Analysis
-
max time kernel
146s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03/03/2023, 11:17
Static task
static1
Behavioral task
behavioral1
Sample
460e2adec1d0b10524e0543749e6aa620c145bdc3f66326e5894943c437563fc.exe
Resource
win10v2004-20230220-en
General
-
Target
460e2adec1d0b10524e0543749e6aa620c145bdc3f66326e5894943c437563fc.exe
-
Size
666KB
-
MD5
9c71f9bc24d6f5b82978c2c314bbf1fe
-
SHA1
0a1d0ebbd2f2db2e55cbe52ec89020938fcc0576
-
SHA256
460e2adec1d0b10524e0543749e6aa620c145bdc3f66326e5894943c437563fc
-
SHA512
ae03e4876d0d8be801a13b8b1c054706c18136fac151fcfb350e8c03d9ad300ab215c57c7d0e8a2eed5eceb0ccb1de5721efa9c4f7308d2ed607b48f8269b02b
-
SSDEEP
12288:+MrNy9063w+cF1WFcie3lj0NiCpgOOfUyMan9jPN+SRVrn5Z6ozXIW:LyLw+WWXCfUyManlPNlRt5ZnXL
Malware Config
Extracted
redline
rosto
hueref.eu:4162
-
auth_value
07d81eba8cad42bbd0ae60042d48eac6
Extracted
redline
flurs
hueref.eu:4162
-
auth_value
967190a484bd63836957d2fa7d601592
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection uroq78Lc25.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" uroq78Lc25.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" uroq78Lc25.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" uroq78Lc25.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" uroq78Lc25.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" uroq78Lc25.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/4376-192-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/4376-193-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/4376-195-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/4376-197-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/4376-199-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/4376-201-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/4376-203-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/4376-205-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/4376-207-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/4376-209-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/4376-211-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/4376-213-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/4376-215-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/4376-219-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/4376-217-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/4376-221-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/4376-223-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/4376-225-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/4376-398-0x00000000025F0000-0x0000000002600000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2764 ycBL02lU73.exe 536 uroq78Lc25.exe 4376 wraU53Th36.exe 2748 xuqd85Vu48.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" uroq78Lc25.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features uroq78Lc25.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 460e2adec1d0b10524e0543749e6aa620c145bdc3f66326e5894943c437563fc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 460e2adec1d0b10524e0543749e6aa620c145bdc3f66326e5894943c437563fc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ycBL02lU73.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ycBL02lU73.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3784 536 WerFault.exe 86 4452 4376 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 536 uroq78Lc25.exe 536 uroq78Lc25.exe 4376 wraU53Th36.exe 4376 wraU53Th36.exe 2748 xuqd85Vu48.exe 2748 xuqd85Vu48.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 536 uroq78Lc25.exe Token: SeDebugPrivilege 4376 wraU53Th36.exe Token: SeDebugPrivilege 2748 xuqd85Vu48.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3112 wrote to memory of 2764 3112 460e2adec1d0b10524e0543749e6aa620c145bdc3f66326e5894943c437563fc.exe 85 PID 3112 wrote to memory of 2764 3112 460e2adec1d0b10524e0543749e6aa620c145bdc3f66326e5894943c437563fc.exe 85 PID 3112 wrote to memory of 2764 3112 460e2adec1d0b10524e0543749e6aa620c145bdc3f66326e5894943c437563fc.exe 85 PID 2764 wrote to memory of 536 2764 ycBL02lU73.exe 86 PID 2764 wrote to memory of 536 2764 ycBL02lU73.exe 86 PID 2764 wrote to memory of 536 2764 ycBL02lU73.exe 86 PID 2764 wrote to memory of 4376 2764 ycBL02lU73.exe 92 PID 2764 wrote to memory of 4376 2764 ycBL02lU73.exe 92 PID 2764 wrote to memory of 4376 2764 ycBL02lU73.exe 92 PID 3112 wrote to memory of 2748 3112 460e2adec1d0b10524e0543749e6aa620c145bdc3f66326e5894943c437563fc.exe 96 PID 3112 wrote to memory of 2748 3112 460e2adec1d0b10524e0543749e6aa620c145bdc3f66326e5894943c437563fc.exe 96 PID 3112 wrote to memory of 2748 3112 460e2adec1d0b10524e0543749e6aa620c145bdc3f66326e5894943c437563fc.