Analysis
-
max time kernel
87s -
max time network
89s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
26-03-2023 12:51
Static task
static1
Behavioral task
behavioral1
Sample
c58dee6a97db845e728a0512bce9f75b5cb2cdad466e2f58200e18b819d5dd43.exe
Resource
win10v2004-20230220-en
General
-
Target
c58dee6a97db845e728a0512bce9f75b5cb2cdad466e2f58200e18b819d5dd43.exe
-
Size
686KB
-
MD5
3ea5e4a62a20407942c607b37553b468
-
SHA1
787b2018c06405972fb1a78e9964f6c0eebdd5a1
-
SHA256
c58dee6a97db845e728a0512bce9f75b5cb2cdad466e2f58200e18b819d5dd43
-
SHA512
34f5b4631792664d86338d47b22365bb525fba73a983e6b7c17d6f53f771a9fe53bdaa8198c2685e9885df0146b79788d2849203f10fb17f3f6392252e2135a0
-
SSDEEP
12288:WMray90ABhbSVj+PPUpbfStBBbr/Mw5yMK496WqvMPjSPX5jIYf:QyJrbSAHUpmTBHdEOHjkxIm
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
dogma
193.233.20.32:4125
-
auth_value
1b692976ca991040f2e8890409c35142
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6540.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6540.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6540.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6540.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6540.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6540.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/3772-191-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/3772-192-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/3772-194-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/3772-201-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/3772-204-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/3772-196-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/3772-206-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/3772-208-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/3772-210-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/3772-212-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/3772-214-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/3772-216-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/3772-218-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/3772-220-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/3772-222-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/3772-224-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/3772-226-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/3772-228-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/3772-1115-0x0000000007380000-0x0000000007390000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2196 un305178.exe 3924 pro6540.exe 3772 qu2012.exe 1632 si454620.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6540.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6540.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c58dee6a97db845e728a0512bce9f75b5cb2cdad466e2f58200e18b819d5dd43.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c58dee6a97db845e728a0512bce9f75b5cb2cdad466e2f58200e18b819d5dd43.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un305178.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un305178.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4208 3924 WerFault.exe 81 4996 3772 WerFault.exe 87 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3924 pro6540.exe 3924 pro6540.exe 3772 qu2012.exe 3772 qu2012.exe 1632 si454620.exe 1632 si454620.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3924 pro6540.exe Token: SeDebugPrivilege 3772 qu2012.exe Token: SeDebugPrivilege 1632 si454620.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2196 2692 c58dee6a97db845e728a0512bce9f75b5cb2cdad466e2f58200e18b819d5dd43.exe 80 PID 2692 wrote to memory of 2196 2692 c58dee6a97db845e728a0512bce9f75b5cb2cdad466e2f58200e18b819d5dd43.exe 80 PID 2692 wrote to memory of 2196 2692 c58dee6a97db845e728a0512bce9f75b5cb2cdad466e2f58200e18b819d5dd43.exe 80 PID 2196 wrote to memory of 3924 2196 un305178.exe 81 PID 2196 wrote to memory of 3924 2196 un305178.exe 81 PID 2196 wrote to memory of 3924 2196 un305178.exe 81 PID 2196 wrote to memory of 3772 2196 un305178.exe 87 PID 2196 wrote to memory of 3772 2196 un305178.exe 87 PID 2196 wrote to memory of 3772 2196 un305178.exe 87 PID 2692 wrote to memory of 1632 2692 c58dee6a97db845e728a0512bce9f75b5cb2cdad466e2f58200e18b819d5dd43.exe 90 PID 2692 wrote to memory of 1632 2692 c58dee6a97db845e728a0512bce9f75b5cb2cdad466e2f58200e18b819d5dd43.exe 90 PID 2692 wrote to memory of 1632 2692 c58dee6a97db845e728a0512bce9f75b5cb2cdad466e2f58200e18b819d5dd43.