Analysis
-
max time kernel
90s -
max time network
92s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
20/05/2023, 00:12
Static task
static1
Behavioral task
behavioral1
Sample
f7654b4982c0403301f0c20dcdb4e38280a373224da58391df35376f98841ae5.exe
Resource
win10-20230220-en
General
-
Target
f7654b4982c0403301f0c20dcdb4e38280a373224da58391df35376f98841ae5.exe
-
Size
1.0MB
-
MD5
d740b2ba5cb1a488aa05ea50147b31a3
-
SHA1
756f2accef0d3e646ff272919286ed213c585a51
-
SHA256
f7654b4982c0403301f0c20dcdb4e38280a373224da58391df35376f98841ae5
-
SHA512
7d2ab7b1cca8468b827098af93a89b0d91ab6f9126810989ab5d5d5628bfd7ae50b213ab9d1634b0b20a3656145ed59011a827cacea5b8fd8a2da8a5174c4f4e
-
SSDEEP
12288:CMrDy90b99WrSdrRcmcceqo9D2heFnSo2Kh1nNSsVMEDXyfvOPpILqOx8BMDDORv:ZyGrn3c5cJhYSALssuEDyq6k2DDOtBJ
Malware Config
Extracted
redline
deren
77.91.68.253:19065
-
auth_value
04a169f1fb198bfbeca74d0e06ea2d54
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g3309356.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g3309356.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g3309356.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g3309356.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g3309356.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4588-205-0x00000000021C0000-0x0000000002204000-memory.dmp family_redline behavioral1/memory/4588-206-0x0000000002460000-0x00000000024A0000-memory.dmp family_redline behavioral1/memory/4588-208-0x0000000002460000-0x000000000249C000-memory.dmp family_redline behavioral1/memory/4588-209-0x0000000002460000-0x000000000249C000-memory.dmp family_redline behavioral1/memory/4588-211-0x0000000002460000-0x000000000249C000-memory.dmp family_redline behavioral1/memory/4588-213-0x0000000002460000-0x000000000249C000-memory.dmp family_redline behavioral1/memory/4588-215-0x0000000002460000-0x000000000249C000-memory.dmp family_redline behavioral1/memory/4588-217-0x0000000002460000-0x000000000249C000-memory.dmp family_redline behavioral1/memory/4588-219-0x0000000002460000-0x000000000249C000-memory.dmp family_redline behavioral1/memory/4588-221-0x0000000002460000-0x000000000249C000-memory.dmp family_redline behavioral1/memory/4588-223-0x0000000002460000-0x000000000249C000-memory.dmp family_redline behavioral1/memory/4588-225-0x0000000002460000-0x000000000249C000-memory.dmp family_redline behavioral1/memory/4588-227-0x0000000002460000-0x000000000249C000-memory.dmp family_redline behavioral1/memory/4588-229-0x0000000002460000-0x000000000249C000-memory.dmp family_redline behavioral1/memory/4588-231-0x0000000002460000-0x000000000249C000-memory.dmp family_redline behavioral1/memory/4588-233-0x0000000002460000-0x000000000249C000-memory.dmp family_redline behavioral1/memory/4588-235-0x0000000002460000-0x000000000249C000-memory.dmp family_redline behavioral1/memory/4588-237-0x0000000002460000-0x000000000249C000-memory.dmp family_redline behavioral1/memory/4588-239-0x0000000002460000-0x000000000249C000-memory.dmp family_redline behavioral1/memory/4588-241-0x0000000002460000-0x000000000249C000-memory.dmp family_redline -
Executes dropped EXE 7 IoCs
pid Process 8 x5589461.exe 4720 x1821714.exe 4796 f2868356.exe 1060 g3309356.exe 4504 h7134062.exe 4544 h7134062.exe 4588 i4294653.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" g3309356.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features g3309356.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f7654b4982c0403301f0c20dcdb4e38280a373224da58391df35376f98841ae5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f7654b4982c0403301f0c20dcdb4e38280a373224da58391df35376f98841ae5.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x5589461.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x5589461.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x1821714.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x1821714.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4504 set thread context of 4544 4504 h7134062.exe 72 -
