Analysis
-
max time kernel
78s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2023 01:10
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230220-en
General
-
Target
file.exe
-
Size
1020KB
-
MD5
621a84e89db114a333aae881a8a496f9
-
SHA1
51f51a67889f4fa25ac4c695b59fd7382471493a
-
SHA256
b3dec2c71fbda914fbe2072812aff7911a2cd9202085530716b807cbbaab0ca2
-
SHA512
09e765dc40bcf8391dbb4f3d2e902f7a6630e535d173ec6a39b9e06f8983ae19891783f0ed6a3a966272408c47fc9e103e721ae518c325d0a877511afb9654f8
-
SSDEEP
24576:NyRuRHOT2qoxBvDN/szVdnH33R+PRJcSKs9rGbu:oRuR4MfNyVZ3kPHHrGb
Malware Config
Extracted
redline
lupa
83.97.73.122:19062
-
auth_value
6a764aa41830c77712442516d143bc9c
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection o8385065.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o8385065.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o8385065.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o8385065.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o8385065.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o8385065.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral2/memory/3696-209-0x0000000004F50000-0x0000000004F8C000-memory.dmp family_redline behavioral2/memory/3696-208-0x0000000004F50000-0x0000000004F8C000-memory.dmp family_redline behavioral2/memory/3696-211-0x0000000004F50000-0x0000000004F8C000-memory.dmp family_redline behavioral2/memory/3696-213-0x0000000004F50000-0x0000000004F8C000-memory.dmp family_redline behavioral2/memory/3696-220-0x0000000004F50000-0x0000000004F8C000-memory.dmp family_redline behavioral2/memory/3696-222-0x0000000004F50000-0x0000000004F8C000-memory.dmp family_redline behavioral2/memory/3696-217-0x0000000004F50000-0x0000000004F8C000-memory.dmp family_redline behavioral2/memory/3696-224-0x0000000004F50000-0x0000000004F8C000-memory.dmp family_redline behavioral2/memory/3696-226-0x0000000004F50000-0x0000000004F8C000-memory.dmp family_redline behavioral2/memory/3696-228-0x0000000004F50000-0x0000000004F8C000-memory.dmp family_redline behavioral2/memory/3696-230-0x0000000004F50000-0x0000000004F8C000-memory.dmp family_redline behavioral2/memory/3696-232-0x0000000004F50000-0x0000000004F8C000-memory.dmp family_redline behavioral2/memory/3696-234-0x0000000004F50000-0x0000000004F8C000-memory.dmp family_redline behavioral2/memory/3696-236-0x0000000004F50000-0x0000000004F8C000-memory.dmp family_redline behavioral2/memory/3696-238-0x0000000004F50000-0x0000000004F8C000-memory.dmp family_redline behavioral2/memory/3696-240-0x0000000004F50000-0x0000000004F8C000-memory.dmp family_redline behavioral2/memory/3696-242-0x0000000004F50000-0x0000000004F8C000-memory.dmp family_redline behavioral2/memory/3696-244-0x0000000004F50000-0x0000000004F8C000-memory.dmp family_redline behavioral2/memory/3696-246-0x0000000004F50000-0x0000000004F8C000-memory.dmp family_redline -
Executes dropped EXE 7 IoCs
pid Process 4460 z6715598.exe 1980 z6813358.exe 3328 o8385065.exe 2408 p4120004.exe 3696 r5069670.exe 4412 s1926613.exe 3832 s1926613.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features o8385065.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o8385065.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z6813358.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z6813358.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z6715598.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z6715598.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4412 set thread context of 3832 4412 s1926613.exe 97 -
Program crash 1 IoCs
