Analysis
-
max time kernel
87s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2023, 21:44
Static task
static1
Behavioral task
behavioral1
Sample
69b66440de0c45d9daf70f3cf21cd0df66e2d9b22b1665874a5c95f6b15f4c3a.exe
Resource
win10v2004-20230220-en
General
-
Target
69b66440de0c45d9daf70f3cf21cd0df66e2d9b22b1665874a5c95f6b15f4c3a.exe
-
Size
558KB
-
MD5
d49b1262701ef47a1d3d13a09a2a86f8
-
SHA1
f1fd6558f00c034701e7b63a2f68ba73c75d47cb
-
SHA256
69b66440de0c45d9daf70f3cf21cd0df66e2d9b22b1665874a5c95f6b15f4c3a
-
SHA512
a8a4ced93fe2aac8e02d50febea1ae06e9ce965de738d8bd4c0980044530bceafc68226c96aed5ce13a6f11d1cc12abfeab82740a529dd508495711db72abb04
-
SSDEEP
12288:iMr4y90LRjmRAO/uSTz6fRZVskz63dmN09X5QDWWKzrc+9zcAHpB:KyMRB1UzQRvsu6359X5QiWKL9gAJB
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Extracted
redline
misha
193.56.146.11:4173
-
auth_value
e17e441c954db214b94a603a7b0b1aea
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" s0779HJ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" s0779HJ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" s0779HJ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection s0779HJ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" s0779HJ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" s0779HJ.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 34 IoCs
resource yara_rule behavioral1/memory/3636-156-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/3636-157-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/3636-159-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/3636-161-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/3636-163-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/3636-165-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/3636-167-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/3636-169-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/3636-171-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/3636-173-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/3636-175-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/3636-177-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/3636-179-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/3636-181-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/3636-183-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/3636-185-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/3636-187-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/3636-189-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/3636-191-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/3636-193-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/3636-195-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/3636-197-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/3636-199-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/3636-201-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/3636-204-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/3636-207-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/3636-209-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/3636-211-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/3636-215-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/3636-217-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/3636-219-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/3636-213-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/3636-221-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/3636-1074-0x0000000002710000-0x0000000002720000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1480 vkkz2589jh.exe 4252 s0779HJ.exe 3636 t39kU80.exe 3696 uTunu70.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" s0779HJ.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vkkz2589jh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vkkz2589jh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 69b66440de0c45d9daf70f3cf21cd0df66e2d9b22b1665874a5c95f6b15f4c3a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 69b66440de0c45d9daf70f3cf21cd0df66e2d9b22b1665874a5c95f6b15f4c3a.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1200 3636 WerFault.exe 88 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4252 s0779HJ.exe 4252 s0779HJ.exe 3636 t39kU80.exe 3636 t39kU80.exe 3696 uTunu70.exe 3696 uTunu70.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4252 s0779HJ.exe Token: SeDebugPrivilege 3636 t39kU80.exe Token: SeDebugPrivilege 3696 uTunu70.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1028 wrote to memory of 1480 1028 69b66440de0c45d9daf70f3cf21cd0df66e2d9b22b1665874a5c95f6b15f4c3a.exe 84 PID 1028 wrote to memory of 1480 1028 69b66440de0c45d9daf70f3cf21cd0df66e2d9b22b1665874a5c95f6b15f4c3a.exe 84 PID 1028 wrote to memory of 1480 1028 69b66440de0c45d9daf70f3cf21cd0df66e2d9b22b1665874a5c95f6b15f4c3a.exe 84 PID 1480 wrote to memory of 4252 1480 vkkz2589jh.exe 85 PID 1480 wrote to memory of 4252 1480 vkkz2589jh.exe 85 PID 1480 wrote to memory of 3636 1480 vkkz2589jh.exe 88 PID 1480 wrote to memory of 3636 1480 vkkz2589jh.exe 88 PID 1480 wrote to memory of 3636 1480 vkkz2589jh.exe 88 PID 1028 wrote to memory of 3696 1028 69b66440de0c45d9daf70f3cf21cd0df66e2d9b22b1665874a5c95f6b15f4c3a.exe 94 PID 1028 wrote to memory of 3696 1028 69b66440de0c45d9daf70f3cf21cd0df66e2d9b22b1665874a5c95f6b15f4c3a.exe 94 PID 1028 wrote to memory of 3696 1028 69b66440de0c45d9daf70f3cf21cd0df66e2d9b22b1665874a5c95f6b15f4c3a.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\69b66440de0c45d9daf70f3cf21cd0df66e2d9b22b1665874a5c95f6b15f4c3a.exe"C:\Users\Admin\AppData\Local\Temp\69b66440de0c45d9daf70f3cf21cd0df66e2d9b22b1665874a5c95f6b15f4c3a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vkkz2589jh.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vkkz2589jh.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s0779HJ.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s0779HJ.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4252
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\t39kU80.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\t39kU80.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3636 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3636 -s 14884⤵
- Program crash
PID:1200
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uTunu70.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uTunu70.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3636 -ip 36361⤵PID:4404
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5fb6b1dfc1d31819df66b4eba004f4f1e
SHA18fb4085acc6bdac0c653130d20ccf87dc0a4bc16
SHA2564a8cf958110e605398244c588878680f5f367bf064573a69fded3f4ca70c7549
SHA512270f0208fac6330d413709de2f1aa348f20e434bb70b886a96e7db87f74607c9dcbee92b458ea375ca9d22a89af46b31655b84d6f26fac3d12e63f8242d41f3a
-
Filesize
175KB
MD5fb6b1dfc1d31819df66b4eba004f4f1e
SHA18fb4085acc6bdac0c653130d20ccf87dc0a4bc16
SHA2564a8cf958110e605398244c588878680f5f367bf064573a69fded3f4ca70c7549
SHA512270f0208fac6330d413709de2f1aa348f20e434bb70b886a96e7db87f74607c9dcbee92b458ea375ca9d22a89af46b31655b84d6f26fac3d12e63f8242d41f3a
-
Filesize
414KB
MD5ca62ce1dd1866229152bb96cee5c9220
SHA16948e006a0557559c6286d941e795a074168726b
SHA2567529633d37d4d238238ea779308722bc021011da4a496e89851c17cbdaf11bb8
SHA512f656d28e4e610a814bb5f6aaf3485ae55b2f96ba6a147b341e8f7c2fd5335dc1e97c2360715e75490c8e2ec7bd0b07f0a62b589c9ea3e554cb17176b4e22e2d4
-
Filesize
414KB
MD5ca62ce1dd1866229152bb96cee5c9220
SHA16948e006a0557559c6286d941e795a074168726b
SHA2567529633d37d4d238238ea779308722bc021011da4a496e89851c17cbdaf11bb8
SHA512f656d28e4e610a814bb5f6aaf3485ae55b2f96ba6a147b341e8f7c2fd5335dc1e97c2360715e75490c8e2ec7bd0b07f0a62b589c9ea3e554cb17176b4e22e2d4
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
391KB
MD5f4a3e231a550fb23f6ae4ca3b665867e
SHA195385ee65c82259f32afa57e615cbd5b6765814c
SHA256b0ee82f1c87220f31eff4098076aad767fd602006b8c661e53a5dc867152a5d0
SHA5126cf614308a733d14fff859a46b5d8d7f082f2c6f7a0314e78be8b0b413efda3a36aa3772514f837192d9a147466197f2f669718341e8fe998840d6f1724ba183
-
Filesize
391KB
MD5f4a3e231a550fb23f6ae4ca3b665867e
SHA195385ee65c82259f32afa57e615cbd5b6765814c
SHA256b0ee82f1c87220f31eff4098076aad767fd602006b8c661e53a5dc867152a5d0
SHA5126cf614308a733d14fff859a46b5d8d7f082f2c6f7a0314e78be8b0b413efda3a36aa3772514f837192d9a147466197f2f669718341e8fe998840d6f1724ba183