Analysis
-
max time kernel
51s -
max time network
59s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
03-03-2023 17:02
Static task
static1
Behavioral task
behavioral1
Sample
0e2b70509cc4294b5fe8c60258465c13a64b3de2bc75de32e84000b055198c6d.exe
Resource
win10-20230220-en
General
-
Target
0e2b70509cc4294b5fe8c60258465c13a64b3de2bc75de32e84000b055198c6d.exe
-
Size
677KB
-
MD5
db18f21c2028c6c111d84212ee59d017
-
SHA1
882657c79da453e6360e423254c6e85ad64d2d82
-
SHA256
0e2b70509cc4294b5fe8c60258465c13a64b3de2bc75de32e84000b055198c6d
-
SHA512
ace3785c8d147d1853342dcd4db87e457077caecbc134185e312dea4239f740cc611790854514576c95a571556321ea5f4ee6107fd07c2432d664695516055ed
-
SSDEEP
12288:PMr0y90FcRHydJAn50bt11Lkmw/XdALRBJrLgjRuOSH7fP2Asd2rJ:PyuYSKQrtw6dTHYuDHbTsYrJ
Malware Config
Extracted
redline
rosto
hueref.eu:4162
-
auth_value
07d81eba8cad42bbd0ae60042d48eac6
Extracted
redline
foksa
hueref.eu:4162
-
auth_value
6a9b2601a21672b285de3ed41b5402e4
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" urOy29TU33.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" urOy29TU33.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" urOy29TU33.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" urOy29TU33.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" urOy29TU33.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 22 IoCs
resource yara_rule behavioral1/memory/4212-181-0x0000000004960000-0x00000000049A6000-memory.dmp family_redline behavioral1/memory/4212-182-0x0000000005040000-0x0000000005084000-memory.dmp family_redline behavioral1/memory/4212-183-0x0000000005040000-0x000000000507E000-memory.dmp family_redline behavioral1/memory/4212-184-0x0000000005040000-0x000000000507E000-memory.dmp family_redline behavioral1/memory/4212-186-0x0000000005040000-0x000000000507E000-memory.dmp family_redline behavioral1/memory/4212-188-0x0000000005040000-0x000000000507E000-memory.dmp family_redline behavioral1/memory/4212-190-0x0000000005040000-0x000000000507E000-memory.dmp family_redline behavioral1/memory/4212-192-0x0000000005040000-0x000000000507E000-memory.dmp family_redline behavioral1/memory/4212-194-0x0000000005040000-0x000000000507E000-memory.dmp family_redline behavioral1/memory/4212-196-0x0000000005040000-0x000000000507E000-memory.dmp family_redline behavioral1/memory/4212-198-0x0000000005040000-0x000000000507E000-memory.dmp family_redline behavioral1/memory/4212-200-0x0000000005040000-0x000000000507E000-memory.dmp family_redline behavioral1/memory/4212-202-0x0000000005040000-0x000000000507E000-memory.dmp family_redline behavioral1/memory/4212-204-0x0000000005040000-0x000000000507E000-memory.dmp family_redline behavioral1/memory/4212-206-0x0000000005040000-0x000000000507E000-memory.dmp family_redline behavioral1/memory/4212-208-0x0000000005040000-0x000000000507E000-memory.dmp family_redline behavioral1/memory/4212-210-0x0000000005040000-0x000000000507E000-memory.dmp family_redline behavioral1/memory/4212-212-0x0000000005040000-0x000000000507E000-memory.dmp family_redline behavioral1/memory/4212-214-0x0000000005040000-0x000000000507E000-memory.dmp family_redline behavioral1/memory/4212-217-0x0000000005040000-0x000000000507E000-memory.dmp family_redline behavioral1/memory/4212-224-0x00000000049F0000-0x0000000004A00000-memory.dmp family_redline behavioral1/memory/4212-1100-0x00000000049F0000-0x0000000004A00000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3316 ycxA90dK52.exe 2772 urOy29TU33.exe 4212 wrGB10kl77.exe 4804 xuKi16rf85.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features urOy29TU33.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" urOy29TU33.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ycxA90dK52.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0e2b70509cc4294b5fe8c60258465c13a64b3de2bc75de32e84000b055198c6d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0e2b70509cc4294b5fe8c60258465c13a64b3de2bc75de32e84000b055198c6d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ycxA90dK52.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2772 urOy29TU33.exe 2772 urOy29TU33.exe 4212 wrGB10kl77.exe 4212 wrGB10kl77.exe 4804 xuKi16rf85.exe 4804 xuKi16rf85.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2772 urOy29TU33.exe Token: SeDebugPrivilege 4212 wrGB10kl77.exe Token: SeDebugPrivilege 4804 xuKi16rf85.