Analysis
-
max time kernel
76s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03/03/2023, 16:06
Static task
static1
Behavioral task
behavioral1
Sample
07e92c8c45ffa4343ceae8b0280b3ff7ed725499d4861122b7fc9844c967c262.exe
Resource
win10v2004-20230220-en
General
-
Target
07e92c8c45ffa4343ceae8b0280b3ff7ed725499d4861122b7fc9844c967c262.exe
-
Size
546KB
-
MD5
536f12e577697f7b968c952b7d80dd42
-
SHA1
0807a8090b4c8dac7c0ea4ed7f5ff5f2c93ee75f
-
SHA256
07e92c8c45ffa4343ceae8b0280b3ff7ed725499d4861122b7fc9844c967c262
-
SHA512
b78a98a6c0409b432171f04d65773d07a2b8d25b01b8420acd7092a02049cc9e3df9b05ee54e0ef9ac5181e285a13b9e7795ef862e12bcb5e68e9a17d602b779
-
SSDEEP
6144:KIy+bnr+ep0yN90QEvigzJVVMIECI/+IMJBk76Qfy6ixaiw9PIdm9y3qfgs2i:kMr+y90FiEVVpCOksyz9gTafgsP
Malware Config
Extracted
redline
rosto
hueref.eu:4162
-
auth_value
07d81eba8cad42bbd0ae60042d48eac6
Extracted
redline
foksa
hueref.eu:4162
-
auth_value
6a9b2601a21672b285de3ed41b5402e4
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw02Mr76hd03.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw02Mr76hd03.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sw02Mr76hd03.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw02Mr76hd03.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw02Mr76hd03.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw02Mr76hd03.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/3832-154-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3832-155-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3832-157-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3832-159-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3832-161-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3832-163-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3832-167-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3832-169-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3832-173-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3832-175-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3832-181-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3832-179-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3832-184-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3832-187-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3832-197-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3832-201-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3832-213-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3832-217-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3832-215-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3832-219-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3832-221-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3832-211-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3832-209-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3832-207-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3832-205-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3832-203-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3832-199-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3832-195-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3832-193-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3832-191-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3832-177-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3832-171-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3832-165-0x0000000005250000-0x000000000528E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4008 vkjV7700WS.exe 2292 sw02Mr76hd03.exe 3832 tkxE66Kv56wd.exe 2316 upQu69aj73pl.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw02Mr76hd03.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 07e92c8c45ffa4343ceae8b0280b3ff7ed725499d4861122b7fc9844c967c262.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vkjV7700WS.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vkjV7700WS.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 07e92c8c45ffa4343ceae8b0280b3ff7ed725499d4861122b7fc9844c967c262.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4424 3832 WerFault.exe 97 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2292 sw02Mr76hd03.exe 2292 sw02Mr76hd03.exe 3832 tkxE66Kv56wd.exe 3832 tkxE66Kv56wd.exe 2316 upQu69aj73pl.exe 2316 upQu69aj73pl.