Analysis
-
max time kernel
150s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 18:39
Static task
static1
Behavioral task
behavioral1
Sample
9be0da2f461febdef86829d124e63f3ba1e35bf076b220e5a133327a5caee215.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
9be0da2f461febdef86829d124e63f3ba1e35bf076b220e5a133327a5caee215.exe
Resource
win10v2004-20230220-en
General
-
Target
9be0da2f461febdef86829d124e63f3ba1e35bf076b220e5a133327a5caee215.exe
-
Size
1.5MB
-
MD5
67f1e00a3f0227ed325882408edbccff
-
SHA1
10f9e5a468076d69514d517ca4e22c2ee7d53803
-
SHA256
9be0da2f461febdef86829d124e63f3ba1e35bf076b220e5a133327a5caee215
-
SHA512
c02c737145537d0b1841d73d5635a4d46e190ad9b91f4f5dc72fc1352e739c72c1c2a348efda7c33c5b0288ac3ebdea2259616af534a9820079a0982d9ee2d49
-
SSDEEP
24576:2yF7zn7DITXttA+d2BP/nCZAc93lTxB2TNpcrFqc6QBqA0AjZc:FF7z7kI+43sVTx4wBzzBVtd
Malware Config
Extracted
redline
mazda
217.196.96.56:4138
-
auth_value
3d2870537d84a4c6d7aeecd002871c51
Signatures
-
Detects Redline Stealer samples 3 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4832-216-0x000000000A590000-0x000000000ABA8000-memory.dmp redline_stealer behavioral2/memory/4832-224-0x000000000AF40000-0x000000000AFA6000-memory.dmp redline_stealer behavioral2/memory/4832-225-0x000000000BAA0000-0x000000000BC62000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a7661228.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a7661228.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a7661228.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a7661228.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a7661228.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a7661228.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 2276 v2531392.exe 1244 v8165357.exe 988 v0072382.exe 1220 v3560340.exe 728 a7661228.exe 4832 b4096270.exe 3768 c8376200.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a7661228.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a7661228.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9be0da2f461febdef86829d124e63f3ba1e35bf076b220e5a133327a5caee215.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v2531392.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v0072382.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v0072382.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v3560340.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v3560340.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9be0da2f461febdef86829d124e63f3ba1e35bf076b220e5a133327a5caee215.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v2531392.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v8165357.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v8165357.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 3 IoCs
pid pid_target Process procid_target 688 728 WerFault.exe 87 4736 3768 WerFault.exe 93 2640 3768 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 728 a7661228.exe 728 a7661228.exe 4832 b4096270.exe 4832 b4096270.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 728 a7661228.exe Token: SeDebugPrivilege 4832 b4096270.