Analysis
-
max time kernel
115s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
04/03/2023, 04:18
Static task
static1
Behavioral task
behavioral1
Sample
0b42dbf4ad6f2335cbb958d3f8d559b8137ddb02512068e31bf81ba5f29b3e2d.exe
Resource
win10v2004-20230220-en
General
-
Target
0b42dbf4ad6f2335cbb958d3f8d559b8137ddb02512068e31bf81ba5f29b3e2d.exe
-
Size
659KB
-
MD5
67cb938e8c6968d283aae5cf5579abf2
-
SHA1
13cf1fbd45939ae9b4700ed58f27d0c3c17e222a
-
SHA256
0b42dbf4ad6f2335cbb958d3f8d559b8137ddb02512068e31bf81ba5f29b3e2d
-
SHA512
0f1e2e5e3ff47a5ff4ac66b4effb42d82955d8d7eecd82f4290964a418dedd99f883a8ee8e7a7edd85051e3577f2d1161229253cd4eb9b5f33edbe5c3bcd2471
-
SSDEEP
12288:bMrPy909C6bDU4Vw/7k/Boph/CEXR86qKDqCqjQZzx5voFMSrBK:IyqC684e/gOj/vePQzfwGSrY
Malware Config
Extracted
redline
rosto
hueref.eu:4162
-
auth_value
07d81eba8cad42bbd0ae60042d48eac6
Extracted
redline
foksa
hueref.eu:4162
-
auth_value
6a9b2601a21672b285de3ed41b5402e4
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" urZt48zh96.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" urZt48zh96.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" urZt48zh96.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection urZt48zh96.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" urZt48zh96.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" urZt48zh96.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/1808-188-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/1808-190-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/1808-192-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/1808-187-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/1808-194-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/1808-196-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/1808-198-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/1808-200-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/1808-202-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/1808-204-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/1808-206-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/1808-208-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/1808-210-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/1808-212-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/1808-214-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/1808-216-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/1808-218-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/1808-220-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/1808-1109-0x0000000004BD0000-0x0000000004BE0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3648 ycuN82Lg26.exe 2160 urZt48zh96.exe 1808 wrXx49Ci06.exe 1420 xudN52vd95.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features urZt48zh96.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" urZt48zh96.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0b42dbf4ad6f2335cbb958d3f8d559b8137ddb02512068e31bf81ba5f29b3e2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0b42dbf4ad6f2335cbb958d3f8d559b8137ddb02512068e31bf81ba5f29b3e2d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ycuN82Lg26.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ycuN82Lg26.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4488 2160 WerFault.exe 85 4640 1808 WerFault.exe 94 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2160 urZt48zh96.exe 2160 urZt48zh96.exe 1808 wrXx49Ci06.exe 1808 wrXx49Ci06.exe 1420 xudN52vd95.exe 1420 xudN52vd95.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2160 urZt48zh96.exe Token: SeDebugPrivilege 1808 wrXx49Ci06.exe Token: SeDebugPrivilege 1420 xudN52vd95.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3332 wrote to memory of 3648 3332 0b42dbf4ad6f2335cbb958d3f8d559b8137ddb02512068e31bf81ba5f29b3e2d.exe 84 PID 3332 wrote to memory of 3648 3332 0b42dbf4ad6f2335cbb958d3f8d559b8137ddb02512068e31bf81ba5f29b3e2d.exe 84 PID 3332 wrote to memory of 3648 3332 0b42dbf4ad6f2335cbb958d3f8d559b8137ddb02512068e31bf81ba5f29b3e2d.exe 84 PID 3648 wrote to memory of 2160 3648 ycuN82Lg26.exe 85 PID 3648 wrote to memory of 2160 3648 ycuN82Lg26.exe 85 PID 3648 wrote to memory of 2160 3648 ycuN82Lg26.exe 85 PID 3648 wrote to memory of 1808 3648 ycuN82Lg26.exe 94 PID 3648 wrote to memory of 1808 3648 ycuN82Lg26.exe 94 PID 3648 wrote to memory of 1808 3648 ycuN82Lg26.exe 94 PID 3332 wrote to memory of 1420 3332 0b42dbf4ad6f2335cbb958d3f8d559b8137ddb02512068e31bf81ba5f29b3e2d.exe 98 PID 3332 wrote to memory of 1420 3332 0b42dbf4ad6f2335cbb958d3f8d559b8137ddb02512068e31bf81ba5f29b3e2d.exe 98 PID 3332 wrote to memory of 1420 3332 0b42dbf4ad6f2335cbb958d3f8d559b8137ddb02512068e31bf81ba5f29b3e2d.