Analysis
-
max time kernel
144s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24-03-2023 09:08
Static task
static1
Behavioral task
behavioral1
Sample
6f59694cb2a4fe0af61f24b036ec7f901ed239f6d200cb9d684bccbf46b91c73.exe
Resource
win10v2004-20230220-en
General
-
Target
6f59694cb2a4fe0af61f24b036ec7f901ed239f6d200cb9d684bccbf46b91c73.exe
-
Size
538KB
-
MD5
f93483c4361a095210dfae536eee273e
-
SHA1
c976057048f60bd7a495cbefcb95195debb5b4f2
-
SHA256
6f59694cb2a4fe0af61f24b036ec7f901ed239f6d200cb9d684bccbf46b91c73
-
SHA512
ed92766ced1e9161f9f5e994da2bc9c55bee39f0d74fbb6f6f48214aeada10f29e34220441d8eaa98afd39a51093a9193fa71bf1325ff4ddd77a2ba66099c83f
-
SSDEEP
12288:EMrey902IP9kIw4RS9BQ2ractbFex4I4+MPEkq4fvkB:qysPamEWCtbFuFQG4f8B
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
hero
193.233.20.31:4125
-
auth_value
11f3c75a88ca461bcc8d6bf60a1193e3
Signatures
-
Processes:
pro0420.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection pro0420.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0420.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0420.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0420.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0420.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0420.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/2348-158-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2348-161-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2348-159-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2348-165-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2348-167-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2348-163-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2348-169-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2348-171-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2348-173-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2348-175-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2348-177-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2348-179-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2348-181-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2348-183-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2348-185-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2348-187-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2348-189-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2348-191-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2348-193-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2348-195-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2348-197-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2348-199-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2348-201-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2348-203-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2348-205-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2348-207-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2348-209-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2348-211-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2348-213-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2348-215-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2348-217-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2348-219-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline behavioral1/memory/2348-221-0x0000000007280000-0x00000000072BE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
unio2047.exepro0420.exequ6576.exesi877869.exepid process 2472 unio2047.exe 3500 pro0420.exe 2348 qu6576.exe 4872 si877869.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro0420.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0420.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
6f59694cb2a4fe0af61f24b036ec7f901ed239f6d200cb9d684bccbf46b91c73.exeunio2047.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6f59694cb2a4fe0af61f24b036ec7f901ed239f6d200cb9d684bccbf46b91c73.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6f59694cb2a4fe0af61f24b036ec7f901ed239f6d200cb9d684bccbf46b91c73.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce unio2047.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio2047.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5060 2348 WerFault.exe qu6576.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro0420.exequ6576.exesi877869.exepid process 3500 pro0420.exe 3500 pro0420.exe 2348 qu6576.exe 2348 qu6576.exe 4872 si877869.exe 4872 si877869.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro0420.exequ6576.exesi877869.exedescription pid process Token: SeDebugPrivilege 3500 pro0420.exe Token: SeDebugPrivilege 2348 qu6576.exe Token: SeDebugPrivilege 4872 si877869.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
