Analysis
-
max time kernel
151s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 19:55
Static task
static1
Behavioral task
behavioral1
Sample
d9992fb396aba64346224cd4cc5de7f27220c67623fde519267d7a268d257a31.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
d9992fb396aba64346224cd4cc5de7f27220c67623fde519267d7a268d257a31.exe
Resource
win10v2004-20230220-en
General
-
Target
d9992fb396aba64346224cd4cc5de7f27220c67623fde519267d7a268d257a31.exe
-
Size
707KB
-
MD5
5d72159004c0c68b3319d0068dcb730f
-
SHA1
61bd2a870581970f5ac0b0b239776032ee94941d
-
SHA256
d9992fb396aba64346224cd4cc5de7f27220c67623fde519267d7a268d257a31
-
SHA512
fe5df3b3d0fb8b2da009cbf12a5feacfc2324aa4a580952902a8a49d770a08dd0b2e9e2e47cfe36bd5dee97390392d80de768ecd209c9adc0f366e1ae9fb2ddf
-
SSDEEP
12288:HMrBy90gCCkuMVnXgJpIAM+/bsR7eLpewAAQ9R2k2CR84cBZ68aSaXEBcj3FPpr8:Cy4LVnXgJ+Avs1O9AAQ9cFCR84cLtaSx
Malware Config
Signatures
-
Detects Redline Stealer samples 3 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4560-148-0x00000000074A0000-0x0000000007AB8000-memory.dmp redline_stealer behavioral2/memory/4560-154-0x0000000007BC0000-0x0000000007C26000-memory.dmp redline_stealer behavioral2/memory/4560-158-0x0000000008AD0000-0x0000000008C92000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h5114354.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h5114354.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h5114354.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h5114354.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h5114354.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h5114354.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation i7185555.exe -
Executes dropped EXE 5 IoCs
pid Process 3652 x3853606.exe 4560 g3364337.exe 376 h5114354.exe 4328 i7185555.exe 4244 oneetx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h5114354.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h5114354.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d9992fb396aba64346224cd4cc5de7f27220c67623fde519267d7a268d257a31.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d9992fb396aba64346224cd4cc5de7f27220c67623fde519267d7a268d257a31.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x3853606.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x3853606.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 15 IoCs
pid pid_target Process procid_target 1172 376 WerFault.exe 86 2240 4328 WerFault.exe 92 3428 4328 WerFault.exe 92 4052 4328 WerFault.exe 92 2968 4328 WerFault.exe 92 4080 4328 WerFault.exe 92 3212 4328 WerFault.exe 92 3988 4328 WerFault.exe 92 1840 4328 WerFault.exe 92 2184 4328 WerFault.exe 92 1552 4328 WerFault.exe 92 2272 4328 WerFault.exe 92 4416 4244 WerFault.exe 113 1136 4244 WerFault.exe 113 5072 4244 WerFault.exe 113 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4560 g3364337.exe 4560 g3364337.exe 376 h5114354.exe 376 h5114354.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4560 g3364337.exe Token: SeDebugPrivilege 376 h5114354.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4328 i7185555.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3740 wrote to memory of 3652 3740 d9992fb396aba64346224cd4cc5de7f27220c67623fde519267d7a268d257a31.exe 78 PID 3740 wrote to memory of 3652 3740 d9992fb396aba64346224cd4cc5de7f27220c67623fde519267d7a268d257a31.exe 78 PID 3740 wrote to memory of 3652 3740 d9992fb396aba64346224cd4cc5de7f27220c67623fde519267d7a268d257a31.exe 78 PID 3652 wrote to memory of 4560 3652 x3853606.exe 79 PID 3652 wrote to memory of 4560 3652 x3853606.exe 79 PID 3652 wrote to memory of 4560 3652 x3853606.exe 79 PID 3652 wrote to memory of 376 3652 x3853606.exe 86 PID 3652 wrote to memory of 376 