Analysis
-
max time kernel
152s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2023 18:28
Static task
static1
Behavioral task
behavioral1
Sample
65e927b43ad5e5c9e01570c197da93530191b622d90abad16e486d69157942b9.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
65e927b43ad5e5c9e01570c197da93530191b622d90abad16e486d69157942b9.exe
Resource
win10v2004-20230220-en
General
-
Target
65e927b43ad5e5c9e01570c197da93530191b622d90abad16e486d69157942b9.exe
-
Size
599KB
-
MD5
9fcf210a9e62502d2332c6cf658b50d5
-
SHA1
91ed85654df42d0f41c02cc344bac9f11c858f34
-
SHA256
65e927b43ad5e5c9e01570c197da93530191b622d90abad16e486d69157942b9
-
SHA512
ebbb43549280464616956cfa60d1755deeaf0918c46f1023f7c8c0105b1362b267b9190cb49eabadf9f04618d14d8a21cdb2810ffedbadfb33ecdf916146774c
-
SSDEEP
12288:sMrSy90mYT6rZjgyo7HoX1Id3CWyEh62U2+6cWCLxCs88Zpg2FaUOZ/t:OymTmJyHgasPv2RwK2bO7
Malware Config
Signatures
-
Detects Redline Stealer samples 3 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/652-148-0x00000000079C0000-0x0000000007FD8000-memory.dmp redline_stealer behavioral2/memory/652-154-0x0000000007830000-0x0000000007896000-memory.dmp redline_stealer behavioral2/memory/652-159-0x0000000008FC0000-0x0000000009182000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" l6152104.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection l6152104.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" l6152104.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" l6152104.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" l6152104.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" l6152104.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation m1594315.exe -
Executes dropped EXE 5 IoCs
pid Process 3308 y4520007.exe 652 k9594817.exe 1888 l6152104.exe 3292 m1594315.exe 2172 oneetx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features l6152104.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" l6152104.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 65e927b43ad5e5c9e01570c197da93530191b622d90abad16e486d69157942b9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 65e927b43ad5e5c9e01570c197da93530191b622d90abad16e486d69157942b9.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y4520007.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y4520007.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 17 IoCs
pid pid_target Process procid_target 2360 3292 WerFault.exe 94 3228 3292 WerFault.exe 94 4344 3292 WerFault.exe 94 2228 3292 WerFault.exe 94 4188 3292 WerFault.exe 94 1004 3292 WerFault.exe 94 1336 3292 WerFault.exe 94 4272 3292 WerFault.exe 94 4304 3292 WerFault.exe 94 3112 3292 WerFault.exe 94 4820 2172 WerFault.exe 114 1736 2172 WerFault.exe 114 2892 2172 WerFault.exe 114 748 2172 WerFault.exe 114 4996 2172 WerFault.exe 114 1140 2172 WerFault.exe 114 4400 2172 WerFault.exe 114 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 652 k9594817.exe 652 k9594817.exe 1888 l6152104.exe 1888 l6152104.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 652 k9594817.exe Token: SeDebugPrivilege 1888 l6152104.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3292 m1594315.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1360 wrote to memory of 3308 1360 65e927b43ad5e5c9e01570c197da93530191b622d90abad16e486d69157942b9.exe 83 PID 1360 wrote to memory of 3308 1360 65e927b43ad5e5c9e01570c197da93530191b622d90abad16e486d69157942b9.exe 83 PID 1360 wrote to memory of 3308 1360 65e927b43ad5e5c9e01570c197da93530191b622d90abad16e486d69157942b9.exe 83 PID 3308 wrote to memory of 652 3308 y4520007.exe 84 PID 3308 wrote to memory of 652 3308 y4520007.exe 84 PID 3308 wrote to memory of 652 3308 y4520007.exe 84 PID 3308 wrote to memory of 1888 3308 y4520007.exe 93 PID 3308 wrote to memory of 1888 3308 y4520007.exe 93 PID 3308 wrote to memory of 1888 3308 y4520007.exe 93 PID 1360 wrote to memory of 3292 1360 65e927b43ad5e5c9e01570c197da93530191b622d90abad16e486d69157942b9.exe 94 PID 1360 wrote to memory of 3292 1360 65e927b43ad5e5c9e01570c197da93530191b622d90abad16e486d69157942b9.exe 94 PID 1360 wrote to memory of 3292 1360 65e927b43ad5e5c9e01570c197da93530191b622d90abad16e486d69157942b9.exe 94 PID 3292 wrote to memory of 2172 3292 m1594315.exe 114 PID 3292 wrote to memory of 2172 3292 m1594315.exe 114 PID 3292 wrote to memory of 2172 3292 m1594315.