Analysis
-
max time kernel
84s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2023, 23:50
Static task
static1
Behavioral task
behavioral1
Sample
fca5999f3e50c945d43a6467a03afe2b6a594d02c21c8f3ed7e4edba1b60fcc5.exe
Resource
win10v2004-20230220-en
General
-
Target
fca5999f3e50c945d43a6467a03afe2b6a594d02c21c8f3ed7e4edba1b60fcc5.exe
-
Size
819KB
-
MD5
9f4ee426fb2d5f5a494ea7706638c1e1
-
SHA1
61c129e0eff5e1098ff4a0deaf73f3d986b9af7c
-
SHA256
fca5999f3e50c945d43a6467a03afe2b6a594d02c21c8f3ed7e4edba1b60fcc5
-
SHA512
bd52fb463aad5fc0f904c2761e0240f77775da94ccc7c10a8e15e120b6763f7c4b69e5105128870d183a161bc3303f510676cf35dbacfbecb1696e158607bc29
-
SSDEEP
12288:fMrmy90b01HecTJHMxIXaEK8j3ihmVWa+5fxn/IRx8UuTQ2V6zgux/iXv12AIR:xy2B6xMOqEF0mVW/5Ux8UV2kzGjC
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
relon
193.233.20.30:4125
-
auth_value
17da69809725577b595e217ba006b869
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" qu8906.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5551.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5551.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5551.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5551.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection qu8906.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" qu8906.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" qu8906.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" qu8906.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection pro5551.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5551.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" qu8906.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/5108-205-0x00000000028A0000-0x00000000028DE000-memory.dmp family_redline behavioral1/memory/5108-203-0x00000000028A0000-0x00000000028DE000-memory.dmp family_redline behavioral1/memory/5108-208-0x00000000028A0000-0x00000000028DE000-memory.dmp family_redline behavioral1/memory/5108-210-0x00000000028A0000-0x00000000028DE000-memory.dmp family_redline behavioral1/memory/5108-212-0x00000000028A0000-0x00000000028DE000-memory.dmp family_redline behavioral1/memory/5108-214-0x00000000028A0000-0x00000000028DE000-memory.dmp family_redline behavioral1/memory/5108-216-0x00000000028A0000-0x00000000028DE000-memory.dmp family_redline behavioral1/memory/5108-218-0x00000000028A0000-0x00000000028DE000-memory.dmp family_redline behavioral1/memory/5108-220-0x00000000028A0000-0x00000000028DE000-memory.dmp family_redline behavioral1/memory/5108-222-0x00000000028A0000-0x00000000028DE000-memory.dmp family_redline behavioral1/memory/5108-224-0x00000000028A0000-0x00000000028DE000-memory.dmp family_redline behavioral1/memory/5108-226-0x00000000028A0000-0x00000000028DE000-memory.dmp family_redline behavioral1/memory/5108-228-0x00000000028A0000-0x00000000028DE000-memory.dmp family_redline behavioral1/memory/5108-230-0x00000000028A0000-0x00000000028DE000-memory.dmp family_redline behavioral1/memory/5108-232-0x00000000028A0000-0x00000000028DE000-memory.dmp family_redline behavioral1/memory/5108-234-0x00000000028A0000-0x00000000028DE000-memory.dmp family_redline behavioral1/memory/5108-236-0x00000000028A0000-0x00000000028DE000-memory.dmp family_redline behavioral1/memory/5108-238-0x00000000028A0000-0x00000000028DE000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 3508 unio2302.exe 4568 unio8537.exe 1984 pro5551.exe 180 qu8906.exe 5108 rwo50s21.exe 4120 si848357.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5551.