3652 x3853606.exe 86 PID 3652 wrote to memory of 376 3652 x3853606.exe 86 PID 3740 wrote to memory of 4328 3740 d9992fb396aba64346224cd4cc5de7f27220c67623fde519267d7a268d257a31.exe 92 PID 3740 wrote to memory of 4328 3740 d9992fb396aba64346224cd4cc5de7f27220c67623fde519267d7a268d257a31.exe 92 PID 3740 wrote to memory of 4328 3740 d9992fb396aba64346224cd4cc5de7f27220c67623fde519267d7a268d257a31.exe 92 PID 4328 wrote to memory of 4244 4328 i7185555.exe 113 PID 4328 wrote to memory of 4244 4328 i7185555.exe 113 PID 4328 wrote to memory of 4244 4328 i7185555.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9992fb396aba64346224cd4cc5de7f27220c67623fde519267d7a268d257a31.exe"C:\Users\Admin\AppData\Local\Temp\d9992fb396aba64346224cd4cc5de7f27220c67623fde519267d7a268d257a31.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3853606.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3853606.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g3364337.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g3364337.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4560
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h5114354.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h5114354.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:376 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 376 -s 10884⤵
- Program crash
PID:1172
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i7185555.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i7185555.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4328 -s 6963⤵
- Program crash
PID:2240
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4328 -s 7643⤵
- Program crash
PID:3428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4328 -s 8563⤵
- Program crash
PID:4052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4328 -s 9763⤵
- Program crash
PID:2968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4328 -s 10123⤵
- Program crash
PID:4080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4328 -s 9563⤵
- Program crash
PID:3212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4328 -s 12203⤵
- Program crash
PID:3988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4328 -s 12323⤵
- Program crash
PID:1840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4328 -s 13243⤵
- Program crash
PID:2184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4328 -s 13643⤵
- Program crash
PID:1552
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Executes dropped EXE
PID:4244 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4244 -s 6924⤵
- Program crash
PID:4416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4244 -s 8444⤵
- Program crash
PID:1136
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4244 -s 9124⤵
- Program crash
PID:5072
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4328 -s 13323⤵
- Program crash
PID:2272
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 376 -ip 3761⤵PID:4824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4328 -ip 43281⤵PID:4240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4328 -ip 43281⤵PID:2876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4328 -ip 43281⤵PID:1372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4328 -ip 43281⤵PID:984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4328 -ip 43281⤵PID:4752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4328 -ip 43281⤵PID:2384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4328 -ip 43281⤵PID:3200
