Analysis
-
max time kernel
142s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2023, 23:00
Static task
static1
Behavioral task
behavioral1
Sample
c56e97783408253eeba6f0c46515008f8f7af4d1ea8b36baf8fb74b0784e77f5.exe
Resource
win10v2004-20230220-en
General
-
Target
c56e97783408253eeba6f0c46515008f8f7af4d1ea8b36baf8fb74b0784e77f5.exe
-
Size
546KB
-
MD5
091186aa650f22c4eec511e7d3ab3d07
-
SHA1
b512ff78f1c38e850131ee6fe159cad056f40bd5
-
SHA256
c56e97783408253eeba6f0c46515008f8f7af4d1ea8b36baf8fb74b0784e77f5
-
SHA512
95ff58e7b1541da087d2379e50e886f69791ae71e8c80af237d54910926eaf9f43820c3a5d66dbdf86f17756a4a7a72d6f5dec096b7d4c09dd22ff1716d435b6
-
SSDEEP
12288:GMrKy90FlkG3KblfzQyzsZBpiJ5xpqziL:cyGufz5sZHo5xpqzk
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Extracted
redline
forma
193.233.20.24:4123
-
auth_value
50b8e065d7cb1e9e30786f7a370368f9
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sw43VI48UW47.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw43VI48UW47.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw43VI48UW47.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw43VI48UW47.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw43VI48UW47.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw43VI48UW47.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/4620-156-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/4620-159-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/4620-157-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/4620-161-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/4620-163-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/4620-165-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/4620-167-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/4620-169-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/4620-171-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/4620-173-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/4620-175-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/4620-177-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/4620-179-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/4620-181-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/4620-183-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/4620-189-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/4620-187-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/4620-191-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/4620-193-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/4620-195-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/4620-197-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/4620-199-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/4620-201-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/4620-203-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/4620-205-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/4620-207-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/4620-209-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/4620-211-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/4620-213-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/4620-215-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/4620-217-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/4620-219-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/4620-221-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4720 vRv9763sa.exe 400 sw43VI48UW47.exe 4620 tLR31YC66.exe 4044 usA65zW47.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw43VI48UW47.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c56e97783408253eeba6f0c46515008f8f7af4d1ea8b36baf8fb74b0784e77f5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c56e97783408253eeba6f0c46515008f8f7af4d1ea8b36baf8fb74b0784e77f5.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vRv9763sa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vRv9763sa.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4896 4620 WerFault.exe 94 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 400 sw43VI48UW47.exe 400 sw43VI48UW47.exe 4620 tLR31YC66.exe 4620 tLR31YC66.exe 4044 usA65zW47.exe 4044 usA65zW47.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 400 sw43VI48UW47.exe Token: SeDebugPrivilege 4620 tLR31YC66.exe Token: SeDebugPrivilege 4044 usA65zW47.