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2292 sw02Mr76hd03.exe Token: SeDebugPrivilege 3832 tkxE66Kv56wd.exe Token: SeDebugPrivilege 2316 upQu69aj73pl.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2240 wrote to memory of 4008 2240 07e92c8c45ffa4343ceae8b0280b3ff7ed725499d4861122b7fc9844c967c262.exe 87 PID 2240 wrote to memory of 4008 2240 07e92c8c45ffa4343ceae8b0280b3ff7ed725499d4861122b7fc9844c967c262.exe 87 PID 2240 wrote to memory of 4008 2240 07e92c8c45ffa4343ceae8b0280b3ff7ed725499d4861122b7fc9844c967c262.exe 87 PID 4008 wrote to memory of 2292 4008 vkjV7700WS.exe 88 PID 4008 wrote to memory of 2292 4008 vkjV7700WS.exe 88 PID 4008 wrote to memory of 3832 4008 vkjV7700WS.exe 97 PID 4008 wrote to memory of 3832 4008 vkjV7700WS.exe 97 PID 4008 wrote to memory of 3832 4008 vkjV7700WS.exe 97 PID 2240 wrote to memory of 2316 2240 07e92c8c45ffa4343ceae8b0280b3ff7ed725499d4861122b7fc9844c967c262.exe 101 PID 2240 wrote to memory of 2316 2240 07e92c8c45ffa4343ceae8b0280b3ff7ed725499d4861122b7fc9844c967c262.exe 101 PID 2240 wrote to memory of 2316 2240 07e92c8c45ffa4343ceae8b0280b3ff7ed725499d4861122b7fc9844c967c262.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\07e92c8c45ffa4343ceae8b0280b3ff7ed725499d4861122b7fc9844c967c262.exe"C:\Users\Admin\AppData\Local\Temp\07e92c8c45ffa4343ceae8b0280b3ff7ed725499d4861122b7fc9844c967c262.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vkjV7700WS.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vkjV7700WS.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw02Mr76hd03.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw02Mr76hd03.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2292
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkxE66Kv56wd.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkxE66Kv56wd.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3832 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3832 -s 11044⤵
- Program crash
PID:4424
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\upQu69aj73pl.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\upQu69aj73pl.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3832 -ip 38321⤵PID:1464
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD575ced8ad0d8cd237ebc9cb7b00852651
SHA1adab63df3e0a40fd9f170ab57da66f01f226141c
SHA256a35a264162c124ffd066dd867ed96359131d37b243cb0445c1c9eba6a58de819
SHA512f565a49b14671683a1e48cece82a437a79bf8bdb456a3c6f35fac020e5fef3cd666399208633b7d2da9407f7b334a311a416b0a969c8b62ff28e15e7d4a0c431
-
Filesize
175KB
MD575ced8ad0d8cd237ebc9cb7b00852651
SHA1adab63df3e0a40fd9f170ab57da66f01f226141c
SHA256a35a264162c124ffd066dd867ed96359131d37b243cb0445c1c9eba6a58de819
SHA512f565a49b14671683a1e48cece82a437a79bf8bdb456a3c6f35fac020e5fef3cd666399208633b7d2da9407f7b334a311a416b0a969c8b62ff28e15e7d4a0c431
-
Filesize
401KB
MD5a73a1984af6cfc0910cfbafb9cddc513
SHA1b5982916d093c435641adac213e7f341f81400a5
SHA256affe46178c0a9d26adbb9a07ad67faa6f01f8e0c53c39767cee0d3376870969b
SHA51208f4275967c66324a82a13f7cbb6b60316aed369b39224cecdae3389f9a5d82d6bdd2bdcf59d88bab4e504660102afb0f675c31c4384fb3beae4b94ca14ba30d
-
Filesize
401KB
MD5a73a1984af6cfc0910cfbafb9cddc513
SHA1b5982916d093c435641adac213e7f341f81400a5
SHA256affe46178c0a9d26adbb9a07ad67faa6f01f8e0c53c39767cee0d3376870969b
SHA51208f4275967c66324a82a13f7cbb6b60316aed369b39224cecdae3389f9a5d82d6bdd2bdcf59d88bab4e504660102afb0f675c31c4384fb3beae4b94ca14ba30d
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
316KB
MD57a00ceb826fbe2eb80febf0cec1a6dbd
SHA121571e19e4a21aed87e0da8ef700266d9b5d894e
SHA256221bad9d41661911494519ff391c1df253e72f6cb06a17f3632508a43632ebff
SHA51270f9535e31ce84bd699a69843289a872fcbaf73fd312f198325d919c1a8ae3bbc17bc510c559d97eb96b4056dbe4e5052f2ad97d700112c9562c2fb737c28e4b
-
Filesize
316KB
MD57a00ceb826fbe2eb80febf0cec1a6dbd
SHA121571e19e4a21aed87e0da8ef700266d9b5d894e
SHA256221bad9d41661911494519ff391c1df253e72f6cb06a17f3632508a43632ebff
SHA51270f9535e31ce84bd699a69843289a872fcbaf73fd312f198325d919c1a8ae3bbc17bc510c559d97eb96b4056dbe4e5052f2ad97d700112c9562c2fb737c28e4b