Analysis
-
max time kernel
145s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-03-2023 20:05
Static task
static1
Behavioral task
behavioral1
Sample
62363718b42ebe8c284b89a7d773fa3dcca921c353c3873de1656fb229b07ce2.exe
Resource
win10v2004-20230220-en
General
-
Target
62363718b42ebe8c284b89a7d773fa3dcca921c353c3873de1656fb229b07ce2.exe
-
Size
658KB
-
MD5
4c74fc8bc1e64eed54d5a500882f718d
-
SHA1
e23b317e9d45bf3ee3c2128f416ef0b223b999ad
-
SHA256
62363718b42ebe8c284b89a7d773fa3dcca921c353c3873de1656fb229b07ce2
-
SHA512
a5968c0de83e464349ba53b184b4f95ac520759cb46194283b8a470113cd1d7ba7de20572a31553a3bf0aef70fae1172e505b264633bf751648170cc4b8df838
-
SSDEEP
12288:YMryy90qg2e3OcstkRT/NnWdWz3rrgpRJIqV5WqEH4:ay7gv3KtkT/trIpfRG4
Malware Config
Extracted
redline
rosto
hueref.eu:4162
-
auth_value
07d81eba8cad42bbd0ae60042d48eac6
Extracted
redline
foksa
hueref.eu:4162
-
auth_value
6a9b2601a21672b285de3ed41b5402e4
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" urNw29Xk46.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" urNw29Xk46.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" urNw29Xk46.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" urNw29Xk46.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection urNw29Xk46.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" urNw29Xk46.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/2404-190-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/2404-189-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/2404-192-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/2404-194-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/2404-196-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/2404-198-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/2404-200-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/2404-202-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/2404-204-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/2404-206-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/2404-208-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/2404-210-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/2404-212-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/2404-214-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/2404-216-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/2404-218-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/2404-220-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/2404-222-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/2404-1109-0x0000000004BA0000-0x0000000004BB0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2044 ycAc05UC30.exe 668 urNw29Xk46.exe 2404 wrdX54nG71.exe 1412 xuOG21Rw39.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features urNw29Xk46.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" urNw29Xk46.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 62363718b42ebe8c284b89a7d773fa3dcca921c353c3873de1656fb229b07ce2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 62363718b42ebe8c284b89a7d773fa3dcca921c353c3873de1656fb229b07ce2.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ycAc05UC30.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ycAc05UC30.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4176 668 WerFault.exe 86 220 2404 WerFault.exe 94 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 668 urNw29Xk46.exe 668 urNw29Xk46.exe 2404 wrdX54nG71.exe 2404 wrdX54nG71.exe 1412 xuOG21Rw39.exe 1412 xuOG21Rw39.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 668 urNw29Xk46.exe Token: SeDebugPrivilege 2404 wrdX54nG71.exe Token: SeDebugPrivilege 1412 xuOG21Rw39.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4940 wrote to memory of 2044 4940 62363718b42ebe8c284b89a7d773fa3dcca921c353c3873de1656fb229b07ce2.exe 85 PID 4940 wrote to memory of 2044 4940 62363718b42ebe8c284b89a7d773fa3dcca921c353c3873de1656fb229b07ce2.exe 85 PID 4940 wrote to memory of 2044 4940 62363718b42ebe8c284b89a7d773fa3dcca921c353c3873de1656fb229b07ce2.exe 85 PID 2044 wrote to memory of 668 2044 ycAc05UC30.exe 86 PID 2044 wrote to memory of 668 2044 ycAc05UC30.exe 86 PID 2044 wrote to memory of 668 2044 ycAc05UC30.exe 86 PID 2044 wrote to memory of 2404 2044 ycAc05UC30.exe 94 PID 2044 wrote to memory of 2404 2044 ycAc05UC30.exe 94 PID 2044 wrote to memory of 2404 2044 ycAc05UC30.exe 94 PID 4940 wrote to memory of 1412 4940 62363718b42ebe8c284b89a7d773fa3dcca921c353c3873de1656fb229b07ce2.exe 98 PID 4940 wrote to memory of 1412 4940 62363718b42ebe8c284b89a7d773fa3dcca921c353c3873de1656fb229b07ce2.exe 98 PID 4940 wrote to memory of 1412 4940 62363718b42ebe8c284b89a7d773fa3dcca921c353c3873de1656fb229b07ce2.