Analysis
-
max time kernel
134s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2023, 22:41
Static task
static1
Behavioral task
behavioral1
Sample
6c87c9f560c0d4114e0f73d21f22247c8f5bd49b9ea5c2be8f8b98c904b063ea.exe
Resource
win10v2004-20230220-en
General
-
Target
6c87c9f560c0d4114e0f73d21f22247c8f5bd49b9ea5c2be8f8b98c904b063ea.exe
-
Size
818KB
-
MD5
7ec5f5743b582f9b3e8f9f15e274b817
-
SHA1
c5f9d1f8e0f0669b6cbc9a68779692b102aaae15
-
SHA256
6c87c9f560c0d4114e0f73d21f22247c8f5bd49b9ea5c2be8f8b98c904b063ea
-
SHA512
652fa7e95b7d6a787b6adcf15c44666e28fbf39d0874a7cd366a5e95c343b5ca3b1caa323999a660ee40a758a523ccbe1fe53e06e6a00aa194973082c413d83f
-
SSDEEP
24576:Ey7FE+A+PFyV9SCL3+vvdBZFDA4uXnkC:TBtpGSCL34jPDA4uX
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
relon
193.233.20.30:4125
-
auth_value
17da69809725577b595e217ba006b869
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" qu7009.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" qu7009.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" qu7009.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7973.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection qu7009.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7973.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7973.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7973.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" qu7009.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" qu7009.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection pro7973.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7973.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/2160-206-0x00000000029B0000-0x00000000029EE000-memory.dmp family_redline behavioral1/memory/2160-208-0x00000000029B0000-0x00000000029EE000-memory.dmp family_redline behavioral1/memory/2160-210-0x00000000029B0000-0x00000000029EE000-memory.dmp family_redline behavioral1/memory/2160-212-0x00000000029B0000-0x00000000029EE000-memory.dmp family_redline behavioral1/memory/2160-214-0x00000000029B0000-0x00000000029EE000-memory.dmp family_redline behavioral1/memory/2160-216-0x00000000029B0000-0x00000000029EE000-memory.dmp family_redline behavioral1/memory/2160-218-0x00000000029B0000-0x00000000029EE000-memory.dmp family_redline behavioral1/memory/2160-220-0x00000000029B0000-0x00000000029EE000-memory.dmp family_redline behavioral1/memory/2160-222-0x00000000029B0000-0x00000000029EE000-memory.dmp family_redline behavioral1/memory/2160-224-0x00000000029B0000-0x00000000029EE000-memory.dmp family_redline behavioral1/memory/2160-226-0x00000000029B0000-0x00000000029EE000-memory.dmp family_redline behavioral1/memory/2160-228-0x00000000029B0000-0x00000000029EE000-memory.dmp family_redline behavioral1/memory/2160-230-0x00000000029B0000-0x00000000029EE000-memory.dmp family_redline behavioral1/memory/2160-232-0x00000000029B0000-0x00000000029EE000-memory.dmp family_redline behavioral1/memory/2160-234-0x00000000029B0000-0x00000000029EE000-memory.dmp family_redline behavioral1/memory/2160-236-0x00000000029B0000-0x00000000029EE000-memory.dmp family_redline behavioral1/memory/2160-238-0x00000000029B0000-0x00000000029EE000-memory.dmp family_redline behavioral1/memory/2160-240-0x00000000029B0000-0x00000000029EE000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 3132 unio0750.exe 3488 unio1844.exe 2092 pro7973.exe 3860 qu7009.exe 2160 rtM87s48.exe 944 si852172.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7973.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features qu7009.