Analysis
-
max time kernel
154s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2023 18:39
Static task
static1
Behavioral task
behavioral1
Sample
9aeb76e2cd2a084799762be0ba3ac7a1f36da5546722cdacb052cf49792262f9.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
9aeb76e2cd2a084799762be0ba3ac7a1f36da5546722cdacb052cf49792262f9.exe
Resource
win10v2004-20230220-en
General
-
Target
9aeb76e2cd2a084799762be0ba3ac7a1f36da5546722cdacb052cf49792262f9.exe
-
Size
1.5MB
-
MD5
c9eb95def54841272a0c0dc3a0f056ae
-
SHA1
e90c40e931eebb2017d9c59e24ecaa38541d5d8f
-
SHA256
9aeb76e2cd2a084799762be0ba3ac7a1f36da5546722cdacb052cf49792262f9
-
SHA512
3b20b87aeb292d9bd2ec7242e4a3512695a5c8203bf4f50b3f74f22dbca27d89b08d5c7bb766af44cf12f050ce6fd6d4cb62faece518e567df319678e1955952
-
SSDEEP
24576:xyfZS9andozk33b2mOjZYLLTCvZquvYHa5HqI7bauSMg52eZtZAf/95jtc83om4O:kBYOdok3tLT4XYaKI7WRHHbGtfcCyTD
Malware Config
Extracted
redline
mazda
217.196.96.56:4138
-
auth_value
3d2870537d84a4c6d7aeecd002871c51
Signatures
-
Detects Redline Stealer samples 3 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4948-216-0x00000000057C0000-0x0000000005DD8000-memory.dmp redline_stealer behavioral2/memory/4948-224-0x0000000005FE0000-0x0000000006046000-memory.dmp redline_stealer behavioral2/memory/4948-225-0x0000000006650000-0x0000000006812000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a2881162.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a2881162.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a2881162.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a2881162.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a2881162.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a2881162.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 1496 v9352702.exe 2080 v4474197.exe 1384 v3378876.exe 736 v9165912.exe 3776 a2881162.exe 4948 b8937619.exe 3636 c9588965.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a2881162.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a2881162.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v3378876.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v3378876.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9aeb76e2cd2a084799762be0ba3ac7a1f36da5546722cdacb052cf49792262f9.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v9352702.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v9352702.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v4474197.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v4474197.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v9165912.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v9165912.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9aeb76e2cd2a084799762be0ba3ac7a1f36da5546722cdacb052cf49792262f9.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 9 IoCs
pid pid_target Process procid_target 2708 3776 WerFault.exe 89 4816 3636 WerFault.exe 94 2984 3636 WerFault.exe 94 1608 3636 WerFault.exe 94 680 3636 WerFault.exe 94 3048 3636 WerFault.exe 94 3164 3636 WerFault.exe 94 1880 3636 WerFault.exe 94 2372 3636 WerFault.exe 94 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3776 a2881162.exe 3776 a2881162.exe 4948 b8937619.exe 4948 b8937619.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3776 a2881162.exe Token: SeDebugPrivilege 4948 b8937619.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2432 wrote to memory of 1496 2432 9aeb76e2cd2a084799762be0ba3ac7a1f36da5546722cdacb052cf49792262f9.exe 85 PID 2432 wrote to memory of 1496 2432 9aeb76e2cd2a084799762be0ba3ac7a1f36da5546722cdacb052cf49792262f9.exe 85 PID 2432 wrote to memory of 1496 2432 9aeb76e2cd2a084799762be0ba3ac7a1f36da5546722cdacb052cf49792262f9.exe 85 PID 1496 wrote to memory of 2080 1496 v9352702.exe 86 PID 1496 wrote to memory of 2080 1496 v9352702.exe 86 PID 1496 wrote to memory of 2080 1496 v9352702.exe 86 PID 2080 wrote to memory of 1384 2080 v4474197.exe 87 PID 2080 