Program crash 1 IoCs
pid pid_target Process procid_target 1932 4544 WerFault.exe 72 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4796 f2868356.exe 4796 f2868356.exe 1060 g3309356.exe 1060 g3309356.exe 4588 i4294653.exe 4588 i4294653.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4796 f2868356.exe Token: SeDebugPrivilege 1060 g3309356.exe Token: SeDebugPrivilege 4504 h7134062.exe Token: SeDebugPrivilege 4588 i4294653.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 4188 wrote to memory of 8 4188 f7654b4982c0403301f0c20dcdb4e38280a373224da58391df35376f98841ae5.exe 66 PID 4188 wrote to memory of 8 4188 f7654b4982c0403301f0c20dcdb4e38280a373224da58391df35376f98841ae5.exe 66 PID 4188 wrote to memory of 8 4188 f7654b4982c0403301f0c20dcdb4e38280a373224da58391df35376f98841ae5.exe 66 PID 8 wrote to memory of 4720 8 x5589461.exe 67 PID 8 wrote to memory of 4720 8 x5589461.exe 67 PID 8 wrote to memory of 4720 8 x5589461.exe 67 PID 4720 wrote to memory of 4796 4720 x1821714.exe 68 PID 4720 wrote to memory of 4796 4720 x1821714.exe 68 PID 4720 wrote to memory of 4796 4720 x1821714.exe 68 PID 4720 wrote to memory of 1060 4720 x1821714.exe 70 PID 4720 wrote to memory of 1060 4720 x1821714.exe 70 PID 4720 wrote to memory of 1060 4720 x1821714.exe 70 PID 8 wrote to memory of 4504 8 x5589461.exe 71 PID 8 wrote to memory of 4504 8 x5589461.exe 71 PID 8 wrote to memory of 4504 8 x5589461.exe 71 PID 4504 wrote to memory of 4544 4504 h7134062.exe 72 PID 4504 wrote to memory of 4544 4504 h7134062.exe 72 PID 4504 wrote to memory of 4544 4504 h7134062.exe 72 PID 4504 wrote to memory of 4544 4504 h7134062.exe 72 PID 4504 wrote to memory of 4544 4504 h7134062.exe 72 PID 4504 wrote to memory of 4544 4504 h7134062.exe 72 PID 4504 wrote to memory of 4544 4504 h7134062.exe 72 PID 4504 wrote to memory of 4544 4504 h7134062.exe 72 PID 4504 wrote to memory of 4544 4504 h7134062.exe 72 PID 4504 wrote to memory of 4544 4504 h7134062.exe 72 PID 4188 wrote to memory of 4588 4188 f7654b4982c0403301f0c20dcdb4e38280a373224da58391df35376f98841ae5.exe 74 PID 4188 wrote to memory of 4588 4188 f7654b4982c0403301f0c20dcdb4e38280a373224da58391df35376f98841ae5.exe 74 PID 4188 wrote to memory of 4588 4188 f7654b4982c0403301f0c20dcdb4e38280a373224da58391df35376f98841ae5.exe 74
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7654b4982c0403301f0c20dcdb4e38280a373224da58391df35376f98841ae5.exe"C:\Users\Admin\AppData\Local\Temp\f7654b4982c0403301f0c20dcdb4e38280a373224da58391df35376f98841ae5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5589461.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5589461.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1821714.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1821714.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f2868356.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f2868356.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4796
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g3309356.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g3309356.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1060
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h7134062.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h7134062.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h7134062.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h7134062.exe4⤵
- Executes dropped EXE
PID:4544 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4544 -s 245⤵
- Program crash
PID:1932
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i4294653.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i4294653.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4588
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
284KB
MD5dd2e6f17cfddda94d7dd92a65ed2ea33
