Analysis
-
max time kernel
76s -
max time network
80s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2023, 07:45
Static task
static1
Behavioral task
behavioral1
Sample
f3e26a3811eb0df491fd6d357373513f951e83e0be1ceac2cfa0476ce9e5f9bc.exe
Resource
win10v2004-20230220-en
General
-
Target
f3e26a3811eb0df491fd6d357373513f951e83e0be1ceac2cfa0476ce9e5f9bc.exe
-
Size
1.0MB
-
MD5
98e90b98b55e836018b3ad82381064e7
-
SHA1
88fd0d8d014ab882121b27c60ebd8ac9bfe1887a
-
SHA256
f3e26a3811eb0df491fd6d357373513f951e83e0be1ceac2cfa0476ce9e5f9bc
-
SHA512
18a10d3e4af17f51afee288c9563c4f2d8979b4c1ac4bfac541c7bc711663accbdffe813a08ec3bdcc9184d7d5a2f47c1d87c6a22ad143329e97594269e94c8f
-
SSDEEP
24576:/ys7ivxKudqGB0aZ+PFofyMp2xNPZyoPQX/7l+y:KpfdqGB6PFoffpUSYm/g
Malware Config
Extracted
redline
diza
185.161.248.37:4138
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k6549314.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k6549314.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k6549314.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k6549314.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k6549314.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k6549314.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4712-217-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral1/memory/4712-218-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral1/memory/4712-220-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral1/memory/4712-222-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral1/memory/4712-224-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral1/memory/4712-226-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral1/memory/4712-228-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral1/memory/4712-230-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral1/memory/4712-232-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral1/memory/4712-234-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral1/memory/4712-236-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral1/memory/4712-238-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral1/memory/4712-240-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral1/memory/4712-242-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral1/memory/4712-244-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral1/memory/4712-246-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral1/memory/4712-248-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral1/memory/4712-250-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral1/memory/4712-295-0x0000000004AD0000-0x0000000004AE0000-memory.dmp family_redline behavioral1/memory/4712-299-0x0000000004AD0000-0x0000000004AE0000-memory.dmp family_redline -
Executes dropped EXE 7 IoCs
pid Process 3960 y4817355.exe 4888 y0225841.exe 4280 k6549314.exe 3652 l2603139.exe 2424 m7480678.exe 3872 m7480678.exe 4712 n4703430.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k6549314.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k6549314.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f3e26a3811eb0df491fd6d357373513f951e83e0be1ceac2cfa0476ce9e5f9bc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f3e26a3811eb0df491fd6d357373513f951e83e0be1ceac2cfa0476ce9e5f9bc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y4817355.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y4817355.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y0225841.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y0225841.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2424 set thread context of 3872 2424 m7480678.exe 94 -
Program crash 1 IoCs