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\65e927b43ad5e5c9e01570c197da93530191b622d90abad16e486d69157942b9.exe"C:\Users\Admin\AppData\Local\Temp\65e927b43ad5e5c9e01570c197da93530191b622d90abad16e486d69157942b9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4520007.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4520007.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k9594817.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k9594817.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:652
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l6152104.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l6152104.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1888
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m1594315.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m1594315.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 6963⤵
- Program crash
PID:2360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 7483⤵
- Program crash
PID:3228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 8563⤵
- Program crash
PID:4344
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 8803⤵
- Program crash
PID:2228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 10003⤵
- Program crash
PID:4188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 9763⤵
- Program crash
PID:1004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 12043⤵
- Program crash
PID:1336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 12243⤵
- Program crash
PID:4272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 13163⤵
- Program crash
PID:4304
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Executes dropped EXE
PID:2172 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2172 -s 6924⤵
- Program crash
PID:4820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2172 -s 8324⤵
- Program crash
PID:1736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2172 -s 7884⤵
- Program crash
PID:2892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2172 -s 10564⤵
- Program crash
PID:748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2172 -s 10764⤵
- Program crash
PID:4996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2172 -s 10764⤵
- Program crash
PID:1140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2172 -s 10564⤵
- Program crash
PID:4400
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 13083⤵
- Program crash
PID:3112
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 3292 -ip 32921⤵PID:2428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3292 -ip 32921⤵PID:2636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3292 -ip 32921⤵PID:1240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3292 -ip 32921⤵PID:3740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3292 -ip 32921⤵PID:5004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3292 -ip 32921⤵PID:3516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3292 -ip 32921⤵PID:2568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3292 -ip 32921⤵PID:4548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3292 -ip 32921⤵PID:3952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3292 -ip 32921⤵PID:1060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2172 -ip 21721⤵PID:3340
