Analysis
-
max time kernel
77s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07-03-2023 20:15
Static task
static1
Behavioral task
behavioral1
Sample
69251087e7ae9058555a5192e007bafb6f4ae9a063c3a2f369616eec2e2f7fc6.exe
Resource
win10v2004-20230220-en
General
-
Target
69251087e7ae9058555a5192e007bafb6f4ae9a063c3a2f369616eec2e2f7fc6.exe
-
Size
718KB
-
MD5
6e9c206e5b21672cd61f18f8873d5649
-
SHA1
891b505f1524498d450c221ea6696715ae3eb97e
-
SHA256
69251087e7ae9058555a5192e007bafb6f4ae9a063c3a2f369616eec2e2f7fc6
-
SHA512
2008086300a90663823ef7a001757587867afa279a12c5798a7a31f8727d554973615efdf7abf171fd5af998362514c69f8c98e87e5078d75af7e0c720b7e39d
-
SSDEEP
12288:lMrQy90LxdkVzKZzRd7daa6zMbH4J+69bQKPNQUG9KNPRcO+A:ByOxxzR9dHHL3KPNQn9KNZp+A
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Extracted
redline
misha
193.56.146.11:4173
-
auth_value
e17e441c954db214b94a603a7b0b1aea
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" r5437Mh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" r5437Mh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" r5437Mh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" r5437Mh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" r5437Mh.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection r5437Mh.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/4280-192-0x0000000004A80000-0x0000000004ABE000-memory.dmp family_redline behavioral1/memory/4280-191-0x0000000004A80000-0x0000000004ABE000-memory.dmp family_redline behavioral1/memory/4280-194-0x0000000004A80000-0x0000000004ABE000-memory.dmp family_redline behavioral1/memory/4280-196-0x0000000004A80000-0x0000000004ABE000-memory.dmp family_redline behavioral1/memory/4280-198-0x0000000004A80000-0x0000000004ABE000-memory.dmp family_redline behavioral1/memory/4280-200-0x0000000004A80000-0x0000000004ABE000-memory.dmp family_redline behavioral1/memory/4280-210-0x0000000004A80000-0x0000000004ABE000-memory.dmp family_redline behavioral1/memory/4280-218-0x0000000004A80000-0x0000000004ABE000-memory.dmp family_redline behavioral1/memory/4280-216-0x0000000004A80000-0x0000000004ABE000-memory.dmp family_redline behavioral1/memory/4280-214-0x0000000004A80000-0x0000000004ABE000-memory.dmp family_redline behavioral1/memory/4280-212-0x0000000004A80000-0x0000000004ABE000-memory.dmp family_redline behavioral1/memory/4280-208-0x0000000004A80000-0x0000000004ABE000-memory.dmp family_redline behavioral1/memory/4280-206-0x0000000004A80000-0x0000000004ABE000-memory.dmp family_redline behavioral1/memory/4280-204-0x0000000004A80000-0x0000000004ABE000-memory.dmp family_redline behavioral1/memory/4280-202-0x0000000004A80000-0x0000000004ABE000-memory.dmp family_redline behavioral1/memory/4280-220-0x0000000004A80000-0x0000000004ABE000-memory.dmp family_redline behavioral1/memory/4280-222-0x0000000004A80000-0x0000000004ABE000-memory.dmp family_redline behavioral1/memory/4280-224-0x0000000004A80000-0x0000000004ABE000-memory.dmp family_redline behavioral1/memory/4280-1107-0x0000000004BD0000-0x0000000004BE0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1900 ycCK5133mT.exe 1872 r5437Mh.exe 4280 w43tL19.exe 3856 xQsmJ67.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features r5437Mh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" r5437Mh.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ycCK5133mT.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 69251087e7ae9058555a5192e007bafb6f4ae9a063c3a2f369616eec2e2f7fc6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 69251087e7ae9058555a5192e007bafb6f4ae9a063c3a2f369616eec2e2f7fc6.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ycCK5133mT.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3108 1872 WerFault.exe 88 3532 4280 WerFault.exe 99 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1872 r5437Mh.exe 1872 r5437Mh.exe 4280 w43tL19.exe 4280 w43tL19.exe 3856 xQsmJ67.exe 3856 xQsmJ67.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1872 r5437Mh.exe Token: SeDebugPrivilege 4280 w43tL19.exe Token: SeDebugPrivilege 3856 xQsmJ67.