pid pid_target Process procid_target 2644 3872 WerFault.exe 94 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4280 k6549314.exe 4280 k6549314.exe 3652 l2603139.exe 3652 l2603139.exe 4712 n4703430.exe 4712 n4703430.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4280 k6549314.exe Token: SeDebugPrivilege 3652 l2603139.exe Token: SeDebugPrivilege 2424 m7480678.exe Token: SeDebugPrivilege 4712 n4703430.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3872 m7480678.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 4436 wrote to memory of 3960 4436 f3e26a3811eb0df491fd6d357373513f951e83e0be1ceac2cfa0476ce9e5f9bc.exe 80 PID 4436 wrote to memory of 3960 4436 f3e26a3811eb0df491fd6d357373513f951e83e0be1ceac2cfa0476ce9e5f9bc.exe 80 PID 4436 wrote to memory of 3960 4436 f3e26a3811eb0df491fd6d357373513f951e83e0be1ceac2cfa0476ce9e5f9bc.exe 80 PID 3960 wrote to memory of 4888 3960 y4817355.exe 81 PID 3960 wrote to memory of 4888 3960 y4817355.exe 81 PID 3960 wrote to memory of 4888 3960 y4817355.exe 81 PID 4888 wrote to memory of 4280 4888 y0225841.exe 82 PID 4888 wrote to memory of 4280 4888 y0225841.exe 82 PID 4888 wrote to memory of 4280 4888 y0225841.exe 82 PID 4888 wrote to memory of 3652 4888 y0225841.exe 89 PID 4888 wrote to memory of 3652 4888 y0225841.exe 89 PID 4888 wrote to memory of 3652 4888 y0225841.exe 89 PID 3960 wrote to memory of 2424 3960 y4817355.exe 93 PID 3960 wrote to memory of 2424 3960 y4817355.exe 93 PID 3960 wrote to memory of 2424 3960 y4817355.exe 93 PID 2424 wrote to memory of 3872 2424 m7480678.exe 94 PID 2424 wrote to memory of 3872 2424 m7480678.exe 94 PID 2424 wrote to memory of 3872 2424 m7480678.exe 94 PID 2424 wrote to memory of 3872 2424 m7480678.exe 94 PID 2424 wrote to memory of 3872 2424 m7480678.exe 94 PID 2424 wrote to memory of 3872 2424 m7480678.exe 94 PID 2424 wrote to memory of 3872 2424 m7480678.exe 94 PID 2424 wrote to memory of 3872 2424 m7480678.exe 94 PID 2424 wrote to memory of 3872 2424 m7480678.exe 94 PID 2424 wrote to memory of 3872 2424 m7480678.exe 94 PID 4436 wrote to memory of 4712 4436 f3e26a3811eb0df491fd6d357373513f951e83e0be1ceac2cfa0476ce9e5f9bc.exe 96 PID 4436 wrote to memory of 4712 4436 f3e26a3811eb0df491fd6d357373513f951e83e0be1ceac2cfa0476ce9e5f9bc.exe 96 PID 4436 wrote to memory of 4712 4436 f3e26a3811eb0df491fd6d357373513f951e83e0be1ceac2cfa0476ce9e5f9bc.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3e26a3811eb0df491fd6d357373513f951e83e0be1ceac2cfa0476ce9e5f9bc.exe"C:\Users\Admin\AppData\Local\Temp\f3e26a3811eb0df491fd6d357373513f951e83e0be1ceac2cfa0476ce9e5f9bc.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4817355.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4817355.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y0225841.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y0225841.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k6549314.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k6549314.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4280
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l2603139.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l2603139.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3652
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m7480678.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m7480678.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m7480678.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m7480678.exe4⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3872 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 125⤵
- Program crash
PID:2644
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n4703430.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n4703430.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3872 -ip 38721⤵PID:1692
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
286KB
MD5899a7dee9d73f994c7d265f052250b50
SHA1a080f9a67d9feb102ce3faff65500a82dd1e8274
SHA25694f491ee64e6dcb860bbcd7bf3c1571773947dd3123d8f03b83b4f4e26206a72