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2172 -ip 21721⤵PID:4944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2172 -ip 21721⤵PID:3976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2172 -ip 21721⤵PID:1664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2172 -ip 21721⤵PID:4484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2172 -ip 21721⤵PID:3312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2172 -ip 21721⤵PID:2096
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
339KB
MD5f7680cd47798241ba96ea97e9aba488a
SHA10ab00f2aa273435a4ddf6fdcc910afdd1079155a
SHA25674f10b901f35b22177c1ac43c290c36611b383a40de4faaf9feacaa6d86be6a8
SHA5122ceff59af4c369c7b7531450116c992092f7ab6141bc9dd74eb5a6bb36e4120686c0381a4e234c40f0ae5551f10c520c592d93e2485f3479e90507bc79f19155
-
Filesize
339KB
MD5f7680cd47798241ba96ea97e9aba488a
SHA10ab00f2aa273435a4ddf6fdcc910afdd1079155a
SHA25674f10b901f35b22177c1ac43c290c36611b383a40de4faaf9feacaa6d86be6a8
SHA5122ceff59af4c369c7b7531450116c992092f7ab6141bc9dd74eb5a6bb36e4120686c0381a4e234c40f0ae5551f10c520c592d93e2485f3479e90507bc79f19155
-
Filesize
307KB
MD5e4d1ae8baed68e4158c2a0e0271241ae
SHA1ab5d03a6d558323053b181e2934d841e594f9080
SHA256b291cd810edaf2c15fc09d39fbbc0867cfc6b24f8a708ea13d26872b7ea1ebbb
SHA5127e2400cc5d9f59840ea5b0f05c2559ec03f7f8d4809fc69a1cfa12b1d4dab46e88fdc3f857e36ffced6a6e87a1eeb905df008d52aea8b1c70b5e32a57365803a
-
Filesize
307KB
MD5e4d1ae8baed68e4158c2a0e0271241ae
SHA1ab5d03a6d558323053b181e2934d841e594f9080
SHA256b291cd810edaf2c15fc09d39fbbc0867cfc6b24f8a708ea13d26872b7ea1ebbb
SHA5127e2400cc5d9f59840ea5b0f05c2559ec03f7f8d4809fc69a1cfa12b1d4dab46e88fdc3f857e36ffced6a6e87a1eeb905df008d52aea8b1c70b5e32a57365803a
-
Filesize
137KB
MD53c86b66f6b7eb077a276399f63928dfb
SHA1df370706189600c6e338fc5801dfa3e9dbe24ed4
SHA25640d329b81431fe6b10aa348762c0cd94d500426f422f96a2e9999823e62ce367
SHA5125d53ef8c1c08e45ddbad80571598faebbd17cadc6b86145ee03f734db482181ea913b953a8655abc4f39b75fd9c132a1e4d07cc7a3b2ba94e898f4195bc5d805
-
Filesize
137KB
MD53c86b66f6b7eb077a276399f63928dfb
SHA1df370706189600c6e338fc5801dfa3e9dbe24ed4
SHA25640d329b81431fe6b10aa348762c0cd94d500426f422f96a2e9999823e62ce367
SHA5125d53ef8c1c08e45ddbad80571598faebbd17cadc6b86145ee03f734db482181ea913b953a8655abc4f39b75fd9c132a1e4d07cc7a3b2ba94e898f4195bc5d805
-
Filesize
175KB
MD51a9386ede9644869205c20849dd34d31
SHA1b9f7917d31b85d161dae7f5e244a0c29f23ca48a
SHA256b740d1a000f4cc25f64333945800ba955243a792836ceed806699e355a8787a8
SHA512d36b695ceb93270a5fd693cb498ff729788d93a5b40697414ea4a28b510d4d22aa69096f37287cf8bf6daee10edbb78b7c4f30b4d1d3c47f492c4d1cec9bc2b4
-
Filesize
175KB
MD51a9386ede9644869205c20849dd34d31
SHA1b9f7917d31b85d161dae7f5e244a0c29f23ca48a
SHA256b740d1a000f4cc25f64333945800ba955243a792836ceed806699e355a8787a8
SHA512d36b695ceb93270a5fd693cb498ff729788d93a5b40697414ea4a28b510d4d22aa69096f37287cf8bf6daee10edbb78b7c4f30b4d1d3c47f492c4d1cec9bc2b4
-
Filesize
339KB
MD5f7680cd47798241ba96ea97e9aba488a
SHA10ab00f2aa273435a4ddf6fdcc910afdd1079155a
SHA25674f10b901f35b22177c1ac43c290c36611b383a40de4faaf9feacaa6d86be6a8
SHA5122ceff59af4c369c7b7531450116c992092f7ab6141bc9dd74eb5a6bb36e4120686c0381a4e234c40f0ae5551f10c520c592d93e2485f3479e90507bc79f19155
-
Filesize
339KB
MD5f7680cd47798241ba96ea97e9aba488a
SHA10ab00f2aa273435a4ddf6fdcc910afdd1079155a
SHA25674f10b901f35b22177c1ac43c290c36611b383a40de4faaf9feacaa6d86be6a8
SHA5122ceff59af4c369c7b7531450116c992092f7ab6141bc9dd74eb5a6bb36e4120686c0381a4e234c40f0ae5551f10c520c592d93e2485f3479e90507bc79f19155
-
Filesize
339KB
MD5f7680cd47798241ba96ea97e9aba488a
SHA10ab00f2aa273435a4ddf6fdcc910afdd1079155a
SHA25674f10b901f35b22177c1ac43c290c36611b383a40de4faaf9feacaa6d86be6a8
SHA5122ceff59af4c369c7b7531450116c992092f7ab6141bc9dd74eb5a6bb36e4120686c0381a4e234c40f0ae5551f10c520c592d93e2485f3479e90507bc79f19155