Analysis
-
max time kernel
59s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19/05/2023, 12:27
Static task
static1
Behavioral task
behavioral1
Sample
2fd2feba6bd44c7fc88285cde61e84faea2ef90788efa583d314c2ecaa48b7b4.exe
Resource
win10v2004-20230220-en
General
-
Target
2fd2feba6bd44c7fc88285cde61e84faea2ef90788efa583d314c2ecaa48b7b4.exe
-
Size
1.0MB
-
MD5
439b246eb9ffda3cbd363190f06b0d9a
-
SHA1
e510493ca440037e544e96332246d21b80c430ea
-
SHA256
2fd2feba6bd44c7fc88285cde61e84faea2ef90788efa583d314c2ecaa48b7b4
-
SHA512
554aec13d3816bb2e0559f2740f71d81b74b8e669f440358b0a4787e66d7d749ea48ecbd5ceda32de9addfc8b2577ce59bb7cf16efff0cf2fd5d646e531b006b
-
SSDEEP
24576:fyaVOx48A4yA/foh/VLryFLfYqVLIyl9iwf1g:qaVOK8A4yAY5VaVrV8y3iw
Malware Config
Extracted
redline
muser
77.91.68.253:19065
-
auth_value
ab307a8e027ba1296455e3d548f168a3
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a1669123.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a1669123.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a1669123.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a1669123.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a1669123.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a1669123.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/5068-218-0x0000000004AD0000-0x0000000004B0C000-memory.dmp family_redline behavioral1/memory/5068-219-0x0000000004AD0000-0x0000000004B0C000-memory.dmp family_redline behavioral1/memory/5068-221-0x0000000004AD0000-0x0000000004B0C000-memory.dmp family_redline behavioral1/memory/5068-227-0x0000000004AD0000-0x0000000004B0C000-memory.dmp family_redline behavioral1/memory/5068-230-0x0000000004AD0000-0x0000000004B0C000-memory.dmp family_redline behavioral1/memory/5068-224-0x0000000004AD0000-0x0000000004B0C000-memory.dmp family_redline behavioral1/memory/5068-232-0x0000000004AD0000-0x0000000004B0C000-memory.dmp family_redline behavioral1/memory/5068-234-0x0000000004AD0000-0x0000000004B0C000-memory.dmp family_redline behavioral1/memory/5068-236-0x0000000004AD0000-0x0000000004B0C000-memory.dmp family_redline behavioral1/memory/5068-238-0x0000000004AD0000-0x0000000004B0C000-memory.dmp family_redline behavioral1/memory/5068-240-0x0000000004AD0000-0x0000000004B0C000-memory.dmp family_redline behavioral1/memory/5068-242-0x0000000004AD0000-0x0000000004B0C000-memory.dmp family_redline behavioral1/memory/5068-244-0x0000000004AD0000-0x0000000004B0C000-memory.dmp family_redline behavioral1/memory/5068-246-0x0000000004AD0000-0x0000000004B0C000-memory.dmp family_redline behavioral1/memory/5068-248-0x0000000004AD0000-0x0000000004B0C000-memory.dmp family_redline behavioral1/memory/5068-250-0x0000000004AD0000-0x0000000004B0C000-memory.dmp family_redline behavioral1/memory/5068-252-0x0000000004AD0000-0x0000000004B0C000-memory.dmp family_redline behavioral1/memory/5068-254-0x0000000004AD0000-0x0000000004B0C000-memory.dmp family_redline behavioral1/memory/5068-1131-0x0000000004B10000-0x0000000004B20000-memory.dmp family_redline -
Executes dropped EXE 8 IoCs
