Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
19/05/2023, 01:44
Static task
static1
Behavioral task
behavioral1
Sample
b8e30932b420011082a4d41a9659a350a1a058a511916c4376ed848040a8f194.exe
Resource
win10v2004-20230221-en
General
-
Target
b8e30932b420011082a4d41a9659a350a1a058a511916c4376ed848040a8f194.exe
-
Size
1019KB
-
MD5
c8028db09e8dbc065f1d7573f9b1c3fb
-
SHA1
0d2ec212b2a0514f00a3b57ea62de71e4d92e4b2
-
SHA256
b8e30932b420011082a4d41a9659a350a1a058a511916c4376ed848040a8f194
-
SHA512
7a1139a3d74c3b3af1faac8a66cd22b7f34f4b00350872490b9823970312592343114ccb054526bbb44209d62128f1e245a4266521d8dee4a832ac747678e0fb
-
SSDEEP
24576:jyAJhZXbm4G9Z7i9gEQsiDJtdYqq635YlnWKSTacKKJYTyYMy:2WhZXbo9Z+9g6EO56pN1KKJYW
Malware Config
Extracted
redline
lols
77.91.68.253:41783
-
auth_value
07dccfc2986896754e6cde616a0a7868
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o0514771.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o0514771.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection o0514771.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o0514771.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o0514771.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o0514771.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/224-196-0x00000000049C0000-0x00000000049FC000-memory.dmp family_redline behavioral1/memory/224-197-0x00000000049C0000-0x00000000049FC000-memory.dmp family_redline behavioral1/memory/224-199-0x00000000049C0000-0x00000000049FC000-memory.dmp family_redline behavioral1/memory/224-201-0x00000000049C0000-0x00000000049FC000-memory.dmp family_redline behavioral1/memory/224-203-0x00000000049C0000-0x00000000049FC000-memory.dmp family_redline behavioral1/memory/224-205-0x00000000049C0000-0x00000000049FC000-memory.dmp family_redline behavioral1/memory/224-207-0x00000000049C0000-0x00000000049FC000-memory.dmp family_redline behavioral1/memory/224-209-0x00000000049C0000-0x00000000049FC000-memory.dmp family_redline behavioral1/memory/224-211-0x00000000049C0000-0x00000000049FC000-memory.dmp family_redline behavioral1/memory/224-215-0x00000000049C0000-0x00000000049FC000-memory.dmp family_redline behavioral1/memory/224-218-0x00000000049C0000-0x00000000049FC000-memory.dmp family_redline behavioral1/memory/224-220-0x00000000049C0000-0x00000000049FC000-memory.dmp family_redline behavioral1/memory/224-222-0x00000000049C0000-0x00000000049FC000-memory.dmp family_redline behavioral1/memory/224-224-0x00000000049C0000-0x00000000049FC000-memory.dmp family_redline behavioral1/memory/224-226-0x00000000049C0000-0x00000000049FC000-memory.dmp family_redline behavioral1/memory/224-228-0x00000000049C0000-0x00000000049FC000-memory.dmp family_redline behavioral1/memory/224-230-0x00000000049C0000-0x00000000049FC000-memory.dmp family_redline behavioral1/memory/224-232-0x00000000049C0000-0x00000000049FC000-memory.dmp family_redline behavioral1/memory/224-234-0x00000000049C0000-0x00000000049FC000-memory.dmp family_redline -
Executes dropped EXE 8 IoCs
pid Process 4472 z2269585.exe 4676 z3560251.exe 5100 o0514771.exe 1252 p7299189.exe 224 r5989485.exe 3256 s7282511.exe 4004 s7282511.exe 520 s7282511.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features o0514771.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o0514771.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z2269585.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z3560251.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z3560251.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b8e30932b420011082a4d41a9659a350a1a058a511916c4376ed848040a8f194.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b8e30932b420011082a4d41a9659a350a1a058a511916c4376ed848040a8f194.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z2269585.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3256 set thread context of 520 3256 s7282511.exe 92 -
Program crash 2 IoCs
