Analysis
-
max time kernel
91s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
18/05/2023, 13:42
Static task
static1
Behavioral task
behavioral1
Sample
1ad962f6abf057f0a842298ea76484c808a4171cc92d6cd595edfa153aa3143c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1ad962f6abf057f0a842298ea76484c808a4171cc92d6cd595edfa153aa3143c.exe
Resource
win10v2004-20230220-en
General
-
Target
1ad962f6abf057f0a842298ea76484c808a4171cc92d6cd595edfa153aa3143c.exe
-
Size
1.0MB
-
MD5
51be1f13d729bd2d8cf4b925e4880f1d
-
SHA1
c539b7d8b5be101f9a711209de104c7b59b32e65
-
SHA256
1ad962f6abf057f0a842298ea76484c808a4171cc92d6cd595edfa153aa3143c
-
SHA512
462680afe03ffa1be58de8f67d888c5b805a6c70a07442670f0644f7a4cf6a8a1ffdd86134219445dbfe1bf5fa8533b79a99692d24db8ffefc6c37265395dcba
-
SSDEEP
24576:vyq+Bp+oRUb47ROMjHpIBR7H+KEyt94CzeIwTNUx6pT/WSG:6qxomb4rJIPH+KEyrNAq8pT
Malware Config
Extracted
redline
dream
77.91.68.253:4138
-
auth_value
7b4f26a4ca794e30cee1032d5cb62f5c
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k7754722.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k7754722.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k7754722.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k7754722.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k7754722.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k7754722.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral2/memory/3540-219-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral2/memory/3540-220-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral2/memory/3540-223-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral2/memory/3540-227-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral2/memory/3540-229-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral2/memory/3540-231-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral2/memory/3540-233-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral2/memory/3540-235-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral2/memory/3540-237-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral2/memory/3540-239-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral2/memory/3540-241-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral2/memory/3540-243-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral2/memory/3540-245-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral2/memory/3540-247-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral2/memory/3540-249-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral2/memory/3540-251-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral2/memory/3540-253-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral2/memory/3540-255-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral2/memory/3540-1133-0x0000000004A30000-0x0000000004A40000-memory.dmp family_redline -
Executes dropped EXE 8 IoCs
pid Process 1940 y3610483.exe 1128 y7631986.exe 4000 k7754722.exe 2252 l9226878.exe 4464 m5484426.exe 512 m5484426.exe 404 m5484426.exe 3540 n6844534.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k7754722.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k7754722.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y3610483.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y7631986.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y7631986.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1ad962f6abf057f0a842298ea76484c808a4171cc92d6cd595edfa153aa3143c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1ad962f6abf057f0a842298ea76484c808a4171cc92d6cd595edfa153aa3143c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y3610483.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4464 set thread context of 404 4464 m5484426.exe 86 -
Program crash 1 IoCs
