Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
28/02/2023, 23:27
Static task
static1
Behavioral task
behavioral1
Sample
51fa75840fa613015c3570317994937a5af8ce2dbe1603edef69628bf322a101.exe
Resource
win10-20230220-en
General
-
Target
51fa75840fa613015c3570317994937a5af8ce2dbe1603edef69628bf322a101.exe
-
Size
546KB
-
MD5
9713bf5b143c141ad320c618cd2c293c
-
SHA1
32e41b844fe32c1931405b52e782871d3949db03
-
SHA256
51fa75840fa613015c3570317994937a5af8ce2dbe1603edef69628bf322a101
-
SHA512
fc1a3ec84ef0aee8e54ff9688c61b9b08901b463e0e4888bf411677c20ca2a71d557fba5502758c55683d264901dad48d64c30b896874dc61eb3336603b2662d
-
SSDEEP
12288:0Mr5y90seTRx7KBExfcgj7CGMPMREwQ1cQ4f7eNz0gvOtp:dy4KBExfcgHJREwdQy7eNYSq
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Extracted
redline
forma
193.233.20.24:4123
-
auth_value
50b8e065d7cb1e9e30786f7a370368f9
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw57uN73WA66.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw57uN73WA66.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw57uN73WA66.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw57uN73WA66.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw57uN73WA66.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/4160-142-0x0000000004C80000-0x0000000004CC6000-memory.dmp family_redline behavioral1/memory/4160-144-0x0000000004D00000-0x0000000004D44000-memory.dmp family_redline behavioral1/memory/4160-148-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4160-149-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4160-153-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4160-151-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4160-155-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4160-157-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4160-159-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4160-161-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4160-163-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4160-165-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4160-167-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4160-171-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4160-169-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4160-175-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4160-173-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4160-185-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4160-183-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4160-181-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4160-189-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4160-187-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4160-191-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4160-179-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4160-177-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4160-193-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4160-201-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4160-199-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4160-203-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4160-205-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4160-197-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4160-195-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4160-207-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4160-211-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4160-209-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3384 vPZ8617LB.exe 4168 sw57uN73WA66.exe 4160 tsK00jC71.exe 3920 uYo25QJ19.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw57uN73WA66.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 51fa75840fa613015c3570317994937a5af8ce2dbe1603edef69628bf322a101.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 51fa75840fa613015c3570317994937a5af8ce2dbe1603edef69628bf322a101.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vPZ8617LB.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vPZ8617LB.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4168 sw57uN73WA66.exe 4168 sw57uN73WA66.exe 4160 tsK00jC71.exe 4160 tsK00jC71.exe 3920 uYo25QJ19.exe 3920 uYo25QJ19.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4168 sw57uN73WA66.exe Token: SeDebugPrivilege 4160 tsK00jC71.exe Token: SeDebugPrivilege 3920 uYo25QJ19.