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4052 wrote to memory of 2276 4052 9be0da2f461febdef86829d124e63f3ba1e35bf076b220e5a133327a5caee215.exe 83 PID 4052 wrote to memory of 2276 4052 9be0da2f461febdef86829d124e63f3ba1e35bf076b220e5a133327a5caee215.exe 83 PID 4052 wrote to memory of 2276 4052 9be0da2f461febdef86829d124e63f3ba1e35bf076b220e5a133327a5caee215.exe 83 PID 2276 wrote to memory of 1244 2276 v2531392.exe 84 PID 2276 wrote to memory of 1244 2276 v2531392.exe 84 PID 2276 wrote to memory of 1244 2276 v2531392.exe 84 PID 1244 wrote to memory of 988 1244 v8165357.exe 85 PID 1244 wrote to memory of 988 1244 v8165357.exe 85 PID 1244 wrote to memory of 988 1244 v8165357.exe 85 PID 988 wrote to memory of 1220 988 v0072382.exe 86 PID 988 wrote to memory of 1220 988 v0072382.exe 86 PID 988 wrote to memory of 1220 988 v0072382.exe 86 PID 1220 wrote to memory of 728 1220 v3560340.exe 87 PID 1220 wrote to memory of 728 1220 v3560340.exe 87 PID 1220 wrote to memory of 728 1220 v3560340.exe 87 PID 1220 wrote to memory of 4832 1220 v3560340.exe 92 PID 1220 wrote to memory of 4832 1220 v3560340.exe 92 PID 1220 wrote to memory of 4832 1220 v3560340.exe 92 PID 988 wrote to memory of 3768 988 v0072382.exe 93 PID 988 wrote to memory of 3768 988 v0072382.exe 93 PID 988 wrote to memory of 3768 988 v0072382.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\9be0da2f461febdef86829d124e63f3ba1e35bf076b220e5a133327a5caee215.exe"C:\Users\Admin\AppData\Local\Temp\9be0da2f461febdef86829d124e63f3ba1e35bf076b220e5a133327a5caee215.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2531392.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2531392.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8165357.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8165357.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0072382.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0072382.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3560340.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3560340.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a7661228.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a7661228.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:728 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 728 -s 10807⤵
- Program crash
PID:688
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b4096270.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b4096270.exe6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4832
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c8376200.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c8376200.exe5⤵
- Executes dropped EXE
PID:3768 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3768 -s 6966⤵
- Program crash
PID:4736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3768 -s 7486⤵
- Program crash
PID:2640
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 728 -ip 7281⤵PID:3552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3768 -ip 37681⤵PID:916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3768 -ip 37681⤵PID:1044
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD56a2ffd63f4ea6d3cb6eab1fe2168a5da
SHA1a7e462f676442f4280464cf35d8edaf69ed1a02c
SHA256cb0a5e182c601e1436cbb0ba1dbb30272cbcb40d342a5f4cbbc74f8bf6d6a445
SHA51229cc2be73e45ba5a520c58676494980b25057fbee07df1f2c03d0a9dc02708049805fec5890f86b91064f08c691197a68b3d5126985d4bb1f8f9f7e6eedecf31
-
Filesize
1.4MB
MD56a2ffd63f4ea6d3cb6eab1fe2168a5da
SHA1a7e462f676442f4280464cf35d8edaf69ed1a02c
SHA256cb0a5e182c601e1436cbb0ba1dbb30272cbcb40d342a5f4cbbc74f8bf6d6a445
SHA51229cc2be73e45ba5a520c58676494980b25057fbee07df1f2c03d0a9dc02708049805fec5890f86b91064f08c691197a68b3d5126985d4bb1f8f9f7e6eedecf31
-
Filesize
912KB
MD5377a183bbbb7c57bef59b96775daebe3
SHA1cf4d0944cc39670cde95607aa4fa92022d65d6e4
SHA256e16a5081643a66bba8be8ae122ffe5b1dbcc81b73af70efdcfd800a81f62278a
