Analysis
-
max time kernel
79s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
03/03/2023, 06:11
Static task
static1
Behavioral task
behavioral1
Sample
dde64f7669c607d355386f46886a0bdf4b2af337355ba201121f8433dfb8a780.exe
Resource
win10v2004-20230221-en
General
-
Target
dde64f7669c607d355386f46886a0bdf4b2af337355ba201121f8433dfb8a780.exe
-
Size
538KB
-
MD5
9e3473013bb526f5e1d78fd99cdf0b08
-
SHA1
394eff0c8fadd58e9678cbba4bc263e38bf86469
-
SHA256
dde64f7669c607d355386f46886a0bdf4b2af337355ba201121f8433dfb8a780
-
SHA512
8593b60d6b3ab0b29636ee6625df7c80e7f6b1a07e1f9dcda31790d4e54f9da80bc0738e03a9a9b146f6392c80c7d37b1b2ed9c5e9b8a4f4854f9294100a7f93
-
SSDEEP
12288:4MrLy90u44oCQmIcpBCdo9PZ73z22yM5uNAe6z3at6b7rOg:Dyj442cb4ob7+wz306b2g
Malware Config
Extracted
redline
ruzhpe
pepunn.com:4162
-
auth_value
f735ced96ae8d01d0bd1d514240e54e0
Extracted
redline
fchan
pepunn.com:4162
-
auth_value
127bd53d55e8c4f0dd2f6e1ea60deef4
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw36iG79zy60.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw36iG79zy60.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw36iG79zy60.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw36iG79zy60.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sw36iG79zy60.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw36iG79zy60.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/380-158-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/380-159-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/380-161-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/380-163-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/380-165-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/380-167-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/380-169-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/380-171-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/380-173-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/380-175-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/380-177-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/380-179-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/380-181-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/380-183-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/380-185-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/380-187-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/380-189-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/380-191-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/380-193-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/380-195-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/380-197-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/380-199-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/380-201-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/380-203-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/380-205-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/380-207-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/380-209-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/380-211-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/380-213-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/380-215-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/380-217-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/380-219-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/380-221-0x0000000002740000-0x000000000277E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3588 vkHu6451Ph.exe 440 sw36iG79zy60.exe 380 tkmA96Zs15HD.exe 1856 upyz72er55UH.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw36iG79zy60.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dde64f7669c607d355386f46886a0bdf4b2af337355ba201121f8433dfb8a780.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" dde64f7669c607d355386f46886a0bdf4b2af337355ba201121f8433dfb8a780.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vkHu6451Ph.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vkHu6451Ph.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1520 380 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 440 sw36iG79zy60.exe 440 sw36iG79zy60.exe 380 tkmA96Zs15HD.exe 380 tkmA96Zs15HD.exe 1856 upyz72er55UH.exe 1856 upyz72er55UH.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 440 sw36iG79zy60.exe Token: SeDebugPrivilege 380 tkmA96Zs15HD.exe Token: SeDebugPrivilege 1856 upyz72er55UH.