Analysis
-
max time kernel
53s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
01/03/2023, 14:37
Static task
static1
Behavioral task
behavioral1
Sample
0035e2ac259bd395957b08f64ff8abb80468eade5fd70698006ffd97f6f407b0.exe
Resource
win10-20230220-en
General
-
Target
0035e2ac259bd395957b08f64ff8abb80468eade5fd70698006ffd97f6f407b0.exe
-
Size
536KB
-
MD5
092b80a1ac4e3e0f751fb2a904fd010e
-
SHA1
33ce583c5698fea1f08193849b8021c45407c0c4
-
SHA256
0035e2ac259bd395957b08f64ff8abb80468eade5fd70698006ffd97f6f407b0
-
SHA512
6b6ba34c04e305511aecdf43c3ad2c9e6f21b16d465a72557157203c620534aa144725270fbd05ca55599ca52f39da9eddabf1ce435ae252ccfffd9c2e774a37
-
SSDEEP
6144:KGy+bnr+Op0yN90QEGZN6wvWCrGu9cHn7AD8rJPVvhIuG6ZpAbUZOM78Zd6zFw9S:WMrKy90sZ0+1KMDiPN+Y8Y5ALMia7h
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Extracted
redline
forma
193.233.20.24:4123
-
auth_value
50b8e065d7cb1e9e30786f7a370368f9
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw31RB95jr75.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw31RB95jr75.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw31RB95jr75.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw31RB95jr75.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw31RB95jr75.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 36 IoCs
resource yara_rule behavioral1/memory/3916-140-0x0000000002240000-0x0000000002286000-memory.dmp family_redline behavioral1/memory/3916-142-0x0000000002320000-0x0000000002364000-memory.dmp family_redline behavioral1/memory/3916-147-0x0000000002320000-0x000000000235E000-memory.dmp family_redline behavioral1/memory/3916-148-0x0000000002320000-0x000000000235E000-memory.dmp family_redline behavioral1/memory/3916-150-0x0000000002320000-0x000000000235E000-memory.dmp family_redline behavioral1/memory/3916-152-0x0000000002320000-0x000000000235E000-memory.dmp family_redline behavioral1/memory/3916-154-0x0000000002320000-0x000000000235E000-memory.dmp family_redline behavioral1/memory/3916-156-0x0000000002320000-0x000000000235E000-memory.dmp family_redline behavioral1/memory/3916-158-0x0000000002320000-0x000000000235E000-memory.dmp family_redline behavioral1/memory/3916-160-0x0000000002320000-0x000000000235E000-memory.dmp family_redline behavioral1/memory/3916-162-0x0000000002320000-0x000000000235E000-memory.dmp family_redline behavioral1/memory/3916-164-0x0000000002320000-0x000000000235E000-memory.dmp family_redline behavioral1/memory/3916-166-0x0000000002320000-0x000000000235E000-memory.dmp family_redline behavioral1/memory/3916-168-0x0000000002320000-0x000000000235E000-memory.dmp family_redline behavioral1/memory/3916-170-0x0000000002320000-0x000000000235E000-memory.dmp family_redline behavioral1/memory/3916-172-0x0000000002320000-0x000000000235E000-memory.dmp family_redline behavioral1/memory/3916-174-0x0000000002320000-0x000000000235E000-memory.dmp family_redline behavioral1/memory/3916-176-0x0000000002320000-0x000000000235E000-memory.dmp family_redline behavioral1/memory/3916-178-0x0000000002320000-0x000000000235E000-memory.dmp family_redline behavioral1/memory/3916-180-0x0000000002320000-0x000000000235E000-memory.dmp family_redline behavioral1/memory/3916-182-0x0000000002320000-0x000000000235E000-memory.dmp family_redline