Analysis
-
max time kernel
54s -
max time network
56s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
04-03-2023 12:18
Static task
static1
Behavioral task
behavioral1
Sample
65dce176d4e7f52a9d719690ea5e68c7365e7c949869924f087d6e87deb5340d.exe
Resource
win10-20230220-en
General
-
Target
65dce176d4e7f52a9d719690ea5e68c7365e7c949869924f087d6e87deb5340d.exe
-
Size
660KB
-
MD5
60ce776eb5141138b8786ffac655e082
-
SHA1
4c1b83ed40154c40e49feb189108ea114693be06
-
SHA256
65dce176d4e7f52a9d719690ea5e68c7365e7c949869924f087d6e87deb5340d
-
SHA512
8448de3abac2560cc7e8f04b6974b64ca055d3c597dd67f37ba187e9f62303dde6c5491f6f36f2ef842769a22ca4cd7e9951b20a938b91e90768f08eb4b4f377
-
SSDEEP
12288:wMr0y90/1lAiSAdkg8n0EnAcpGOLmyrATD1viQcDp8E:UyAQmPotmysv1viQEz
Malware Config
Extracted
redline
rosto
hueref.eu:4162
-
auth_value
07d81eba8cad42bbd0ae60042d48eac6
Extracted
redline
foksa
hueref.eu:4162
-
auth_value
6a9b2601a21672b285de3ed41b5402e4
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" urcV54MY24.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" urcV54MY24.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" urcV54MY24.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" urcV54MY24.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" urcV54MY24.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2208-181-0x0000000002250000-0x0000000002296000-memory.dmp family_redline behavioral1/memory/2208-182-0x0000000002500000-0x0000000002544000-memory.dmp family_redline behavioral1/memory/2208-183-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/2208-184-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/2208-186-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/2208-188-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/2208-190-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/2208-192-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/2208-194-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/2208-196-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/2208-198-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/2208-200-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/2208-202-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/2208-204-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/2208-206-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/2208-208-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/2208-210-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/2208-212-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/2208-214-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/2208-216-0x0000000002500000-0x000000000253E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2404 ychM62qO82.exe 2560 urcV54MY24.exe 2208 wroo77oM72.exe 3584 xuON22RB30.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" urcV54MY24.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features urcV54MY24.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ychM62qO82.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ychM62qO82.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 65dce176d4e7f52a9d719690ea5e68c7365e7c949869924f087d6e87deb5340d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 65dce176d4e7f52a9d719690ea5e68c7365e7c949869924f087d6e87deb5340d.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2560 urcV54MY24.exe 2560 urcV54MY24.exe 2208 wroo77oM72.exe 2208 wroo77oM72.exe 3584 xuON22RB30.exe 3584 xuON22RB30.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2560 urcV54MY24.exe Token: SeDebugPrivilege 2208 wroo77oM72.exe Token: SeDebugPrivilege 3584 xuON22RB30.