pid Process 3116 v4365767.exe 3572 v4593371.exe 1960 a1669123.exe 4448 b2140038.exe 3172 c1739977.exe 5112 c1739977.exe 5080 c1739977.exe 5068 d7539028.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a1669123.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a1669123.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v4365767.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v4365767.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v4593371.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v4593371.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2fd2feba6bd44c7fc88285cde61e84faea2ef90788efa583d314c2ecaa48b7b4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2fd2feba6bd44c7fc88285cde61e84faea2ef90788efa583d314c2ecaa48b7b4.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3172 set thread context of 5080 3172 c1739977.exe 92 -
Program crash 1 IoCs
pid pid_target Process procid_target 4372 5080 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1960 a1669123.exe 1960 a1669123.exe 4448 b2140038.exe 4448 b2140038.exe 5068 d7539028.exe 5068 d7539028.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1960 a1669123.exe Token: SeDebugPrivilege 4448 b2140038.exe Token: SeDebugPrivilege 3172 c1739977.exe Token: SeDebugPrivilege 5068 d7539028.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 5080 c1739977.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 4932 wrote to memory of 3116 4932 2fd2feba6bd44c7fc88285cde61e84faea2ef90788efa583d314c2ecaa48b7b4.exe 85 PID 4932 wrote to memory of 3116 4932 2fd2feba6bd44c7fc88285cde61e84faea2ef90788efa583d314c2ecaa48b7b4.exe 85 PID 4932 wrote to memory of 3116 4932 2fd2feba6bd44c7fc88285cde61e84faea2ef90788efa583d314c2ecaa48b7b4.exe 85 PID 3116 wrote to memory of 3572 3116 v4365767.exe 86 PID 3116 wrote to memory of 3572 3116 v4365767.exe 86 PID 3116 wrote to memory of 3572 3116 v4365767.exe 86 PID 3572 wrote to memory of 1960 3572 v4593371.exe 87 PID 3572 wrote to memory of 1960 3572 v4593371.exe 87 PID 3572 wrote to memory of 1960 3572 v4593371.exe 87 PID 3572 wrote to memory of 4448 3572 v4593371.exe 88 PID 3572 wrote to memory of 4448 3572 v4593371.exe 88 PID 3572 wrote to memory of 4448 3572 v4593371.exe 88 PID 3116 wrote to memory of 3172 3116 v4365767.exe 89 PID 3116 wrote to memory of 3172 3116 v4365767.exe 89 PID 3116 wrote to memory of 3172 3116 v4365767.exe 89 PID 3172 wrote to memory of 5112 3172 c1739977.exe 90 PID 3172 wrote to memory of 5112 3172 c1739977.exe 90 PID 3172 wrote to memory of 5112 3172 c1739977.exe 90 PID 3172 wrote to memory of 5112 3172 c1739977.exe 90 PID 3172 wrote to memory of 5080 3172 c1739977.exe 92 PID 3172 wrote to memory of 5080 3172 c1739977.exe 92 PID 3172 wrote to memory of 5080 3172 c1739977.exe 92 PID 3172 wrote to memory of 5080 3172 c1739977.exe 92 PID 3172 wrote to memory of 5080 3172 c1739977.exe 92 PID 3172 wrote to memory of 5080 3172 c1739977.exe 92 PID 3172 wrote to memory of 5080 3172 c1739977.exe 92 PID 3172 wrote to memory of 5080 3172 c1739977.exe 92 PID 3172 wrote to memory of 5080 3172 c1739977.exe 92 PID 3172 wrote to memory of 5080 3172 c1739977.exe 92 PID 4932 wrote to memory of 5068 4932 2fd2feba6bd44c7fc88285cde61e84faea2ef90788efa583d314c2ecaa48b7b4.exe 94 PID 4932 wrote to memory of 5068 4932 2fd2feba6bd44c7fc88285cde61e84faea2ef90788efa583d314c2ecaa48b7b4.exe 94 PID 4932 wrote to memory of 5068 4932 2fd2feba6bd44c7fc88285cde61e84faea2ef90788efa583d314c2ecaa48b7b4.