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2896 wrote to memory of 3384 2896 51fa75840fa613015c3570317994937a5af8ce2dbe1603edef69628bf322a101.exe 66 PID 2896 wrote to memory of 3384 2896 51fa75840fa613015c3570317994937a5af8ce2dbe1603edef69628bf322a101.exe 66 PID 2896 wrote to memory of 3384 2896 51fa75840fa613015c3570317994937a5af8ce2dbe1603edef69628bf322a101.exe 66 PID 3384 wrote to memory of 4168 3384 vPZ8617LB.exe 67 PID 3384 wrote to memory of 4168 3384 vPZ8617LB.exe 67 PID 3384 wrote to memory of 4160 3384 vPZ8617LB.exe 68 PID 3384 wrote to memory of 4160 3384 vPZ8617LB.exe 68 PID 3384 wrote to memory of 4160 3384 vPZ8617LB.exe 68 PID 2896 wrote to memory of 3920 2896 51fa75840fa613015c3570317994937a5af8ce2dbe1603edef69628bf322a101.exe 70 PID 2896 wrote to memory of 3920 2896 51fa75840fa613015c3570317994937a5af8ce2dbe1603edef69628bf322a101.exe 70 PID 2896 wrote to memory of 3920 2896 51fa75840fa613015c3570317994937a5af8ce2dbe1603edef69628bf322a101.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\51fa75840fa613015c3570317994937a5af8ce2dbe1603edef69628bf322a101.exe"C:\Users\Admin\AppData\Local\Temp\51fa75840fa613015c3570317994937a5af8ce2dbe1603edef69628bf322a101.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vPZ8617LB.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vPZ8617LB.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw57uN73WA66.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw57uN73WA66.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4168
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tsK00jC71.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tsK00jC71.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4160
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uYo25QJ19.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uYo25QJ19.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3920
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD539e9897c15a6c76f5ffd7b68d05f0df1
SHA1dd2c6fd8c3f2279efb73f98e2a8a0ac63716854b
SHA256aeb89d4534e6e0876aaf3026addb9a1ed26a699491adbadeab4dd647fa340197
SHA51268f62dd505e2105f594e8dfea35fbd06e04cd3058c465c01f3adfc87f1d4d2f20635956c8d67ed57e8586132db22b0c1bc4b98e1f62f6a0c222dd1cb1a713923
-
Filesize
176KB
MD539e9897c15a6c76f5ffd7b68d05f0df1
SHA1dd2c6fd8c3f2279efb73f98e2a8a0ac63716854b
SHA256aeb89d4534e6e0876aaf3026addb9a1ed26a699491adbadeab4dd647fa340197
SHA51268f62dd505e2105f594e8dfea35fbd06e04cd3058c465c01f3adfc87f1d4d2f20635956c8d67ed57e8586132db22b0c1bc4b98e1f62f6a0c222dd1cb1a713923
-
Filesize
402KB
MD56fff3cf4393ad642b1a59e04884cf30c
SHA10dfd9438dbe6770335c0104a7ef2ed2b5d05bece
SHA256a6d0160cc4b9b9dd8ac179044627a0bf44124230660777c93f0c9c6c51a7eba3
SHA512d92a16cfef944473859d92200a060f1633207449edda6483905ce5c9b6201246c8f4ad6db9581be09898024fb8c94a7e81b879fd0d612fe6ccca123f5e3a3db3
-
Filesize
402KB
MD56fff3cf4393ad642b1a59e04884cf30c
SHA10dfd9438dbe6770335c0104a7ef2ed2b5d05bece
SHA256a6d0160cc4b9b9dd8ac179044627a0bf44124230660777c93f0c9c6c51a7eba3
SHA512d92a16cfef944473859d92200a060f1633207449edda6483905ce5c9b6201246c8f4ad6db9581be09898024fb8c94a7e81b879fd0d612fe6ccca123f5e3a3db3
-
Filesize
15KB
MD59f281fb6157e2a7179fdda95b4e1da43
SHA1fb6d48199ce8140a823ccfc413327066d4c3d894
SHA256b57732dc568efdd7e6b9435066500d6de5d2219264a20ffe779211091633b88c
SHA5127e4e9562cb209b608cfd605cdc134d2394cb263b98643500be93a2744f00bcea55988c86141dbd05e1aab07def0f6b20250266221f783a435053fdf179d63d70
-
Filesize
15KB
MD59f281fb6157e2a7179fdda95b4e1da43
SHA1fb6d48199ce8140a823ccfc413327066d4c3d894
SHA256b57732dc568efdd7e6b9435066500d6de5d2219264a20ffe779211091633b88c
SHA5127e4e9562cb209b608cfd605cdc134d2394cb263b98643500be93a2744f00bcea55988c86141dbd05e1aab07def0f6b20250266221f783a435053fdf179d63d70
-
Filesize
376KB
MD551d83e219f7908c47e000ced515c41c5
SHA149860bcc7802e33498d0010de530f67573577ce1
SHA256556b654b17afba716bb4859376467fc708829ff6c5b5a9c9e18e40a133b6b37d
SHA512a9e0b625653af5ee0e90b91344ca01928888279b9936647c0f655ff3dd67fb2fa36067ad7e78ad8d2ecb78ec25926d31c541a97db72dc72b366188c163ee71f4
-
Filesize
376KB
MD551d83e219f7908c47e000ced515c41c5
SHA149860bcc7802e33498d0010de530f67573577ce1
SHA256556b654b17afba716bb4859376467fc708829ff6c5b5a9c9e18e40a133b6b37d
SHA512a9e0b625653af5ee0e90b91344ca01928888279b9936647c0f655ff3dd67fb2fa36067ad7e78ad8d2ecb78ec25926d31c541a97db72dc72b366188c163ee71f4