wrote to memory of 1384 2080 v4474197.exe 87 PID 2080 wrote to memory of 1384 2080 v4474197.exe 87 PID 1384 wrote to memory of 736 1384 v3378876.exe 88 PID 1384 wrote to memory of 736 1384 v3378876.exe 88 PID 1384 wrote to memory of 736 1384 v3378876.exe 88 PID 736 wrote to memory of 3776 736 v9165912.exe 89 PID 736 wrote to memory of 3776 736 v9165912.exe 89 PID 736 wrote to memory of 3776 736 v9165912.exe 89 PID 736 wrote to memory of 4948 736 v9165912.exe 93 PID 736 wrote to memory of 4948 736 v9165912.exe 93 PID 736 wrote to memory of 4948 736 v9165912.exe 93 PID 1384 wrote to memory of 3636 1384 v3378876.exe 94 PID 1384 wrote to memory of 3636 1384 v3378876.exe 94 PID 1384 wrote to memory of 3636 1384 v3378876.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\9aeb76e2cd2a084799762be0ba3ac7a1f36da5546722cdacb052cf49792262f9.exe"C:\Users\Admin\AppData\Local\Temp\9aeb76e2cd2a084799762be0ba3ac7a1f36da5546722cdacb052cf49792262f9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9352702.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9352702.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4474197.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4474197.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3378876.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3378876.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9165912.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9165912.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a2881162.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a2881162.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3776 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3776 -s 10847⤵
- Program crash
PID:2708
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b8937619.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b8937619.exe6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4948
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c9588965.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c9588965.exe5⤵
- Executes dropped EXE
PID:3636 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3636 -s 6966⤵
- Program crash
PID:4816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3636 -s 7526⤵
- Program crash
PID:2984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3636 -s 7966⤵
- Program crash
PID:1608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3636 -s 9406⤵
- Program crash
PID:680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3636 -s 9806⤵
- Program crash
PID:3048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3636 -s 9566⤵
- Program crash
PID:3164
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3636 -s 12206⤵
- Program crash
PID:1880
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3636 -s 12086⤵
- Program crash
PID:2372
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3776 -ip 37761⤵PID:4604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3636 -ip 36361⤵PID:4892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3636 -ip 36361⤵PID:1372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3636 -ip 36361⤵PID:1680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3636 -ip 36361⤵PID:2444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3636 -ip 36361⤵PID:3868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3636 -ip 36361⤵PID:3976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3636 -ip 36361⤵PID:1540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3636 -ip 36361⤵PID:3100
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD535c54204860280c0d5a4e4612ef2010a
SHA1310d7bd92be77b835c388d3d412e24c05595011f
SHA2566efc1c533030b754c20e3cdd1a9875319047e2d5e23d38c19946511e84962c71
SHA5124355383e75dc8cac03bf67f15a0ed8968216306cbed64892fc4907b044cc272ba1503cd7bd7a6894eda0bdcd42868048214aa155ff5ed8475b5282db45377884
-
Filesize
1.3MB
MD535c54204860280c0d5a4e4612ef2010a