pid pid_target Process procid_target 3868 1252 WerFault.exe 85 2496 520 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5100 o0514771.exe 5100 o0514771.exe 224 r5989485.exe 224 r5989485.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5100 o0514771.exe Token: SeDebugPrivilege 224 r5989485.exe Token: SeDebugPrivilege 3256 s7282511.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 520 s7282511.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 4484 wrote to memory of 4472 4484 b8e30932b420011082a4d41a9659a350a1a058a511916c4376ed848040a8f194.exe 82 PID 4484 wrote to memory of 4472 4484 b8e30932b420011082a4d41a9659a350a1a058a511916c4376ed848040a8f194.exe 82 PID 4484 wrote to memory of 4472 4484 b8e30932b420011082a4d41a9659a350a1a058a511916c4376ed848040a8f194.exe 82 PID 4472 wrote to memory of 4676 4472 z2269585.exe 83 PID 4472 wrote to memory of 4676 4472 z2269585.exe 83 PID 4472 wrote to memory of 4676 4472 z2269585.exe 83 PID 4676 wrote to memory of 5100 4676 z3560251.exe 84 PID 4676 wrote to memory of 5100 4676 z3560251.exe 84 PID 4676 wrote to memory of 5100 4676 z3560251.exe 84 PID 4676 wrote to memory of 1252 4676 z3560251.exe 85 PID 4676 wrote to memory of 1252 4676 z3560251.exe 85 PID 4676 wrote to memory of 1252 4676 z3560251.exe 85 PID 4472 wrote to memory of 224 4472 z2269585.exe 88 PID 4472 wrote to memory of 224 4472 z2269585.exe 88 PID 4472 wrote to memory of 224 4472 z2269585.exe 88 PID 4484 wrote to memory of 3256 4484 b8e30932b420011082a4d41a9659a350a1a058a511916c4376ed848040a8f194.exe 89 PID 4484 wrote to memory of 3256 4484 b8e30932b420011082a4d41a9659a350a1a058a511916c4376ed848040a8f194.exe 89 PID 4484 wrote to memory of 3256 4484 b8e30932b420011082a4d41a9659a350a1a058a511916c4376ed848040a8f194.exe 89 PID 3256 wrote to memory of 4004 3256 s7282511.exe 90 PID 3256 wrote to memory of 4004 3256 s7282511.exe 90 PID 3256 wrote to memory of 4004 3256 s7282511.exe 90 PID 3256 wrote to memory of 4004 3256 s7282511.exe 90 PID 3256 wrote to memory of 520 3256 s7282511.exe 92 PID 3256 wrote to memory of 520 3256 s7282511.exe 92 PID 3256 wrote to memory of 520 3256 s7282511.exe 92 PID 3256 wrote to memory of 520 3256 s7282511.exe 92 PID 3256 wrote to memory of 520 3256 s7282511.exe 92 PID 3256 wrote to memory of 520 3256 s7282511.exe 92 PID 3256 wrote to memory of 520 3256 s7282511.exe 92 PID 3256 wrote to memory of 520 3256 s7282511.exe 92 PID 3256 wrote to memory of 520 3256 s7282511.exe 92 PID 3256 wrote to memory of 520 3256 s7282511.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8e30932b420011082a4d41a9659a350a1a058a511916c4376ed848040a8f194.exe"C:\Users\Admin\AppData\Local\Temp\b8e30932b420011082a4d41a9659a350a1a058a511916c4376ed848040a8f194.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2269585.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2269585.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3560251.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3560251.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o0514771.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o0514771.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5100
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p7299189.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p7299189.exe4⤵
- Executes dropped EXE
PID:1252 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1252 -s 9285⤵
- Program crash
PID:3868
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5989485.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5989485.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:224
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s7282511.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s7282511.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s7282511.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s7282511.exe3⤵
- Executes dropped EXE
PID:4004
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s7282511.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s7282511.exe3⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:520 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 520 -s 124⤵
- Program crash
PID:2496
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1252 -ip 12521⤵PID:4388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 520 -ip 5201⤵PID:5048
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
962KB
MD585d9db55fa75a177bda1ab34e157fd53
SHA1661660502183661768404f2dd5f6fd83706f75c8
