Analysis
-
max time kernel
62s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2023, 18:11
Static task
static1
Behavioral task
behavioral1
Sample
wallet.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
wallet.exe
Resource
win10v2004-20230220-en
General
-
Target
wallet.exe
-
Size
1.0MB
-
MD5
02402ffde947a6a13163f323aacd2e98
-
SHA1
7bcf3faec49831202e9795a00aa1d2d262942819
-
SHA256
2d4fadc4565beb42e8e00717f4343f6ba86bf906680fc78ad18383ada904e17d
-
SHA512
617eb17c8a366e8c9a525ec883368247c8acf25ae5972a0d49f1a661c41ac162ff35b7d21ba16cdf8f221b4d3892673eb36afb872e04acb42abd8660726cac37
-
SSDEEP
24576:Iy5XstlTRjRkxwmwNxn9zNcyFUIlgNrFkgTwOOt0:PVyTRjULohPjyISvkgTg
Malware Config
Extracted
redline
deren
77.91.68.253:19065
-
auth_value
04a169f1fb198bfbeca74d0e06ea2d54
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k5914143.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k5914143.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k5914143.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k5914143.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k5914143.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k5914143.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral2/memory/1092-215-0x00000000049C0000-0x00000000049FC000-memory.dmp family_redline behavioral2/memory/1092-216-0x00000000049C0000-0x00000000049FC000-memory.dmp family_redline behavioral2/memory/1092-218-0x00000000049C0000-0x00000000049FC000-memory.dmp family_redline behavioral2/memory/1092-220-0x00000000049C0000-0x00000000049FC000-memory.dmp family_redline behavioral2/memory/1092-222-0x00000000049C0000-0x00000000049FC000-memory.dmp family_redline behavioral2/memory/1092-224-0x00000000049C0000-0x00000000049FC000-memory.dmp family_redline behavioral2/memory/1092-226-0x00000000049C0000-0x00000000049FC000-memory.dmp family_redline behavioral2/memory/1092-228-0x00000000049C0000-0x00000000049FC000-memory.dmp family_redline behavioral2/memory/1092-230-0x00000000049C0000-0x00000000049FC000-memory.dmp family_redline behavioral2/memory/1092-233-0x00000000049C0000-0x00000000049FC000-memory.dmp family_redline behavioral2/memory/1092-237-0x00000000049C0000-0x00000000049FC000-memory.dmp family_redline behavioral2/memory/1092-239-0x00000000049C0000-0x00000000049FC000-memory.dmp family_redline behavioral2/memory/1092-241-0x00000000049C0000-0x00000000049FC000-memory.dmp family_redline behavioral2/memory/1092-243-0x00000000049C0000-0x00000000049FC000-memory.dmp family_redline behavioral2/memory/1092-245-0x00000000049C0000-0x00000000049FC000-memory.dmp family_redline behavioral2/memory/1092-247-0x00000000049C0000-0x00000000049FC000-memory.dmp family_redline behavioral2/memory/1092-249-0x00000000049C0000-0x00000000049FC000-memory.dmp family_redline behavioral2/memory/1092-251-0x00000000049C0000-0x00000000049FC000-memory.dmp family_redline -
Executes dropped EXE 7 IoCs
pid Process 2676 y3257651.exe 1376 y0237798.exe 3852 k5914143.exe 5064 l3336932.exe 4448 m3509590.exe 4108 m3509590.exe 1092 n2131906.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k5914143.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k5914143.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce wallet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" wallet.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y3257651.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y3257651.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y0237798.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y0237798.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4448 set thread context of 4108 4448 m3509590.exe 85 -
Program crash 1 IoCs
