Analysis
-
max time kernel
140s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/03/2023, 12:16
Static task
static1
Behavioral task
behavioral1
Sample
de31e34590cc70b1f0a2cd1645c2bdac38dddc13da81d3543ae9023e1ebef1fb.exe
Resource
win10v2004-20230220-en
General
-
Target
de31e34590cc70b1f0a2cd1645c2bdac38dddc13da81d3543ae9023e1ebef1fb.exe
-
Size
536KB
-
MD5
e76ce7880e14bbd616c96ddfb3631048
-
SHA1
df0dd2024062b1e73ba1512450cf0100d9808840
-
SHA256
de31e34590cc70b1f0a2cd1645c2bdac38dddc13da81d3543ae9023e1ebef1fb
-
SHA512
7500d7d158dc0b639448462ec05aa4dc50b811b4367f05fb0207ca33bc2e33e9de9ed86dc212952c8086055b6a1250a660401711e2aa92f27dffc40175b44f33
-
SSDEEP
12288:qMrxy90w+aEvreN4VZUMMpSXxa6qwbx1bh84ksu8apz4:3yEaEvre6VZ4lSdphRMz4
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Extracted
redline
forma
193.233.20.24:4123
-
auth_value
50b8e065d7cb1e9e30786f7a370368f9
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw42Ta32Qr07.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw42Ta32Qr07.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw42Ta32Qr07.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw42Ta32Qr07.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw42Ta32Qr07.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sw42Ta32Qr07.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/3880-158-0x0000000005110000-0x000000000514E000-memory.dmp family_redline behavioral1/memory/3880-159-0x0000000005110000-0x000000000514E000-memory.dmp family_redline behavioral1/memory/3880-161-0x0000000005110000-0x000000000514E000-memory.dmp family_redline behavioral1/memory/3880-163-0x0000000005110000-0x000000000514E000-memory.dmp family_redline behavioral1/memory/3880-165-0x0000000005110000-0x000000000514E000-memory.dmp family_redline behavioral1/memory/3880-167-0x0000000005110000-0x000000000514E000-memory.dmp family_redline behavioral1/memory/3880-169-0x0000000005110000-0x000000000514E000-memory.dmp family_redline behavioral1/memory/3880-171-0x0000000005110000-0x000000000514E000-memory.dmp family_redline behavioral1/memory/3880-173-0x0000000005110000-0x000000000514E000-memory.dmp family_redline behavioral1/memory/3880-175-0x0000000005110000-0x000000000514E000-memory.dmp family_redline behavioral1/memory/3880-177-0x0000000005110000-0x000000000514E000-memory.dmp family_redline behavioral1/memory/3880-179-0x0000000005110000-0x000000000514E000-memory.dmp family_redline behavioral1/memory/3880-181-0x0000000005110000-0x000000000514E000-memory.dmp family_redline behavioral1/memory/3880-183-0x0000000005110000-0x000000000514E000-memory.dmp family_redline behavioral1/memory/3880-185-0x0000000005110000-0x000000000514E000-memory.dmp family_redline behavioral1/memory/3880-187-0x0000000005110000-0x000000000514E000-memory.dmp family_redline behavioral1/memory/3880-189-0x0000000005110000-0x000000000514E000-memory.dmp family_redline behavioral1/memory/3880-191-0x0000000005110000-0x000000000514E000-memory.dmp family_redline behavioral1/memory/3880-193-0x0000000005110000-0x000000000514E000-memory.dmp family_redline behavioral1/memory/3880-195-0x0000000005110000-0x000000000514E000-memory.dmp family_redline behavioral1/memory/3880-197-0x0000000005110000-0x000000000514E000-memory.dmp family_redline