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4328 -ip 43281⤵PID:3744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4328 -ip 43281⤵PID:1480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4328 -ip 43281⤵PID:3780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4328 -ip 43281⤵PID:4148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4244 -ip 42441⤵PID:4676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4244 -ip 42441⤵PID:1240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4244 -ip 42441⤵PID:2816
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340KB
MD5b64cb3b5ac26e26aabba5882c88498e1
SHA1b94354f9f07522bd04fa9a1b724d8a6008902eb7
SHA256a001c843fedc8fecb01880099c9ca74c9dd560b7c613a56d4abfda6811eab65c
SHA51264e3b69f4394637d70799a1aae5d1b37e949092d7ab8bf12afd1583feae420ddeb00faf563ab49425d7b564fa709c8dbb45321290e55e839ccdf642e577b1953
-
Filesize
340KB
MD5b64cb3b5ac26e26aabba5882c88498e1
SHA1b94354f9f07522bd04fa9a1b724d8a6008902eb7
SHA256a001c843fedc8fecb01880099c9ca74c9dd560b7c613a56d4abfda6811eab65c
SHA51264e3b69f4394637d70799a1aae5d1b37e949092d7ab8bf12afd1583feae420ddeb00faf563ab49425d7b564fa709c8dbb45321290e55e839ccdf642e577b1953
-
Filesize
416KB
MD5e8bb96c2d872a5e63402d5516c1894ac
SHA1e1bc788b7c08bf168170c8753bd402ff7b089b5f
SHA25683b471a78dea32883876db467e60e6c8fae70d1e901c0d8868ea8722d6fed25c
SHA5120043ad98b7918b4f24ac4455a448b157b765ef1c558e4afa9365719661c4718569dafbccce896f94d0c61e74ed6c693df2846994417affe08fbba568d82bcb78
-
Filesize
416KB
MD5e8bb96c2d872a5e63402d5516c1894ac
SHA1e1bc788b7c08bf168170c8753bd402ff7b089b5f
SHA25683b471a78dea32883876db467e60e6c8fae70d1e901c0d8868ea8722d6fed25c
SHA5120043ad98b7918b4f24ac4455a448b157b765ef1c558e4afa9365719661c4718569dafbccce896f94d0c61e74ed6c693df2846994417affe08fbba568d82bcb78
-
Filesize
136KB
MD5a737e9507a7d38850157debdc1e5d208
SHA150b952ef777e16503fa8393539e7cbd583417062
SHA2568ca6a5b10fea08013d4892e791bc52b44e10bf59828159990eca706c0d1a9018
SHA51226c99885fc26703a20c3076b0e30c6d00eaf0b2286e4b12ee8341dc4cb853f7c95a8d4bc9c97d0cbe09b990c15c76cacecebed0aef7ae4dd900c905f32c36b9e
-
Filesize
136KB
MD5a737e9507a7d38850157debdc1e5d208
SHA150b952ef777e16503fa8393539e7cbd583417062
SHA2568ca6a5b10fea08013d4892e791bc52b44e10bf59828159990eca706c0d1a9018
SHA51226c99885fc26703a20c3076b0e30c6d00eaf0b2286e4b12ee8341dc4cb853f7c95a8d4bc9c97d0cbe09b990c15c76cacecebed0aef7ae4dd900c905f32c36b9e
-
Filesize
360KB
MD5af0672f3d12f39b9098e7d2c1501f0e8
SHA1ffd638249c513996800164549f46b21b85b8354f
SHA256e18f311da080846d27481c57c44dd7f5930d189f0259f99f43600a90de0456ad
SHA51276b738c92aa22e349f668775e0928773cc512a60c430979021fd686b6f2d5eb5cd42befd4d226aedc7425a1435ec94f501e651074b0ba3228792710a3c17e0a1
-
Filesize
360KB
MD5af0672f3d12f39b9098e7d2c1501f0e8
SHA1ffd638249c513996800164549f46b21b85b8354f
SHA256e18f311da080846d27481c57c44dd7f5930d189f0259f99f43600a90de0456ad
SHA51276b738c92aa22e349f668775e0928773cc512a60c430979021fd686b6f2d5eb5cd42befd4d226aedc7425a1435ec94f501e651074b0ba3228792710a3c17e0a1
-
Filesize
340KB
MD5b64cb3b5ac26e26aabba5882c88498e1
SHA1b94354f9f07522bd04fa9a1b724d8a6008902eb7
SHA256a001c843fedc8fecb01880099c9ca74c9dd560b7c613a56d4abfda6811eab65c
SHA51264e3b69f4394637d70799a1aae5d1b37e949092d7ab8bf12afd1583feae420ddeb00faf563ab49425d7b564fa709c8dbb45321290e55e839ccdf642e577b1953
-
Filesize
340KB
MD5b64cb3b5ac26e26aabba5882c88498e1
SHA1b94354f9f07522bd04fa9a1b724d8a6008902eb7
SHA256a001c843fedc8fecb01880099c9ca74c9dd560b7c613a56d4abfda6811eab65c
SHA51264e3b69f4394637d70799a1aae5d1b37e949092d7ab8bf12afd1583feae420ddeb00faf563ab49425d7b564fa709c8dbb45321290e55e839ccdf642e577b1953
-
Filesize
340KB
MD5b64cb3b5ac26e26aabba5882c88498e1
SHA1b94354f9f07522bd04fa9a1b724d8a6008902eb7
SHA256a001c843fedc8fecb01880099c9ca74c9dd560b7c613a56d4abfda6811eab65c
SHA51264e3b69f4394637d70799a1aae5d1b37e949092d7ab8bf12afd1583feae420ddeb00faf563ab49425d7b564fa709c8dbb45321290e55e839ccdf642e577b1953