Analysis
-
max time kernel
144s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2023, 22:19
Static task
static1
Behavioral task
behavioral1
Sample
68403e6036bfccca2b532e81514d14f5ffad7cb56bc3beb01518c2df74181655.exe
Resource
win10v2004-20230220-en
General
-
Target
68403e6036bfccca2b532e81514d14f5ffad7cb56bc3beb01518c2df74181655.exe
-
Size
725KB
-
MD5
ce7e7064a4e5e0f4b3ccacac9cf917fc
-
SHA1
4324a8540275110241518cc7353fe7f8b6bb61a4
-
SHA256
68403e6036bfccca2b532e81514d14f5ffad7cb56bc3beb01518c2df74181655
-
SHA512
a62253b763cc8c0fc3f70e350aa97e73fd662c2cb2496d3e0d67ede2ea75839d6b6383744e3ad8e6d4064121e668a8b5a3904ff862e85fd3a5c6144168c844ff
-
SSDEEP
12288:HMrQy90l09Mjx+LjtNwPaauJMtC3uFrh65mN0sX6QRWHqLRhnMPbbFXc:jysv+LZqNC3u6hsX6Q4KLRFgc
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Extracted
redline
misha
193.56.146.11:4173
-
auth_value
e17e441c954db214b94a603a7b0b1aea
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" r2958uk.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection r2958uk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" r2958uk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" r2958uk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" r2958uk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" r2958uk.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/3780-190-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3780-191-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3780-195-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3780-193-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3780-197-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3780-199-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3780-201-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3780-209-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3780-205-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3780-211-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3780-213-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3780-215-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3780-219-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3780-217-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3780-221-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3780-223-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3780-225-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/3780-227-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4904 ycoz3386fk.exe 2632 r2958uk.exe 3780 w67Sf28.exe 1756 xQHBD11.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features r2958uk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" r2958uk.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 68403e6036bfccca2b532e81514d14f5ffad7cb56bc3beb01518c2df74181655.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 68403e6036bfccca2b532e81514d14f5ffad7cb56bc3beb01518c2df74181655.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ycoz3386fk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ycoz3386fk.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4692 2632 WerFault.exe 86 2676 3780 WerFault.exe 94 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2632 r2958uk.exe 2632 r2958uk.exe 3780 w67Sf28.exe 3780 w67Sf28.exe 1756 xQHBD11.exe 1756 xQHBD11.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2632 r2958uk.exe Token: SeDebugPrivilege 3780 w67Sf28.exe Token: SeDebugPrivilege 1756 xQHBD11.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4824 wrote to memory of 4904 4824 68403e6036bfccca2b532e81514d14f5ffad7cb56bc3beb01518c2df74181655.exe 85 PID 4824 wrote to memory of 4904 4824 68403e6036bfccca2b532e81514d14f5ffad7cb56bc3beb01518c2df74181655.exe 85 PID 4824 wrote to memory of 4904 4824 68403e6036bfccca2b532e81514d14f5ffad7cb56bc3beb01518c2df74181655.exe 85 PID 4904 wrote to memory of 2632 4904 ycoz3386fk.exe 86 PID 4904 wrote to memory of 2632 4904 ycoz3386fk.exe 86 PID 4904 wrote to memory of 2632 4904 ycoz3386fk.exe 86 PID 4904 wrote to memory of 3780 4904 ycoz3386fk.exe 94 PID 4904 wrote to memory of 3780 4904 ycoz3386fk.exe 94 PID 4904 wrote to memory of 3780 4904 ycoz3386fk.exe 94 PID 4824 wrote to memory of 1756 4824 68403e6036bfccca2b532e81514d14f5ffad7cb56bc3beb01518c2df74181655.exe 100 PID 4824 wrote to memory of 1756 4824 68403e6036bfccca2b532e81514d14f5ffad7cb56bc3beb01518c2df74181655.exe 100 PID 4824 wrote to memory of 1756 4824 68403e6036bfccca2b532e81514d14f5ffad7cb56bc3beb01518c2df74181655.