Analysis
-
max time kernel
145s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/03/2023, 22:53
Static task
static1
Behavioral task
behavioral1
Sample
292d49b35338ec0ef22bc276cb6d336669da61043c903ad37c785b0cd280b2e1.exe
Resource
win10v2004-20230220-en
General
-
Target
292d49b35338ec0ef22bc276cb6d336669da61043c903ad37c785b0cd280b2e1.exe
-
Size
536KB
-
MD5
08dd5e47f75381b73263d9e074ea0d14
-
SHA1
4bcf6868cfcc74ec7714c593b02ce17e43ac3b6b
-
SHA256
292d49b35338ec0ef22bc276cb6d336669da61043c903ad37c785b0cd280b2e1
-
SHA512
c64ca1b10ebde90fda5a622eb9b402193e543a7ce6744cb018e75c354b4c5fa4f0c13ffc203871b1c13e2e1c3316100fc6f90fa96dedb209ad934190534333fc
-
SSDEEP
12288:fMrJy90x/1hVHvdweruFPhC5Z/JTE1+DnLEU0nd9:OyoVeI8apE4LT0v
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Extracted
redline
fuba
193.56.146.11:4162
-
auth_value
43015841fc23c63b15ca6ffe1d278d5e
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw88Sl59su30.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw88Sl59su30.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw88Sl59su30.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw88Sl59su30.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw88Sl59su30.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sw88Sl59su30.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/4564-158-0x0000000005130000-0x000000000516E000-memory.dmp family_redline behavioral1/memory/4564-159-0x0000000005130000-0x000000000516E000-memory.dmp family_redline behavioral1/memory/4564-161-0x0000000005130000-0x000000000516E000-memory.dmp family_redline behavioral1/memory/4564-163-0x0000000005130000-0x000000000516E000-memory.dmp family_redline behavioral1/memory/4564-165-0x0000000005130000-0x000000000516E000-memory.dmp family_redline behavioral1/memory/4564-167-0x0000000005130000-0x000000000516E000-memory.dmp family_redline behavioral1/memory/4564-169-0x0000000005130000-0x000000000516E000-memory.dmp family_redline behavioral1/memory/4564-171-0x0000000005130000-0x000000000516E000-memory.dmp family_redline behavioral1/memory/4564-173-0x0000000005130000-0x000000000516E000-memory.dmp family_redline behavioral1/memory/4564-175-0x0000000005130000-0x000000000516E000-memory.dmp family_redline behavioral1/memory/4564-177-0x0000000005130000-0x000000000516E000-memory.dmp family_redline behavioral1/memory/4564-179-0x0000000005130000-0x000000000516E000-memory.dmp family_redline behavioral1/memory/4564-181-0x0000000005130000-0x000000000516E000-memory.dmp family_redline behavioral1/memory/4564-183-0x0000000005130000-0x000000000516E000-memory.dmp family_redline behavioral1/memory/4564-185-0x0000000005130000-0x000000000516E000-memory.dmp family_redline behavioral1/memory/4564-187-0x0000000005130000-0x000000000516E000-memory.dmp family_redline behavioral1/memory/4564-189-0x0000000005130000-0x000000000516E000-memory.dmp family_redline behavioral1/memory/4564-191-0x0000000005130000-0x000000000516E000-memory.dmp family_redline behavioral1/memory/4564-193-0x0000000005130000-0x000000000516E000-memory.dmp family_redline behavioral1/memory/4564-195-0x0000000005130000-0x000000000516E000-memory.dmp family_redline behavioral1/memory/4564-197-0x0000000005130000-0x000000000516E000-memory.dmp family_redline