pid pid_target Process procid_target 996 4108 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3852 k5914143.exe 3852 k5914143.exe 5064 l3336932.exe 5064 l3336932.exe 1092 n2131906.exe 1092 n2131906.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3852 k5914143.exe Token: SeDebugPrivilege 5064 l3336932.exe Token: SeDebugPrivilege 4448 m3509590.exe Token: SeDebugPrivilege 1092 n2131906.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 4108 m3509590.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2676 2072 wallet.exe 79 PID 2072 wrote to memory of 2676 2072 wallet.exe 79 PID 2072 wrote to memory of 2676 2072 wallet.exe 79 PID 2676 wrote to memory of 1376 2676 y3257651.exe 80 PID 2676 wrote to memory of 1376 2676 y3257651.exe 80 PID 2676 wrote to memory of 1376 2676 y3257651.exe 80 PID 1376 wrote to memory of 3852 1376 y0237798.exe 81 PID 1376 wrote to memory of 3852 1376 y0237798.exe 81 PID 1376 wrote to memory of 3852 1376 y0237798.exe 81 PID 1376 wrote to memory of 5064 1376 y0237798.exe 82 PID 1376 wrote to memory of 5064 1376 y0237798.exe 82 PID 1376 wrote to memory of 5064 1376 y0237798.exe 82 PID 2676 wrote to memory of 4448 2676 y3257651.exe 84 PID 2676 wrote to memory of 4448 2676 y3257651.exe 84 PID 2676 wrote to memory of 4448 2676 y3257651.exe 84 PID 4448 wrote to memory of 4108 4448 m3509590.exe 85 PID 4448 wrote to memory of 4108 4448 m3509590.exe 85 PID 4448 wrote to memory of 4108 4448 m3509590.exe 85 PID 4448 wrote to memory of 4108 4448 m3509590.exe 85 PID 4448 wrote to memory of 4108 4448 m3509590.exe 85 PID 4448 wrote to memory of 4108 4448 m3509590.exe 85 PID 4448 wrote to memory of 4108 4448 m3509590.exe 85 PID 4448 wrote to memory of 4108 4448 m3509590.exe 85 PID 4448 wrote to memory of 4108 4448 m3509590.exe 85 PID 4448 wrote to memory of 4108 4448 m3509590.exe 85 PID 2072 wrote to memory of 1092 2072 wallet.exe 87 PID 2072 wrote to memory of 1092 2072 wallet.exe 87 PID 2072 wrote to memory of 1092 2072 wallet.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\wallet.exe"C:\Users\Admin\AppData\Local\Temp\wallet.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3257651.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3257651.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y0237798.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y0237798.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k5914143.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k5914143.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3852
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l3336932.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l3336932.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5064
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m3509590.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m3509590.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m3509590.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m3509590.exe4⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4108 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4108 -s 125⤵
- Program crash
PID:996
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n2131906.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n2131906.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4108 -ip 41081⤵PID:2996
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
284KB
MD5896a811ee525b9319c0077e79c96b271
SHA19d820bb278fe9ea35b82ca2a565becfc6552c6bb
SHA25683c6ea4ace5d20ce9f63834e9068ca16cb3436c3b18f7c86563d5e877f3ae8a0
SHA512212eb176906ac7150ceadeaaf6dc20ee0feaf3ac33c034381e25f1a3363a3ec3e5acd7526925412f7d1e5660c0b9bab0e8ca10273dfe7a171b8b65fa3e892de7
-
