Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01-05-2023 18:55
Static task
static1
Behavioral task
behavioral1
Sample
e63f4b5a91cc2355ef33235e3ef138e82d168a3e9dd929101d775df6478a9360.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e63f4b5a91cc2355ef33235e3ef138e82d168a3e9dd929101d775df6478a9360.exe
Resource
win10v2004-20230220-en
General
-
Target
e63f4b5a91cc2355ef33235e3ef138e82d168a3e9dd929101d775df6478a9360.exe
-
Size
867KB
-
MD5
c4de65fb82daa97d657be2c6d0ee977c
-
SHA1
2b4752edfcb2137ecc6ccc73b460be1d49921a59
-
SHA256
e63f4b5a91cc2355ef33235e3ef138e82d168a3e9dd929101d775df6478a9360
-
SHA512
bd1e1526f0d9ee74c1dbb3293074d3dea0aa3abb5dde3cca9fca6d30e1a312ae10d904f0211015c781e70065ba247c4b206b68a85ddb9cf9e8d1af883818f550
-
SSDEEP
12288:cy90vlTu/pBetfuIHcQj6iDu68fWb/YLAUHMpzjKngK34qEPpWw7vlkfiMx/gksT:cymySH/FKXfc/0AUs1jyR4XBZzmrVg3
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dark
185.161.248.73:4164
-
auth_value
ae85b01f66afe8770afeed560513fc2d
Signatures
-
Detects Redline Stealer samples 3 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4508-2320-0x0000000005660000-0x0000000005C78000-memory.dmp redline_stealer behavioral2/memory/4004-2335-0x00000000059B0000-0x0000000005A16000-memory.dmp redline_stealer behavioral2/memory/4004-2337-0x0000000006750000-0x0000000006912000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection s05943769.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" s05943769.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" s05943769.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" s05943769.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" s05943769.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" s05943769.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation p09505292.exe -
Executes dropped EXE 5 IoCs
pid Process 688 y88058824.exe 1188 p09505292.exe 4508 1.exe 4004 r13462002.exe 952 s05943769.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" s05943769.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features s05943769.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e63f4b5a91cc2355ef33235e3ef138e82d168a3e9dd929101d775df6478a9360.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e63f4b5a91cc2355ef33235e3ef138e82d168a3e9dd929101d775df6478a9360.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y88058824.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y88058824.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 3208 1188 WerFault.exe 83 4900 952 WerFault.exe 96 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4508 1.exe 4004 r13462002.exe 4004 r13462002.exe 4508 1.exe 952 s05943769.exe 952 s05943769.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1188 p09505292.exe Token: SeDebugPrivilege 4508 1.exe Token: SeDebugPrivilege 4004 r13462002.exe Token: SeDebugPrivilege 952 s05943769.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 856 wrote to memory of 688 856 e63f4b5a91cc2355ef33235e3ef138e82d168a3e9dd929101d775df6478a9360.exe 82 PID 856 wrote to memory of 688 856 e63f4b5a91cc2355ef33235e3ef138e82d168a3e9dd929101d775df6478a9360.exe 82 PID 856 wrote to memory of 688 856 e63f4b5a91cc2355ef33235e3ef138e82d168a3e9dd929101d775df6478a9360.exe 82 PID 688 wrote to memory of 1188 688 y88058824.exe 83 PID 688 wrote to memory of 1188 688 y88058824.exe 83 PID 688 wrote to memory of 1188 688 y88058824.exe 83 PID 1188 wrote to memory of 4508 1188 p09505292.exe 88 PID 1188 wrote to memory of 4508 1188 p09505292.exe 88 PID 1188 wrote to memory of 4508 1188 p09505292.exe 88 PID 688 wrote to memory of 4004 688 y88058824.exe 94 PID 688 wrote to memory of 4004 688 y88058824.exe 94 PID 688 wrote to memory of 4004 688 y88058824.exe 94 PID 856 wrote to memory of 952 856 e63f4b5a91cc2355ef33235e3ef138e82d168a3e9dd929101d775df6478a9360.exe 96 PID 856 wrote to memory of 952 856 e63f4b5a91cc2355ef33235e3ef138e82d168a3e9dd929101d775df6478a9360.exe 96 PID 856 wrote to memory of 952 856 e63f4b5a91cc2355ef33235e3ef138e82d168a3e9dd929101d775df6478a9360.