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1416 wrote to memory of 1900 1416 69251087e7ae9058555a5192e007bafb6f4ae9a063c3a2f369616eec2e2f7fc6.exe 87 PID 1416 wrote to memory of 1900 1416 69251087e7ae9058555a5192e007bafb6f4ae9a063c3a2f369616eec2e2f7fc6.exe 87 PID 1416 wrote to memory of 1900 1416 69251087e7ae9058555a5192e007bafb6f4ae9a063c3a2f369616eec2e2f7fc6.exe 87 PID 1900 wrote to memory of 1872 1900 ycCK5133mT.exe 88 PID 1900 wrote to memory of 1872 1900 ycCK5133mT.exe 88 PID 1900 wrote to memory of 1872 1900 ycCK5133mT.exe 88 PID 1900 wrote to memory of 4280 1900 ycCK5133mT.exe 99 PID 1900 wrote to memory of 4280 1900 ycCK5133mT.exe 99 PID 1900 wrote to memory of 4280 1900 ycCK5133mT.exe 99 PID 1416 wrote to memory of 3856 1416 69251087e7ae9058555a5192e007bafb6f4ae9a063c3a2f369616eec2e2f7fc6.exe 103 PID 1416 wrote to memory of 3856 1416 69251087e7ae9058555a5192e007bafb6f4ae9a063c3a2f369616eec2e2f7fc6.exe 103 PID 1416 wrote to memory of 3856 1416 69251087e7ae9058555a5192e007bafb6f4ae9a063c3a2f369616eec2e2f7fc6.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\69251087e7ae9058555a5192e007bafb6f4ae9a063c3a2f369616eec2e2f7fc6.exe"C:\Users\Admin\AppData\Local\Temp\69251087e7ae9058555a5192e007bafb6f4ae9a063c3a2f369616eec2e2f7fc6.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycCK5133mT.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycCK5133mT.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5437Mh.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5437Mh.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1872 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1872 -s 11004⤵
- Program crash
PID:3108
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\w43tL19.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\w43tL19.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4280 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4280 -s 11324⤵
- Program crash
PID:3532
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xQsmJ67.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xQsmJ67.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1872 -ip 18721⤵PID:2812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4280 -ip 42801⤵PID:1052
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5fb6b1dfc1d31819df66b4eba004f4f1e
SHA18fb4085acc6bdac0c653130d20ccf87dc0a4bc16
SHA2564a8cf958110e605398244c588878680f5f367bf064573a69fded3f4ca70c7549
SHA512270f0208fac6330d413709de2f1aa348f20e434bb70b886a96e7db87f74607c9dcbee92b458ea375ca9d22a89af46b31655b84d6f26fac3d12e63f8242d41f3a
-
Filesize
175KB
MD5fb6b1dfc1d31819df66b4eba004f4f1e
SHA18fb4085acc6bdac0c653130d20ccf87dc0a4bc16
SHA2564a8cf958110e605398244c588878680f5f367bf064573a69fded3f4ca70c7549
SHA512270f0208fac6330d413709de2f1aa348f20e434bb70b886a96e7db87f74607c9dcbee92b458ea375ca9d22a89af46b31655b84d6f26fac3d12e63f8242d41f3a
-
Filesize
573KB
MD5ee4179c77b8a92d208784d47961d55e5
SHA185473fa1098bc4aed7eab6b7fbdf66a3f59553cb
SHA2568ca133a10114efaa2f3b875abd4f9c618fe51540b5eeb1453b2513f9796f047e
SHA5122d1c5a2d5f35661900742b8d087074a215bffe4067bdda999085d44c4dce8e4b7bb883ca9a95b926f12a7876b71a3313db4727584c6aa5e86c25f600c7d8ad04
-
Filesize
573KB
MD5ee4179c77b8a92d208784d47961d55e5
SHA185473fa1098bc4aed7eab6b7fbdf66a3f59553cb
SHA2568ca133a10114efaa2f3b875abd4f9c618fe51540b5eeb1453b2513f9796f047e
SHA5122d1c5a2d5f35661900742b8d087074a215bffe4067bdda999085d44c4dce8e4b7bb883ca9a95b926f12a7876b71a3313db4727584c6aa5e86c25f600c7d8ad04
-
Filesize
363KB
MD55f9106c1a4ae0150887ac3eadc521f31
SHA1b7c59f033e09829e70ebf380ef9c33aff98d2bf4
SHA256ddda2d12c18f4944b44af8c6bb030ae608060d087483c423acf217c4c4ed5411
SHA51280ab71ecb332f2316abf7cb73c4811bf2162c2e95fc0670fcd8d26370158e2b2f342328ece12e9edeed90a7568d24d0048bdb9ee3ea928fd80d1499851c5caf3
-
Filesize
363KB
MD55f9106c1a4ae0150887ac3eadc521f31
SHA1b7c59f033e09829e70ebf380ef9c33aff98d2bf4
SHA256ddda2d12c18f4944b44af8c6bb030ae608060d087483c423acf217c4c4ed5411
SHA51280ab71ecb332f2316abf7cb73c4811bf2162c2e95fc0670fcd8d26370158e2b2f342328ece12e9edeed90a7568d24d0048bdb9ee3ea928fd80d1499851c5caf3
-
Filesize
365KB
MD530233f3be2afb48253fb402f9794c9e4
SHA1277ba030691956811a1391ee9f837c2cbeac5ed3
SHA256639a58787c4cc8cf575939fb71085a928658fcb8d04edf4225d90dc2c6e3586f
SHA512cbf3b295e1bb055353e57973b0ddcde8056385d18bc7eac01da9d6fb396c1114467210f06ba5460835be8d568ee1ba048e408be073bb04e1d9ea638e37904898
-
Filesize
365KB
MD530233f3be2afb48253fb402f9794c9e4
SHA1277ba030691956811a1391ee9f837c2cbeac5ed3
SHA256639a58787c4cc8cf575939fb71085a928658fcb8d04edf4225d90dc2c6e3586f
SHA512cbf3b295e1bb055353e57973b0ddcde8056385d18bc7eac01da9d6fb396c1114467210f06ba5460835be8d568ee1ba048e408be073bb04e1d9ea638e37904898