pid pid_target Process procid_target 2900 3832 WerFault.exe 97 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3328 o8385065.exe 3328 o8385065.exe 2408 p4120004.exe 2408 p4120004.exe 3696 r5069670.exe 3696 r5069670.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3328 o8385065.exe Token: SeDebugPrivilege 2408 p4120004.exe Token: SeDebugPrivilege 3696 r5069670.exe Token: SeDebugPrivilege 4412 s1926613.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3832 s1926613.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 5032 wrote to memory of 4460 5032 file.exe 83 PID 5032 wrote to memory of 4460 5032 file.exe 83 PID 5032 wrote to memory of 4460 5032 file.exe 83 PID 4460 wrote to memory of 1980 4460 z6715598.exe 84 PID 4460 wrote to memory of 1980 4460 z6715598.exe 84 PID 4460 wrote to memory of 1980 4460 z6715598.exe 84 PID 1980 wrote to memory of 3328 1980 z6813358.exe 85 PID 1980 wrote to memory of 3328 1980 z6813358.exe 85 PID 1980 wrote to memory of 3328 1980 z6813358.exe 85 PID 1980 wrote to memory of 2408 1980 z6813358.exe 91 PID 1980 wrote to memory of 2408 1980 z6813358.exe 91 PID 1980 wrote to memory of 2408 1980 z6813358.exe 91 PID 4460 wrote to memory of 3696 4460 z6715598.exe 94 PID 4460 wrote to memory of 3696 4460 z6715598.exe 94 PID 4460 wrote to memory of 3696 4460 z6715598.exe 94 PID 5032 wrote to memory of 4412 5032 file.exe 96 PID 5032 wrote to memory of 4412 5032 file.exe 96 PID 5032 wrote to memory of 4412 5032 file.exe 96 PID 4412 wrote to memory of 3832 4412 s1926613.exe 97 PID 4412 wrote to memory of 3832 4412 s1926613.exe 97 PID 4412 wrote to memory of 3832 4412 s1926613.exe 97 PID 4412 wrote to memory of 3832 4412 s1926613.exe 97 PID 4412 wrote to memory of 3832 4412 s1926613.exe 97 PID 4412 wrote to memory of 3832 4412 s1926613.exe 97 PID 4412 wrote to memory of 3832 4412 s1926613.exe 97 PID 4412 wrote to memory of 3832 4412 s1926613.exe 97 PID 4412 wrote to memory of 3832 4412 s1926613.exe 97 PID 4412 wrote to memory of 3832 4412 s1926613.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6715598.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6715598.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6813358.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6813358.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o8385065.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o8385065.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3328
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p4120004.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p4120004.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2408
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5069670.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5069670.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3696
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1926613.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1926613.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1926613.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1926613.exe3⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3832 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3832 -s 124⤵
- Program crash
PID:2900
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3832 -ip 38321⤵PID:2452
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
963KB
MD5b4b1ce52974ac1cbfd90947f52cef639
SHA19d177d1ba86933a67fd5e10a4f274c705d39449a
SHA2560c1ed5f523bf681f03d5785eb7e7bdd648225d957dd37a8ff41b81154ebb3930
SHA512085239e3925bb6b55b0e7fbc4aa780ddce08b3cc74ed035f1c2dd5171f41515c930aa8ce2f31521434b79b2e05821a452a7c0daad1314df4516e301b76654248
-
Filesize
963KB
MD5b4b1ce52974ac1cbfd90947f52cef639