behavioral1/memory/3880-199-0x0000000005110000-0x000000000514E000-memory.dmp family_redline behavioral1/memory/3880-201-0x0000000005110000-0x000000000514E000-memory.dmp family_redline behavioral1/memory/3880-203-0x0000000005110000-0x000000000514E000-memory.dmp family_redline behavioral1/memory/3880-205-0x0000000005110000-0x000000000514E000-memory.dmp family_redline behavioral1/memory/3880-207-0x0000000005110000-0x000000000514E000-memory.dmp family_redline behavioral1/memory/3880-209-0x0000000005110000-0x000000000514E000-memory.dmp family_redline behavioral1/memory/3880-211-0x0000000005110000-0x000000000514E000-memory.dmp family_redline behavioral1/memory/3880-213-0x0000000005110000-0x000000000514E000-memory.dmp family_redline behavioral1/memory/3880-215-0x0000000005110000-0x000000000514E000-memory.dmp family_redline behavioral1/memory/3880-217-0x0000000005110000-0x000000000514E000-memory.dmp family_redline behavioral1/memory/3880-219-0x0000000005110000-0x000000000514E000-memory.dmp family_redline behavioral1/memory/3880-221-0x0000000005110000-0x000000000514E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4480 vlZ1126vQ.exe 4576 sw42Ta32Qr07.exe 3880 tIp73lT66.exe 996 uzI90Vi05.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw42Ta32Qr07.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" de31e34590cc70b1f0a2cd1645c2bdac38dddc13da81d3543ae9023e1ebef1fb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vlZ1126vQ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vlZ1126vQ.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce de31e34590cc70b1f0a2cd1645c2bdac38dddc13da81d3543ae9023e1ebef1fb.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4368 3880 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4576 sw42Ta32Qr07.exe 4576 sw42Ta32Qr07.exe 3880 tIp73lT66.exe 3880 tIp73lT66.exe 996 uzI90Vi05.exe 996 uzI90Vi05.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4576 sw42Ta32Qr07.exe Token: SeDebugPrivilege 3880 tIp73lT66.exe Token: SeDebugPrivilege 996 uzI90Vi05.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1304 wrote to memory of 4480 1304 de31e34590cc70b1f0a2cd1645c2bdac38dddc13da81d3543ae9023e1ebef1fb.exe 85 PID 1304 wrote to memory of 4480 1304 de31e34590cc70b1f0a2cd1645c2bdac38dddc13da81d3543ae9023e1ebef1fb.exe 85 PID 1304 wrote to memory of 4480 1304 de31e34590cc70b1f0a2cd1645c2bdac38dddc13da81d3543ae9023e1ebef1fb.exe 85 PID 4480 wrote to memory of 4576 4480 vlZ1126vQ.exe 86 PID 4480 wrote to memory of 4576 4480 vlZ1126vQ.exe 86 PID 4480 wrote to memory of 3880 4480 vlZ1126vQ.exe 91 PID 4480 wrote to memory of 3880 4480 vlZ1126vQ.exe 91 PID 4480 wrote to memory of 3880 4480 vlZ1126vQ.exe 91 PID 1304 wrote to memory of 996 1304 de31e34590cc70b1f0a2cd1645c2bdac38dddc13da81d3543ae9023e1ebef1fb.exe 95 PID 1304 wrote to memory of 996 1304 de31e34590cc70b1f0a2cd1645c2bdac38dddc13da81d3543ae9023e1ebef1fb.exe 95 PID 1304 wrote to memory of 996 1304 de31e34590cc70b1f0a2cd1645c2bdac38dddc13da81d3543ae9023e1ebef1fb.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\de31e34590cc70b1f0a2cd1645c2bdac38dddc13da81d3543ae9023e1ebef1fb.exe"C:\Users\Admin\AppData\Local\Temp\de31e34590cc70b1f0a2cd1645c2bdac38dddc13da81d3543ae9023e1ebef1fb.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vlZ1126vQ.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vlZ1126vQ.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw42Ta32Qr07.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw42Ta32Qr07.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4576