behavioral1/memory/3916-184-0x0000000002320000-0x000000000235E000-memory.dmp family_redline behavioral1/memory/3916-186-0x0000000002320000-0x000000000235E000-memory.dmp family_redline behavioral1/memory/3916-188-0x0000000002320000-0x000000000235E000-memory.dmp family_redline behavioral1/memory/3916-190-0x0000000002320000-0x000000000235E000-memory.dmp family_redline behavioral1/memory/3916-192-0x0000000002320000-0x000000000235E000-memory.dmp family_redline behavioral1/memory/3916-194-0x0000000002320000-0x000000000235E000-memory.dmp family_redline behavioral1/memory/3916-196-0x0000000002320000-0x000000000235E000-memory.dmp family_redline behavioral1/memory/3916-198-0x0000000002320000-0x000000000235E000-memory.dmp family_redline behavioral1/memory/3916-200-0x0000000002320000-0x000000000235E000-memory.dmp family_redline behavioral1/memory/3916-202-0x0000000002320000-0x000000000235E000-memory.dmp family_redline behavioral1/memory/3916-204-0x0000000002320000-0x000000000235E000-memory.dmp family_redline behavioral1/memory/3916-206-0x0000000002320000-0x000000000235E000-memory.dmp family_redline behavioral1/memory/3916-208-0x0000000002320000-0x000000000235E000-memory.dmp family_redline behavioral1/memory/3916-210-0x0000000002320000-0x000000000235E000-memory.dmp family_redline behavioral1/memory/3916-1064-0x0000000004DF0000-0x0000000004E00000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4236 vLm3807HN.exe 3928 sw31RB95jr75.exe 3916 tOP59fF40.exe 5016 uRo45DJ52.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw31RB95jr75.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0035e2ac259bd395957b08f64ff8abb80468eade5fd70698006ffd97f6f407b0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0035e2ac259bd395957b08f64ff8abb80468eade5fd70698006ffd97f6f407b0.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vLm3807HN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vLm3807HN.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3928 sw31RB95jr75.exe 3928 sw31RB95jr75.exe 3916 tOP59fF40.exe 3916 tOP59fF40.exe 5016 uRo45DJ52.exe 5016 uRo45DJ52.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3928 sw31RB95jr75.exe Token: SeDebugPrivilege 3916 tOP59fF40.exe Token: SeDebugPrivilege 5016 uRo45DJ52.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4192 wrote to memory of 4236 4192 0035e2ac259bd395957b08f64ff8abb80468eade5fd70698006ffd97f6f407b0.exe 66 PID 4192 wrote to memory of 4236 4192 0035e2ac259bd395957b08f64ff8abb80468eade5fd70698006ffd97f6f407b0.exe 66 PID 4192 wrote to memory of 4236 4192 0035e2ac259bd395957b08f64ff8abb80468eade5fd70698006ffd97f6f407b0.exe 66 PID 4236 wrote to memory of 3928 4236 vLm3807HN.exe 67 PID 4236 wrote to memory of 3928 4236 vLm3807HN.exe 67 PID 4236 wrote to memory of 3916 4236 vLm3807HN.exe 68 PID 4236 wrote to memory of 3916 4236 vLm3807HN.exe 68 PID 4236 wrote to memory of 3916 4236 vLm3807HN.exe 68 PID 4192 wrote to memory of 5016 4192 0035e2ac259bd395957b08f64ff8abb80468eade5fd70698006ffd97f6f407b0.exe 70 PID 4192 wrote to memory of 5016 4192 0035e2ac259bd395957b08f64ff8abb80468eade5fd70698006ffd97f6f407b0.exe 70 PID 4192 wrote to memory of 5016 4192 0035e2ac259bd395957b08f64ff8abb80468eade5fd70698006ffd97f6f407b0.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\0035e2ac259bd395957b08f64ff8abb80468eade5fd70698006ffd97f6f407b0.exe"C:\Users\Admin\AppData\Local\Temp\0035e2ac259bd395957b08f64ff8abb80468eade5fd70698006ffd97f6f407b0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vLm3807HN.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vLm3807HN.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw31RB95jr75.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw31RB95jr75.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3928
