd2e99f408fbe9c329ed5d73da1a64089eef013ff54f209cd4d8a9.exe"C:\Users\Admin\AppData\Local\Temp\54754c2080fd2e99f408fbe9c329ed5d73da1a64089eef013ff54f209cd4d8a9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vkxL8755Qt.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vkxL8755Qt.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw93Xk03sv01.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw93Xk03sv01.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1796
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkEA05zD42jf.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkEA05zD42jf.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1412 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1412 -s 13924⤵
- Program crash
PID:2732
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uphG71kl50ye.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uphG71kl50ye.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1412 -ip 14121⤵PID:436
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD513ccbf7eb181cf83f6ce05581bcbe985
SHA1a6c593d1f792f39cade98e0c019326f0b9642c05
SHA2561aa0d49aa694236846a055dcece6d5d4fdcfe62a7604300299e564f38fd38e9f
SHA5123b693bb7c818fb6531774c0df00eccb682a1baca918b3d30fdba6b88e980d41603ae37e85aea35cc71f4b3f7bf0e37a0453967f413702d10aadda5e235da127c
-
Filesize
175KB
MD513ccbf7eb181cf83f6ce05581bcbe985
SHA1a6c593d1f792f39cade98e0c019326f0b9642c05
SHA2561aa0d49aa694236846a055dcece6d5d4fdcfe62a7604300299e564f38fd38e9f
SHA5123b693bb7c818fb6531774c0df00eccb682a1baca918b3d30fdba6b88e980d41603ae37e85aea35cc71f4b3f7bf0e37a0453967f413702d10aadda5e235da127c
-
Filesize
411KB
MD5d936016789992cf5d32ece98aa2900ba
SHA1f41c47d598062dcede46324e216b381c37f4c153
SHA256813eea09a7f08368d72ae25128a41ffa7e63dfde2164a64412b01aed03e67a78
SHA5129484ae4b74adebf771790fc9383f0702502142a1541ee0ca38adb3d63dced2c931a13d68d2ce905e323488b2281ef55e238fa50035342c0c6bc698defd90fb69
-
Filesize
411KB
MD5d936016789992cf5d32ece98aa2900ba
SHA1f41c47d598062dcede46324e216b381c37f4c153
SHA256813eea09a7f08368d72ae25128a41ffa7e63dfde2164a64412b01aed03e67a78
SHA5129484ae4b74adebf771790fc9383f0702502142a1541ee0ca38adb3d63dced2c931a13d68d2ce905e323488b2281ef55e238fa50035342c0c6bc698defd90fb69
-
Filesize
17KB
MD5b48b3434c15c3d791b2dbc03dbc0966d
SHA1e3a984146d5acbf945c83532c3012655906dfe1b
SHA25628b620e12612714c5c47081c977c71c716a8bda9f0f7f4400126412de5fe5ffa
SHA5128560c10c983cea82dadedd320b083c342ea9d312917b4a2200df1a622519f22d807503f7da5360d72743e23c901a330c9a4098398ea266e5c4823ff95c3ee297
-
Filesize
17KB
MD5b48b3434c15c3d791b2dbc03dbc0966d
SHA1e3a984146d5acbf945c83532c3012655906dfe1b
SHA25628b620e12612714c5c47081c977c71c716a8bda9f0f7f4400126412de5fe5ffa
SHA5128560c10c983cea82dadedd320b083c342ea9d312917b4a2200df1a622519f22d807503f7da5360d72743e23c901a330c9a4098398ea266e5c4823ff95c3ee297
-
Filesize
410KB
MD5dd957a86774a219d7a7c1dc3b2f39fdc
SHA144158d89d13015254526a17a20a65a3ddd05e85c
SHA256e154068bcbd7ab9a1ad782314383ff0f4bdef76b23ed99aded1f7260c61230cb
SHA512a6e615f934c7775ff4e227642506e0effb2a1f015c8edee62ab518c8c3d3bbfc591ac01b541dc6a0ef8efb581bb3c5c722ed9a6d437839f28f88829a1b8233fc
-
Filesize
410KB
MD5dd957a86774a219d7a7c1dc3b2f39fdc
SHA144158d89d13015254526a17a20a65a3ddd05e85c
SHA256e154068bcbd7ab9a1ad782314383ff0f4bdef76b23ed99aded1f7260c61230cb
SHA512a6e615f934c7775ff4e227642506e0effb2a1f015c8edee62ab518c8c3d3bbfc591ac01b541dc6a0ef8efb581bb3c5c722ed9a6d437839f28f88829a1b8233fc