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\68403e6036bfccca2b532e81514d14f5ffad7cb56bc3beb01518c2df74181655.exe"C:\Users\Admin\AppData\Local\Temp\68403e6036bfccca2b532e81514d14f5ffad7cb56bc3beb01518c2df74181655.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycoz3386fk.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycoz3386fk.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r2958uk.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r2958uk.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2632 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2632 -s 10804⤵
- Program crash
PID:4692
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\w67Sf28.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\w67Sf28.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3780 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3780 -s 13284⤵
- Program crash
PID:2676
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xQHBD11.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xQHBD11.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2632 -ip 26321⤵PID:1380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3780 -ip 37801⤵PID:4812
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5fb6b1dfc1d31819df66b4eba004f4f1e
SHA18fb4085acc6bdac0c653130d20ccf87dc0a4bc16
SHA2564a8cf958110e605398244c588878680f5f367bf064573a69fded3f4ca70c7549
SHA512270f0208fac6330d413709de2f1aa348f20e434bb70b886a96e7db87f74607c9dcbee92b458ea375ca9d22a89af46b31655b84d6f26fac3d12e63f8242d41f3a
-
Filesize
175KB
MD5fb6b1dfc1d31819df66b4eba004f4f1e
SHA18fb4085acc6bdac0c653130d20ccf87dc0a4bc16
SHA2564a8cf958110e605398244c588878680f5f367bf064573a69fded3f4ca70c7549
SHA512270f0208fac6330d413709de2f1aa348f20e434bb70b886a96e7db87f74607c9dcbee92b458ea375ca9d22a89af46b31655b84d6f26fac3d12e63f8242d41f3a
-
Filesize
581KB
MD5b17c1f2c1591a87c75b2549b30b0d003
SHA1282acc79ae3dbe1b9a15b48651f33f2eb323be86
SHA2569fe533c222b90d5df41eb4e75cb80879a2f65b3ba03aa2e6987b5cda92b6b828
SHA512a5c938daf665b1775301748e40a650c7419109cf7eb2b7b9fa6a0fbd0678cc5b951fc493a8086852ff295e19f429d787a5f5d5ae3566386cf6812ebefc585138
-
Filesize
581KB
MD5b17c1f2c1591a87c75b2549b30b0d003
SHA1282acc79ae3dbe1b9a15b48651f33f2eb323be86
SHA2569fe533c222b90d5df41eb4e75cb80879a2f65b3ba03aa2e6987b5cda92b6b828
SHA512a5c938daf665b1775301748e40a650c7419109cf7eb2b7b9fa6a0fbd0678cc5b951fc493a8086852ff295e19f429d787a5f5d5ae3566386cf6812ebefc585138
-
Filesize
363KB
MD55f9106c1a4ae0150887ac3eadc521f31
SHA1b7c59f033e09829e70ebf380ef9c33aff98d2bf4
SHA256ddda2d12c18f4944b44af8c6bb030ae608060d087483c423acf217c4c4ed5411
SHA51280ab71ecb332f2316abf7cb73c4811bf2162c2e95fc0670fcd8d26370158e2b2f342328ece12e9edeed90a7568d24d0048bdb9ee3ea928fd80d1499851c5caf3
-
Filesize
363KB
MD55f9106c1a4ae0150887ac3eadc521f31
SHA1b7c59f033e09829e70ebf380ef9c33aff98d2bf4
SHA256ddda2d12c18f4944b44af8c6bb030ae608060d087483c423acf217c4c4ed5411
SHA51280ab71ecb332f2316abf7cb73c4811bf2162c2e95fc0670fcd8d26370158e2b2f342328ece12e9edeed90a7568d24d0048bdb9ee3ea928fd80d1499851c5caf3
-
Filesize
391KB
MD5f4a3e231a550fb23f6ae4ca3b665867e
SHA195385ee65c82259f32afa57e615cbd5b6765814c
SHA256b0ee82f1c87220f31eff4098076aad767fd602006b8c661e53a5dc867152a5d0
SHA5126cf614308a733d14fff859a46b5d8d7f082f2c6f7a0314e78be8b0b413efda3a36aa3772514f837192d9a147466197f2f669718341e8fe998840d6f1724ba183
-
Filesize
391KB
MD5f4a3e231a550fb23f6ae4ca3b665867e
SHA195385ee65c82259f32afa57e615cbd5b6765814c
SHA256b0ee82f1c87220f31eff4098076aad767fd602006b8c661e53a5dc867152a5d0
SHA5126cf614308a733d14fff859a46b5d8d7f082f2c6f7a0314e78be8b0b413efda3a36aa3772514f837192d9a147466197f2f669718341e8fe998840d6f1724ba183