Analysis
-
max time kernel
142s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01-03-2023 13:48
Static task
static1
Behavioral task
behavioral1
Sample
80b99c541fc146e3cb7bb0545def0b5ac2877ecf726828a3328ae746f8b10b64.exe
Resource
win10v2004-20230220-en
General
-
Target
80b99c541fc146e3cb7bb0545def0b5ac2877ecf726828a3328ae746f8b10b64.exe
-
Size
537KB
-
MD5
30fbdfa08a52c8249c29fcd242c421d6
-
SHA1
4304c3df69f08f513f4c83fcd3e9cca9abd58268
-
SHA256
80b99c541fc146e3cb7bb0545def0b5ac2877ecf726828a3328ae746f8b10b64
-
SHA512
da3033709daf6089af11e95036bf959e098b03ad261a0c6ad9073b67d1e604c3aa1666f044435b0074f99532dbf4c6cbf77a1a1366209d228937c9c70058a139
-
SSDEEP
12288:KMr4y90+D+wBVOgO5LvLNlITZYAVLpenLUYLR:OyscVtOZvplIaAVa9
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Extracted
redline
forma
193.233.20.24:4123
-
auth_value
50b8e065d7cb1e9e30786f7a370368f9
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw73RX69GI60.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw73RX69GI60.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw73RX69GI60.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sw73RX69GI60.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw73RX69GI60.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw73RX69GI60.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/4844-156-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/4844-157-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/4844-159-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/4844-161-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/4844-163-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/4844-165-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/4844-167-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/4844-169-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/4844-171-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/4844-173-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/4844-175-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/4844-177-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/4844-180-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/4844-182-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/4844-184-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/4844-186-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/4844-188-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/4844-190-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/4844-192-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/4844-194-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/4844-196-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/4844-198-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/4844-200-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/4844-202-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/4844-204-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/4844-206-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/4844-208-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/4844-210-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/4844-212-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/4844-214-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/4844-216-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/4844-218-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/4844-220-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4304 vuD4177yu.exe 4372 sw73RX69GI60.exe 4844 tol69SK21.exe 4492 uEe48Dw97.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw73RX69GI60.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 80b99c541fc146e3cb7bb0545def0b5ac2877ecf726828a3328ae746f8b10b64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 80b99c541fc146e3cb7bb0545def0b5ac2877ecf726828a3328ae746f8b10b64.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vuD4177yu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vuD4177yu.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4436 4844 WerFault.exe 87 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4372 sw73RX69GI60.exe 4372 sw73RX69GI60.exe 4844 tol69SK21.exe 4844 tol69SK21.exe 4492 uEe48Dw97.exe 4492 uEe48Dw97.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4372 sw73RX69GI60.exe Token: SeDebugPrivilege 4844 tol69SK21.exe Token: SeDebugPrivilege 4492 uEe48Dw97.