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 408 wrote to memory of 3588 408 dde64f7669c607d355386f46886a0bdf4b2af337355ba201121f8433dfb8a780.exe 86 PID 408 wrote to memory of 3588 408 dde64f7669c607d355386f46886a0bdf4b2af337355ba201121f8433dfb8a780.exe 86 PID 408 wrote to memory of 3588 408 dde64f7669c607d355386f46886a0bdf4b2af337355ba201121f8433dfb8a780.exe 86 PID 3588 wrote to memory of 440 3588 vkHu6451Ph.exe 87 PID 3588 wrote to memory of 440 3588 vkHu6451Ph.exe 87 PID 3588 wrote to memory of 380 3588 vkHu6451Ph.exe 92 PID 3588 wrote to memory of 380 3588 vkHu6451Ph.exe 92 PID 3588 wrote to memory of 380 3588 vkHu6451Ph.exe 92 PID 408 wrote to memory of 1856 408 dde64f7669c607d355386f46886a0bdf4b2af337355ba201121f8433dfb8a780.exe 97 PID 408 wrote to memory of 1856 408 dde64f7669c607d355386f46886a0bdf4b2af337355ba201121f8433dfb8a780.exe 97 PID 408 wrote to memory of 1856 408 dde64f7669c607d355386f46886a0bdf4b2af337355ba201121f8433dfb8a780.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\dde64f7669c607d355386f46886a0bdf4b2af337355ba201121f8433dfb8a780.exe"C:\Users\Admin\AppData\Local\Temp\dde64f7669c607d355386f46886a0bdf4b2af337355ba201121f8433dfb8a780.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vkHu6451Ph.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vkHu6451Ph.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw36iG79zy60.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw36iG79zy60.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:440
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkmA96Zs15HD.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkmA96Zs15HD.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:380 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 380 -s 20964⤵
- Program crash
PID:1520
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\upyz72er55UH.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\upyz72er55UH.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 380 -ip 3801⤵PID:4384
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5617af5e3d26db77b1029fcf44b9ac807
SHA116a59169abd39f71452acf63de839e6906153cb5
SHA2564b45a491c069c06309350a3de84cd17402dfc1d9ff76103e2f5cf0fcfe645f0d
SHA512a96639d53b3b00e7cb9cdfc92c1334e799bd59d9dacee6b0be0ea1d6c8792f5b3e3d62c3a7d93c6576d20ce994c20ae7c8b57df44b33ed9fb930995477a44a6c
-
Filesize
175KB
MD5617af5e3d26db77b1029fcf44b9ac807
SHA116a59169abd39f71452acf63de839e6906153cb5
SHA2564b45a491c069c06309350a3de84cd17402dfc1d9ff76103e2f5cf0fcfe645f0d
SHA512a96639d53b3b00e7cb9cdfc92c1334e799bd59d9dacee6b0be0ea1d6c8792f5b3e3d62c3a7d93c6576d20ce994c20ae7c8b57df44b33ed9fb930995477a44a6c
-
Filesize
393KB
MD5a47063c320c75d66af211fcabfbae7a0
SHA1880a0c843325901f47289fa14fa5c2f39896c84f
SHA2563a842fa06715a08ee324759bd1daecef7d5cffd46daa0486ded6b96bddb897b2
SHA5123ae331dbee082713c92702cb39aa59fec9cc61602a7f689451df4015699b0018dab3213004a61ce364b4b1b8e6bb77c8f7690dce01b5dca8fcfc3a7a98a26f68
-
Filesize
393KB
MD5a47063c320c75d66af211fcabfbae7a0
SHA1880a0c843325901f47289fa14fa5c2f39896c84f
SHA2563a842fa06715a08ee324759bd1daecef7d5cffd46daa0486ded6b96bddb897b2
SHA5123ae331dbee082713c92702cb39aa59fec9cc61602a7f689451df4015699b0018dab3213004a61ce364b4b1b8e6bb77c8f7690dce01b5dca8fcfc3a7a98a26f68
-
Filesize
18KB
MD5823e8c70d9f15dae9cb2721dd63e2a2d
SHA1cf7795e4533bd8475678b1c8413e5a4f5e0049e9
SHA256ff0bd3930782887615a28e199883100ee57feb6d5d9dbe0214dd98cc0d5a2685
SHA512c10d9e39a4004bb1ebb26f1680335eab22995549498ba9a4681b6c43a6036b58bafe1455cfd9b9223f7b62bb74840530ab307557d27231ff6caac47747eba8a4
-
Filesize
18KB
MD5823e8c70d9f15dae9cb2721dd63e2a2d
SHA1cf7795e4533bd8475678b1c8413e5a4f5e0049e9
SHA256ff0bd3930782887615a28e199883100ee57feb6d5d9dbe0214dd98cc0d5a2685
SHA512c10d9e39a4004bb1ebb26f1680335eab22995549498ba9a4681b6c43a6036b58bafe1455cfd9b9223f7b62bb74840530ab307557d27231ff6caac47747eba8a4
-
Filesize
309KB
MD5284f5cacca006d191a474f8c3eada4c1
SHA105ccc7b3be213f8543b80cd95e4cbd1aac6190dd
SHA25652e7f367705bf1ad2aed8f9ac8dde3a1c3cd7fc0bd64ae3a3d5a44be416c1341
SHA51226887be6f3f12322ca653e2ba5ee592d5dba31c09312c27d5d29b1d9832f84e42f19a4588787894792d26068dc029ab6abca08a02cc2651e3c8dfe75c41fe4ee
-
Filesize
309KB
MD5284f5cacca006d191a474f8c3eada4c1
SHA105ccc7b3be213f8543b80cd95e4cbd1aac6190dd
SHA25652e7f367705bf1ad2aed8f9ac8dde3a1c3cd7fc0bd64ae3a3d5a44be416c1341
SHA51226887be6f3f12322ca653e2ba5ee592d5dba31c09312c27d5d29b1d9832f84e42f19a4588787894792d26068dc029ab6abca08a02cc2651e3c8dfe75c41fe4ee