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tOP59fF40.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tOP59fF40.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3916
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uRo45DJ52.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uRo45DJ52.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5016
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
177KB
MD5aae606c1b141187a0c1f64eb36d56e89
SHA1184b1f640800e11abc51bdcf0102e23e8f000dfa
SHA2562f4eff4ca7d203b80acf80c9d3617823cf60ff35bf915bd491c30cd3285b711a
SHA512b84f37d59ff50249bd7e6b7c30b94be739e6ff96b7982b8214358063a678fb6b316131f449fd2559ef951d42891296f8e106574d8c6b19f795b043591ec0e348
-
Filesize
177KB
MD5aae606c1b141187a0c1f64eb36d56e89
SHA1184b1f640800e11abc51bdcf0102e23e8f000dfa
SHA2562f4eff4ca7d203b80acf80c9d3617823cf60ff35bf915bd491c30cd3285b711a
SHA512b84f37d59ff50249bd7e6b7c30b94be739e6ff96b7982b8214358063a678fb6b316131f449fd2559ef951d42891296f8e106574d8c6b19f795b043591ec0e348
-
Filesize
391KB
MD57988313c42bb67bc9fbe9c634d3870aa
SHA188016c84bfb5dec4657f3a80d71c636c85d85982
SHA256bb9ee1e4e902df58f87f9bc1cf924a22a388bc32f401dda6cf375553a1456134
SHA512a933ee15d46db71c6415d36aa9754d8f3a1a6827932cdd1ece01371ac9fac9b928a4e4e0d8f00477e675ab32b5569e911709deed3edd68c65bbbb0caef4fb90f
-
Filesize
391KB
MD57988313c42bb67bc9fbe9c634d3870aa
SHA188016c84bfb5dec4657f3a80d71c636c85d85982
SHA256bb9ee1e4e902df58f87f9bc1cf924a22a388bc32f401dda6cf375553a1456134
SHA512a933ee15d46db71c6415d36aa9754d8f3a1a6827932cdd1ece01371ac9fac9b928a4e4e0d8f00477e675ab32b5569e911709deed3edd68c65bbbb0caef4fb90f
-
Filesize
17KB
MD531d72d8acd130092ad7d915c062975b1
SHA1dadbf53cefd94cd8328e7c0ec2685948d617ab3b
SHA25664e18776f0961bb678c1ba0e8ba5796e632c7260967599edd5807deaeb9d8416
SHA5126c058731ea5fe4e260ff7bdca3a9b6f8bdbb9d0a39979b72ca3f3cd4aacec47b972cd779f99290c4ad172ab7be6519b70d749588c94e8b8643234d5347158262
-
Filesize
17KB
MD531d72d8acd130092ad7d915c062975b1
SHA1dadbf53cefd94cd8328e7c0ec2685948d617ab3b
SHA25664e18776f0961bb678c1ba0e8ba5796e632c7260967599edd5807deaeb9d8416
SHA5126c058731ea5fe4e260ff7bdca3a9b6f8bdbb9d0a39979b72ca3f3cd4aacec47b972cd779f99290c4ad172ab7be6519b70d749588c94e8b8643234d5347158262
-
Filesize
304KB
MD5ad61b513e0bbc3784d0c28ba13ab19ff
SHA10d86785da45331516385d7d72e18457e32b89aed
SHA2565e58f65612a82a7a2a61a80f45d1cc0d756372bc05a8160e1d962270d2e1b037
SHA51280d72ceb8b82f962a85381078abf4826412537604ff74749d05ff926f79ca143107219d217520050561b09675b04bfef14ddee37b2dc4818a84bf04c785afe0a
-
Filesize
304KB
MD5ad61b513e0bbc3784d0c28ba13ab19ff
SHA10d86785da45331516385d7d72e18457e32b89aed
SHA2565e58f65612a82a7a2a61a80f45d1cc0d756372bc05a8160e1d962270d2e1b037
SHA51280d72ceb8b82f962a85381078abf4826412537604ff74749d05ff926f79ca143107219d217520050561b09675b04bfef14ddee37b2dc4818a84bf04c785afe0a