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4696 wrote to memory of 4304 4696 80b99c541fc146e3cb7bb0545def0b5ac2877ecf726828a3328ae746f8b10b64.exe 85 PID 4696 wrote to memory of 4304 4696 80b99c541fc146e3cb7bb0545def0b5ac2877ecf726828a3328ae746f8b10b64.exe 85 PID 4696 wrote to memory of 4304 4696 80b99c541fc146e3cb7bb0545def0b5ac2877ecf726828a3328ae746f8b10b64.exe 85 PID 4304 wrote to memory of 4372 4304 vuD4177yu.exe 86 PID 4304 wrote to memory of 4372 4304 vuD4177yu.exe 86 PID 4304 wrote to memory of 4844 4304 vuD4177yu.exe 87 PID 4304 wrote to memory of 4844 4304 vuD4177yu.exe 87 PID 4304 wrote to memory of 4844 4304 vuD4177yu.exe 87 PID 4696 wrote to memory of 4492 4696 80b99c541fc146e3cb7bb0545def0b5ac2877ecf726828a3328ae746f8b10b64.exe 91 PID 4696 wrote to memory of 4492 4696 80b99c541fc146e3cb7bb0545def0b5ac2877ecf726828a3328ae746f8b10b64.exe 91 PID 4696 wrote to memory of 4492 4696 80b99c541fc146e3cb7bb0545def0b5ac2877ecf726828a3328ae746f8b10b64.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\80b99c541fc146e3cb7bb0545def0b5ac2877ecf726828a3328ae746f8b10b64.exe"C:\Users\Admin\AppData\Local\Temp\80b99c541fc146e3cb7bb0545def0b5ac2877ecf726828a3328ae746f8b10b64.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vuD4177yu.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vuD4177yu.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw73RX69GI60.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw73RX69GI60.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4372
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tol69SK21.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tol69SK21.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4844 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4844 -s 15924⤵
- Program crash
PID:4436
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uEe48Dw97.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uEe48Dw97.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4492
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4844 -ip 48441⤵PID:3060
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
177KB
MD57af8e0599a0c84145dd698a8a57bfc77
SHA1a18daff5be79795239c91f7e397e113babfacda5
SHA2562b6385b222dfe9ac938eb8c7d5d4a3be894ac8f7ffabf07fc40ca7f5ce62dcfb
SHA51253729631b01f9737bc63f6f51323486e1505a47afaa525d99478b5ab8c018c31a0be800800b2c30ff2abd90dee5028fccbb7f28a4d0e9b73aec13b17d0819302
-
Filesize
177KB
MD57af8e0599a0c84145dd698a8a57bfc77
SHA1a18daff5be79795239c91f7e397e113babfacda5
SHA2562b6385b222dfe9ac938eb8c7d5d4a3be894ac8f7ffabf07fc40ca7f5ce62dcfb
SHA51253729631b01f9737bc63f6f51323486e1505a47afaa525d99478b5ab8c018c31a0be800800b2c30ff2abd90dee5028fccbb7f28a4d0e9b73aec13b17d0819302
-
Filesize
392KB
MD5681f8ef123155252d85691b376be7e14
SHA164d0edecb5989d0b4d06112e769f88063c3b6e3a
SHA2565c9459fd7fe4e571df1ccd49e06d830817a7585c32df6383d54c13863964a9fd
SHA51253bdf90f2723280a275ccae1021cf46fac69fec9e7256b3297955c16c4ca9b23e61858ba86ce5e04f074cc59086a4e97ecbc8848132a1ab0c1747d5b7c42d8ff
-
Filesize
392KB
MD5681f8ef123155252d85691b376be7e14
SHA164d0edecb5989d0b4d06112e769f88063c3b6e3a
SHA2565c9459fd7fe4e571df1ccd49e06d830817a7585c32df6383d54c13863964a9fd
SHA51253bdf90f2723280a275ccae1021cf46fac69fec9e7256b3297955c16c4ca9b23e61858ba86ce5e04f074cc59086a4e97ecbc8848132a1ab0c1747d5b7c42d8ff
-
Filesize
17KB
MD59c98e278efddc73229acd3b2e79f2172
SHA1e843b4bb86dd4057b52a876f1b70253c1aa55a71
SHA256b1f3e52b9a36ecfee645d1f506c768cbecbe998a5b66897387bf58b95f75d820
SHA512d6a46e4df3463de962c6b5b9f935464e552a4b1c6227140b17d2ca6a0fc24f28c9660f9324e234ae9435da15f5295cc34f3bb3b4a670341fd32f5ac5cc9aebbf
-
Filesize
17KB
MD59c98e278efddc73229acd3b2e79f2172
SHA1e843b4bb86dd4057b52a876f1b70253c1aa55a71
SHA256b1f3e52b9a36ecfee645d1f506c768cbecbe998a5b66897387bf58b95f75d820
SHA512d6a46e4df3463de962c6b5b9f935464e552a4b1c6227140b17d2ca6a0fc24f28c9660f9324e234ae9435da15f5295cc34f3bb3b4a670341fd32f5ac5cc9aebbf
-
Filesize
304KB
MD5ad61b513e0bbc3784d0c28ba13ab19ff
SHA10d86785da45331516385d7d72e18457e32b89aed
SHA2565e58f65612a82a7a2a61a80f45d1cc0d756372bc05a8160e1d962270d2e1b037
SHA51280d72ceb8b82f962a85381078abf4826412537604ff74749d05ff926f79ca143107219d217520050561b09675b04bfef14ddee37b2dc4818a84bf04c785afe0a
-
Filesize
304KB
MD5ad61b513e0bbc3784d0c28ba13ab19ff
SHA10d86785da45331516385d7d72e18457e32b89aed
SHA2565e58f65612a82a7a2a61a80f45d1cc0d756372bc05a8160e1d962270d2e1b037
SHA51280d72ceb8b82f962a85381078abf4826412537604ff74749d05ff926f79ca143107219d217520050561b09675b04bfef14ddee37b2dc4818a84bf04c785afe0a