behavioral1/memory/4564-199-0x0000000005130000-0x000000000516E000-memory.dmp family_redline behavioral1/memory/4564-201-0x0000000005130000-0x000000000516E000-memory.dmp family_redline behavioral1/memory/4564-203-0x0000000005130000-0x000000000516E000-memory.dmp family_redline behavioral1/memory/4564-205-0x0000000005130000-0x000000000516E000-memory.dmp family_redline behavioral1/memory/4564-207-0x0000000005130000-0x000000000516E000-memory.dmp family_redline behavioral1/memory/4564-209-0x0000000005130000-0x000000000516E000-memory.dmp family_redline behavioral1/memory/4564-211-0x0000000005130000-0x000000000516E000-memory.dmp family_redline behavioral1/memory/4564-213-0x0000000005130000-0x000000000516E000-memory.dmp family_redline behavioral1/memory/4564-215-0x0000000005130000-0x000000000516E000-memory.dmp family_redline behavioral1/memory/4564-217-0x0000000005130000-0x000000000516E000-memory.dmp family_redline behavioral1/memory/4564-219-0x0000000005130000-0x000000000516E000-memory.dmp family_redline behavioral1/memory/4564-221-0x0000000005130000-0x000000000516E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4428 vmS2626NO.exe 32 sw88Sl59su30.exe 4564 trN20mC95.exe 2928 ura40tv84.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw88Sl59su30.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vmS2626NO.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 292d49b35338ec0ef22bc276cb6d336669da61043c903ad37c785b0cd280b2e1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 292d49b35338ec0ef22bc276cb6d336669da61043c903ad37c785b0cd280b2e1.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vmS2626NO.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4192 4564 WerFault.exe 88 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 32 sw88Sl59su30.exe 32 sw88Sl59su30.exe 4564 trN20mC95.exe 4564 trN20mC95.exe 2928 ura40tv84.exe 2928 ura40tv84.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 32 sw88Sl59su30.exe Token: SeDebugPrivilege 4564 trN20mC95.exe Token: SeDebugPrivilege 2928 ura40tv84.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1564 wrote to memory of 4428 1564 292d49b35338ec0ef22bc276cb6d336669da61043c903ad37c785b0cd280b2e1.exe 86 PID 1564 wrote to memory of 4428 1564 292d49b35338ec0ef22bc276cb6d336669da61043c903ad37c785b0cd280b2e1.exe 86 PID 1564 wrote to memory of 4428 1564 292d49b35338ec0ef22bc276cb6d336669da61043c903ad37c785b0cd280b2e1.exe 86 PID 4428 wrote to memory of 32 4428 vmS2626NO.exe 87 PID 4428 wrote to memory of 32 4428 vmS2626NO.exe 87 PID 4428 wrote to memory of 4564 4428 vmS2626NO.exe 88 PID 4428 wrote to memory of 4564 4428 vmS2626NO.exe 88 PID 4428 wrote to memory of 4564 4428 vmS2626NO.exe 88 PID 1564 wrote to memory of 2928 1564 292d49b35338ec0ef22bc276cb6d336669da61043c903ad37c785b0cd280b2e1.exe 93 PID 1564 wrote to memory of 2928 1564 292d49b35338ec0ef22bc276cb6d336669da61043c903ad37c785b0cd280b2e1.exe 93 PID 1564 wrote to memory of 2928 1564 292d49b35338ec0ef22bc276cb6d336669da61043c903ad37c785b0cd280b2e1.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\292d49b35338ec0ef22bc276cb6d336669da61043c903ad37c785b0cd280b2e1.exe"C:\Users\Admin\AppData\Local\Temp\292d49b35338ec0ef22bc276cb6d336669da61043c903ad37c785b0cd280b2e1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vmS2626NO.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vmS2626NO.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw88Sl59su30.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw88Sl59su30.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:32
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\trN20mC95.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\trN20mC95.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4564 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4564 -s 13364⤵
- Program crash
PID:4192
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ura40tv84.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ura40tv84.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4564 -ip 45641⤵PID:3976
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5d8633077bf2fbc145ba153b269e260ec
SHA12acce38df6980292b2f01cdb94b21f2d3882aa7e
SHA256477a770a08d493973e79417f6dee855b24cbf3fb44ba200a60a694d84ff5fe25
SHA5120aeae7f4a74aa2f0e3074a846f00a6ced6df3754643006d1a9ba54993b10396d4a246a6ff2a119e3a9483f5b04fdbefd1efa3a0d9e99f36cb4403a14f1a7ba34
-
Filesize
175KB
MD5d8633077bf2fbc145ba153b269e260ec
SHA12acce38df6980292b2f01cdb94b21f2d3882aa7e
SHA256477a770a08d493973e79417f6dee855b24cbf3fb44ba200a60a694d84ff5fe25
SHA5120aeae7f4a74aa2f0e3074a846f00a6ced6df3754643006d1a9ba54993b10396d4a246a6ff2a119e3a9483f5b04fdbefd1efa3a0d9e99f36cb4403a14f1a7ba34
-
Filesize
391KB
MD543b050b60ea70f5353418f1714dd32aa
SHA19e2f57a612bb5347982f5fb2e2eecea3447fcb5b
SHA2560b5bd52c4a714e629c3bf831a6e2dd601519824473d09f86cce755f82dd4c2e6
SHA512311d720c14730fcdc9deb22bb08f9e4f643e05e83c127a277b75ace7a85e6cee4f7032786d248285c8b4383d152cdd49ca72d465c231e65f28de7cc635c176c7
-
Filesize
391KB
MD543b050b60ea70f5353418f1714dd32aa
SHA19e2f57a612bb5347982f5fb2e2eecea3447fcb5b
SHA2560b5bd52c4a714e629c3bf831a6e2dd601519824473d09f86cce755f82dd4c2e6
SHA512311d720c14730fcdc9deb22bb08f9e4f643e05e83c127a277b75ace7a85e6cee4f7032786d248285c8b4383d152cdd49ca72d465c231e65f28de7cc635c176c7
-
Filesize
11KB
MD5c8a8cea45e9b40590620ed7be3a231aa
SHA1104f68acbfb921ed2e7bf6fb35f427643e7bbc2c
SHA256e8777b31dbbc5db5ca15255be6ba323e57a5ca6eefe1f775d35bb05925af4aa1
SHA512c59e0d5da5c966524f2370a5877212a3cfc9fc628ac7a09608bac67a13e5325c3858e50131fa4e0b1e6cdc036e48c481d40cfceeebf5cc52ab050ca1ff77f7d1
-
Filesize
11KB
MD5c8a8cea45e9b40590620ed7be3a231aa
SHA1104f68acbfb921ed2e7bf6fb35f427643e7bbc2c
SHA256e8777b31dbbc5db5ca15255be6ba323e57a5ca6eefe1f775d35bb05925af4aa1
SHA512c59e0d5da5c966524f2370a5877212a3cfc9fc628ac7a09608bac67a13e5325c3858e50131fa4e0b1e6cdc036e48c481d40cfceeebf5cc52ab050ca1ff77f7d1
-
Filesize
304KB
MD5a562213cf445eaaf665759f35b4e91c2
SHA1c37cb42d6b01cb56f0528499c8cb2d801176bf45
SHA256457e081eb0be34e398946eda58be940aef13cd4390cb727cc848846833d307c3
SHA5126944f4c08e8617f4ff143a96aeb4b4dc8c31562db7f6747bed36abb4116b540c181a5c42384505f1d059c3e3bbdf4f4ca3f74d0480b0e20efa28e1505f3b4fbd
-
Filesize
304KB
MD5a562213cf445eaaf665759f35b4e91c2
SHA1c37cb42d6b01cb56f0528499c8cb2d801176bf45
SHA256457e081eb0be34e398946eda58be940aef13cd4390cb727cc848846833d307c3
SHA5126944f4c08e8617f4ff143a96aeb4b4dc8c31562db7f6747bed36abb4116b540c181a5c42384505f1d059c3e3bbdf4f4ca3f74d0480b0e20efa28e1505f3b4fbd