Analysis
-
max time kernel
84s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-03-2023 01:14
Static task
static1
Behavioral task
behavioral1
Sample
6d2ed45115cc5837e9d08e8467634b556a77d0f30c147328b6b0d2f62fc934c3.exe
Resource
win10v2004-20230220-en
General
-
Target
6d2ed45115cc5837e9d08e8467634b556a77d0f30c147328b6b0d2f62fc934c3.exe
-
Size
695KB
-
MD5
41e0491fd8419eece12787bc14a75ba9
-
SHA1
8835b1e6ef410094c52e56bcbf663ec652ddf87d
-
SHA256
6d2ed45115cc5837e9d08e8467634b556a77d0f30c147328b6b0d2f62fc934c3
-
SHA512
3e5cdc90e18192ac06c52fe1bcca0aa849f1016635956c4a2bc776de4fe9a2c8929bea833b438a64bf37ad31825e4a12d5ed935d0768aa4364817ea643e01c94
-
SSDEEP
12288:cMrhy90sFIPK2IHL6/UIht34lZgHaS2nIYgPfmZmx2g+kNUqkjSIH0+gBLPXYOgx:9yTF6K2IHLg3hbHaSgIYgnmZmX+/XSIB
Malware Config
Extracted
redline
ruzhpe
pepunn.com:4162
-
auth_value
f735ced96ae8d01d0bd1d514240e54e0
Extracted
redline
fchan
pepunn.com:4162
-
auth_value
127bd53d55e8c4f0dd2f6e1ea60deef4
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection urvH91js68.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" urvH91js68.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" urvH91js68.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" urvH91js68.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" urvH91js68.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" urvH91js68.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/348-191-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral1/memory/348-192-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral1/memory/348-194-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral1/memory/348-196-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral1/memory/348-198-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral1/memory/348-200-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral1/memory/348-202-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral1/memory/348-204-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral1/memory/348-206-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral1/memory/348-208-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral1/memory/348-210-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral1/memory/348-212-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral1/memory/348-214-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral1/memory/348-216-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral1/memory/348-220-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral1/memory/348-224-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral1/memory/348-226-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral1/memory/348-228-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3276 ycmP73CA00.exe 3564 urvH91js68.exe 348 wrbl57zy99.exe 2296 xuWX44Ih16.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" urvH91js68.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features urvH91js68.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6d2ed45115cc5837e9d08e8467634b556a77d0f30c147328b6b0d2f62fc934c3.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ycmP73CA00.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ycmP73CA00.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6d2ed45115cc5837e9d08e8467634b556a77d0f30c147328b6b0d2f62fc934c3.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2300 3564 WerFault.exe 90 5112 348 WerFault.exe 101 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3564 urvH91js68.exe 3564 urvH91js68.exe 348 wrbl57zy99.exe 348 wrbl57zy99.exe 2296 xuWX44Ih16.exe 2296 xuWX44Ih16.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3564 urvH91js68.exe Token: SeDebugPrivilege 348 wrbl57zy99.exe Token: SeDebugPrivilege 2296 xuWX44Ih16.