pid pid_target Process procid_target 632 404 WerFault.exe 86 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4000 k7754722.exe 4000 k7754722.exe 2252 l9226878.exe 2252 l9226878.exe 3540 n6844534.exe 3540 n6844534.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4000 k7754722.exe Token: SeDebugPrivilege 2252 l9226878.exe Token: SeDebugPrivilege 4464 m5484426.exe Token: SeDebugPrivilege 3540 n6844534.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 404 m5484426.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 4980 wrote to memory of 1940 4980 1ad962f6abf057f0a842298ea76484c808a4171cc92d6cd595edfa153aa3143c.exe 79 PID 4980 wrote to memory of 1940 4980 1ad962f6abf057f0a842298ea76484c808a4171cc92d6cd595edfa153aa3143c.exe 79 PID 4980 wrote to memory of 1940 4980 1ad962f6abf057f0a842298ea76484c808a4171cc92d6cd595edfa153aa3143c.exe 79 PID 1940 wrote to memory of 1128 1940 y3610483.exe 80 PID 1940 wrote to memory of 1128 1940 y3610483.exe 80 PID 1940 wrote to memory of 1128 1940 y3610483.exe 80 PID 1128 wrote to memory of 4000 1128 y7631986.exe 81 PID 1128 wrote to memory of 4000 1128 y7631986.exe 81 PID 1128 wrote to memory of 4000 1128 y7631986.exe 81 PID 1128 wrote to memory of 2252 1128 y7631986.exe 82 PID 1128 wrote to memory of 2252 1128 y7631986.exe 82 PID 1128 wrote to memory of 2252 1128 y7631986.exe 82 PID 1940 wrote to memory of 4464 1940 y3610483.exe 84 PID 1940 wrote to memory of 4464 1940 y3610483.exe 84 PID 1940 wrote to memory of 4464 1940 y3610483.exe 84 PID 4464 wrote to memory of 512 4464 m5484426.exe 85 PID 4464 wrote to memory of 512 4464 m5484426.exe 85 PID 4464 wrote to memory of 512 4464 m5484426.exe 85 PID 4464 wrote to memory of 512 4464 m5484426.exe 85 PID 4464 wrote to memory of 404 4464 m5484426.exe 86 PID 4464 wrote to memory of 404 4464 m5484426.exe 86 PID 4464 wrote to memory of 404 4464 m5484426.exe 86 PID 4464 wrote to memory of 404 4464 m5484426.exe 86 PID 4464 wrote to memory of 404 4464 m5484426.exe 86 PID 4464 wrote to memory of 404 4464 m5484426.exe 86 PID 4464 wrote to memory of 404 4464 m5484426.exe 86 PID 4464 wrote to memory of 404 4464 m5484426.exe 86 PID 4464 wrote to memory of 404 4464 m5484426.exe 86 PID 4464 wrote to memory of 404 4464 m5484426.exe 86 PID 4980 wrote to memory of 3540 4980 1ad962f6abf057f0a842298ea76484c808a4171cc92d6cd595edfa153aa3143c.exe 90 PID 4980 wrote to memory of 3540 4980 1ad962f6abf057f0a842298ea76484c808a4171cc92d6cd595edfa153aa3143c.exe 90 PID 4980 wrote to memory of 3540 4980 1ad962f6abf057f0a842298ea76484c808a4171cc92d6cd595edfa153aa3143c.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ad962f6abf057f0a842298ea76484c808a4171cc92d6cd595edfa153aa3143c.exe"C:\Users\Admin\AppData\Local\Temp\1ad962f6abf057f0a842298ea76484c808a4171cc92d6cd595edfa153aa3143c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3610483.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3610483.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y7631986.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y7631986.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k7754722.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k7754722.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4000
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l9226878.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l9226878.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2252
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m5484426.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m5484426.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m5484426.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m5484426.exe4⤵
- Executes dropped EXE
PID:512
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m5484426.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m5484426.exe4⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:404 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 404 -s 125⤵
- Program crash
PID:632
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n6844534.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n6844534.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 404 -ip 4041⤵PID:2236
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
284KB
MD546f2bd2fc47b72e39701a3e32fd290e5
SHA12e9aabb3fbfa6bc98bf1e19688c95f3c1d8f9ea6
SHA25663770c12d06562fdc23d6d613fb57c5bfdbad829dc8970abf4b5313e2c4ec242