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" qu7009.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce unio0750.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio0750.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce unio1844.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" unio1844.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6c87c9f560c0d4114e0f73d21f22247c8f5bd49b9ea5c2be8f8b98c904b063ea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6c87c9f560c0d4114e0f73d21f22247c8f5bd49b9ea5c2be8f8b98c904b063ea.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2648 sc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4228 3860 WerFault.exe 98 2520 2160 WerFault.exe 101 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2092 pro7973.exe 2092 pro7973.exe 3860 qu7009.exe 3860 qu7009.exe 2160 rtM87s48.exe 2160 rtM87s48.exe 944 si852172.exe 944 si852172.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2092 pro7973.exe Token: SeDebugPrivilege 3860 qu7009.exe Token: SeDebugPrivilege 2160 rtM87s48.exe Token: SeDebugPrivilege 944 si852172.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4340 wrote to memory of 3132 4340 6c87c9f560c0d4114e0f73d21f22247c8f5bd49b9ea5c2be8f8b98c904b063ea.exe 87 PID 4340 wrote to memory of 3132 4340 6c87c9f560c0d4114e0f73d21f22247c8f5bd49b9ea5c2be8f8b98c904b063ea.exe 87 PID 4340 wrote to memory of 3132 4340 6c87c9f560c0d4114e0f73d21f22247c8f5bd49b9ea5c2be8f8b98c904b063ea.exe 87 PID 3132 wrote to memory of 3488 3132 unio0750.exe 88 PID 3132 wrote to memory of 3488 3132 unio0750.exe 88 PID 3132 wrote to memory of 3488 3132 unio0750.exe 88 PID 3488 wrote to memory of 2092 3488 unio1844.exe 89 PID 3488 wrote to memory of 2092 3488 unio1844.exe 89 PID 3488 wrote to memory of 3860 3488 unio1844.exe 98 PID 3488 wrote to memory of 3860 3488 unio1844.exe 98 PID 3488 wrote to memory of 3860 3488 unio1844.exe 98 PID 3132 wrote to memory of 2160 3132 unio0750.exe 101 PID 3132 wrote to memory of 2160 3132 unio0750.exe 101 PID 3132 wrote to memory of 2160 3132 unio0750.exe 101 PID 4340 wrote to memory of 944 4340 6c87c9f560c0d4114e0f73d21f22247c8f5bd49b9ea5c2be8f8b98c904b063ea.exe 109 PID 4340 wrote to memory of 944 4340 6c87c9f560c0d4114e0f73d21f22247c8f5bd49b9ea5c2be8f8b98c904b063ea.exe 109 PID 4340 wrote to memory of 944 4340 6c87c9f560c0d4114e0f73d21f22247c8f5bd49b9ea5c2be8f8b98c904b063ea.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c87c9f560c0d4114e0f73d21f22247c8f5bd49b9ea5c2be8f8b98c904b063ea.exe"C:\Users\Admin\AppData\Local\Temp\6c87c9f560c0d4114e0f73d21f22247c8f5bd49b9ea5c2be8f8b98c904b063ea.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio0750.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio0750.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio1844.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio1844.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro7973.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro7973.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2092
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu7009.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu7009.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3860 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3860 -s 10845⤵
- Program crash
PID:4228
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rtM87s48.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rtM87s48.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2160 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2160 -s 18444⤵