SHA512e0daf96d83a4397eac213b5650b8d73c12a9322ac5303c6da36c46a95b052dcf0a93630ade83c02bb3f584a0c196a44433d1acc7c1f55e57841375a7a6fbb2e7
-
Filesize
286KB
MD5899a7dee9d73f994c7d265f052250b50
SHA1a080f9a67d9feb102ce3faff65500a82dd1e8274
SHA25694f491ee64e6dcb860bbcd7bf3c1571773947dd3123d8f03b83b4f4e26206a72
SHA512e0daf96d83a4397eac213b5650b8d73c12a9322ac5303c6da36c46a95b052dcf0a93630ade83c02bb3f584a0c196a44433d1acc7c1f55e57841375a7a6fbb2e7
-
Filesize
750KB
MD59ab77dc58738b7390adde963bfcf95db
SHA169c0c82991f95694736f647942a535fdcdba571e
SHA2562c215087d951feebd71870110b2d2d377a72992ba6cdea93ba62cb993bb7d46e
SHA51250c7177da457bafe2b9ec4d4fbc52439855fbd3e1c1e7ffe68b2caf185cd5e9f2471a264e2cc631370c366cbf3d3ed47081449853ffde3f5d93716b3ec05e6b8
-
Filesize
750KB
MD59ab77dc58738b7390adde963bfcf95db
SHA169c0c82991f95694736f647942a535fdcdba571e
SHA2562c215087d951feebd71870110b2d2d377a72992ba6cdea93ba62cb993bb7d46e
SHA51250c7177da457bafe2b9ec4d4fbc52439855fbd3e1c1e7ffe68b2caf185cd5e9f2471a264e2cc631370c366cbf3d3ed47081449853ffde3f5d93716b3ec05e6b8
-
Filesize
966KB
MD57c4010f62a0ecf4254042484cc2d0f18
SHA103c843b80fb4c7f391790b5e4a0467b8d01ca4c4
SHA2560eb59f4356016cad1d50dad9445dd620fc8680cf6e8609979b685d604a740050
SHA51216657a0fa426b8faae8514861deb37187e94ade6f38f4cae2ac518715bd632f65c5156955ac6efd7d701dbb6ac2cd818c6fcd8cd5563e58a15a61e3855bd74dc
-
Filesize
966KB
MD57c4010f62a0ecf4254042484cc2d0f18
SHA103c843b80fb4c7f391790b5e4a0467b8d01ca4c4
SHA2560eb59f4356016cad1d50dad9445dd620fc8680cf6e8609979b685d604a740050
SHA51216657a0fa426b8faae8514861deb37187e94ade6f38f4cae2ac518715bd632f65c5156955ac6efd7d701dbb6ac2cd818c6fcd8cd5563e58a15a61e3855bd74dc
-
Filesize
966KB
MD57c4010f62a0ecf4254042484cc2d0f18
SHA103c843b80fb4c7f391790b5e4a0467b8d01ca4c4
SHA2560eb59f4356016cad1d50dad9445dd620fc8680cf6e8609979b685d604a740050
SHA51216657a0fa426b8faae8514861deb37187e94ade6f38f4cae2ac518715bd632f65c5156955ac6efd7d701dbb6ac2cd818c6fcd8cd5563e58a15a61e3855bd74dc
-
Filesize
305KB
MD5995355e75dc872adce961aa4005a3f43
SHA11e128b0a426da1d1bce55589cbaf241db994e3c6
SHA2563ea312651a2e9a4537b45c67de96ee5299364095854770ea40da589d74db516c
SHA5121d3acf4289910b2f14630fabc99e025a3ae50caecb4260377f0cd95afbebc83139f3527380ebdf08afeb4c3fc67c65f986c9824ab6118968de68f907eaf2a3c2
-
Filesize
305KB
MD5995355e75dc872adce961aa4005a3f43
SHA11e128b0a426da1d1bce55589cbaf241db994e3c6
SHA2563ea312651a2e9a4537b45c67de96ee5299364095854770ea40da589d74db516c
SHA5121d3acf4289910b2f14630fabc99e025a3ae50caecb4260377f0cd95afbebc83139f3527380ebdf08afeb4c3fc67c65f986c9824ab6118968de68f907eaf2a3c2
-
Filesize
186KB
MD543cc4e7061add1ba38e978f4e7c79048
SHA19626cea752d305dbf7879d70a4ec8fd692129ed4
SHA25645d0765bab59b4d7106fc182beac5fee838d40e67275950fa84fbc9b73b76db9
SHA5124808a50b7b1ef31b972d8ff983da084d643aad2c8f76d45036614cb02f00bfa42a2e0f5f8eecd89ca24b7c537fa7ba593389cbbaa3c19bbb6a83cc8b5315e979
-
Filesize
186KB
MD543cc4e7061add1ba38e978f4e7c79048
SHA19626cea752d305dbf7879d70a4ec8fd692129ed4
SHA25645d0765bab59b4d7106fc182beac5fee838d40e67275950fa84fbc9b73b76db9
SHA5124808a50b7b1ef31b972d8ff983da084d643aad2c8f76d45036614cb02f00bfa42a2e0f5f8eecd89ca24b7c537fa7ba593389cbbaa3c19bbb6a83cc8b5315e979
-
Filesize
146KB
MD51a335b62a7b44c7bf7e609138bb50ba2
SHA17b8abf51056793495bf85ab3384e720242f4982f
SHA256ac43125c80d026a1f8ee33084a06dcc63e05f99a16b19d3516cd26b9e5cc36d5
SHA512a598c0d38ebe48bede4048d09fc037686188427eae6a680d048a2de06988e371cc45d63c42f93c0e3a756cf322a2ce99140dd230feb4d9fdcc21aea1b587e9f9
-
Filesize
146KB
MD51a335b62a7b44c7bf7e609138bb50ba2
SHA17b8abf51056793495bf85ab3384e720242f4982f
SHA256ac43125c80d026a1f8ee33084a06dcc63e05f99a16b19d3516cd26b9e5cc36d5
SHA512a598c0d38ebe48bede4048d09fc037686188427eae6a680d048a2de06988e371cc45d63c42f93c0e3a756cf322a2ce99140dd230feb4d9fdcc21aea1b587e9f9