SHA1310d7bd92be77b835c388d3d412e24c05595011f
SHA2566efc1c533030b754c20e3cdd1a9875319047e2d5e23d38c19946511e84962c71
SHA5124355383e75dc8cac03bf67f15a0ed8968216306cbed64892fc4907b044cc272ba1503cd7bd7a6894eda0bdcd42868048214aa155ff5ed8475b5282db45377884
-
Filesize
867KB
MD54ac7c7bb36e49216e1810bb58c63243e
SHA1dad933ba7935afa9456b5eb0739eacdb716d4a02
SHA2562cc79a98226d9fb79aded1b1343546f1638623dff6999e191842e08e7c8623a3
SHA5129830b1524f4d9d23b4837d137a844b2372e850d172b17715a0ee50528df0e7a1c27a416e8021c5191ffc6b681bfd1e87a0f31ca6421f89792f6f20fd5c4cbeb0
-
Filesize
867KB
MD54ac7c7bb36e49216e1810bb58c63243e
SHA1dad933ba7935afa9456b5eb0739eacdb716d4a02
SHA2562cc79a98226d9fb79aded1b1343546f1638623dff6999e191842e08e7c8623a3
SHA5129830b1524f4d9d23b4837d137a844b2372e850d172b17715a0ee50528df0e7a1c27a416e8021c5191ffc6b681bfd1e87a0f31ca6421f89792f6f20fd5c4cbeb0
-
Filesize
663KB
MD522474c95b49ad786a933c12df0202313
SHA17d98b798200ae46d6e6ab0213f863ab60d33bdd9
SHA256ff118cc216afb583f5e85368fa5f7035cd401dba330860005dd4dc178c41e6c2
SHA51281d08d52fe6ee89ba0953a3b9b3b60b36e48b475c5a6825973b64309e7b4b18afb191164a803c2b316b1d75bce15969277c09dfdd8b5b9974d1797b33a2b1102
-
Filesize
663KB
MD522474c95b49ad786a933c12df0202313
SHA17d98b798200ae46d6e6ab0213f863ab60d33bdd9
SHA256ff118cc216afb583f5e85368fa5f7035cd401dba330860005dd4dc178c41e6c2
SHA51281d08d52fe6ee89ba0953a3b9b3b60b36e48b475c5a6825973b64309e7b4b18afb191164a803c2b316b1d75bce15969277c09dfdd8b5b9974d1797b33a2b1102
-
Filesize
295KB
MD5fe53a5ea5312c37093c83b0f31853db1
SHA177d53b3d0383c8456b2b218226c12ef473751d41
SHA256cd0b7b761602e343eb6d6b2d185984db253aeee80307685451d3929f56fd78c9
SHA5124d8ca8bbf1752b39e7bdc36094a51ccb382b00a9fb9e27287b7e3f0827f5c221a79fc8b06869fc4f827e5d38839e2175e5447a3159f167b649b4ede11f168299
-
Filesize
295KB
MD5fe53a5ea5312c37093c83b0f31853db1
SHA177d53b3d0383c8456b2b218226c12ef473751d41
SHA256cd0b7b761602e343eb6d6b2d185984db253aeee80307685451d3929f56fd78c9
SHA5124d8ca8bbf1752b39e7bdc36094a51ccb382b00a9fb9e27287b7e3f0827f5c221a79fc8b06869fc4f827e5d38839e2175e5447a3159f167b649b4ede11f168299
-
Filesize
394KB
MD5e0bdbeae5407856e1d9f866d0ca27e0c
SHA1bd8b7470511d59e6c01828a0eb40af521db0dd92
SHA256269f6bfad4bc77fa8a5d6e7725ead871ac60b6288c031fb70667c1d7dfaaef12
SHA512f67699209bc69e9c52dedddd624bbae70c1e98165df6b9717879f4879b6d40488708dc75a4e8ae5fe511fa6853b34b5fde5c50e7d982158652539e4c707a6320
-
Filesize
394KB
MD5e0bdbeae5407856e1d9f866d0ca27e0c
SHA1bd8b7470511d59e6c01828a0eb40af521db0dd92
SHA256269f6bfad4bc77fa8a5d6e7725ead871ac60b6288c031fb70667c1d7dfaaef12
SHA512f67699209bc69e9c52dedddd624bbae70c1e98165df6b9717879f4879b6d40488708dc75a4e8ae5fe511fa6853b34b5fde5c50e7d982158652539e4c707a6320
-
Filesize
315KB
MD53861448f98606abff318ee210fc1e8ae
SHA19c7dfd45a01f7db912827a1f95623431f1d97dd8
SHA256fb5f47dfb21a6fa908978067ea15def1aeb4e60584a122d19e52eee8075072f4
SHA512930ef8a1205b73eda729a2c9daeaa9c7bcd2b4a3a57031eb627cd0deea9951dc1c9d049ed539984b9ed21a170778cde04791515951440a4f25e02b74cb909bd5
-
Filesize
315KB
MD53861448f98606abff318ee210fc1e8ae
SHA19c7dfd45a01f7db912827a1f95623431f1d97dd8
SHA256fb5f47dfb21a6fa908978067ea15def1aeb4e60584a122d19e52eee8075072f4
SHA512930ef8a1205b73eda729a2c9daeaa9c7bcd2b4a3a57031eb627cd0deea9951dc1c9d049ed539984b9ed21a170778cde04791515951440a4f25e02b74cb909bd5
-
Filesize
168KB
MD595eb0f6c78aee8f954bbe0ebc9dae607
SHA1ba165208f693639f2293d8ab6d0efdce52a28e5b
SHA256b96d1b26c7c2a8a6d61ba0080c8e341b471229714db331e923e7d2a57949c730
SHA512bf575484aa4a7b26b493c530f2419a611a91c312f067619076f423dbba233ff4e93223b6bbb155360af26f4e130c41d3dd063c787a989b2e879b2ce567262193
-
Filesize
168KB
MD595eb0f6c78aee8f954bbe0ebc9dae607
SHA1ba165208f693639f2293d8ab6d0efdce52a28e5b
SHA256b96d1b26c7c2a8a6d61ba0080c8e341b471229714db331e923e7d2a57949c730
SHA512bf575484aa4a7b26b493c530f2419a611a91c312f067619076f423dbba233ff4e93223b6bbb155360af26f4e130c41d3dd063c787a989b2e879b2ce567262193