Analysis
-
max time kernel
80s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
03/03/2023, 03:18
Static task
static1
Behavioral task
behavioral1
Sample
bbb12f757d1635cdcba621ef2a153d57480c4042f02c7c0379c757fab828f31a.exe
Resource
win10v2004-20230221-en
General
-
Target
bbb12f757d1635cdcba621ef2a153d57480c4042f02c7c0379c757fab828f31a.exe
-
Size
556KB
-
MD5
fd55f7f1b7dfc93135db9996553bae72
-
SHA1
55073f8da85edd8326201a97a796d65ad5d8a107
-
SHA256
bbb12f757d1635cdcba621ef2a153d57480c4042f02c7c0379c757fab828f31a
-
SHA512
cd5964f1e2331ed2b2bdadb40292e7a20c78d92cd998ba8bb7058c0d88f51ddf467cb03e8d649dbe67d9f51d7392f9d6ff321dcd9a2c9ffb2f342a521bcee748
-
SSDEEP
12288:jMrby90K0nXWoP+4nmA/IDch5K8S4In0E56grmeJ+wEnkbpVA:Iyb0nXT1r7I95drmeJHEnkbpVA
Malware Config
Extracted
redline
ruzhpe
pepunn.com:4162
-
auth_value
f735ced96ae8d01d0bd1d514240e54e0
Extracted
redline
fchan
pepunn.com:4162
-
auth_value
127bd53d55e8c4f0dd2f6e1ea60deef4
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw95ty32Th34.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw95ty32Th34.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw95ty32Th34.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw95ty32Th34.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sw95ty32Th34.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw95ty32Th34.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/3076-156-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3076-159-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3076-157-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3076-161-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3076-163-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3076-165-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3076-167-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3076-169-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3076-171-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3076-173-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3076-175-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3076-177-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3076-180-0x0000000007470000-0x0000000007480000-memory.dmp family_redline behavioral1/memory/3076-183-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3076-185-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3076-179-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3076-187-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3076-189-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3076-191-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3076-193-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3076-195-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3076-197-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3076-199-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3076-201-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3076-203-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3076-205-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3076-207-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3076-209-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3076-211-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3076-213-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3076-215-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3076-217-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3076-219-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3076-221-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3076-1076-0x0000000007470000-0x0000000007480000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2696 vkTT4137eL.exe 2880 sw95ty32Th34.exe 3076 tkgX89oU37aW.exe 2844 upXG66wc34xb.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw95ty32Th34.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce bbb12f757d1635cdcba621ef2a153d57480c4042f02c7c0379c757fab828f31a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bbb12f757d1635cdcba621ef2a153d57480c4042f02c7c0379c757fab828f31a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vkTT4137eL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vkTT4137eL.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1356 3076 WerFault.exe 88 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2880 sw95ty32Th34.exe 2880 sw95ty32Th34.exe 3076 tkgX89oU37aW.exe 3076 tkgX89oU37aW.exe 2844 upXG66wc34xb.exe 2844 upXG66wc34xb.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2880 sw95ty32Th34.exe Token: SeDebugPrivilege 3076 tkgX89oU37aW.exe Token: SeDebugPrivilege 2844 upXG66wc34xb.