Analysis
-
max time kernel
135s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2023 07:14
Static task
static1
Behavioral task
behavioral1
Sample
49883d026fb595c0243e0deb509e7bb534f54b10e6fa2567695a3937d31ff840.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
49883d026fb595c0243e0deb509e7bb534f54b10e6fa2567695a3937d31ff840.exe
Resource
win10v2004-20230220-en
General
-
Target
49883d026fb595c0243e0deb509e7bb534f54b10e6fa2567695a3937d31ff840.exe
-
Size
1020KB
-
MD5
7405d40eeb9e5c190ea52d2fe22c4ade
-
SHA1
831e57887e29a5217b7a382666d7a7ce7a9a1651
-
SHA256
49883d026fb595c0243e0deb509e7bb534f54b10e6fa2567695a3937d31ff840
-
SHA512
1be5a4eb2610048396fee84996d74b73538d5b0702391728fad90ca15530bf2069ef80338fface02aec9d9842d7e258dafd8e69bf5bc60e54c043d7814d18d45
-
SSDEEP
24576:4yCk0Xxjij3IvWo1Z7hxXrem3LniPptz9kWgsEcI:/YBjiVqZ1xXv3rOvz6P
Malware Config
Extracted
redline
luxa
77.91.68.157:19065
-
auth_value
2dda654f9abf47e50c7446be3ecc1806
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o4072071.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o4072071.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o4072071.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection o4072071.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o4072071.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o4072071.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral2/memory/2976-213-0x00000000024A0000-0x00000000024DC000-memory.dmp family_redline behavioral2/memory/2976-215-0x00000000024A0000-0x00000000024DC000-memory.dmp family_redline behavioral2/memory/2976-212-0x00000000024A0000-0x00000000024DC000-memory.dmp family_redline behavioral2/memory/2976-217-0x00000000024A0000-0x00000000024DC000-memory.dmp family_redline behavioral2/memory/2976-219-0x00000000024A0000-0x00000000024DC000-memory.dmp family_redline behavioral2/memory/2976-221-0x00000000024A0000-0x00000000024DC000-memory.dmp family_redline behavioral2/memory/2976-223-0x00000000024A0000-0x00000000024DC000-memory.dmp family_redline behavioral2/memory/2976-225-0x00000000024A0000-0x00000000024DC000-memory.dmp family_redline behavioral2/memory/2976-227-0x00000000024A0000-0x00000000024DC000-memory.dmp family_redline behavioral2/memory/2976-229-0x00000000024A0000-0x00000000024DC000-memory.dmp family_redline behavioral2/memory/2976-231-0x00000000024A0000-0x00000000024DC000-memory.dmp family_redline behavioral2/memory/2976-233-0x00000000024A0000-0x00000000024DC000-memory.dmp family_redline behavioral2/memory/2976-235-0x00000000024A0000-0x00000000024DC000-memory.dmp family_redline behavioral2/memory/2976-237-0x00000000024A0000-0x00000000024DC000-memory.dmp family_redline behavioral2/memory/2976-239-0x00000000024A0000-0x00000000024DC000-memory.dmp family_redline behavioral2/memory/2976-241-0x00000000024A0000-0x00000000024DC000-memory.dmp family_redline behavioral2/memory/2976-243-0x00000000024A0000-0x00000000024DC000-memory.dmp family_redline behavioral2/memory/2976-245-0x00000000024A0000-0x00000000024DC000-memory.dmp family_redline behavioral2/memory/2976-247-0x00000000024A0000-0x00000000024DC000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation s6995044.exe -
Executes dropped EXE 9 IoCs