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\c58dee6a97db845e728a0512bce9f75b5cb2cdad466e2f58200e18b819d5dd43.exe"C:\Users\Admin\AppData\Local\Temp\c58dee6a97db845e728a0512bce9f75b5cb2cdad466e2f58200e18b819d5dd43.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un305178.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un305178.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6540.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6540.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3924 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3924 -s 10804⤵
- Program crash
PID:4208
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2012.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2012.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3772 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3772 -s 20324⤵
- Program crash
PID:4996
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si454620.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si454620.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3924 -ip 39241⤵PID:4220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3772 -ip 37721⤵PID:3288
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5317dc7c700983be2d0571b75366c66e0
SHA1c8842c95e8022181b8219c1611374964a29e54bb
SHA2567b9750ec271c39a4678099e58824fd1b8f6ba703417732683dba9c092fa5e5ae
SHA5126b33f937febdd2a2522a360dab3cdae0ca879c7f0e2ea347a4443fa0c8595e8937b4eb696249040c459e809e5cda72f870c6644455652efe3e490e27f3d1ec04
-
Filesize
175KB
MD5317dc7c700983be2d0571b75366c66e0
SHA1c8842c95e8022181b8219c1611374964a29e54bb
SHA2567b9750ec271c39a4678099e58824fd1b8f6ba703417732683dba9c092fa5e5ae
SHA5126b33f937febdd2a2522a360dab3cdae0ca879c7f0e2ea347a4443fa0c8595e8937b4eb696249040c459e809e5cda72f870c6644455652efe3e490e27f3d1ec04
-
Filesize
544KB
MD5d7f165a8dc636ecf0a38d3a77d806c0d
SHA1e27e67473056e8b23dfa63ef72748671bccf4b2d
SHA256869db70ea358494dc31bdce3f988cecb383c6c54183f9a4b07f606bc20fa9039
SHA512cb6e83a924e4deb88bf3bf7ea05a03a0475cd66c707f5786a4daac3da8bf1e74047099f4f520fedd368ea26393f8ba99e9ce2de61c35580052992894c9b50281
-
Filesize
544KB
MD5d7f165a8dc636ecf0a38d3a77d806c0d
SHA1e27e67473056e8b23dfa63ef72748671bccf4b2d
SHA256869db70ea358494dc31bdce3f988cecb383c6c54183f9a4b07f606bc20fa9039
SHA512cb6e83a924e4deb88bf3bf7ea05a03a0475cd66c707f5786a4daac3da8bf1e74047099f4f520fedd368ea26393f8ba99e9ce2de61c35580052992894c9b50281
-
Filesize
326KB
MD510dacda19b86843e419be8a2f878b17b
SHA1610f9ad6f9a80cd466cd36addf70962f3ee15d69
SHA256fedfb35581c4e9d240bb4f31c3f4027714ddb7aa501d6bcc6a69356cb9e1716f
SHA512a0202f4af9e443100e44fa6b1398b61a9d4c5bb61a17935f4ce70899faf6bb0387ec9127260d786200844c5b68e2808b15e0e71e1a5b33c5ace24d574c9924b9
-
Filesize
326KB
MD510dacda19b86843e419be8a2f878b17b
SHA1610f9ad6f9a80cd466cd36addf70962f3ee15d69
SHA256fedfb35581c4e9d240bb4f31c3f4027714ddb7aa501d6bcc6a69356cb9e1716f
SHA512a0202f4af9e443100e44fa6b1398b61a9d4c5bb61a17935f4ce70899faf6bb0387ec9127260d786200844c5b68e2808b15e0e71e1a5b33c5ace24d574c9924b9
-
Filesize
384KB
MD5a606a74a842dfa0194ffe7aa4577aef2
SHA18cf29d5f81e660d755d6c5380408747927429908
SHA256b323966c98b4b6e16e84696a81bcd232067b572324979875d1662aa33c7861eb
SHA5126bfe82a2873769ff09ec44df5e479a8da2b73afe47b9417c642b224e8ddee1f76394d7be78dc46d5cc125a186a31c75fa74bb1496461887048b87e7ad52785af
-
Filesize
384KB
MD5a606a74a842dfa0194ffe7aa4577aef2
SHA18cf29d5f81e660d755d6c5380408747927429908
SHA256b323966c98b4b6e16e84696a81bcd232067b572324979875d1662aa33c7861eb
SHA5126bfe82a2873769ff09ec44df5e479a8da2b73afe47b9417c642b224e8ddee1f76394d7be78dc46d5cc125a186a31c75fa74bb1496461887048b87e7ad52785af