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\62363718b42ebe8c284b89a7d773fa3dcca921c353c3873de1656fb229b07ce2.exe"C:\Users\Admin\AppData\Local\Temp\62363718b42ebe8c284b89a7d773fa3dcca921c353c3873de1656fb229b07ce2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycAc05UC30.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycAc05UC30.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urNw29Xk46.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urNw29Xk46.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:668 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 668 -s 10804⤵
- Program crash
PID:4176
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrdX54nG71.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrdX54nG71.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2404 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2404 -s 14084⤵
- Program crash
PID:220
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuOG21Rw39.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuOG21Rw39.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 668 -ip 6681⤵PID:1428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 2404 -ip 24041⤵PID:3852
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD575ced8ad0d8cd237ebc9cb7b00852651
SHA1adab63df3e0a40fd9f170ab57da66f01f226141c
SHA256a35a264162c124ffd066dd867ed96359131d37b243cb0445c1c9eba6a58de819
SHA512f565a49b14671683a1e48cece82a437a79bf8bdb456a3c6f35fac020e5fef3cd666399208633b7d2da9407f7b334a311a416b0a969c8b62ff28e15e7d4a0c431
-
Filesize
175KB
MD575ced8ad0d8cd237ebc9cb7b00852651
SHA1adab63df3e0a40fd9f170ab57da66f01f226141c
SHA256a35a264162c124ffd066dd867ed96359131d37b243cb0445c1c9eba6a58de819
SHA512f565a49b14671683a1e48cece82a437a79bf8bdb456a3c6f35fac020e5fef3cd666399208633b7d2da9407f7b334a311a416b0a969c8b62ff28e15e7d4a0c431
-
Filesize
513KB
MD592bc2f87d50f6b4d770e63fd5c195936
SHA1015ca07944abf111831c7451f5189fbe946df2d9
SHA2568b9c1ce117d11199a801f21d7d395f415ccd5c3cf31a4a34a161d7c211d2a169
SHA512063e77bd5783cd8c772ebb56483c996e3d0ce4cc2f1d5dcd94299e3ac3f1c72f3e10582543d66e681c9d0af4519588e7eeb345583adaa196461c41a96f0dd6bc
-
Filesize
513KB
MD592bc2f87d50f6b4d770e63fd5c195936
SHA1015ca07944abf111831c7451f5189fbe946df2d9
SHA2568b9c1ce117d11199a801f21d7d395f415ccd5c3cf31a4a34a161d7c211d2a169
SHA512063e77bd5783cd8c772ebb56483c996e3d0ce4cc2f1d5dcd94299e3ac3f1c72f3e10582543d66e681c9d0af4519588e7eeb345583adaa196461c41a96f0dd6bc
-
Filesize
231KB
MD522b881080c5443070fcb5bf47fd14536
SHA19a81a5c111385c1d3bde3e017a553c55b9e8f376
SHA25677d200f4afd1696760e4a0fd4f7ff8fbe2023789bbfb424b45a9805e50e3ea25
SHA5127dfa621e59c40f5535f8cbd4ad453873b73b6e070baa0148abfc7063e9b2bc56a2773abc3a58642f50d8bdcb35c6ead0e0505fd49fe7733e05763396d88bc0c3
-
Filesize
231KB
MD522b881080c5443070fcb5bf47fd14536
SHA19a81a5c111385c1d3bde3e017a553c55b9e8f376
SHA25677d200f4afd1696760e4a0fd4f7ff8fbe2023789bbfb424b45a9805e50e3ea25
SHA5127dfa621e59c40f5535f8cbd4ad453873b73b6e070baa0148abfc7063e9b2bc56a2773abc3a58642f50d8bdcb35c6ead0e0505fd49fe7733e05763396d88bc0c3
-
Filesize
289KB
MD5f719d70ebe5b666b482c91b61516218e
SHA161da23978f14b2ef38e7d14113172346145fe6ba
SHA256439904dbd91520dd5e82eb107d025d3f0e7a74e30f1e1743976c046d5b28e568
SHA512be894aa89bf97710e2eeb77425880a452abffebdc742c3426222aa433d558636398b36df659d6cea3eae614a1a5fc624da514f17074bcf8034039ddb1a12ee72
-
Filesize
289KB
MD5f719d70ebe5b666b482c91b61516218e
SHA161da23978f14b2ef38e7d14113172346145fe6ba
SHA256439904dbd91520dd5e82eb107d025d3f0e7a74e30f1e1743976c046d5b28e568
SHA512be894aa89bf97710e2eeb77425880a452abffebdc742c3426222aa433d558636398b36df659d6cea3eae614a1a5fc624da514f17074bcf8034039ddb1a12ee72