SHA18bd516a85527fda566827497b048ff932d98c553
SHA2562b9e858572cf0726fe5b64150db5e473b884c1900fd0f68a65f25a66d1c274c3
SHA512880244ff73c9e6b86e6b8a34a712d38529f6844e7a9d830a84b71d707f5c1a2e6e8e6f680cd415df45fa16ccee72f9883cdbd9aea698d0c5c77feeaebb4c6f52
-
Filesize
284KB
MD5dd2e6f17cfddda94d7dd92a65ed2ea33
SHA18bd516a85527fda566827497b048ff932d98c553
SHA2562b9e858572cf0726fe5b64150db5e473b884c1900fd0f68a65f25a66d1c274c3
SHA512880244ff73c9e6b86e6b8a34a712d38529f6844e7a9d830a84b71d707f5c1a2e6e8e6f680cd415df45fa16ccee72f9883cdbd9aea698d0c5c77feeaebb4c6f52
-
Filesize
750KB
MD531c82f991f9cc3d2f437a62f4dae2646
SHA12a4534f5a2c34a96ff2e6df1564e4240dc0fd127
SHA2565a7ed1eb0927bfa15c1d557cd31819176c0da477f5b3c0121e5754c194bb2d3a
SHA512702fff809a6e8911bc1c41381a8d97c341ec7d6e23dacbd4c7fa69086111c8a5a2c7489338fca00f7c8fd9d19488e580551dfd0ddee7fba7c8675e698e084303
-
Filesize
750KB
MD531c82f991f9cc3d2f437a62f4dae2646
SHA12a4534f5a2c34a96ff2e6df1564e4240dc0fd127
SHA2565a7ed1eb0927bfa15c1d557cd31819176c0da477f5b3c0121e5754c194bb2d3a
SHA512702fff809a6e8911bc1c41381a8d97c341ec7d6e23dacbd4c7fa69086111c8a5a2c7489338fca00f7c8fd9d19488e580551dfd0ddee7fba7c8675e698e084303
-
Filesize
963KB
MD589d6ffb1adc15eaab83f69780f6d4ddf
SHA1df11181545e71759a36e2921896c91c931094bbf
SHA256597fafe4d0394af70d430050f557db2b7347a0466c40101f8f2d60c9cbd4c354
SHA512d6ca8da93d049e8be37b5206a52accd25daeb0d505d03ad089897cfabc5e78894a561dc2ef4804a1bc0c5f6e524627141360edf025913795f241fed25d17ce42
-
Filesize
963KB
MD589d6ffb1adc15eaab83f69780f6d4ddf
SHA1df11181545e71759a36e2921896c91c931094bbf
SHA256597fafe4d0394af70d430050f557db2b7347a0466c40101f8f2d60c9cbd4c354
SHA512d6ca8da93d049e8be37b5206a52accd25daeb0d505d03ad089897cfabc5e78894a561dc2ef4804a1bc0c5f6e524627141360edf025913795f241fed25d17ce42
-
Filesize
963KB
MD589d6ffb1adc15eaab83f69780f6d4ddf
SHA1df11181545e71759a36e2921896c91c931094bbf
SHA256597fafe4d0394af70d430050f557db2b7347a0466c40101f8f2d60c9cbd4c354
SHA512d6ca8da93d049e8be37b5206a52accd25daeb0d505d03ad089897cfabc5e78894a561dc2ef4804a1bc0c5f6e524627141360edf025913795f241fed25d17ce42
-
Filesize
306KB
MD5e3d9d3435ee00bbb553ba900fbf1ccd2
SHA17d65ddcb390a4a6061e20294feda6dab7674e262
SHA256f0e0a0afadd19edf9455f9893e9f79294b6f47b20b9df53aa5f505585e154e52
SHA512620d318e7699d4fb89263ccb482c5c9be344f991b59f30aca449f69866ebce4b26bcc356ada6dd7dca71dd2c707eca161c4d6150f2a27b41384f9832de3a071a
-
Filesize
306KB
MD5e3d9d3435ee00bbb553ba900fbf1ccd2
SHA17d65ddcb390a4a6061e20294feda6dab7674e262
SHA256f0e0a0afadd19edf9455f9893e9f79294b6f47b20b9df53aa5f505585e154e52
SHA512620d318e7699d4fb89263ccb482c5c9be344f991b59f30aca449f69866ebce4b26bcc356ada6dd7dca71dd2c707eca161c4d6150f2a27b41384f9832de3a071a
-
Filesize
145KB
MD50c9f215fbf2554907e83f1d7aab5de8b
SHA10319137c64116bb5f4aada01c89ad2885c065990
SHA256dbaa1d59fbc5dc8712b1fa8a56c054d57071ccceba2d7b04a8bba91fdf5cd433
SHA512f8d1a3ade6fd62684833858af13d00bd32bd1fa7d1f752b1fc94fa1ccff5bf107a290500146cc78de4b52c93a47df6f27834dbc71418f6d8c8c95aba871c6e68
-
Filesize
145KB
MD50c9f215fbf2554907e83f1d7aab5de8b
SHA10319137c64116bb5f4aada01c89ad2885c065990
SHA256dbaa1d59fbc5dc8712b1fa8a56c054d57071ccceba2d7b04a8bba91fdf5cd433
SHA512f8d1a3ade6fd62684833858af13d00bd32bd1fa7d1f752b1fc94fa1ccff5bf107a290500146cc78de4b52c93a47df6f27834dbc71418f6d8c8c95aba871c6e68
-
Filesize
184KB
MD51e3320c5be3741dfaae2c4d55f329163
SHA10d34904eb28f779645e8ad488ed85202b7cec0b0
SHA256a251117120ba1309ec82caa6488fcc4413a57d14d99b8b76712fa3ba90ddb690
SHA51272584143080a3358f4f21f947b4b79e8ace2291d3687a6c4c7c3355413a91c0a3a7781a57e919c1f9e27444d2a3b65e2661599658584a71b29e293fa47a24e0b
-
Filesize
184KB
MD51e3320c5be3741dfaae2c4d55f329163
SHA10d34904eb28f779645e8ad488ed85202b7cec0b0
SHA256a251117120ba1309ec82caa6488fcc4413a57d14d99b8b76712fa3ba90ddb690
SHA51272584143080a3358f4f21f947b4b79e8ace2291d3687a6c4c7c3355413a91c0a3a7781a57e919c1f9e27444d2a3b65e2661599658584a71b29e293fa47a24e0b