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2152 wrote to memory of 4720 2152 c56e97783408253eeba6f0c46515008f8f7af4d1ea8b36baf8fb74b0784e77f5.exe 86 PID 2152 wrote to memory of 4720 2152 c56e97783408253eeba6f0c46515008f8f7af4d1ea8b36baf8fb74b0784e77f5.exe 86 PID 2152 wrote to memory of 4720 2152 c56e97783408253eeba6f0c46515008f8f7af4d1ea8b36baf8fb74b0784e77f5.exe 86 PID 4720 wrote to memory of 400 4720 vRv9763sa.exe 87 PID 4720 wrote to memory of 400 4720 vRv9763sa.exe 87 PID 4720 wrote to memory of 4620 4720 vRv9763sa.exe 94 PID 4720 wrote to memory of 4620 4720 vRv9763sa.exe 94 PID 4720 wrote to memory of 4620 4720 vRv9763sa.exe 94 PID 2152 wrote to memory of 4044 2152 c56e97783408253eeba6f0c46515008f8f7af4d1ea8b36baf8fb74b0784e77f5.exe 98 PID 2152 wrote to memory of 4044 2152 c56e97783408253eeba6f0c46515008f8f7af4d1ea8b36baf8fb74b0784e77f5.exe 98 PID 2152 wrote to memory of 4044 2152 c56e97783408253eeba6f0c46515008f8f7af4d1ea8b36baf8fb74b0784e77f5.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\c56e97783408253eeba6f0c46515008f8f7af4d1ea8b36baf8fb74b0784e77f5.exe"C:\Users\Admin\AppData\Local\Temp\c56e97783408253eeba6f0c46515008f8f7af4d1ea8b36baf8fb74b0784e77f5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vRv9763sa.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vRv9763sa.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw43VI48UW47.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw43VI48UW47.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:400
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tLR31YC66.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tLR31YC66.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4620 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4620 -s 13524⤵
- Program crash
PID:4896
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\usA65zW47.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\usA65zW47.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4620 -ip 46201⤵PID:4100
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD5b9048e960ccb89e58ae039ae84c426cb
SHA144284b61a210701b1adb984743046ac17e64e33e
SHA256647f6af747635e2a0e98aa3d768a3e9a197a9bbd04a704c7ea8f0e57f57e7def
SHA512ca5d33ce00fd7473bf0bd5eb1922a100daff90fe95539a70530c8035252a4d069b16e7a659c33959aa78a98926c1f6d676ccbd3e0129f88ee70c3d4fed0181a2
-
Filesize
176KB
MD5b9048e960ccb89e58ae039ae84c426cb
SHA144284b61a210701b1adb984743046ac17e64e33e
SHA256647f6af747635e2a0e98aa3d768a3e9a197a9bbd04a704c7ea8f0e57f57e7def
SHA512ca5d33ce00fd7473bf0bd5eb1922a100daff90fe95539a70530c8035252a4d069b16e7a659c33959aa78a98926c1f6d676ccbd3e0129f88ee70c3d4fed0181a2
-
Filesize
401KB
MD5638177005058639eef689854741015b2
SHA101489af16249091994ef1ebdacd5ddd3fb980f3e
SHA2562a0399e4734d1390e2764711520d5c68f1e6e52d5c904b3e92de5dff2aa99085
SHA5127703b673662c13a3220a602831db8dd5269076700bd825f2be3e47a37277b3424c8202765538c430ac698972566a6000e740436963d55b5f869f2e5ac0f1ef2b
-
Filesize
401KB
MD5638177005058639eef689854741015b2
SHA101489af16249091994ef1ebdacd5ddd3fb980f3e
SHA2562a0399e4734d1390e2764711520d5c68f1e6e52d5c904b3e92de5dff2aa99085
SHA5127703b673662c13a3220a602831db8dd5269076700bd825f2be3e47a37277b3424c8202765538c430ac698972566a6000e740436963d55b5f869f2e5ac0f1ef2b
-
Filesize
15KB
MD56f91e5fa212b7819ec3944b2178f1313
SHA149ea3d1cfe00c25231ad9c47385476610907fd5c
SHA256192189d8db8e948ebb9308a539bf636419f015f1624d4aeb162781e07c05559b
SHA512b611776ed5d6bb28ceee191e4bb90a5433ad51a5f625478d63fd530b577ff685b8e55cfb6ca009b4f189c674492bbe329ae5c61b147c0300fe65d679fa0cdee1
-
Filesize
15KB
MD56f91e5fa212b7819ec3944b2178f1313
SHA149ea3d1cfe00c25231ad9c47385476610907fd5c
SHA256192189d8db8e948ebb9308a539bf636419f015f1624d4aeb162781e07c05559b
SHA512b611776ed5d6bb28ceee191e4bb90a5433ad51a5f625478d63fd530b577ff685b8e55cfb6ca009b4f189c674492bbe329ae5c61b147c0300fe65d679fa0cdee1
-
Filesize
375KB
MD5cd6966060f9f437f1933aba4b8703cca
SHA19f69f3f9317a4a6526c99074bb851bc4a1c30788
SHA25624a0f1a482ffbadb53221d40b7669cfb6352b0ccffb786a595cfeb4d9805b9f0
SHA512d7249fb6f039225e99d30293f69453c0c08a44bf12887d656d4e30fa896aaf51d31fab132ed6840ffe0f305f3ce8cf0be315835bf221745a7b4dac27640c1929
-
Filesize
375KB
MD5cd6966060f9f437f1933aba4b8703cca
SHA19f69f3f9317a4a6526c99074bb851bc4a1c30788
SHA25624a0f1a482ffbadb53221d40b7669cfb6352b0ccffb786a595cfeb4d9805b9f0
SHA512d7249fb6f039225e99d30293f69453c0c08a44bf12887d656d4e30fa896aaf51d31fab132ed6840ffe0f305f3ce8cf0be315835bf221745a7b4dac27640c1929