SHA512864660469bf69c984cabaafbf3f41c4dc1010220457e715563e42e0de6ecc21da8b83c94609fe0eaf31d892232507d22d80021ba336897dbc647b4b0923186c6
-
Filesize
284KB
MD546f2bd2fc47b72e39701a3e32fd290e5
SHA12e9aabb3fbfa6bc98bf1e19688c95f3c1d8f9ea6
SHA25663770c12d06562fdc23d6d613fb57c5bfdbad829dc8970abf4b5313e2c4ec242
SHA512864660469bf69c984cabaafbf3f41c4dc1010220457e715563e42e0de6ecc21da8b83c94609fe0eaf31d892232507d22d80021ba336897dbc647b4b0923186c6
-
Filesize
751KB
MD57df151a6d662d621a1ff28ebf5a2080e
SHA1aebcaff8f5dea886e552d2128df313ef90685b62
SHA256407a2917e82d2d5bf8976fee16241c958db98b04caac8dce15afc63384232261
SHA512e7f2b82adc05695b249e84fb84f7ed35f032314f84933fc2b81e57aa9a5c319983259e7522bde5c177dfa85797d8303b097f55a62d7f50a0afa9aa3bacdc6e35
-
Filesize
751KB
MD57df151a6d662d621a1ff28ebf5a2080e
SHA1aebcaff8f5dea886e552d2128df313ef90685b62
SHA256407a2917e82d2d5bf8976fee16241c958db98b04caac8dce15afc63384232261
SHA512e7f2b82adc05695b249e84fb84f7ed35f032314f84933fc2b81e57aa9a5c319983259e7522bde5c177dfa85797d8303b097f55a62d7f50a0afa9aa3bacdc6e35
-
Filesize
963KB
MD5c1c1b33e6338e381af9e557ce0a223ce
SHA1c6bfb50e11c95a3959feb371051dda81681f085e
SHA256bb7c19411838c5b7c721e490f005970e8b381019626ce9f8a40e28acecb71079
SHA51269a86cb87dc88251fed741816956ece0d239f159b35abe3d4320a7cc14f932a78c51ee4d8594158b524c484d5418a1f77386cc59dd99149b9e3fdecd34bde831
-
Filesize
963KB
MD5c1c1b33e6338e381af9e557ce0a223ce
SHA1c6bfb50e11c95a3959feb371051dda81681f085e
SHA256bb7c19411838c5b7c721e490f005970e8b381019626ce9f8a40e28acecb71079
SHA51269a86cb87dc88251fed741816956ece0d239f159b35abe3d4320a7cc14f932a78c51ee4d8594158b524c484d5418a1f77386cc59dd99149b9e3fdecd34bde831
-
Filesize
963KB
MD5c1c1b33e6338e381af9e557ce0a223ce
SHA1c6bfb50e11c95a3959feb371051dda81681f085e
SHA256bb7c19411838c5b7c721e490f005970e8b381019626ce9f8a40e28acecb71079
SHA51269a86cb87dc88251fed741816956ece0d239f159b35abe3d4320a7cc14f932a78c51ee4d8594158b524c484d5418a1f77386cc59dd99149b9e3fdecd34bde831
-
Filesize
963KB
MD5c1c1b33e6338e381af9e557ce0a223ce
SHA1c6bfb50e11c95a3959feb371051dda81681f085e
SHA256bb7c19411838c5b7c721e490f005970e8b381019626ce9f8a40e28acecb71079
SHA51269a86cb87dc88251fed741816956ece0d239f159b35abe3d4320a7cc14f932a78c51ee4d8594158b524c484d5418a1f77386cc59dd99149b9e3fdecd34bde831
-
Filesize
305KB
MD5a5e832d50572dd75fa7f370b79782d74
SHA1e7544c8ed3573e191c9054b31a9b8b6bdbfdd7e3
SHA256d7e27bc45778f109d5eb3a529800648e35499ee9611c137e37c716b3dffd3f1e
SHA512520e79d9a11251c9bdd5a93097d83221da7a36f4e3840625e4c7a3dc6dc810927aa363ca4f98df351941d14511375426942f91ea5aa95dbb7956626d096487dd
-
Filesize
305KB
MD5a5e832d50572dd75fa7f370b79782d74
SHA1e7544c8ed3573e191c9054b31a9b8b6bdbfdd7e3
SHA256d7e27bc45778f109d5eb3a529800648e35499ee9611c137e37c716b3dffd3f1e
SHA512520e79d9a11251c9bdd5a93097d83221da7a36f4e3840625e4c7a3dc6dc810927aa363ca4f98df351941d14511375426942f91ea5aa95dbb7956626d096487dd
-
Filesize
184KB
MD5994043e64669093ce3bd7b559e0eb25e
SHA18d34811da1c2659b5c54e557d7ae492514e8bedf
SHA2568e6f5e3cd0dd81ccff5e61cc5161ced66b70129775b6d28a70b08ebe41b8dce8
SHA5121158e9c9e2d727bee96df75896525ba92ce7f862e57860bd65ca825a91699c2c8362fa9e3eb6bda5c8f0cb64db151a78c370b552da0020a90560282afa64f113
-
Filesize
184KB
MD5994043e64669093ce3bd7b559e0eb25e
SHA18d34811da1c2659b5c54e557d7ae492514e8bedf
SHA2568e6f5e3cd0dd81ccff5e61cc5161ced66b70129775b6d28a70b08ebe41b8dce8
SHA5121158e9c9e2d727bee96df75896525ba92ce7f862e57860bd65ca825a91699c2c8362fa9e3eb6bda5c8f0cb64db151a78c370b552da0020a90560282afa64f113
-
Filesize
145KB
MD5f51d164aaca43ad8dc88fe0c0ab8f4a6
SHA1debed4bd8754bb7b91dc57affd188e88911c90ad
SHA256c93d8757c8ae9a66a024594a16bec196de427690c2392f015f99288b3add75c5
SHA5123e29c6b32d50fb559d5ad61b014fd67e0f4b6ea7e297132a42e1ecce3efdb8fb4d38d2f38d2f0e2e848d0f52fed4030989b77332e18f92125ebb89a19f6882b3
-
Filesize
145KB
MD5f51d164aaca43ad8dc88fe0c0ab8f4a6
SHA1debed4bd8754bb7b91dc57affd188e88911c90ad
SHA256c93d8757c8ae9a66a024594a16bec196de427690c2392f015f99288b3add75c5
SHA5123e29c6b32d50fb559d5ad61b014fd67e0f4b6ea7e297132a42e1ecce3efdb8fb4d38d2f38d2f0e2e848d0f52fed4030989b77332e18f92125ebb89a19f6882b3