Analysis
-
max time kernel
54s -
max time network
69s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
01/03/2023, 10:36
Static task
static1
Behavioral task
behavioral1
Sample
b81d8ab6b1c6bd05bfe05ccb9c00d9d4881ef9635e4888aad6bf5b36d3ba8209.exe
Resource
win10-20230220-en
General
-
Target
b81d8ab6b1c6bd05bfe05ccb9c00d9d4881ef9635e4888aad6bf5b36d3ba8209.exe
-
Size
536KB
-
MD5
60dbcffee69f423d34193462a6bbd67c
-
SHA1
4b827f9698d9c3a3d56ac4c57d63521244fa578a
-
SHA256
b81d8ab6b1c6bd05bfe05ccb9c00d9d4881ef9635e4888aad6bf5b36d3ba8209
-
SHA512
f45458be9ca8b79455f10bf64962f98a12a642ffe684f60d8666afb4b0f181e4fb25b976b87c5fafa6918109732d4693d72d8a4296268532379036fa9c700265
-
SSDEEP
12288:FMray90gzTZAnHndgyzFuJYjwlUVsYdGgNgH:LyJ/ZondgynPsYdiH
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Extracted
redline
forma
193.233.20.24:4123
-
auth_value
50b8e065d7cb1e9e30786f7a370368f9
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw07Uc07YD39.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw07Uc07YD39.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw07Uc07YD39.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw07Uc07YD39.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw07Uc07YD39.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/2544-141-0x0000000002620000-0x0000000002666000-memory.dmp family_redline behavioral1/memory/2544-143-0x0000000005060000-0x00000000050A4000-memory.dmp family_redline behavioral1/memory/2544-144-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/2544-149-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/2544-147-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/2544-151-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/2544-145-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/2544-163-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/2544-171-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/2544-179-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/2544-181-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/2544-187-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/2544-185-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/2544-195-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/2544-205-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/2544-211-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/2544-209-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/2544-207-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/2544-203-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/2544-201-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/2544-199-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/2544-197-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/2544-193-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/2544-191-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/2544-189-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/2544-183-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/2544-177-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/2544-175-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/2544-173-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/2544-169-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/2544-167-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/2544-165-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/2544-159-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/2544-155-0x0000000005060000-0x000000000509E000-memory.dmp family_redline behavioral1/memory/2544-153-0x0000000005060000-0x000000000509E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2052 vgn6768fC.exe 2284 sw07Uc07YD39.exe 2544 tbQ54EP70.exe 1292 uWp74MV22.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw07Uc07YD39.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b81d8ab6b1c6bd05bfe05ccb9c00d9d4881ef9635e4888aad6bf5b36d3ba8209.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b81d8ab6b1c6bd05bfe05ccb9c00d9d4881ef9635e4888aad6bf5b36d3ba8209.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vgn6768fC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vgn6768fC.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2284 sw07Uc07YD39.exe 2284 sw07Uc07YD39.exe 2544 tbQ54EP70.exe 2544 tbQ54EP70.exe 1292 uWp74MV22.exe 1292 uWp74MV22.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2284 sw07Uc07YD39.exe Token: SeDebugPrivilege 2544 tbQ54EP70.exe Token: SeDebugPrivilege 1292 uWp74MV22.