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tIp73lT66.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tIp73lT66.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3880 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3880 -s 17964⤵
- Program crash
PID:4368
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uzI90Vi05.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uzI90Vi05.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3880 -ip 38801⤵PID:2752
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
177KB
MD5107ec48e3058370a6629dde5733cf54e
SHA1538798a573ce8fb26574127967f07b56f3daef30
SHA2568931d2b70f3176f57130fd9b6ff13638a15b506382d6b064947b3b0ffab8df5d
SHA512402f3483d7822673bcd7789396ae5337894c68f37c5c104142a2dff873bf3b0cd303989a63a5cf7ba6750a42749c191591c489796ef4cc0203604c5a7f14b4e4
-
Filesize
177KB
MD5107ec48e3058370a6629dde5733cf54e
SHA1538798a573ce8fb26574127967f07b56f3daef30
SHA2568931d2b70f3176f57130fd9b6ff13638a15b506382d6b064947b3b0ffab8df5d
SHA512402f3483d7822673bcd7789396ae5337894c68f37c5c104142a2dff873bf3b0cd303989a63a5cf7ba6750a42749c191591c489796ef4cc0203604c5a7f14b4e4
-
Filesize
391KB
MD5b7d7d3a4bcc2ea01d47cb5ec68734e7c
SHA1842b8ac15335440c2fa9935ad069c7d5979933e3
SHA256a9169a396f77b81a0a2fda20a60883c4a942ddd3bbe1ece2162522af8b2406a8
SHA51277631ae65b2c2d6a4716a0faa8fc8de652e49633e77080639f51f771cba5c0a9dd6e599693f75836b2d2141894bd9d517a75f0591383509aac103efef497a5b4
-
Filesize
391KB
MD5b7d7d3a4bcc2ea01d47cb5ec68734e7c
SHA1842b8ac15335440c2fa9935ad069c7d5979933e3
SHA256a9169a396f77b81a0a2fda20a60883c4a942ddd3bbe1ece2162522af8b2406a8
SHA51277631ae65b2c2d6a4716a0faa8fc8de652e49633e77080639f51f771cba5c0a9dd6e599693f75836b2d2141894bd9d517a75f0591383509aac103efef497a5b4
-
Filesize
17KB
MD55f9c40a22d8288f4b6b8086c0a13438a
SHA1ef510269bbccd40611378d4297f8495af03b2f2e
SHA256d7d30ec9fcc27a381e55319605f81c98c9792c13908a25f4f53004a33b4bcc1a
SHA512b0500ea73d7f8816d083eb39f6918b200b4793d78ddd1a03ea008fa57309bff9a97e39fdb531a4af0198b8d8b2709c7e67778e5a14c9acd9a09a0bf7a1b158f0
-
Filesize
17KB
MD55f9c40a22d8288f4b6b8086c0a13438a
SHA1ef510269bbccd40611378d4297f8495af03b2f2e
SHA256d7d30ec9fcc27a381e55319605f81c98c9792c13908a25f4f53004a33b4bcc1a
SHA512b0500ea73d7f8816d083eb39f6918b200b4793d78ddd1a03ea008fa57309bff9a97e39fdb531a4af0198b8d8b2709c7e67778e5a14c9acd9a09a0bf7a1b158f0
-
Filesize
303KB
MD512a07204bf4c65efdd968689ed260c4e
SHA18430e5110448dc962c4191a1a06b05c4e3c1a140
SHA256e4666bb9e57296f0140b125a1c5e32f446659b0baa2c3d7fef87a7aef339433b
SHA51261dbfcedae6259039196942064d62cae0de853c6c5afa3547e6394e789ddf3c0acc6e94cd2c89c090c6f891a77565b0fe332b21da0afa5a5102f1d12d4f3989a
-
Filesize
303KB
MD512a07204bf4c65efdd968689ed260c4e
SHA18430e5110448dc962c4191a1a06b05c4e3c1a140
SHA256e4666bb9e57296f0140b125a1c5e32f446659b0baa2c3d7fef87a7aef339433b
SHA51261dbfcedae6259039196942064d62cae0de853c6c5afa3547e6394e789ddf3c0acc6e94cd2c89c090c6f891a77565b0fe332b21da0afa5a5102f1d12d4f3989a