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4244 wrote to memory of 3276 4244 6d2ed45115cc5837e9d08e8467634b556a77d0f30c147328b6b0d2f62fc934c3.exe 89 PID 4244 wrote to memory of 3276 4244 6d2ed45115cc5837e9d08e8467634b556a77d0f30c147328b6b0d2f62fc934c3.exe 89 PID 4244 wrote to memory of 3276 4244 6d2ed45115cc5837e9d08e8467634b556a77d0f30c147328b6b0d2f62fc934c3.exe 89 PID 3276 wrote to memory of 3564 3276 ycmP73CA00.exe 90 PID 3276 wrote to memory of 3564 3276 ycmP73CA00.exe 90 PID 3276 wrote to memory of 3564 3276 ycmP73CA00.exe 90 PID 3276 wrote to memory of 348 3276 ycmP73CA00.exe 101 PID 3276 wrote to memory of 348 3276 ycmP73CA00.exe 101 PID 3276 wrote to memory of 348 3276 ycmP73CA00.exe 101 PID 4244 wrote to memory of 2296 4244 6d2ed45115cc5837e9d08e8467634b556a77d0f30c147328b6b0d2f62fc934c3.exe 105 PID 4244 wrote to memory of 2296 4244 6d2ed45115cc5837e9d08e8467634b556a77d0f30c147328b6b0d2f62fc934c3.exe 105 PID 4244 wrote to memory of 2296 4244 6d2ed45115cc5837e9d08e8467634b556a77d0f30c147328b6b0d2f62fc934c3.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d2ed45115cc5837e9d08e8467634b556a77d0f30c147328b6b0d2f62fc934c3.exe"C:\Users\Admin\AppData\Local\Temp\6d2ed45115cc5837e9d08e8467634b556a77d0f30c147328b6b0d2f62fc934c3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycmP73CA00.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycmP73CA00.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urvH91js68.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urvH91js68.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3564 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3564 -s 10764⤵
- Program crash
PID:2300
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrbl57zy99.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrbl57zy99.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:348 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 348 -s 19084⤵
- Program crash
PID:5112
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuWX44Ih16.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuWX44Ih16.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3564 -ip 35641⤵PID:332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 348 -ip 3481⤵PID:4336
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD51de24310cc666cd05190e29ad5eb73e7
SHA12288615f6e99f2f2e857825efa7ccb22f31e331b
SHA256402654166f42d5bb576dcf1fa20eff7b6a49e907854d0624e997bf33478142cf
SHA512910eddd905038ac8af9e83fa1c148f4bb5eb8a18fda88bd5fc34a89ac04f258e96c438412cbb51454bb7f437e5b1191bbcff8aa7e7fbbb0ebe9731899504e23a
-
Filesize
175KB
MD51de24310cc666cd05190e29ad5eb73e7
SHA12288615f6e99f2f2e857825efa7ccb22f31e331b
SHA256402654166f42d5bb576dcf1fa20eff7b6a49e907854d0624e997bf33478142cf
SHA512910eddd905038ac8af9e83fa1c148f4bb5eb8a18fda88bd5fc34a89ac04f258e96c438412cbb51454bb7f437e5b1191bbcff8aa7e7fbbb0ebe9731899504e23a
-
Filesize
552KB
MD5a9dd58497e7369b17b35d0389f009648
SHA1b23f066298f8896998641bbe002f9045a9a66ca6
SHA256d9005f0a3a4fa0cb5b2ecb55b13d79fd61664af1da21e5d7d47e0c24081dd81a
SHA512327d04c0c83f720c63fcd09d09cbecf0133cc2c3addac85730f179afad055fee695d00c8778a11855fff1caa73e8c9f6c2c84818ef4ee942ce3934cf7a09c82c
-
Filesize
552KB
MD5a9dd58497e7369b17b35d0389f009648
SHA1b23f066298f8896998641bbe002f9045a9a66ca6
SHA256d9005f0a3a4fa0cb5b2ecb55b13d79fd61664af1da21e5d7d47e0c24081dd81a
SHA512327d04c0c83f720c63fcd09d09cbecf0133cc2c3addac85730f179afad055fee695d00c8778a11855fff1caa73e8c9f6c2c84818ef4ee942ce3934cf7a09c82c
-
Filesize
351KB
MD5a3ac753269229392fd140bf6bd7fce49
SHA1509b078eadc0ea977f2266ea0ec36c226f5792e5
SHA2560102e14179d6832a369e46e8f88f63a835cc9e1fc6d56541c81844898d608d8c
SHA5124312a7b3ea471cfa47f969fc1870e36d1cc384af2dfd5a36d9e4dc441ce99b6520fc4b3b6d14c42f6e587be31db73d0fc056bd946b14bc65c82fc599ae286ae9
-
Filesize
351KB
MD5a3ac753269229392fd140bf6bd7fce49
SHA1509b078eadc0ea977f2266ea0ec36c226f5792e5
SHA2560102e14179d6832a369e46e8f88f63a835cc9e1fc6d56541c81844898d608d8c
SHA5124312a7b3ea471cfa47f969fc1870e36d1cc384af2dfd5a36d9e4dc441ce99b6520fc4b3b6d14c42f6e587be31db73d0fc056bd946b14bc65c82fc599ae286ae9
-
Filesize
410KB
MD5dd957a86774a219d7a7c1dc3b2f39fdc
SHA144158d89d13015254526a17a20a65a3ddd05e85c
SHA256e154068bcbd7ab9a1ad782314383ff0f4bdef76b23ed99aded1f7260c61230cb
SHA512a6e615f934c7775ff4e227642506e0effb2a1f015c8edee62ab518c8c3d3bbfc591ac01b541dc6a0ef8efb581bb3c5c722ed9a6d437839f28f88829a1b8233fc
-
Filesize
410KB
MD5dd957a86774a219d7a7c1dc3b2f39fdc
SHA144158d89d13015254526a17a20a65a3ddd05e85c
SHA256e154068bcbd7ab9a1ad782314383ff0f4bdef76b23ed99aded1f7260c61230cb
SHA512a6e615f934c7775ff4e227642506e0effb2a1f015c8edee62ab518c8c3d3bbfc591ac01b541dc6a0ef8efb581bb3c5c722ed9a6d437839f28f88829a1b8233fc