pid Process 4220 z5252934.exe 3624 z9522974.exe 4720 o4072071.exe 1520 p7761979.exe 2976 r8038277.exe 4572 s6995044.exe 2712 s6995044.exe 3428 legends.exe 4696 legends.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features o4072071.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o4072071.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z5252934.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z5252934.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z9522974.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z9522974.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 49883d026fb595c0243e0deb509e7bb534f54b10e6fa2567695a3937d31ff840.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 49883d026fb595c0243e0deb509e7bb534f54b10e6fa2567695a3937d31ff840.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4572 set thread context of 2712 4572 s6995044.exe 100 PID 3428 set thread context of 4696 3428 legends.exe 102 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1956 4696 WerFault.exe 102 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4720 o4072071.exe 4720 o4072071.exe 1520 p7761979.exe 1520 p7761979.exe 2976 r8038277.exe 2976 r8038277.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4720 o4072071.exe Token: SeDebugPrivilege 1520 p7761979.exe Token: SeDebugPrivilege 2976 r8038277.exe Token: SeDebugPrivilege 4572 s6995044.exe Token: SeDebugPrivilege 3428 legends.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2712 s6995044.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 4696 legends.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 3420 wrote to memory of 4220 3420 49883d026fb595c0243e0deb509e7bb534f54b10e6fa2567695a3937d31ff840.exe 86 PID 3420 wrote to memory of 4220 3420 49883d026fb595c0243e0deb509e7bb534f54b10e6fa2567695a3937d31ff840.exe 86 PID 3420 wrote to memory of 4220 3420 49883d026fb595c0243e0deb509e7bb534f54b10e6fa2567695a3937d31ff840.exe 86 PID 4220 wrote to memory of 3624 4220 z5252934.exe 87 PID 4220 wrote to memory of 3624 4220 z5252934.exe 87 PID 4220 wrote to memory of 3624 4220 z5252934.exe 87 PID 3624 wrote to memory of 4720 3624 z9522974.exe 88 PID 3624 wrote to memory of 4720 3624 z9522974.exe 88 PID 3624 wrote to memory of 4720 3624 z9522974.exe 88 PID 3624 wrote to memory of 1520 3624 z9522974.exe 93 PID 3624 wrote to memory of 1520 3624 z9522974.exe 93 PID 3624 wrote to memory of 1520 3624 z9522974.exe 93 PID 4220 wrote to memory of 2976 4220 z5252934.exe 97 PID 4220 wrote to memory of 2976 4220 z5252934.exe 97 PID 4220 wrote to memory of 2976 4220 z5252934.exe 97 PID 3420 wrote to memory of 4572 3420 49883d026fb595c0243e0deb509e7bb534f54b10e6fa2567695a3937d31ff840.exe 99 PID 3420 wrote to memory of 4572 3420 49883d026fb595c0243e0deb509e7bb534f54b10e6fa2567695a3937d31ff840.exe 99 PID 3420 wrote to memory of 4572 3420 49883d026fb595c0243e0deb509e7bb534f54b10e6fa2567695a3937d31ff840.exe 99 PID 4572 wrote to memory of 2712 4572 s6995044.exe 100 PID 4572 wrote to memory of 2712 4572 s6995044.exe 100 PID 4572 wrote to memory of 2712 4572 s6995044.exe 100 PID 4572 wrote to memory of 2712 4572 s6995044.exe 100 PID 4572 wrote to memory of 2712 4572 s6995044.exe 100 PID 4572 wrote to memory of 2712 4572 s6995044.exe 100 PID 4572 wrote to memory of 2712 4572 s6995044.exe 100 PID 4572 wrote to memory of 2712 4572 s6995044.exe 100 PID 4572 wrote to memory of 2712 4572 s6995044.exe 100 PID 4572 wrote to memory of 2712 4572 s6995044.exe 100 PID 2712 wrote to memory of 3428 2712 s6995044.exe 101 PID 2712 wrote to memory of 3428 2712 s6995044.exe 101 PID 2712 wrote to memory of 3428 2712 s6995044.exe 101 PID 3428 wrote to memory of 4696 3428 legends.exe 102 PID 3428 wrote to memory of 4696 3428 legends.exe 102 PID 3428 wrote to memory of 4696 3428 legends.exe 102 PID 3428 wrote to memory of 4696 3428 legends.exe 102 PID 3428 wrote to memory of 4696 3428 legends.exe 102 PID 3428 wrote to memory of 4696 3428 legends.exe 102 PID 3428 wrote to memory of 4696 3428 legends.exe 102 PID 3428 wrote to memory of 4696 3428 legends.exe 102 PID 3428 wrote to memory of 4696 3428 legends.exe 102 PID 3428 wrote to memory of 4696 3428 legends.