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features qu8906.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" qu8906.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" unio8537.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fca5999f3e50c945d43a6467a03afe2b6a594d02c21c8f3ed7e4edba1b60fcc5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fca5999f3e50c945d43a6467a03afe2b6a594d02c21c8f3ed7e4edba1b60fcc5.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce unio2302.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio2302.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce unio8537.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3432 180 WerFault.exe 88 744 5108 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1984 pro5551.exe 1984 pro5551.exe 180 qu8906.exe 180 qu8906.exe 5108 rwo50s21.exe 5108 rwo50s21.exe 4120 si848357.exe 4120 si848357.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1984 pro5551.exe Token: SeDebugPrivilege 180 qu8906.exe Token: SeDebugPrivilege 5108 rwo50s21.exe Token: SeDebugPrivilege 4120 si848357.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 552 wrote to memory of 3508 552 fca5999f3e50c945d43a6467a03afe2b6a594d02c21c8f3ed7e4edba1b60fcc5.exe 85 PID 552 wrote to memory of 3508 552 fca5999f3e50c945d43a6467a03afe2b6a594d02c21c8f3ed7e4edba1b60fcc5.exe 85 PID 552 wrote to memory of 3508 552 fca5999f3e50c945d43a6467a03afe2b6a594d02c21c8f3ed7e4edba1b60fcc5.exe 85 PID 3508 wrote to memory of 4568 3508 unio2302.exe 86 PID 3508 wrote to memory of 4568 3508 unio2302.exe 86 PID 3508 wrote to memory of 4568 3508 unio2302.exe 86 PID 4568 wrote to memory of 1984 4568 unio8537.exe 87 PID 4568 wrote to memory of 1984 4568 unio8537.exe 87 PID 4568 wrote to memory of 180 4568 unio8537.exe 88 PID 4568 wrote to memory of 180 4568 unio8537.exe 88 PID 4568 wrote to memory of 180 4568 unio8537.exe 88 PID 3508 wrote to memory of 5108 3508 unio2302.exe 91 PID 3508 wrote to memory of 5108 3508 unio2302.exe 91 PID 3508 wrote to memory of 5108 3508 unio2302.exe 91 PID 552 wrote to memory of 4120 552 fca5999f3e50c945d43a6467a03afe2b6a594d02c21c8f3ed7e4edba1b60fcc5.exe 95 PID 552 wrote to memory of 4120 552 fca5999f3e50c945d43a6467a03afe2b6a594d02c21c8f3ed7e4edba1b60fcc5.exe 95 PID 552 wrote to memory of 4120 552 fca5999f3e50c945d43a6467a03afe2b6a594d02c21c8f3ed7e4edba1b60fcc5.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\fca5999f3e50c945d43a6467a03afe2b6a594d02c21c8f3ed7e4edba1b60fcc5.exe"C:\Users\Admin\AppData\Local\Temp\fca5999f3e50c945d43a6467a03afe2b6a594d02c21c8f3ed7e4edba1b60fcc5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio2302.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio2302.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio8537.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio8537.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro5551.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro5551.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1984
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu8906.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu8906.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:180 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 180 -s 10885⤵
- Program crash
PID:3432
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rwo50s21.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rwo50s21.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5108 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5108 -s 13484⤵