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\460e2adec1d0b10524e0543749e6aa620c145bdc3f66326e5894943c437563fc.exe"C:\Users\Admin\AppData\Local\Temp\460e2adec1d0b10524e0543749e6aa620c145bdc3f66326e5894943c437563fc.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycBL02lU73.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycBL02lU73.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\uroq78Lc25.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\uroq78Lc25.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:536 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 536 -s 10884⤵
- Program crash
PID:3784
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wraU53Th36.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wraU53Th36.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4376 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 17644⤵
- Program crash
PID:4452
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuqd85Vu48.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuqd85Vu48.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 536 -ip 5361⤵PID:2696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4376 -ip 43761⤵PID:5040
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5ed419025a3febe67f67069f64dcc0c5e
SHA177f330625acb6ac63853ce88efabcfc356fea8f6
SHA2561d9f4fd59f09f34c493f3eb59ac87b025cc383a2e3ed67c679b976b305342331
SHA5122c91001f23b4e1b62357dc2d5a79aead9591f0f6b2bf72e5b30883c8b571c485f2d6e5ef406e5afed6332705eea3e75a82d36175a014e8eb0d3064c2888b35b9
-
Filesize
175KB
MD5ed419025a3febe67f67069f64dcc0c5e
SHA177f330625acb6ac63853ce88efabcfc356fea8f6
SHA2561d9f4fd59f09f34c493f3eb59ac87b025cc383a2e3ed67c679b976b305342331
SHA5122c91001f23b4e1b62357dc2d5a79aead9591f0f6b2bf72e5b30883c8b571c485f2d6e5ef406e5afed6332705eea3e75a82d36175a014e8eb0d3064c2888b35b9
-
Filesize
521KB
MD50b124a0ee77a1f20ff77df640d8bab30
SHA15122ef897543ec05161995c4ba19874d2005e8c4
SHA2565f62dd2882322211e4f5caf5f3de21ed28adb0da672df173de23d122f8bb0c50
SHA512b88a74f0380d6f6f4d604ea72cc891d08ae212168e0b4180afa5224785967f1e2657ff19bf285486b44c96028417f6243b7c1c6565d637462e168b5322d029f5
-
Filesize
521KB
MD50b124a0ee77a1f20ff77df640d8bab30
SHA15122ef897543ec05161995c4ba19874d2005e8c4
SHA2565f62dd2882322211e4f5caf5f3de21ed28adb0da672df173de23d122f8bb0c50
SHA512b88a74f0380d6f6f4d604ea72cc891d08ae212168e0b4180afa5224785967f1e2657ff19bf285486b44c96028417f6243b7c1c6565d637462e168b5322d029f5
-
Filesize
250KB
MD57d616b2fa3e262248f4e34021778ad77
SHA1b67a64fd07cf0f4c44b9724db8e15d390a0ec36c
SHA256e361ed92225d29a137aab7345679de1deb38868ccbe8487e03d57feaed29be65
SHA5120aa65a5ebc11acea74036e7e0ea0432b695cdd97634ba9834752701c9fb92ab7ad2f2eb0f2332ad0fad304f720fe180d145c3e630d718ddc98214be08f6673b1
-
Filesize
250KB
MD57d616b2fa3e262248f4e34021778ad77
SHA1b67a64fd07cf0f4c44b9724db8e15d390a0ec36c
SHA256e361ed92225d29a137aab7345679de1deb38868ccbe8487e03d57feaed29be65
SHA5120aa65a5ebc11acea74036e7e0ea0432b695cdd97634ba9834752701c9fb92ab7ad2f2eb0f2332ad0fad304f720fe180d145c3e630d718ddc98214be08f6673b1
-
Filesize
308KB
MD5c08ea92c1d03fb367226765e9271415b
SHA1a7446c05eb491cbaeb1d528f96b4d6ba70017c2a
SHA2565687174289cc28ecf2025e0aec313a18151361200f818a8e6d83123e4ad40388
SHA512a975c487c656bd35704a3a2da42c2cae28aa72c234295ffc4d4c87f2aa4f05889bc5bed1d6e41c4b5c7390808cc0fae7241577cbf538694eb0167de089400a1d
-
Filesize
308KB
MD5c08ea92c1d03fb367226765e9271415b
SHA1a7446c05eb491cbaeb1d528f96b4d6ba70017c2a
SHA2565687174289cc28ecf2025e0aec313a18151361200f818a8e6d83123e4ad40388
SHA512a975c487c656bd35704a3a2da42c2cae28aa72c234295ffc4d4c87f2aa4f05889bc5bed1d6e41c4b5c7390808cc0fae7241577cbf538694eb0167de089400a1d