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1568 wrote to memory of 2404 1568 65dce176d4e7f52a9d719690ea5e68c7365e7c949869924f087d6e87deb5340d.exe 66 PID 1568 wrote to memory of 2404 1568 65dce176d4e7f52a9d719690ea5e68c7365e7c949869924f087d6e87deb5340d.exe 66 PID 1568 wrote to memory of 2404 1568 65dce176d4e7f52a9d719690ea5e68c7365e7c949869924f087d6e87deb5340d.exe 66 PID 2404 wrote to memory of 2560 2404 ychM62qO82.exe 67 PID 2404 wrote to memory of 2560 2404 ychM62qO82.exe 67 PID 2404 wrote to memory of 2560 2404 ychM62qO82.exe 67 PID 2404 wrote to memory of 2208 2404 ychM62qO82.exe 68 PID 2404 wrote to memory of 2208 2404 ychM62qO82.exe 68 PID 2404 wrote to memory of 2208 2404 ychM62qO82.exe 68 PID 1568 wrote to memory of 3584 1568 65dce176d4e7f52a9d719690ea5e68c7365e7c949869924f087d6e87deb5340d.exe 70 PID 1568 wrote to memory of 3584 1568 65dce176d4e7f52a9d719690ea5e68c7365e7c949869924f087d6e87deb5340d.exe 70 PID 1568 wrote to memory of 3584 1568 65dce176d4e7f52a9d719690ea5e68c7365e7c949869924f087d6e87deb5340d.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\65dce176d4e7f52a9d719690ea5e68c7365e7c949869924f087d6e87deb5340d.exe"C:\Users\Admin\AppData\Local\Temp\65dce176d4e7f52a9d719690ea5e68c7365e7c949869924f087d6e87deb5340d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ychM62qO82.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ychM62qO82.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urcV54MY24.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urcV54MY24.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2560
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wroo77oM72.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wroo77oM72.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2208
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuON22RB30.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuON22RB30.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3584
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD575ced8ad0d8cd237ebc9cb7b00852651
SHA1adab63df3e0a40fd9f170ab57da66f01f226141c
SHA256a35a264162c124ffd066dd867ed96359131d37b243cb0445c1c9eba6a58de819
SHA512f565a49b14671683a1e48cece82a437a79bf8bdb456a3c6f35fac020e5fef3cd666399208633b7d2da9407f7b334a311a416b0a969c8b62ff28e15e7d4a0c431
-
Filesize
175KB
MD575ced8ad0d8cd237ebc9cb7b00852651
SHA1adab63df3e0a40fd9f170ab57da66f01f226141c
SHA256a35a264162c124ffd066dd867ed96359131d37b243cb0445c1c9eba6a58de819
SHA512f565a49b14671683a1e48cece82a437a79bf8bdb456a3c6f35fac020e5fef3cd666399208633b7d2da9407f7b334a311a416b0a969c8b62ff28e15e7d4a0c431
-
Filesize
516KB
MD560bb9325db43f7d8f7b9873b0ec3d33c
SHA1b66409a43e058b0740edc89991dd45052d3197ab
SHA256030361a2ab6f03d409c734df95b1dbff3f253f9e85287b0ad98b69c0d50a3dd7
SHA512b92ea96f1a9eba67df2aa92ab7bddf40c4dd56da802e57bcd6820db3f45e08b114fed1760a8feaedea04aced67bf4cba5f92fa35d5be170506e1d9476741a074
-
Filesize
516KB
MD560bb9325db43f7d8f7b9873b0ec3d33c
SHA1b66409a43e058b0740edc89991dd45052d3197ab
SHA256030361a2ab6f03d409c734df95b1dbff3f253f9e85287b0ad98b69c0d50a3dd7
SHA512b92ea96f1a9eba67df2aa92ab7bddf40c4dd56da802e57bcd6820db3f45e08b114fed1760a8feaedea04aced67bf4cba5f92fa35d5be170506e1d9476741a074
-
Filesize
232KB
MD5fa0bf4034c0d1c31e46269512270b913
SHA1fe2cc134263ff123c8448a62bff83853a22a8298
SHA256115b1dd2d011b884f77b0d51c7093ef306649f3d3d78c4ee8b64822add6d944f
SHA512dd688e8d5b627a70b9d5b2a847a968f8189739c3a85ad5fe68d487a5cb59bc418a95d324ab53bfe08c1c7f7ad3845aa815ca59dd212071875e5e14099e2f6a53
-
Filesize
232KB
MD5fa0bf4034c0d1c31e46269512270b913
SHA1fe2cc134263ff123c8448a62bff83853a22a8298
SHA256115b1dd2d011b884f77b0d51c7093ef306649f3d3d78c4ee8b64822add6d944f
SHA512dd688e8d5b627a70b9d5b2a847a968f8189739c3a85ad5fe68d487a5cb59bc418a95d324ab53bfe08c1c7f7ad3845aa815ca59dd212071875e5e14099e2f6a53
-
Filesize
289KB
MD571a839f728f79ee4af543c5ec12771fb
SHA1f1503f9dc53c3e32ff7256d84d151f76cf601d5c
SHA256563fa95b6824faee24bef23daae68b191bbf5ec09941d90abad95f8999f195fb
SHA512b5a8fde95f70836adb284ed60fb56dcab939139f382c39a6aa4e54f859090330e99346ee27a663907f9e6b1a6bf9eb0e859da8aa92739f430f52e277fa13b6e9
-
Filesize
289KB
MD571a839f728f79ee4af543c5ec12771fb
SHA1f1503f9dc53c3e32ff7256d84d151f76cf601d5c
SHA256563fa95b6824faee24bef23daae68b191bbf5ec09941d90abad95f8999f195fb
SHA512b5a8fde95f70836adb284ed60fb56dcab939139f382c39a6aa4e54f859090330e99346ee27a663907f9e6b1a6bf9eb0e859da8aa92739f430f52e277fa13b6e9