- Program crash
PID:744
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si848357.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si848357.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4120
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 180 -ip 1801⤵PID:3376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 5108 -ip 51081⤵PID:4084
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD56fbff2d7c9ba7f0a71f02a5c70df9dfc
SHA1003da0075734cd2d7f201c5b0e4779b8e1f33621
SHA256cb56407367a42f61993842b66bcd24993a30c87116313c26d6af9e37bbb1b6b3
SHA51225842b9df4767b16096f2bfcedc9d368a9696e6c6d9c7b2c75987769a5b338ae04b23b1e89f18eef2244e84f04e4acf6af56643a97abfe5b605f66cba0bac27f
-
Filesize
175KB
MD56fbff2d7c9ba7f0a71f02a5c70df9dfc
SHA1003da0075734cd2d7f201c5b0e4779b8e1f33621
SHA256cb56407367a42f61993842b66bcd24993a30c87116313c26d6af9e37bbb1b6b3
SHA51225842b9df4767b16096f2bfcedc9d368a9696e6c6d9c7b2c75987769a5b338ae04b23b1e89f18eef2244e84f04e4acf6af56643a97abfe5b605f66cba0bac27f
-
Filesize
677KB
MD57adccc82b1783abfdfafaebe9ddef964
SHA1a80c8a7fc1cc1e3ccfdfa64de4347bb819b5bc12
SHA2560f592e2206e6cc75fca075f033d56ab1bce6cbb1a9cd60cd7dd88bd2111686bc
SHA512780a20c3cc519b172c6f02c34da1aa5db28512563a566596b36fd93426cd2218698889a37146cd2d526b00088ee61719b16aed09984415d2e36c5990330a1111
-
Filesize
677KB
MD57adccc82b1783abfdfafaebe9ddef964
SHA1a80c8a7fc1cc1e3ccfdfa64de4347bb819b5bc12
SHA2560f592e2206e6cc75fca075f033d56ab1bce6cbb1a9cd60cd7dd88bd2111686bc
SHA512780a20c3cc519b172c6f02c34da1aa5db28512563a566596b36fd93426cd2218698889a37146cd2d526b00088ee61719b16aed09984415d2e36c5990330a1111
-
Filesize
349KB
MD5e28bd0d739c28396ec26af2c7767575e
SHA1b9d0b4ff48a571ad09d22d253251153e0bdcd4d2
SHA2565a4e86c3b441413c76fbda1363608f90cf561ce3a1158a06f8daaa34b76a25e7
SHA5127a4afcd1c14bcc0d35282114e3c95f4bbcf8ca291ae75a134e90d57bf7a82e267065213efbf81b248fb6569528ab391b23500960fcaef7c07864fc18f91cbf2b
-
Filesize
349KB
MD5e28bd0d739c28396ec26af2c7767575e
SHA1b9d0b4ff48a571ad09d22d253251153e0bdcd4d2
SHA2565a4e86c3b441413c76fbda1363608f90cf561ce3a1158a06f8daaa34b76a25e7
SHA5127a4afcd1c14bcc0d35282114e3c95f4bbcf8ca291ae75a134e90d57bf7a82e267065213efbf81b248fb6569528ab391b23500960fcaef7c07864fc18f91cbf2b
-
Filesize
334KB
MD5ffa65be795611cf4a4380ab4de676ad3
SHA11cbac29b4009ac7c24ac1c389254b23078e0962b
SHA256b3ea8222527f22d2aa53280663aa8836a9061ded8e78dbcd222ddece30b2c95c
SHA51261255d079babf9f8edce821219d5930b513078e304146a3ca4282aaa1767d3c8507f89e30f0ee66770f40bd027683b3ec779c36f91b1210d120e66d9197d6a0b
-
Filesize
334KB
MD5ffa65be795611cf4a4380ab4de676ad3
SHA11cbac29b4009ac7c24ac1c389254b23078e0962b
SHA256b3ea8222527f22d2aa53280663aa8836a9061ded8e78dbcd222ddece30b2c95c
SHA51261255d079babf9f8edce821219d5930b513078e304146a3ca4282aaa1767d3c8507f89e30f0ee66770f40bd027683b3ec779c36f91b1210d120e66d9197d6a0b
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
290KB
MD56c952785704da44b6f37d59b7fff9725
SHA18c95b06b934f6843707ba9187ecb04725e79b468
SHA2562d5a3d76693d61d6c216dd640cf5eced4713a5ad08a7e91bfe6d28caadca70f9
SHA5124fc2e5dfa5d9b3abb3f2ad432141e6f9a8acfd7e6ea0214979cca946a942d70a0bd3f77c55a633a6ac295c1ee17aaabee87e6a39f78ba096bd6c2c96b2139d80
-
Filesize
290KB
MD56c952785704da44b6f37d59b7fff9725
SHA18c95b06b934f6843707ba9187ecb04725e79b468
SHA2562d5a3d76693d61d6c216dd640cf5eced4713a5ad08a7e91bfe6d28caadca70f9
SHA5124fc2e5dfa5d9b3abb3f2ad432141e6f9a8acfd7e6ea0214979cca946a942d70a0bd3f77c55a633a6ac295c1ee17aaabee87e6a39f78ba096bd6c2c96b2139d80