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4064 wrote to memory of 3316 4064 0e2b70509cc4294b5fe8c60258465c13a64b3de2bc75de32e84000b055198c6d.exe 66 PID 4064 wrote to memory of 3316 4064 0e2b70509cc4294b5fe8c60258465c13a64b3de2bc75de32e84000b055198c6d.exe 66 PID 4064 wrote to memory of 3316 4064 0e2b70509cc4294b5fe8c60258465c13a64b3de2bc75de32e84000b055198c6d.exe 66 PID 3316 wrote to memory of 2772 3316 ycxA90dK52.exe 67 PID 3316 wrote to memory of 2772 3316 ycxA90dK52.exe 67 PID 3316 wrote to memory of 2772 3316 ycxA90dK52.exe 67 PID 3316 wrote to memory of 4212 3316 ycxA90dK52.exe 68 PID 3316 wrote to memory of 4212 3316 ycxA90dK52.exe 68 PID 3316 wrote to memory of 4212 3316 ycxA90dK52.exe 68 PID 4064 wrote to memory of 4804 4064 0e2b70509cc4294b5fe8c60258465c13a64b3de2bc75de32e84000b055198c6d.exe 70 PID 4064 wrote to memory of 4804 4064 0e2b70509cc4294b5fe8c60258465c13a64b3de2bc75de32e84000b055198c6d.exe 70 PID 4064 wrote to memory of 4804 4064 0e2b70509cc4294b5fe8c60258465c13a64b3de2bc75de32e84000b055198c6d.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e2b70509cc4294b5fe8c60258465c13a64b3de2bc75de32e84000b055198c6d.exe"C:\Users\Admin\AppData\Local\Temp\0e2b70509cc4294b5fe8c60258465c13a64b3de2bc75de32e84000b055198c6d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycxA90dK52.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycxA90dK52.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urOy29TU33.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urOy29TU33.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrGB10kl77.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrGB10kl77.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4212
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuKi16rf85.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuKi16rf85.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4804
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD575ced8ad0d8cd237ebc9cb7b00852651
SHA1adab63df3e0a40fd9f170ab57da66f01f226141c
SHA256a35a264162c124ffd066dd867ed96359131d37b243cb0445c1c9eba6a58de819
SHA512f565a49b14671683a1e48cece82a437a79bf8bdb456a3c6f35fac020e5fef3cd666399208633b7d2da9407f7b334a311a416b0a969c8b62ff28e15e7d4a0c431
-
Filesize
175KB
MD575ced8ad0d8cd237ebc9cb7b00852651
SHA1adab63df3e0a40fd9f170ab57da66f01f226141c
SHA256a35a264162c124ffd066dd867ed96359131d37b243cb0445c1c9eba6a58de819
SHA512f565a49b14671683a1e48cece82a437a79bf8bdb456a3c6f35fac020e5fef3cd666399208633b7d2da9407f7b334a311a416b0a969c8b62ff28e15e7d4a0c431
-
Filesize
533KB
MD50700f702e4518d2558c7a81c3a8bf847
SHA1d386f2be847763b5fd221a6d7905187a5ba69b40
SHA2569c3e5f33caabb43ba820c7caccb59d5a94fef434ad8759a7958ed50cf960e823
SHA5128dd3dec6c167dd6b020a75045155f8515444786a286edf0f607dc887e8ea45a3ffd732012221d30d41105496b3a6d1b97470cf4f4fbef243d40971195ffb259e
-
Filesize
533KB
MD50700f702e4518d2558c7a81c3a8bf847
SHA1d386f2be847763b5fd221a6d7905187a5ba69b40
SHA2569c3e5f33caabb43ba820c7caccb59d5a94fef434ad8759a7958ed50cf960e823
SHA5128dd3dec6c167dd6b020a75045155f8515444786a286edf0f607dc887e8ea45a3ffd732012221d30d41105496b3a6d1b97470cf4f4fbef243d40971195ffb259e
-
Filesize
259KB
MD56bc8513cf7109e5ac11a3ce08bd4aa75
SHA1c3ac687b5f1622ede490ea7503900c5fa192fd25
SHA2565c740441af175fbb77d481aebd50b3598b387dabaf576e5607c0e5866f62c729
SHA512b6e62cdbb3bb1dfd09ddab7f2befdd8225c61e143adcd20a9f23e38992057e3cc89e08370a36f5f1a2c9162f3498d7d6dfe025e1c783efb75380760ecfa6ae0a
-
Filesize
259KB
MD56bc8513cf7109e5ac11a3ce08bd4aa75
SHA1c3ac687b5f1622ede490ea7503900c5fa192fd25
SHA2565c740441af175fbb77d481aebd50b3598b387dabaf576e5607c0e5866f62c729
SHA512b6e62cdbb3bb1dfd09ddab7f2befdd8225c61e143adcd20a9f23e38992057e3cc89e08370a36f5f1a2c9162f3498d7d6dfe025e1c783efb75380760ecfa6ae0a
-
Filesize
317KB
MD5951fa5356ac288731a279778680760cb
SHA1ec2e18c615f5818742d946582d64e32bb88dbfbb
SHA256f5f7055115e81907accaf5c574e871f2c009da8163df4d5930af1563f4f5b175
SHA512b8385866f94ab644ad455571866080250acb23cb1d19208ec58cf316524e0b6c419620622c0fe0591b1ff0e3ee5a8e50a39ed0bc4a792ba4b9b903b0ed83d1c4
-
Filesize
317KB
MD5951fa5356ac288731a279778680760cb
SHA1ec2e18c615f5818742d946582d64e32bb88dbfbb
SHA256f5f7055115e81907accaf5c574e871f2c009da8163df4d5930af1563f4f5b175
SHA512b8385866f94ab644ad455571866080250acb23cb1d19208ec58cf316524e0b6c419620622c0fe0591b1ff0e3ee5a8e50a39ed0bc4a792ba4b9b903b0ed83d1c4