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\2fd2feba6bd44c7fc88285cde61e84faea2ef90788efa583d314c2ecaa48b7b4.exe"C:\Users\Admin\AppData\Local\Temp\2fd2feba6bd44c7fc88285cde61e84faea2ef90788efa583d314c2ecaa48b7b4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4365767.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4365767.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4593371.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4593371.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a1669123.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a1669123.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1960
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2140038.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2140038.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4448
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c1739977.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c1739977.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c1739977.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c1739977.exe4⤵
- Executes dropped EXE
PID:5112
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c1739977.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c1739977.exe4⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:5080 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 125⤵
- Program crash
PID:4372
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d7539028.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d7539028.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 5080 -ip 50801⤵PID:3108
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
284KB
MD5efd4292d063bd41763a7ab16d4a783f9
SHA11da780dcf0f4403d2789ae7dd8081d5a2c36dcd9
SHA2565b6a00fbfcb038fe021cec2bdf35644aa600edb69a6bb7f89105f03e78815c6e
SHA5127db8b007b07110951d8fd41289ce1e464f055465d3514e6e603715e97e23aa312ec59fa1a2b3a0efa1778dfa66c8700e621f5489fba0f55f1f243ae0e55e6648
-
Filesize
284KB
MD5efd4292d063bd41763a7ab16d4a783f9
SHA11da780dcf0f4403d2789ae7dd8081d5a2c36dcd9
SHA2565b6a00fbfcb038fe021cec2bdf35644aa600edb69a6bb7f89105f03e78815c6e
SHA5127db8b007b07110951d8fd41289ce1e464f055465d3514e6e603715e97e23aa312ec59fa1a2b3a0efa1778dfa66c8700e621f5489fba0f55f1f243ae0e55e6648
-
Filesize
750KB
MD54d0e83eb0dd042940d7625dd713886f5
SHA142244897b97ad9462eea3339aee7f978b1126be6
SHA25601dc477a2bccf6e8006532bc8e686774767e066397e7c1017abd03c4cc3815af
SHA51202fe9ae7880cb83b75a9a35295bdf84d4f983cb8fa8332a685b6f51611cae9883d056e98c5eec0d6e1528ec50e9da304c5f9cbdb60ac3937949e2d0a7b4dc02b
-
Filesize
750KB
MD54d0e83eb0dd042940d7625dd713886f5
SHA142244897b97ad9462eea3339aee7f978b1126be6
SHA25601dc477a2bccf6e8006532bc8e686774767e066397e7c1017abd03c4cc3815af
SHA51202fe9ae7880cb83b75a9a35295bdf84d4f983cb8fa8332a685b6f51611cae9883d056e98c5eec0d6e1528ec50e9da304c5f9cbdb60ac3937949e2d0a7b4dc02b