6f59694cb2a4fe0af61f24b036ec7f901ed239f6d200cb9d684bccbf46b91c73.exeunio2047.exedescription pid process target process PID 624 wrote to memory of 2472 624 6f59694cb2a4fe0af61f24b036ec7f901ed239f6d200cb9d684bccbf46b91c73.exe unio2047.exe PID 624 wrote to memory of 2472 624 6f59694cb2a4fe0af61f24b036ec7f901ed239f6d200cb9d684bccbf46b91c73.exe unio2047.exe PID 624 wrote to memory of 2472 624 6f59694cb2a4fe0af61f24b036ec7f901ed239f6d200cb9d684bccbf46b91c73.exe unio2047.exe PID 2472 wrote to memory of 3500 2472 unio2047.exe pro0420.exe PID 2472 wrote to memory of 3500 2472 unio2047.exe pro0420.exe PID 2472 wrote to memory of 2348 2472 unio2047.exe qu6576.exe PID 2472 wrote to memory of 2348 2472 unio2047.exe qu6576.exe PID 2472 wrote to memory of 2348 2472 unio2047.exe qu6576.exe PID 624 wrote to memory of 4872 624 6f59694cb2a4fe0af61f24b036ec7f901ed239f6d200cb9d684bccbf46b91c73.exe si877869.exe PID 624 wrote to memory of 4872 624 6f59694cb2a4fe0af61f24b036ec7f901ed239f6d200cb9d684bccbf46b91c73.exe si877869.exe PID 624 wrote to memory of 4872 624 6f59694cb2a4fe0af61f24b036ec7f901ed239f6d200cb9d684bccbf46b91c73.exe si877869.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f59694cb2a4fe0af61f24b036ec7f901ed239f6d200cb9d684bccbf46b91c73.exe"C:\Users\Admin\AppData\Local\Temp\6f59694cb2a4fe0af61f24b036ec7f901ed239f6d200cb9d684bccbf46b91c73.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio2047.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio2047.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0420.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0420.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3500
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6576.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6576.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2348 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2348 -s 19044⤵
- Program crash
PID:5060
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si877869.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si877869.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2348 -ip 23481⤵PID:3508
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD57c11dfe7837f2079d50113de0e973682
SHA1fae072addd4d56ab67d08ab82da4aac5d7223960
SHA256442d9cc0073a6d45abbed64eb9891912091d444fe4dd368924d1b8cf7c59e65b
SHA51206085d23ead5955185736af64754c343a796af98b68c8013ba20b19a5c52eb92066698b86633d54438fe6ad5455c3c3c4625cf03d15439ab486e22388bd8cab7
-
Filesize
175KB
MD57c11dfe7837f2079d50113de0e973682
SHA1fae072addd4d56ab67d08ab82da4aac5d7223960
SHA256442d9cc0073a6d45abbed64eb9891912091d444fe4dd368924d1b8cf7c59e65b
SHA51206085d23ead5955185736af64754c343a796af98b68c8013ba20b19a5c52eb92066698b86633d54438fe6ad5455c3c3c4625cf03d15439ab486e22388bd8cab7
-
Filesize
396KB
MD545224266db6f6f0e5c272bc4d7813e66
SHA1bc8d89e68b94ab08d314c3b026b8fbb58a03f2a6
SHA256b18e7cfdffe921642189c06e053513228e11340bb8afe4fbdebee4277007e900
SHA5124da768c630820dbe2e91bc86101822c28d415605b1dd0941a14bad1d6fd7c1e7fd77ff0a567d70921cd81d253864d8c206db99249a7064cef39e5e61fa1d1511
-
Filesize
396KB
MD545224266db6f6f0e5c272bc4d7813e66
SHA1bc8d89e68b94ab08d314c3b026b8fbb58a03f2a6
SHA256b18e7cfdffe921642189c06e053513228e11340bb8afe4fbdebee4277007e900
SHA5124da768c630820dbe2e91bc86101822c28d415605b1dd0941a14bad1d6fd7c1e7fd77ff0a567d70921cd81d253864d8c206db99249a7064cef39e5e61fa1d1511
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
355KB
MD5373faeb807e3ec74f8773c2b60203673
SHA1167555058831977764aa5997796b47c225334a03
SHA256f0590f84244c1de92f554ffc668b651ce54c5a4db8a47c51a7c19b239a1c839a
SHA5129d046098a95db7a290aa7e6c0613d35518acc139c7e71710b40c642e04601b6e2f0a070dc747650fdb155ecf5f30309a0d5a873cae0631cfd74014f0e02bc24c
-
Filesize
355KB
MD5373faeb807e3ec74f8773c2b60203673
SHA1167555058831977764aa5997796b47c225334a03
SHA256f0590f84244c1de92f554ffc668b651ce54c5a4db8a47c51a7c19b239a1c839a
SHA5129d046098a95db7a290aa7e6c0613d35518acc139c7e71710b40c642e04601b6e2f0a070dc747650fdb155ecf5f30309a0d5a873cae0631cfd74014f0e02bc24c