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b42dbf4ad6f2335cbb958d3f8d559b8137ddb02512068e31bf81ba5f29b3e2d.exe"C:\Users\Admin\AppData\Local\Temp\0b42dbf4ad6f2335cbb958d3f8d559b8137ddb02512068e31bf81ba5f29b3e2d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycuN82Lg26.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycuN82Lg26.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urZt48zh96.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urZt48zh96.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2160 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2160 -s 10844⤵
- Program crash
PID:4488
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrXx49Ci06.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrXx49Ci06.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1808 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1808 -s 14124⤵
- Program crash
PID:4640
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xudN52vd95.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xudN52vd95.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2160 -ip 21601⤵PID:736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 1808 -ip 18081⤵PID:2472
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD575ced8ad0d8cd237ebc9cb7b00852651
SHA1adab63df3e0a40fd9f170ab57da66f01f226141c
SHA256a35a264162c124ffd066dd867ed96359131d37b243cb0445c1c9eba6a58de819
SHA512f565a49b14671683a1e48cece82a437a79bf8bdb456a3c6f35fac020e5fef3cd666399208633b7d2da9407f7b334a311a416b0a969c8b62ff28e15e7d4a0c431
-
Filesize
175KB
MD575ced8ad0d8cd237ebc9cb7b00852651
SHA1adab63df3e0a40fd9f170ab57da66f01f226141c
SHA256a35a264162c124ffd066dd867ed96359131d37b243cb0445c1c9eba6a58de819
SHA512f565a49b14671683a1e48cece82a437a79bf8bdb456a3c6f35fac020e5fef3cd666399208633b7d2da9407f7b334a311a416b0a969c8b62ff28e15e7d4a0c431
-
Filesize
514KB
MD55784aeb2dcc9811340111a36b17de8bd
SHA1bc515af1ffb051201a6e6b54a658578ab8e5f397
SHA2569f9328adb2e1d27d3e526b2b68e9da3d59b491764065e4b6d9c3aff154aa3ced
SHA512e2a7c9884febdaa32d735f2cf5b60a9e86937cc4284c0224c27cae12bee8cd9bbdb6487b8fc91b5e52cf1dfb1280a9032466180eff5ae46ead92b62a364eb4b9
-
Filesize
514KB
MD55784aeb2dcc9811340111a36b17de8bd
SHA1bc515af1ffb051201a6e6b54a658578ab8e5f397
SHA2569f9328adb2e1d27d3e526b2b68e9da3d59b491764065e4b6d9c3aff154aa3ced
SHA512e2a7c9884febdaa32d735f2cf5b60a9e86937cc4284c0224c27cae12bee8cd9bbdb6487b8fc91b5e52cf1dfb1280a9032466180eff5ae46ead92b62a364eb4b9
-
Filesize
232KB
MD5654d38a192aa90f8f2d4c64647ed64d1
SHA1366c844b2fc2b4c0b0191754d4a1470e1763ccb4
SHA25693f2d867562d5187beac7b8d7a55a8f435b7bbab77152b0c7bb3f8c22c2d23a2
SHA5129ce88068e0e4cfac55467fbccc2621bbe431353bf4faf6a0957a6ae38f083023fbd130abb423e35f344e4d3952aed8470eba47c3ab71ff7ec61ff5a79aa80303
-
Filesize
232KB
MD5654d38a192aa90f8f2d4c64647ed64d1
SHA1366c844b2fc2b4c0b0191754d4a1470e1763ccb4
SHA25693f2d867562d5187beac7b8d7a55a8f435b7bbab77152b0c7bb3f8c22c2d23a2
SHA5129ce88068e0e4cfac55467fbccc2621bbe431353bf4faf6a0957a6ae38f083023fbd130abb423e35f344e4d3952aed8470eba47c3ab71ff7ec61ff5a79aa80303
-
Filesize
289KB
MD51c795044102f7759152f7661b15c22bf
SHA166e3fee6ce5c4fd8974bb493b8ea7f63f0de4224
SHA2568f76de3f10a19e704eaaa544d8b0aea616b3b55e5e9d4f91afed3db0c60714a4
SHA5128c6313c1b71200f905a41b131ebb5a54f4057dd14fe062565674b4d86ebdb8ca2faf8655c970bb3ba279d34ea761c0d71d81c94f3fc9cec7dd2c49737b7653a1
-
Filesize
289KB
MD51c795044102f7759152f7661b15c22bf
SHA166e3fee6ce5c4fd8974bb493b8ea7f63f0de4224
SHA2568f76de3f10a19e704eaaa544d8b0aea616b3b55e5e9d4f91afed3db0c60714a4
SHA5128c6313c1b71200f905a41b131ebb5a54f4057dd14fe062565674b4d86ebdb8ca2faf8655c970bb3ba279d34ea761c0d71d81c94f3fc9cec7dd2c49737b7653a1