-
Filesize
963KB
MD51c2797303780004c682b7aedb885b677
SHA198b09ba28654a987df94af4585a2648af08241bb
SHA256be5bf62bea5139a428d0c188c712167487867b483c5c783492682f2edcfcaf8c
SHA512ad2c3e26e26de48a04eeea39e279b88730f93d2a41768e2f88ff490961adca5139a03a439849b3746577a16c2ddf4b8fada84eeb5c9708513173ec0507a4cc1a
-
Filesize
963KB
MD51c2797303780004c682b7aedb885b677
SHA198b09ba28654a987df94af4585a2648af08241bb
SHA256be5bf62bea5139a428d0c188c712167487867b483c5c783492682f2edcfcaf8c
SHA512ad2c3e26e26de48a04eeea39e279b88730f93d2a41768e2f88ff490961adca5139a03a439849b3746577a16c2ddf4b8fada84eeb5c9708513173ec0507a4cc1a
-
Filesize
963KB
MD51c2797303780004c682b7aedb885b677
SHA198b09ba28654a987df94af4585a2648af08241bb
SHA256be5bf62bea5139a428d0c188c712167487867b483c5c783492682f2edcfcaf8c
SHA512ad2c3e26e26de48a04eeea39e279b88730f93d2a41768e2f88ff490961adca5139a03a439849b3746577a16c2ddf4b8fada84eeb5c9708513173ec0507a4cc1a
-
Filesize
963KB
MD51c2797303780004c682b7aedb885b677
SHA198b09ba28654a987df94af4585a2648af08241bb
SHA256be5bf62bea5139a428d0c188c712167487867b483c5c783492682f2edcfcaf8c
SHA512ad2c3e26e26de48a04eeea39e279b88730f93d2a41768e2f88ff490961adca5139a03a439849b3746577a16c2ddf4b8fada84eeb5c9708513173ec0507a4cc1a
-
Filesize
305KB
MD50d61c85edcd904b985c3d6ff0ab77b0f
SHA1ed75ebaae880158dc80ac146b05450979d194667
SHA2567a6c29d6c7ee3e13f6e3ded09bbb5d51adcfc4429487a095f2d4c950de40e31d
SHA5125b4b2242f646363c7d7e1e70aea2455b4451a7de3ac1f4b12101892581eec37f4ceb55e9bffdf60b9abf666ae7bfd63b0719d6bd13b23f5d51d73cf250dab542
-
Filesize
305KB
MD50d61c85edcd904b985c3d6ff0ab77b0f
SHA1ed75ebaae880158dc80ac146b05450979d194667
SHA2567a6c29d6c7ee3e13f6e3ded09bbb5d51adcfc4429487a095f2d4c950de40e31d
SHA5125b4b2242f646363c7d7e1e70aea2455b4451a7de3ac1f4b12101892581eec37f4ceb55e9bffdf60b9abf666ae7bfd63b0719d6bd13b23f5d51d73cf250dab542
-
Filesize
184KB
MD5ad8778d8924f2e9b321e7dea93de88c8
SHA11dfe8ccba36d43d7eae85e47ec785da9168e1f2e
SHA256934873cb5b76933727ef914c6c4beaa6b45888226dab01da3d904bb8ba5e7f5a
SHA51254bb1a2661570c88ba4b12b02cad5a1c1ecf308326a6f378e1380249404c1b5bfdf65e8127156c7839e370287f7f549b6efaaf1296dbdc0e699cb0df0a2c469d
-
Filesize
184KB
MD5ad8778d8924f2e9b321e7dea93de88c8
SHA11dfe8ccba36d43d7eae85e47ec785da9168e1f2e
SHA256934873cb5b76933727ef914c6c4beaa6b45888226dab01da3d904bb8ba5e7f5a
SHA51254bb1a2661570c88ba4b12b02cad5a1c1ecf308326a6f378e1380249404c1b5bfdf65e8127156c7839e370287f7f549b6efaaf1296dbdc0e699cb0df0a2c469d
-
Filesize
145KB
MD5408f0a28976e118c292bb603819e48cc
SHA12c99769d994b569dd186fd40dea1830588f307a0
SHA256847b96aa5a09d2171565c0318d3218ceb03899b8656d52ad1f05e6daf9a5ed55
SHA512242c341a0aff5a1a3e7d6b5ec6544e1819673e7da0382dcd06bf66a39fe2624f243826ccc2b241b4a0b0d3629b66912dff66ca60a3c2f64f7b2c0e261cda9c7e
-
Filesize
145KB
MD5408f0a28976e118c292bb603819e48cc
SHA12c99769d994b569dd186fd40dea1830588f307a0
SHA256847b96aa5a09d2171565c0318d3218ceb03899b8656d52ad1f05e6daf9a5ed55
SHA512242c341a0aff5a1a3e7d6b5ec6544e1819673e7da0382dcd06bf66a39fe2624f243826ccc2b241b4a0b0d3629b66912dff66ca60a3c2f64f7b2c0e261cda9c7e