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4456 wrote to memory of 2696 4456 bbb12f757d1635cdcba621ef2a153d57480c4042f02c7c0379c757fab828f31a.exe 84 PID 4456 wrote to memory of 2696 4456 bbb12f757d1635cdcba621ef2a153d57480c4042f02c7c0379c757fab828f31a.exe 84 PID 4456 wrote to memory of 2696 4456 bbb12f757d1635cdcba621ef2a153d57480c4042f02c7c0379c757fab828f31a.exe 84 PID 2696 wrote to memory of 2880 2696 vkTT4137eL.exe 85 PID 2696 wrote to memory of 2880 2696 vkTT4137eL.exe 85 PID 2696 wrote to memory of 3076 2696 vkTT4137eL.exe 88 PID 2696 wrote to memory of 3076 2696 vkTT4137eL.exe 88 PID 2696 wrote to memory of 3076 2696 vkTT4137eL.exe 88 PID 4456 wrote to memory of 2844 4456 bbb12f757d1635cdcba621ef2a153d57480c4042f02c7c0379c757fab828f31a.exe 92 PID 4456 wrote to memory of 2844 4456 bbb12f757d1635cdcba621ef2a153d57480c4042f02c7c0379c757fab828f31a.exe 92 PID 4456 wrote to memory of 2844 4456 bbb12f757d1635cdcba621ef2a153d57480c4042f02c7c0379c757fab828f31a.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbb12f757d1635cdcba621ef2a153d57480c4042f02c7c0379c757fab828f31a.exe"C:\Users\Admin\AppData\Local\Temp\bbb12f757d1635cdcba621ef2a153d57480c4042f02c7c0379c757fab828f31a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vkTT4137eL.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vkTT4137eL.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw95ty32Th34.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw95ty32Th34.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2880
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkgX89oU37aW.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkgX89oU37aW.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3076 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3076 -s 14084⤵
- Program crash
PID:1356
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\upXG66wc34xb.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\upXG66wc34xb.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3076 -ip 30761⤵PID:936
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD59a2ef35635ce022cda78a8717f368639
SHA1a76662ce7d6dc3e64ebc73f822e5570d371cface
SHA2564fcae9a5763f378144e26b775526b71b46b0a91f4ad277736ebcfab15b6549c1
SHA512fe9d81e28a02c6ea60522d7f7d1d027cc89c63e3ae9735471401ce8bdd570814c4327f0f8c1ab43345cdf01f4dec4fd51440bb065ee05f9d345d11b77b41854f
-
Filesize
175KB
MD59a2ef35635ce022cda78a8717f368639
SHA1a76662ce7d6dc3e64ebc73f822e5570d371cface
SHA2564fcae9a5763f378144e26b775526b71b46b0a91f4ad277736ebcfab15b6549c1
SHA512fe9d81e28a02c6ea60522d7f7d1d027cc89c63e3ae9735471401ce8bdd570814c4327f0f8c1ab43345cdf01f4dec4fd51440bb065ee05f9d345d11b77b41854f
-
Filesize
411KB
MD59e77ee4c2df0879c4e966e3311631e7e
SHA17cf3eb192b3501561b5cc599bd0426c75c1e27f5
SHA256ae04374424cd1d5cb5aa42146b08b343c992eab6d771871e5016b6ec9082404f
SHA5127b357f4e04fd9f426d97bc987f6796ef5ea9a42c2bef965f22e854d774bdf615aab91466b34e669b403e749dd4e9c484836b7ab2f14b6579b9deedae4afbab0b
-
Filesize
411KB
MD59e77ee4c2df0879c4e966e3311631e7e
SHA17cf3eb192b3501561b5cc599bd0426c75c1e27f5
SHA256ae04374424cd1d5cb5aa42146b08b343c992eab6d771871e5016b6ec9082404f
SHA5127b357f4e04fd9f426d97bc987f6796ef5ea9a42c2bef965f22e854d774bdf615aab91466b34e669b403e749dd4e9c484836b7ab2f14b6579b9deedae4afbab0b
-
Filesize
17KB
MD53d8c87d5a8eb47a4d7d6492e68fefadd
SHA10fc713e6a268ee88443e28dde4ba8272f0c1d421
SHA25636001b73c431b778a1e2deb2694a5643d2066815688ff8fde26bfcd8acf3f8dd
SHA5121bcbbdd8de0a1725e8d1500b5ad4c743eacf1418b29093a0bd8f6866b07540282a4595bceb0c905bc01beca2f5bd69a859739e7211ae1c7b2419da3c228c455b
-
Filesize
17KB
MD53d8c87d5a8eb47a4d7d6492e68fefadd
SHA10fc713e6a268ee88443e28dde4ba8272f0c1d421
SHA25636001b73c431b778a1e2deb2694a5643d2066815688ff8fde26bfcd8acf3f8dd
SHA5121bcbbdd8de0a1725e8d1500b5ad4c743eacf1418b29093a0bd8f6866b07540282a4595bceb0c905bc01beca2f5bd69a859739e7211ae1c7b2419da3c228c455b
-
Filesize
410KB
MD54a99afd6ed76b99078df204b18a8b896
SHA1f31f5bc1af96226972ccb4f09f31e951bf8c8c50
SHA256ef798a02a3eb5140e2cf2f4a5cc1baa245c94df5a355e26fb5e1371f7f832473
SHA51279d7fe86efd6624e78af1bdd89713ccf1a0de364ce87a1b1faa904643d5efe003e2083134cd99f78dde26c4587cee6fa8fa02153cbd24a452c49a1e95d94c6d4
-
Filesize
410KB
MD54a99afd6ed76b99078df204b18a8b896
SHA1f31f5bc1af96226972ccb4f09f31e951bf8c8c50
SHA256ef798a02a3eb5140e2cf2f4a5cc1baa245c94df5a355e26fb5e1371f7f832473
SHA51279d7fe86efd6624e78af1bdd89713ccf1a0de364ce87a1b1faa904643d5efe003e2083134cd99f78dde26c4587cee6fa8fa02153cbd24a452c49a1e95d94c6d4