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\49883d026fb595c0243e0deb509e7bb534f54b10e6fa2567695a3937d31ff840.exe"C:\Users\Admin\AppData\Local\Temp\49883d026fb595c0243e0deb509e7bb534f54b10e6fa2567695a3937d31ff840.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5252934.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5252934.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9522974.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9522974.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o4072071.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o4072071.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4720
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p7761979.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p7761979.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1520
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r8038277.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r8038277.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2976
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6995044.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6995044.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6995044.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6995044.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe"C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe5⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4696 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4696 -s 126⤵
- Program crash
PID:1956
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4696 -ip 46961⤵PID:2144
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
963KB
MD55c44899af272aa60b122a60e597e759b
SHA1fb792c2b89426dd7b500dbe865d28edaee52d1f9
SHA2564760486eef519b808e09abb3f1eceb6818f93c1cf45132a030806373729d006b
SHA512f3473d8b0269ddcee41760ecb0a3c180964da37f98321bb8e33380fc8d44f7fce34fc3fe50cddb5378277b840fd52a819bf730159f958af7efeb461daa383342
-
Filesize
963KB
MD55c44899af272aa60b122a60e597e759b
SHA1fb792c2b89426dd7b500dbe865d28edaee52d1f9
SHA2564760486eef519b808e09abb3f1eceb6818f93c1cf45132a030806373729d006b
SHA512f3473d8b0269ddcee41760ecb0a3c180964da37f98321bb8e33380fc8d44f7fce34fc3fe50cddb5378277b840fd52a819bf730159f958af7efeb461daa383342
-
Filesize
963KB
MD55c44899af272aa60b122a60e597e759b
SHA1fb792c2b89426dd7b500dbe865d28edaee52d1f9
SHA2564760486eef519b808e09abb3f1eceb6818f93c1cf45132a030806373729d006b
SHA512f3473d8b0269ddcee41760ecb0a3c180964da37f98321bb8e33380fc8d44f7fce34fc3fe50cddb5378277b840fd52a819bf730159f958af7efeb461daa383342
-
Filesize
963KB
MD55c44899af272aa60b122a60e597e759b
SHA1fb792c2b89426dd7b500dbe865d28edaee52d1f9
SHA2564760486eef519b808e09abb3f1eceb6818f93c1cf45132a030806373729d006b
SHA512f3473d8b0269ddcee41760ecb0a3c180964da37f98321bb8e33380fc8d44f7fce34fc3fe50cddb5378277b840fd52a819bf730159f958af7efeb461daa383342
-
Filesize
963KB
MD55c44899af272aa60b122a60e597e759b
SHA1fb792c2b89426dd7b500dbe865d28edaee52d1f9
SHA2564760486eef519b808e09abb3f1eceb6818f93c1cf45132a030806373729d006b
SHA512f3473d8b0269ddcee41760ecb0a3c180964da37f98321bb8e33380fc8d44f7fce34fc3fe50cddb5378277b840fd52a819bf730159f958af7efeb461daa383342
-
Filesize
963KB
MD55c44899af272aa60b122a60e597e759b
SHA1fb792c2b89426dd7b500dbe865d28edaee52d1f9