Filesize
284KB
MD5896a811ee525b9319c0077e79c96b271
SHA19d820bb278fe9ea35b82ca2a565becfc6552c6bb
SHA25683c6ea4ace5d20ce9f63834e9068ca16cb3436c3b18f7c86563d5e877f3ae8a0
SHA512212eb176906ac7150ceadeaaf6dc20ee0feaf3ac33c034381e25f1a3363a3ec3e5acd7526925412f7d1e5660c0b9bab0e8ca10273dfe7a171b8b65fa3e892de7
-
Filesize
749KB
MD53de7bfc857b3abd65354dcb6c80bfd63
SHA101616b79a0eeb1c1cf2eb235d836d8a7383624c8
SHA256aa68ef1727c561221dd30e49be6d8386b5af504cddc7ef6178abae07c17b4644
SHA5127f5ae3eee88e89dcaf86dca2ff8937902868bce2e6f2473f23efb452149cf7fbf325036127345990159690b902abaa8f09fd96c2486ac791745dfb6369e1fe06
-
Filesize
749KB
MD53de7bfc857b3abd65354dcb6c80bfd63
SHA101616b79a0eeb1c1cf2eb235d836d8a7383624c8
SHA256aa68ef1727c561221dd30e49be6d8386b5af504cddc7ef6178abae07c17b4644
SHA5127f5ae3eee88e89dcaf86dca2ff8937902868bce2e6f2473f23efb452149cf7fbf325036127345990159690b902abaa8f09fd96c2486ac791745dfb6369e1fe06
-
Filesize
964KB
MD54a78e6eeace105c1094a56d0d4e6cda8
SHA1ad93ee1a468103bca3682cefff2297792eec1656
SHA2563d3bffea38cda41bef63eb8e49fd5b0e56cee0b765e233551c956a4e21daf343
SHA5129b2b1ef64f28c287d77f7fed865c0a7a9e43f5a624a7d2b74535bc5e601b9c9572026950666846c902ba8e2c9ce9ddb28fbc058bdbbb7d1fb292f1e42851ec46
-
Filesize
964KB
MD54a78e6eeace105c1094a56d0d4e6cda8
SHA1ad93ee1a468103bca3682cefff2297792eec1656
SHA2563d3bffea38cda41bef63eb8e49fd5b0e56cee0b765e233551c956a4e21daf343
SHA5129b2b1ef64f28c287d77f7fed865c0a7a9e43f5a624a7d2b74535bc5e601b9c9572026950666846c902ba8e2c9ce9ddb28fbc058bdbbb7d1fb292f1e42851ec46
-
Filesize
964KB
MD54a78e6eeace105c1094a56d0d4e6cda8
SHA1ad93ee1a468103bca3682cefff2297792eec1656
SHA2563d3bffea38cda41bef63eb8e49fd5b0e56cee0b765e233551c956a4e21daf343
SHA5129b2b1ef64f28c287d77f7fed865c0a7a9e43f5a624a7d2b74535bc5e601b9c9572026950666846c902ba8e2c9ce9ddb28fbc058bdbbb7d1fb292f1e42851ec46
-
Filesize
304KB
MD559f3cd69a7bf739454c750e5d6be9c66
SHA16471e35d4181b090823a5df2047e6a97da6c4fd2
SHA256856f1ae46f126bacea353d0b659b5ef1337850cd88144051d4f22929eeaab701
SHA512539056df974a9c8610eba6c5744b0ab6563d41a88bb065a019de3f67d3ae7dde234b2fd8cbf9af0c86073cf6fd84cb0de4bd4c566f1409eb79ce88b6db9a56ed
-
Filesize
304KB
MD559f3cd69a7bf739454c750e5d6be9c66
SHA16471e35d4181b090823a5df2047e6a97da6c4fd2
SHA256856f1ae46f126bacea353d0b659b5ef1337850cd88144051d4f22929eeaab701
SHA512539056df974a9c8610eba6c5744b0ab6563d41a88bb065a019de3f67d3ae7dde234b2fd8cbf9af0c86073cf6fd84cb0de4bd4c566f1409eb79ce88b6db9a56ed
-
Filesize
184KB
MD526aff818d0847e1b3aa53d81e811cf44
SHA12cfb21b612c7cc757bb8fe24c4b10030482ee372
SHA25648af8a6555cf0fb83666137fb88d9f4fea3b3956940f3f50e98239314e2d60ac
SHA5124a80e38a153416076d14886d7070d30e2b2f5203aea126d61b107fc94df295aba6174fde173a8eadec6e4b873e70d6162d85c51ecb5cd5f38c6946e9e56c03e8
-
Filesize
184KB
MD526aff818d0847e1b3aa53d81e811cf44
SHA12cfb21b612c7cc757bb8fe24c4b10030482ee372
SHA25648af8a6555cf0fb83666137fb88d9f4fea3b3956940f3f50e98239314e2d60ac
SHA5124a80e38a153416076d14886d7070d30e2b2f5203aea126d61b107fc94df295aba6174fde173a8eadec6e4b873e70d6162d85c51ecb5cd5f38c6946e9e56c03e8
-
Filesize
145KB
MD5803937b8778ffafd4ab8a52e4207409b
SHA11bdd4741865f2c6e162e33cd8a630054c770deac
SHA2565833dbd6776da36f043fd956e14eeebf8bdd004119680b9be1f5c7ab56f7ff7d
SHA51242d4dc017f2fe2c6b1015850ea9385a3d0f1b1b2078efa52390646380be61457cadea7d6392e3b0a7ef2d763c61bbacf86824b538b64745eeea88782d1083e7a
-
Filesize
145KB
MD5803937b8778ffafd4ab8a52e4207409b
SHA11bdd4741865f2c6e162e33cd8a630054c770deac
SHA2565833dbd6776da36f043fd956e14eeebf8bdd004119680b9be1f5c7ab56f7ff7d
SHA51242d4dc017f2fe2c6b1015850ea9385a3d0f1b1b2078efa52390646380be61457cadea7d6392e3b0a7ef2d763c61bbacf86824b538b64745eeea88782d1083e7a