SHA512948ef2f7a4a3245b6b6f55c705f78f87de646d386856316c9504b0b957d73f42bd5deca6b4931647e02e8bc02cf8b049cc6a7124476e28ffd1544d132aa7f72d
-
Filesize
912KB
MD5377a183bbbb7c57bef59b96775daebe3
SHA1cf4d0944cc39670cde95607aa4fa92022d65d6e4
SHA256e16a5081643a66bba8be8ae122ffe5b1dbcc81b73af70efdcfd800a81f62278a
SHA512948ef2f7a4a3245b6b6f55c705f78f87de646d386856316c9504b0b957d73f42bd5deca6b4931647e02e8bc02cf8b049cc6a7124476e28ffd1544d132aa7f72d
-
Filesize
708KB
MD562fa71592f7f6cb0ed755f260b212ddf
SHA16c4582bdf6de1921258bbddbabac347c6ef62ecf
SHA2566916f5ec8341c6121ef0bc199884da9edde4bc39141aecb6785bcfd7e008482a
SHA51206a0037743691cce676d53ce0229d590c54692e0a171052d5e9506cd5354394d0eb0a30938e1b7ecdb3e26e684822b7b8bbba1060e1951e6dba6809ad4118803
-
Filesize
708KB
MD562fa71592f7f6cb0ed755f260b212ddf
SHA16c4582bdf6de1921258bbddbabac347c6ef62ecf
SHA2566916f5ec8341c6121ef0bc199884da9edde4bc39141aecb6785bcfd7e008482a
SHA51206a0037743691cce676d53ce0229d590c54692e0a171052d5e9506cd5354394d0eb0a30938e1b7ecdb3e26e684822b7b8bbba1060e1951e6dba6809ad4118803
-
Filesize
340KB
MD5700e2fb938101cfacb63deeaa9b76bc1
SHA1ac4034f75cbf6819270ad026b89d5f048d01d574
SHA256bba04cc621b4f3f93048eda303c9087db1ba114e8c4077f80b0be81517cf4269
SHA512532c9348c26f9d9924aa6bbc8784edf22843a5b0972f33d67902e72d703ab44531e7bf5713ed2778ef2f9bef3e5d6edcf285131a8ed989382fb4dae4d98134ef
-
Filesize
340KB
MD5700e2fb938101cfacb63deeaa9b76bc1
SHA1ac4034f75cbf6819270ad026b89d5f048d01d574
SHA256bba04cc621b4f3f93048eda303c9087db1ba114e8c4077f80b0be81517cf4269
SHA512532c9348c26f9d9924aa6bbc8784edf22843a5b0972f33d67902e72d703ab44531e7bf5713ed2778ef2f9bef3e5d6edcf285131a8ed989382fb4dae4d98134ef
-
Filesize
415KB
MD5505660602028de2abe382f6e1d15b7f9
SHA1f3e93dfbc7ef709305b579b910f769a47762ca47
SHA25608fe83a198685b41f4865a06cb7d455eacdf676e94c7466131b4bd7d87cfc41b
SHA5125545b897070aab979ae2886bb5488ddf9aff1efa7ba72c8ba8e7f6e6f6baa8006838ddf0d1277114294b0f3b9ea1035ad90c016645126ee76b9affdca4d8e851
-
Filesize
415KB
MD5505660602028de2abe382f6e1d15b7f9
SHA1f3e93dfbc7ef709305b579b910f769a47762ca47
SHA25608fe83a198685b41f4865a06cb7d455eacdf676e94c7466131b4bd7d87cfc41b
SHA5125545b897070aab979ae2886bb5488ddf9aff1efa7ba72c8ba8e7f6e6f6baa8006838ddf0d1277114294b0f3b9ea1035ad90c016645126ee76b9affdca4d8e851
-
Filesize
361KB
MD55d40c67db8cf155579fc8e1267f92571
SHA17487d38a0c57842acd3e5dc4d66c4af16e1451b7
SHA256a61d73f31655454cb1e9cd47d5c21441bf50d62d56fbca77cec93e157c93ebd8
SHA5128e349b1bf84c68065c16755624cdf21b8deb6a11afa2f3887377c700ba165dac5b8e1d9e68fd6143cca133f0637703e6fd7bc2e6e2ce127dd364bbfd43dfe601
-
Filesize
361KB
MD55d40c67db8cf155579fc8e1267f92571
SHA17487d38a0c57842acd3e5dc4d66c4af16e1451b7
SHA256a61d73f31655454cb1e9cd47d5c21441bf50d62d56fbca77cec93e157c93ebd8
SHA5128e349b1bf84c68065c16755624cdf21b8deb6a11afa2f3887377c700ba165dac5b8e1d9e68fd6143cca133f0637703e6fd7bc2e6e2ce127dd364bbfd43dfe601
-
Filesize
168KB
MD5a7f78cfd838c8a56c815d14ea50649a2
SHA12c3ee976bcd2edfd58ad703c233ffdb863992db4
SHA2569f5b498d92b46eba7bea37ce348358624a574a88a17888d2d316d3d85d3b8d12
SHA512c84eff982c608a6a8acc77c3a7bf9fd0f2f47e63a63254d75ee4e7760adac4489d603b8d18812975b95ba67d29833602a6c87291d521505e67a5ae903e84b6f5
-
Filesize
168KB
MD5a7f78cfd838c8a56c815d14ea50649a2
SHA12c3ee976bcd2edfd58ad703c233ffdb863992db4
SHA2569f5b498d92b46eba7bea37ce348358624a574a88a17888d2d316d3d85d3b8d12
SHA512c84eff982c608a6a8acc77c3a7bf9fd0f2f47e63a63254d75ee4e7760adac4489d603b8d18812975b95ba67d29833602a6c87291d521505e67a5ae903e84b6f5