SHA19d177d1ba86933a67fd5e10a4f274c705d39449a
SHA2560c1ed5f523bf681f03d5785eb7e7bdd648225d957dd37a8ff41b81154ebb3930
SHA512085239e3925bb6b55b0e7fbc4aa780ddce08b3cc74ed035f1c2dd5171f41515c930aa8ce2f31521434b79b2e05821a452a7c0daad1314df4516e301b76654248
-
Filesize
963KB
MD5b4b1ce52974ac1cbfd90947f52cef639
SHA19d177d1ba86933a67fd5e10a4f274c705d39449a
SHA2560c1ed5f523bf681f03d5785eb7e7bdd648225d957dd37a8ff41b81154ebb3930
SHA512085239e3925bb6b55b0e7fbc4aa780ddce08b3cc74ed035f1c2dd5171f41515c930aa8ce2f31521434b79b2e05821a452a7c0daad1314df4516e301b76654248
-
Filesize
575KB
MD54b9a3f39808e6da62d09708056480663
SHA1c8c192a2b89cc704b71dc662647562cf9604b1fa
SHA256b75baf2a04b188ea3a30c97e0b50bc2b6c3eb3d6e89f2cf2d6c10596f8edee62
SHA5121b70da55f7e7c69202734445d683b8e23c399c4ac8ee1780af54e2b49673ca29e121befb917ebd7d33eaa2e84bb385f2c632b9fa33bbfc6dbbd7896a4ba02256
-
Filesize
575KB
MD54b9a3f39808e6da62d09708056480663
SHA1c8c192a2b89cc704b71dc662647562cf9604b1fa
SHA256b75baf2a04b188ea3a30c97e0b50bc2b6c3eb3d6e89f2cf2d6c10596f8edee62
SHA5121b70da55f7e7c69202734445d683b8e23c399c4ac8ee1780af54e2b49673ca29e121befb917ebd7d33eaa2e84bb385f2c632b9fa33bbfc6dbbd7896a4ba02256
-
Filesize
284KB
MD51f45b34573f4454594c473e440406a6f
SHA118639154f7258bda618d129b1a199da398d417f6
SHA256bb53f9f6535ce011898d1674a5470aee3972982d73ebeb78a0f9011f2c74bccd
SHA512e948afef08a56e64b407c940c4997e6c9a705a72ed1b8fcece043c1d3a34b508bbab8401cbcd662be455fa63b3559c0a98913d93d1cfdcf2fcd22515b26e7207
-
Filesize
284KB
MD51f45b34573f4454594c473e440406a6f
SHA118639154f7258bda618d129b1a199da398d417f6
SHA256bb53f9f6535ce011898d1674a5470aee3972982d73ebeb78a0f9011f2c74bccd
SHA512e948afef08a56e64b407c940c4997e6c9a705a72ed1b8fcece043c1d3a34b508bbab8401cbcd662be455fa63b3559c0a98913d93d1cfdcf2fcd22515b26e7207
-
Filesize
304KB
MD5c3fa02a7532516d39b41da2d5a55a5cd
SHA18a309760643a46636dabfa50a9cf177c34163dd3
SHA25654f89cc7af9911498b8ef221398baf3dfa3bb36498f5f7d4b1f76b686676e073
SHA5120ab222e8d92833e456f3c2a000a1d0434667dd1e3f8671686542f092306a42a2d2baa6a043a81afe04025b510243f94a03f09f578a5732a66d1696d6f1b5ddba
-
Filesize
304KB
MD5c3fa02a7532516d39b41da2d5a55a5cd
SHA18a309760643a46636dabfa50a9cf177c34163dd3
SHA25654f89cc7af9911498b8ef221398baf3dfa3bb36498f5f7d4b1f76b686676e073
SHA5120ab222e8d92833e456f3c2a000a1d0434667dd1e3f8671686542f092306a42a2d2baa6a043a81afe04025b510243f94a03f09f578a5732a66d1696d6f1b5ddba
-
Filesize
186KB
MD5adca0c2a443a722a64df378a5c23ca96
SHA1721e98a63967356ac380df9113bd1e71695faabf
SHA256fb5a44f369df3675b564922ee0424916016ff76f0257b1ff84b2d2551ff12ea9
SHA5125248d38b63147d8dba4e287d155d189873b8cde79ca3eddbe3e8d7304ea3910ecadb16e5a3072633c2d40eb377fc0d14290b64c95030dd16e2c7cb4508e0c9f9
-
Filesize
186KB
MD5adca0c2a443a722a64df378a5c23ca96
SHA1721e98a63967356ac380df9113bd1e71695faabf
SHA256fb5a44f369df3675b564922ee0424916016ff76f0257b1ff84b2d2551ff12ea9
SHA5125248d38b63147d8dba4e287d155d189873b8cde79ca3eddbe3e8d7304ea3910ecadb16e5a3072633c2d40eb377fc0d14290b64c95030dd16e2c7cb4508e0c9f9
-
Filesize
145KB
MD567d31300ab4458c12ea3138d16fd79a3
SHA16f890d28b413d55615ece0c0213d43836cf6998b
SHA25663193388ae3e77c72172133f18027abef2ce8c9d11b097d642f4bc4c43ad7c99
SHA512244087d39f7a87e4d205307f982dbbb426f7366570f4f76e9a78ff711d22847603497c2dd633ec2108871fd96d276e74a55d2a22b43cd51aa93eaddec9b2257e
-
Filesize
145KB
MD567d31300ab4458c12ea3138d16fd79a3
SHA16f890d28b413d55615ece0c0213d43836cf6998b
SHA25663193388ae3e77c72172133f18027abef2ce8c9d11b097d642f4bc4c43ad7c99
SHA512244087d39f7a87e4d205307f982dbbb426f7366570f4f76e9a78ff711d22847603497c2dd633ec2108871fd96d276e74a55d2a22b43cd51aa93eaddec9b2257e