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1884 wrote to memory of 2052 1884 b81d8ab6b1c6bd05bfe05ccb9c00d9d4881ef9635e4888aad6bf5b36d3ba8209.exe 66 PID 1884 wrote to memory of 2052 1884 b81d8ab6b1c6bd05bfe05ccb9c00d9d4881ef9635e4888aad6bf5b36d3ba8209.exe 66 PID 1884 wrote to memory of 2052 1884 b81d8ab6b1c6bd05bfe05ccb9c00d9d4881ef9635e4888aad6bf5b36d3ba8209.exe 66 PID 2052 wrote to memory of 2284 2052 vgn6768fC.exe 67 PID 2052 wrote to memory of 2284 2052 vgn6768fC.exe 67 PID 2052 wrote to memory of 2544 2052 vgn6768fC.exe 68 PID 2052 wrote to memory of 2544 2052 vgn6768fC.exe 68 PID 2052 wrote to memory of 2544 2052 vgn6768fC.exe 68 PID 1884 wrote to memory of 1292 1884 b81d8ab6b1c6bd05bfe05ccb9c00d9d4881ef9635e4888aad6bf5b36d3ba8209.exe 70 PID 1884 wrote to memory of 1292 1884 b81d8ab6b1c6bd05bfe05ccb9c00d9d4881ef9635e4888aad6bf5b36d3ba8209.exe 70 PID 1884 wrote to memory of 1292 1884 b81d8ab6b1c6bd05bfe05ccb9c00d9d4881ef9635e4888aad6bf5b36d3ba8209.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\b81d8ab6b1c6bd05bfe05ccb9c00d9d4881ef9635e4888aad6bf5b36d3ba8209.exe"C:\Users\Admin\AppData\Local\Temp\b81d8ab6b1c6bd05bfe05ccb9c00d9d4881ef9635e4888aad6bf5b36d3ba8209.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vgn6768fC.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vgn6768fC.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw07Uc07YD39.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw07Uc07YD39.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2284
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tbQ54EP70.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tbQ54EP70.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2544
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uWp74MV22.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uWp74MV22.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1292
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
177KB
MD52f89204af32a4148a3b14a648a7bd0d9
SHA10af88b238d67e5f69f382125ba1eab90cfa93c2e
SHA2567ef2c3784c9a406414f39a5f846873360c6cec8042568b7f46152a0d0c6d22f4
SHA5125d9f35e206253d39aa129319f078517859c96e4756d2cb00f58e518c32bd3b60f639f2b63b833bf9c076ca8910542f536c9474a4334c0112074be5fb2bc665bf
-
Filesize
177KB
MD52f89204af32a4148a3b14a648a7bd0d9
SHA10af88b238d67e5f69f382125ba1eab90cfa93c2e
SHA2567ef2c3784c9a406414f39a5f846873360c6cec8042568b7f46152a0d0c6d22f4
SHA5125d9f35e206253d39aa129319f078517859c96e4756d2cb00f58e518c32bd3b60f639f2b63b833bf9c076ca8910542f536c9474a4334c0112074be5fb2bc665bf
-
Filesize
391KB
MD5a532c38bd32aef625bf90c2f5a13567c
SHA169c691b7488254ab6b4a501e982ee20d3ace0fb0
SHA2566336cc0de6614bac96ac367f31bd4b97a67ddbf3e3207ab073f9d7c4adf7b9f8
SHA5128f24e95a627564029824a0e1e6d250f07db154bb87e4567654072fcd69ae61e5cf071fa6653ceaeeafa44946f8b5c926691ee666b0a772462182345b3b045c1d
-
Filesize
391KB
MD5a532c38bd32aef625bf90c2f5a13567c
SHA169c691b7488254ab6b4a501e982ee20d3ace0fb0
SHA2566336cc0de6614bac96ac367f31bd4b97a67ddbf3e3207ab073f9d7c4adf7b9f8
SHA5128f24e95a627564029824a0e1e6d250f07db154bb87e4567654072fcd69ae61e5cf071fa6653ceaeeafa44946f8b5c926691ee666b0a772462182345b3b045c1d
-
Filesize
16KB
MD5f896f2ed5e00e010621c9d248e5f3ab3
SHA1273e9579931f5f85b65253a572b6406a35964acd
SHA256643a2cb5dbdde784719caf7b97d0c43e7c3318246014971b5ab61749249a4053
SHA51230534babf6b77e5933a48f071f505f787d4ceccc684558e6df051cf5e4186544fa5f2e9f48f706a611610caea595d345733692118fccfdb311ad175220ea7a23
-
Filesize
16KB
MD5f896f2ed5e00e010621c9d248e5f3ab3
SHA1273e9579931f5f85b65253a572b6406a35964acd
SHA256643a2cb5dbdde784719caf7b97d0c43e7c3318246014971b5ab61749249a4053
SHA51230534babf6b77e5933a48f071f505f787d4ceccc684558e6df051cf5e4186544fa5f2e9f48f706a611610caea595d345733692118fccfdb311ad175220ea7a23
-
Filesize
302KB
MD547edc698fb60063cef4e63ee2d5d05bc
SHA18f7bc644d7a378df490ab77d7b3b9b2a25a870fa
SHA2562561279e13e55b30c371c6d72c72bf9124697eec6395f1c1dfbbdd8ac3f5557f
SHA512b6c7b5288217bd01efe5ee9ec396dc7471240749a9f8998ddec34f7a2a073bfaa062e4a72986d0dcb73e283dc60e0cfcd0885a2e68014598e86277dd80082715
-
Filesize
302KB
MD547edc698fb60063cef4e63ee2d5d05bc
SHA18f7bc644d7a378df490ab77d7b3b9b2a25a870fa
SHA2562561279e13e55b30c371c6d72c72bf9124697eec6395f1c1dfbbdd8ac3f5557f
SHA512b6c7b5288217bd01efe5ee9ec396dc7471240749a9f8998ddec34f7a2a073bfaa062e4a72986d0dcb73e283dc60e0cfcd0885a2e68014598e86277dd80082715