SHA2564760486eef519b808e09abb3f1eceb6818f93c1cf45132a030806373729d006b
SHA512f3473d8b0269ddcee41760ecb0a3c180964da37f98321bb8e33380fc8d44f7fce34fc3fe50cddb5378277b840fd52a819bf730159f958af7efeb461daa383342
-
Filesize
963KB
MD55c44899af272aa60b122a60e597e759b
SHA1fb792c2b89426dd7b500dbe865d28edaee52d1f9
SHA2564760486eef519b808e09abb3f1eceb6818f93c1cf45132a030806373729d006b
SHA512f3473d8b0269ddcee41760ecb0a3c180964da37f98321bb8e33380fc8d44f7fce34fc3fe50cddb5378277b840fd52a819bf730159f958af7efeb461daa383342
-
Filesize
576KB
MD5954b43358cc6365e2aa63ec74bd87044
SHA162e282023fb1774d077b723b055550508f3f05f5
SHA256df10f3342dd98d6c17e68b96c24b6b9556f32a49e708afb766dd4cc214a3a208
SHA512b82df37cdb401893e0ebc6f361a5935d2de794856cb8f34b55e920a4702abfe5c55b98d2cb0a0d1fd6eac1b934b2386e13844844e499f529063c008892edf3e0
-
Filesize
576KB
MD5954b43358cc6365e2aa63ec74bd87044
SHA162e282023fb1774d077b723b055550508f3f05f5
SHA256df10f3342dd98d6c17e68b96c24b6b9556f32a49e708afb766dd4cc214a3a208
SHA512b82df37cdb401893e0ebc6f361a5935d2de794856cb8f34b55e920a4702abfe5c55b98d2cb0a0d1fd6eac1b934b2386e13844844e499f529063c008892edf3e0
-
Filesize
284KB
MD5120cac69d39e8d42aa157a7535c18e11
SHA111aedce3d682a3838a508f4c9f5824528ed74ed9
SHA2568a88bc14b91d8fcba515c0a62eb300e7c31893ae36ed09f895c8a110add12136
SHA5125b7fd693bfdef519f4709547e32d002709e7e2e76addddae41e6344f2386417f8c9e3e9ef52848c943c1975a32d6eccc3ee6fdd7371c1650104b72eeb8ff532c
-
Filesize
284KB
MD5120cac69d39e8d42aa157a7535c18e11
SHA111aedce3d682a3838a508f4c9f5824528ed74ed9
SHA2568a88bc14b91d8fcba515c0a62eb300e7c31893ae36ed09f895c8a110add12136
SHA5125b7fd693bfdef519f4709547e32d002709e7e2e76addddae41e6344f2386417f8c9e3e9ef52848c943c1975a32d6eccc3ee6fdd7371c1650104b72eeb8ff532c
-
Filesize
305KB
MD56cd22abc58dbc0b06721d6d6105856d0
SHA15e197c62c38fb7d4ce900abd164413827471f6a0
SHA2563ae58233c3881696cfe9cd5fcbe26277837dde2c1eaa3881a03a0a452d73ab02
SHA512810b0515d8a4391bbbbcf8a44afa5c7c5545d7b4305f6aad212e82c3cc71020dde034963b181c2902396591e7356570be542a5f558d1593e1ac29d970d95d533
-
Filesize
305KB
MD56cd22abc58dbc0b06721d6d6105856d0
SHA15e197c62c38fb7d4ce900abd164413827471f6a0
SHA2563ae58233c3881696cfe9cd5fcbe26277837dde2c1eaa3881a03a0a452d73ab02
SHA512810b0515d8a4391bbbbcf8a44afa5c7c5545d7b4305f6aad212e82c3cc71020dde034963b181c2902396591e7356570be542a5f558d1593e1ac29d970d95d533
-
Filesize
185KB
MD5307605542467ca33de646d916df75583
SHA10ccaac919a6983714502a742f6e3353d5580c17d
SHA25678cd24bf30bfa4943460e1f51fc0c48843aca1349e4412f9f139c1cedd0eb4c6
SHA5127732e652ae11dd1cb34e64eccf3d92fa0e06355432bbaa8169f57da9c262e2d2c1ae0069d246d0ace1bbf5310d1d46ba374e230140ee27bc8fcce4c715dc0a78
-
Filesize
185KB
MD5307605542467ca33de646d916df75583
SHA10ccaac919a6983714502a742f6e3353d5580c17d
SHA25678cd24bf30bfa4943460e1f51fc0c48843aca1349e4412f9f139c1cedd0eb4c6
SHA5127732e652ae11dd1cb34e64eccf3d92fa0e06355432bbaa8169f57da9c262e2d2c1ae0069d246d0ace1bbf5310d1d46ba374e230140ee27bc8fcce4c715dc0a78
-
Filesize
145KB
MD5261c5d1674a36b0e1d13d4e58376bf53
SHA119188e96ecb3f2b82f37cfa8f62d4124c4547276
SHA2560881646eb5d743432edc4fb84ba01f19504b6a807d1990527dee69b430167b0a
SHA512cce05eb25b9e55b8a1aaedbc747aa9fbd6773e1e3934b90f494983ef0a4e064252473a8a5f012d2bc8505bd4eea75ed45b22f83a8ee8bb7bcf9186f94af8eeae
-
Filesize
145KB
MD5261c5d1674a36b0e1d13d4e58376bf53
SHA119188e96ecb3f2b82f37cfa8f62d4124c4547276
SHA2560881646eb5d743432edc4fb84ba01f19504b6a807d1990527dee69b430167b0a
SHA512cce05eb25b9e55b8a1aaedbc747aa9fbd6773e1e3934b90f494983ef0a4e064252473a8a5f012d2bc8505bd4eea75ed45b22f83a8ee8bb7bcf9186f94af8eeae