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\e63f4b5a91cc2355ef33235e3ef138e82d168a3e9dd929101d775df6478a9360.exe"C:\Users\Admin\AppData\Local\Temp\e63f4b5a91cc2355ef33235e3ef138e82d168a3e9dd929101d775df6478a9360.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y88058824.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y88058824.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p09505292.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p09505292.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4508
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1188 -s 13724⤵
- Program crash
PID:3208
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r13462002.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r13462002.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4004
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s05943769.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s05943769.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 952 -s 10643⤵
- Program crash
PID:4900
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1188 -ip 11881⤵PID:1652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 952 -ip 9521⤵PID:1160
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
395KB
MD572377ccb94122cc382fc87990a7bde5f
SHA1b328489a14f282f542f8e3ef93258117ae1fcaed
SHA256961ac64175900adfe34980914b139f1eba060c5e540af75473af770e08d8cf32
SHA5127095f2686f8b00e181ef3c886b388985e383f00f8064b21ea421faa1f5de5b4f39bc6eb48ec91c97f3df839cede8f2185ec9e044a5e2942d53b8436d075223a4
-
Filesize
395KB
MD572377ccb94122cc382fc87990a7bde5f
SHA1b328489a14f282f542f8e3ef93258117ae1fcaed
SHA256961ac64175900adfe34980914b139f1eba060c5e540af75473af770e08d8cf32
SHA5127095f2686f8b00e181ef3c886b388985e383f00f8064b21ea421faa1f5de5b4f39bc6eb48ec91c97f3df839cede8f2185ec9e044a5e2942d53b8436d075223a4
-
Filesize
577KB
MD5ff1cbac2ba8609016549a82cdc1b9f33
SHA1ae2a044a9a780cb617d950b39d6ee4a94bf75d95
SHA256f402ee3def87f7015aa8362f67835fbb42f85829b54bc2b56ce7d37e191b7ca5
SHA5127c618cfdbafde06c2e96479118e2dd4b71ab739a9187e390480739d17a6fb48aabd6c8e768dabd7681642db5c9fdd5033930e32eb6584535ee60e09f6f76f8ab
-
Filesize
577KB
MD5ff1cbac2ba8609016549a82cdc1b9f33
SHA1ae2a044a9a780cb617d950b39d6ee4a94bf75d95
SHA256f402ee3def87f7015aa8362f67835fbb42f85829b54bc2b56ce7d37e191b7ca5
SHA5127c618cfdbafde06c2e96479118e2dd4b71ab739a9187e390480739d17a6fb48aabd6c8e768dabd7681642db5c9fdd5033930e32eb6584535ee60e09f6f76f8ab
-
Filesize
574KB
MD5a934a18b13e275f1e5544ceb5335f8df
SHA15d86d4401b104cfd8a19da2bb8285571df71abb3
SHA2563a34ce0abf9fed18d3adb9214c5e803f29dd1656eaa00842c1f42856ceecab90
SHA51298c72982e6c65fdfa20d0e76c6bbdc07a211663f6c2048c53309b7fa25d3f6b8941e8a473fe9a54e7764aa9634838d8e2e3db81be085d3cf8015722554528d32
-
Filesize
574KB
MD5a934a18b13e275f1e5544ceb5335f8df
SHA15d86d4401b104cfd8a19da2bb8285571df71abb3
SHA2563a34ce0abf9fed18d3adb9214c5e803f29dd1656eaa00842c1f42856ceecab90
SHA51298c72982e6c65fdfa20d0e76c6bbdc07a211663f6c2048c53309b7fa25d3f6b8941e8a473fe9a54e7764aa9634838d8e2e3db81be085d3cf8015722554528d32
-
Filesize
171KB
MD51c9111bc2efaf70736c87680c75e9499
SHA103071dc890210f93ca207b575c0461a93e17cf56
SHA256918da3c1f57b346cc1fefc98ab1e715fbf53a14e16ac9a7076052eb54e1e7b8b
SHA5125039255d0976303ab8d5e605229fe74220885d66d9b753ff55f1cf366e83a9f97dcb07ca4d2c7bc505591e2068ab0c60a112eeaa1e5163afa26deb154855fe30
-
Filesize
171KB
MD51c9111bc2efaf70736c87680c75e9499
SHA103071dc890210f93ca207b575c0461a93e17cf56
SHA256918da3c1f57b346cc1fefc98ab1e715fbf53a14e16ac9a7076052eb54e1e7b8b
SHA5125039255d0976303ab8d5e605229fe74220885d66d9b753ff55f1cf366e83a9f97dcb07ca4d2c7bc505591e2068ab0c60a112eeaa1e5163afa26deb154855fe30
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf