Analysis
-
max time kernel
83s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/03/2023, 08:04
Static task
static1
Behavioral task
behavioral1
Sample
99b58a3eeac4d2477dbb27e53426664163ec651365965c44e95b65955a9b69c0.exe
Resource
win10v2004-20230220-en
General
-
Target
99b58a3eeac4d2477dbb27e53426664163ec651365965c44e95b65955a9b69c0.exe
-
Size
536KB
-
MD5
13ce7fd7f946e0baa3fc2407b40b342e
-
SHA1
226feff35d0ecce14041f1f03fa862f72307e24b
-
SHA256
99b58a3eeac4d2477dbb27e53426664163ec651365965c44e95b65955a9b69c0
-
SHA512
66fc38e1414b934ac51cb7dbf59affdbacb0c079b7a829af6719bdea8e541288cbb7d038d595a37f812f29e017ac449fe117139dc355c8e8d0f25f4e3af3e157
-
SSDEEP
12288:QMruy90qv2On7/nSLbzIAL4kjenhJ2llUYKxxYY/o1xcUm1B+l:uyn77/SH8AxwhI0YYyYg1xcUQEl
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Extracted
redline
forma
193.233.20.24:4123
-
auth_value
50b8e065d7cb1e9e30786f7a370368f9
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw72bK45Sq62.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw72bK45Sq62.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw72bK45Sq62.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw72bK45Sq62.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw72bK45Sq62.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sw72bK45Sq62.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/3332-157-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/3332-158-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/3332-160-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/3332-162-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/3332-164-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/3332-166-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/3332-168-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/3332-170-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/3332-172-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/3332-174-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/3332-176-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/3332-178-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/3332-180-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/3332-182-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/3332-184-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/3332-188-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/3332-186-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/3332-190-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/3332-192-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/3332-194-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/3332-196-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/3332-198-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/3332-200-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/3332-202-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/3332-204-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/3332-206-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/3332-208-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/3332-210-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/3332-212-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/3332-214-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/3332-216-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/3332-218-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/3332-220-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 828 vGi7588Je.exe 912 sw72bK45Sq62.exe 3332 tuQ75rq89.exe 956 uXZ37ku55.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw72bK45Sq62.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vGi7588Je.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 99b58a3eeac4d2477dbb27e53426664163ec651365965c44e95b65955a9b69c0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 99b58a3eeac4d2477dbb27e53426664163ec651365965c44e95b65955a9b69c0.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vGi7588Je.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1020 3332 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 912 sw72bK45Sq62.exe 912 sw72bK45Sq62.exe 3332 tuQ75rq89.exe 3332 tuQ75rq89.exe 956 uXZ37ku55.exe 956 uXZ37ku55.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 912 sw72bK45Sq62.exe Token: SeDebugPrivilege 3332 tuQ75rq89.exe Token: SeDebugPrivilege 956 uXZ37ku55.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3972 wrote to memory of 828 3972 99b58a3eeac4d2477dbb27e53426664163ec651365965c44e95b65955a9b69c0.exe 86 PID 3972 wrote to memory of 828 3972 99b58a3eeac4d2477dbb27e53426664163ec651365965c44e95b65955a9b69c0.exe 86 PID 3972 wrote to memory of 828 3972 99b58a3eeac4d2477dbb27e53426664163ec651365965c44e95b65955a9b69c0.exe 86 PID 828 wrote to memory of 912 828 vGi7588Je.exe 87 PID 828 wrote to memory of 912 828 vGi7588Je.exe 87 PID 828 wrote to memory of 3332 828 vGi7588Je.exe 92 PID 828 wrote to memory of 3332 828 vGi7588Je.exe 92 PID 828 wrote to memory of 3332 828 vGi7588Je.exe 92 PID 3972 wrote to memory of 956 3972 99b58a3eeac4d2477dbb27e53426664163ec651365965c44e95b65955a9b69c0.exe 96 PID 3972 wrote to memory of 956 3972 99b58a3eeac4d2477dbb27e53426664163ec651365965c44e95b65955a9b69c0.exe 96 PID 3972 wrote to memory of 956 3972 99b58a3eeac4d2477dbb27e53426664163ec651365965c44e95b65955a9b69c0.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\99b58a3eeac4d2477dbb27e53426664163ec651365965c44e95b65955a9b69c0.exe"C:\Users\Admin\AppData\Local\Temp\99b58a3eeac4d2477dbb27e53426664163ec651365965c44e95b65955a9b69c0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vGi7588Je.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vGi7588Je.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw72bK45Sq62.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw72bK45Sq62.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:912
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tuQ75rq89.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tuQ75rq89.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3332 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3332 -s 13364⤵
- Program crash
PID:1020
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uXZ37ku55.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uXZ37ku55.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3332 -ip 33321⤵PID:1924
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
177KB
MD566499e6b91db0005b19b8bed8b1998ec
SHA1b021d42adb309ad946d68fa4d9bbf7043a2c9675
SHA256c017188b6fa533fd8e6ef8a7fd0c4ced0d7ee7e5c55ee8dcb4305d84be797e4b
SHA512e846e1d7dbd30ce19c41821946d0f2e2e3ef1311b01ec1010d302956473b5a56a8beca173c43a1119ebd1d998b8fdcc4305a2c27091c5c933e7ec3e3caa3f80b
-
Filesize
177KB
MD566499e6b91db0005b19b8bed8b1998ec
SHA1b021d42adb309ad946d68fa4d9bbf7043a2c9675
SHA256c017188b6fa533fd8e6ef8a7fd0c4ced0d7ee7e5c55ee8dcb4305d84be797e4b
SHA512e846e1d7dbd30ce19c41821946d0f2e2e3ef1311b01ec1010d302956473b5a56a8beca173c43a1119ebd1d998b8fdcc4305a2c27091c5c933e7ec3e3caa3f80b
-
Filesize
391KB
MD5459f8b07d7521c580a6aecea7e40428d
SHA1767a59fabead0b74a1c7210484b1258e25e0df7f
SHA2564772e72eaf593b5e043c4f4011909d9fe2508f509f468387e1f056304aaf58ea
SHA51278a5bc62f26b1009a9782e287117b0f0df80700e2b466b9a815ef411e85eb02b250b6fa4800bfacc94399fcbd1e13d9fe9e260f012652f38e123ebb28b9595be
-
Filesize
391KB
MD5459f8b07d7521c580a6aecea7e40428d
SHA1767a59fabead0b74a1c7210484b1258e25e0df7f
SHA2564772e72eaf593b5e043c4f4011909d9fe2508f509f468387e1f056304aaf58ea
SHA51278a5bc62f26b1009a9782e287117b0f0df80700e2b466b9a815ef411e85eb02b250b6fa4800bfacc94399fcbd1e13d9fe9e260f012652f38e123ebb28b9595be
-
Filesize
16KB
MD5a148ed4afc5ecfc29c9397a470731b35
SHA170c87178da7e2f1e6b951400b885acf10d60ac56
SHA2568ca3cbf08f438bdde1cac0625fdb3d652cba5b20bead49d2084b626f5e4b3b93
SHA512b554be26fbdc1b39599899d0015639eed31b8d5540e43164be7646eb2eb3d79dd7d5f9f927075850bed04e5621436784fea8c4779a2d9ecf1ce4d54d231612d3
-
Filesize
16KB
MD5a148ed4afc5ecfc29c9397a470731b35
SHA170c87178da7e2f1e6b951400b885acf10d60ac56
SHA2568ca3cbf08f438bdde1cac0625fdb3d652cba5b20bead49d2084b626f5e4b3b93
SHA512b554be26fbdc1b39599899d0015639eed31b8d5540e43164be7646eb2eb3d79dd7d5f9f927075850bed04e5621436784fea8c4779a2d9ecf1ce4d54d231612d3
-
Filesize
302KB
MD55b4052ee747278a02dac44898f59aaee
SHA16b59810f74916a6921ea2276b57b6f5f61c79654
SHA256baddc727c186e86b475b2b6dd68a39db563c8f1b6129e7e5f88fb4060cb7ee80
SHA5129d14b58234c4790199902771cecd0723a17e01e7fd1cc5a66d7d92e1848de7347e86429c8985ea885e345e0a80d550af5b4629c98a8e30142c8c21201d7e2c23
-
Filesize
302KB
MD55b4052ee747278a02dac44898f59aaee
SHA16b59810f74916a6921ea2276b57b6f5f61c79654
SHA256baddc727c186e86b475b2b6dd68a39db563c8f1b6129e7e5f88fb4060cb7ee80
SHA5129d14b58234c4790199902771cecd0723a17e01e7fd1cc5a66d7d92e1848de7347e86429c8985ea885e345e0a80d550af5b4629c98a8e30142c8c21201d7e2c23