- Program crash
PID:2520
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si852172.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si852172.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3860 -ip 38601⤵PID:2336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 2160 -ip 21601⤵PID:3944
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2648
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD56fbff2d7c9ba7f0a71f02a5c70df9dfc
SHA1003da0075734cd2d7f201c5b0e4779b8e1f33621
SHA256cb56407367a42f61993842b66bcd24993a30c87116313c26d6af9e37bbb1b6b3
SHA51225842b9df4767b16096f2bfcedc9d368a9696e6c6d9c7b2c75987769a5b338ae04b23b1e89f18eef2244e84f04e4acf6af56643a97abfe5b605f66cba0bac27f
-
Filesize
175KB
MD56fbff2d7c9ba7f0a71f02a5c70df9dfc
SHA1003da0075734cd2d7f201c5b0e4779b8e1f33621
SHA256cb56407367a42f61993842b66bcd24993a30c87116313c26d6af9e37bbb1b6b3
SHA51225842b9df4767b16096f2bfcedc9d368a9696e6c6d9c7b2c75987769a5b338ae04b23b1e89f18eef2244e84f04e4acf6af56643a97abfe5b605f66cba0bac27f
-
Filesize
677KB
MD5d126f873392c3ea819a57146177413e0
SHA1a5d26f42babc896d93404d030a836ab749244188
SHA256ed1d66ec728f5649a6de368dfbcbb3c3b40639fab2f9dd32159ac9d85de83f40
SHA5121d2fda0de2ecccb60b1c2b34909108091c9ae46eb91779bb3e3359d62221381309720405663f548f873812add0eab6db192d35ced26716e389c94c99140f7bf9
-
Filesize
677KB
MD5d126f873392c3ea819a57146177413e0
SHA1a5d26f42babc896d93404d030a836ab749244188
SHA256ed1d66ec728f5649a6de368dfbcbb3c3b40639fab2f9dd32159ac9d85de83f40
SHA5121d2fda0de2ecccb60b1c2b34909108091c9ae46eb91779bb3e3359d62221381309720405663f548f873812add0eab6db192d35ced26716e389c94c99140f7bf9
-
Filesize
349KB
MD5802285ce6a19bc1b63206707d051dc26
SHA14ddf6183aaf657df0aaa27529b4fc841cfbef3b0
SHA2560323ba402a99b0b9474d616c96c23e2fd1ca0b849dfc9ec62a4242aee3bf3323
SHA512cdc70d31d358bba36f3ecf89c2fc14a2613793e2c56ee0fc378a35b1361969670c0cb8c5b958d0d1291210c9541678effd8d5956d9a9adf701af2465dcf085a1
-
Filesize
349KB
MD5802285ce6a19bc1b63206707d051dc26
SHA14ddf6183aaf657df0aaa27529b4fc841cfbef3b0
SHA2560323ba402a99b0b9474d616c96c23e2fd1ca0b849dfc9ec62a4242aee3bf3323
SHA512cdc70d31d358bba36f3ecf89c2fc14a2613793e2c56ee0fc378a35b1361969670c0cb8c5b958d0d1291210c9541678effd8d5956d9a9adf701af2465dcf085a1
-
Filesize
334KB
MD552a1e68240f20d3db9ae2ad990bc268f
SHA17a3e4780b928e9fdaa44ea67614f676f9d6ff7f6
SHA256274343f64bb3b4a658f22ec85f77420e26836f7a4439296a6cc11110ef255cee
SHA512705c0a709c9b27506771ba2989023ec07f20b308cefb76521d25060ed72b332fb912774ace2f7c75123f959dcc86871f880c316912f7626c5807e3504a083ff3
-
Filesize
334KB
MD552a1e68240f20d3db9ae2ad990bc268f
SHA17a3e4780b928e9fdaa44ea67614f676f9d6ff7f6
SHA256274343f64bb3b4a658f22ec85f77420e26836f7a4439296a6cc11110ef255cee
SHA512705c0a709c9b27506771ba2989023ec07f20b308cefb76521d25060ed72b332fb912774ace2f7c75123f959dcc86871f880c316912f7626c5807e3504a083ff3
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
290KB
MD530f7b8e01851db66131c938387ed3014
SHA14d83b5085389dc1203a18c9fc293c214193e85aa
SHA256a9a969bd62e0e3efc29bad2d24309610f15787c9a7fc127f8e52f930d642c3ba
SHA512e83a5c1d90d8d7e5d0ca6d07d1c42e8ff8715556ec7f02883b147040b70a588b90ea8478bac660833442d953d58f499c59d4d6cd7eb6e7f090d6f4e36ed57ebd
-
Filesize
290KB
MD530f7b8e01851db66131c938387ed3014
SHA14d83b5085389dc1203a18c9fc293c214193e85aa
SHA256a9a969bd62e0e3efc29bad2d24309610f15787c9a7fc127f8e52f930d642c3ba
SHA512e83a5c1d90d8d7e5d0ca6d07d1c42e8ff8715556ec7f02883b147040b70a588b90ea8478bac660833442d953d58f499c59d4d6cd7eb6e7f090d6f4e36ed57ebd