SHA256ca0849e2cb445394b35b3d569b6eba13e4f547b3222270a1d1d3e13143597d05
SHA512483c3eb96496682504cd6793d033ac2a97fe6ab8a4821b90f9d66a9ba5bee0d4f0df27eecefd151577e912cafe3f2e0c270177ddfa2c15aa7b809fac8c128fcc
-
Filesize
962KB
MD585d9db55fa75a177bda1ab34e157fd53
SHA1661660502183661768404f2dd5f6fd83706f75c8
SHA256ca0849e2cb445394b35b3d569b6eba13e4f547b3222270a1d1d3e13143597d05
SHA512483c3eb96496682504cd6793d033ac2a97fe6ab8a4821b90f9d66a9ba5bee0d4f0df27eecefd151577e912cafe3f2e0c270177ddfa2c15aa7b809fac8c128fcc
-
Filesize
962KB
MD585d9db55fa75a177bda1ab34e157fd53
SHA1661660502183661768404f2dd5f6fd83706f75c8
SHA256ca0849e2cb445394b35b3d569b6eba13e4f547b3222270a1d1d3e13143597d05
SHA512483c3eb96496682504cd6793d033ac2a97fe6ab8a4821b90f9d66a9ba5bee0d4f0df27eecefd151577e912cafe3f2e0c270177ddfa2c15aa7b809fac8c128fcc
-
Filesize
962KB
MD585d9db55fa75a177bda1ab34e157fd53
SHA1661660502183661768404f2dd5f6fd83706f75c8
SHA256ca0849e2cb445394b35b3d569b6eba13e4f547b3222270a1d1d3e13143597d05
SHA512483c3eb96496682504cd6793d033ac2a97fe6ab8a4821b90f9d66a9ba5bee0d4f0df27eecefd151577e912cafe3f2e0c270177ddfa2c15aa7b809fac8c128fcc
-
Filesize
576KB
MD541313d6444d14de0d66a46dc78d24dc4
SHA18b7f29f6ff51f4268e9b5da2d908de2603d8be48
SHA256d035e5a6e0da2d578e0e6b7ac4de61cb6dc23750ace8bea43db5e5f93705538e
SHA5128d618645ca48deba748329fd2444d663f6ce37b81f51cb8590b619be7333e10c7da4903623e8ce95e285936c40d4479a705d334d1fcfb4b39dccb645ce4e4070
-
Filesize
576KB
MD541313d6444d14de0d66a46dc78d24dc4
SHA18b7f29f6ff51f4268e9b5da2d908de2603d8be48
SHA256d035e5a6e0da2d578e0e6b7ac4de61cb6dc23750ace8bea43db5e5f93705538e
SHA5128d618645ca48deba748329fd2444d663f6ce37b81f51cb8590b619be7333e10c7da4903623e8ce95e285936c40d4479a705d334d1fcfb4b39dccb645ce4e4070
-
Filesize
284KB
MD5da4e22fd4cb7a2662032ae5bf6249147
SHA1b814067e6aa25b99c21d5c1e270caa4667d4317c
SHA256be2407e5afc58671ce3872cfee97e20fac3682ce915b8b8b7a7ebb47fae66e30
SHA512bfccc3ce40a3adf1ef88faec8dbf457b73eb12a5008d97a66d51f596fa92624a511b1857e684fc57d3a75d65e2e816d347302ae772172592207c2b0cb522eb06
-
Filesize
284KB
MD5da4e22fd4cb7a2662032ae5bf6249147
SHA1b814067e6aa25b99c21d5c1e270caa4667d4317c
SHA256be2407e5afc58671ce3872cfee97e20fac3682ce915b8b8b7a7ebb47fae66e30
SHA512bfccc3ce40a3adf1ef88faec8dbf457b73eb12a5008d97a66d51f596fa92624a511b1857e684fc57d3a75d65e2e816d347302ae772172592207c2b0cb522eb06
-
Filesize
305KB
MD5d3979e7995b3a4ad902faaf46a17f320
SHA1ca3628425557682b312882eb178222707964988f
SHA256054ac74fbe19893a2efc0a42787b374253d35255becf09e8e455758592502fd9
SHA51299da1841eb8f4e726ccdda0901c528f03632dce68869e16125aedfd791d34e686a5bfc0b57a70d7597fa9461c0f64cb39f558a4844939923461cdac9d763b182
-
Filesize
305KB
MD5d3979e7995b3a4ad902faaf46a17f320
SHA1ca3628425557682b312882eb178222707964988f
SHA256054ac74fbe19893a2efc0a42787b374253d35255becf09e8e455758592502fd9
SHA51299da1841eb8f4e726ccdda0901c528f03632dce68869e16125aedfd791d34e686a5bfc0b57a70d7597fa9461c0f64cb39f558a4844939923461cdac9d763b182
-
Filesize
184KB
MD54c94e0df16c58143287479c74f3e54e7
SHA1f93129b20ac587e95b91f611d4c58b3005b140a9
SHA256c55f04038db70d84fe431937ecf878573a31f0777ea612ad482f76c9a9968a2f
SHA51272d63fafde9940b14b6ffcad664c287adadee194d8bd3cd685916814ab2b6be4fee82cd6af2035433a1ec39609d2a4ca74cffa414a92182c06ccd4d86b085f09
-
Filesize
184KB
MD54c94e0df16c58143287479c74f3e54e7
SHA1f93129b20ac587e95b91f611d4c58b3005b140a9
SHA256c55f04038db70d84fe431937ecf878573a31f0777ea612ad482f76c9a9968a2f
SHA51272d63fafde9940b14b6ffcad664c287adadee194d8bd3cd685916814ab2b6be4fee82cd6af2035433a1ec39609d2a4ca74cffa414a92182c06ccd4d86b085f09
-
Filesize
145KB
MD56633962990a012aad8ac3cc9d3b7ed8e
SHA1f110187812482b500120d4c7be03c5d377f3532d
SHA256d78edbeb1d5a18a5570de6e461b7400a748dd7dd6f7889387f688d564f5d0049
SHA512c757735ec6b3ea5956dc011c8774e9caec1337aeab5010e49e7a100b40612c335857d963137fa0a5084a321586ef3b6d130af37dda9da8737b47faad02d7230c
-
Filesize
145KB
MD56633962990a012aad8ac3cc9d3b7ed8e
SHA1f110187812482b500120d4c7be03c5d377f3532d
SHA256d78edbeb1d5a18a5570de6e461b7400a748dd7dd6f7889387f688d564f5d0049
SHA512c757735ec6b3ea5956dc011c8774e9caec1337aeab5010e49e7a100b40612c335857d963137fa0a5084a321586ef3b6d130af37dda9da8737b47faad02d7230c