Analysis
-
max time kernel
51s -
max time network
53s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
02/03/2023, 03:15
Static task
static1
Behavioral task
behavioral1
Sample
967e76e82025963405f0592f376daa76f3e5af0fb72a3ce1548b9b7d8da3658f.exe
Resource
win10-20230220-en
General
-
Target
967e76e82025963405f0592f376daa76f3e5af0fb72a3ce1548b9b7d8da3658f.exe
-
Size
536KB
-
MD5
9f3a27839a14a9123beab377d8e3c491
-
SHA1
746db4f66d9fb06978b770418c41afea5c680535
-
SHA256
967e76e82025963405f0592f376daa76f3e5af0fb72a3ce1548b9b7d8da3658f
-
SHA512
87c08b0248ef7541dae5fadf35cf39e9839b014a4713c7bdadd0dfc9d20453f43b48380080d8c1ddc875cd6139b372632747264bfa33a140521798d9c51f2552
-
SSDEEP
12288:tMrBy90kjCmJTf2P5H6VyHwcapyO8zcDHc:0yhTs6+wcapyYD8
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Extracted
redline
fuba
193.56.146.11:4162
-
auth_value
43015841fc23c63b15ca6ffe1d278d5e
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw74od59iq93.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw74od59iq93.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw74od59iq93.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw74od59iq93.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw74od59iq93.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/4180-142-0x0000000004A60000-0x0000000004AA6000-memory.dmp family_redline behavioral1/memory/4180-147-0x0000000005030000-0x0000000005074000-memory.dmp family_redline behavioral1/memory/4180-148-0x0000000005030000-0x000000000506E000-memory.dmp family_redline behavioral1/memory/4180-149-0x0000000005030000-0x000000000506E000-memory.dmp family_redline behavioral1/memory/4180-151-0x0000000005030000-0x000000000506E000-memory.dmp family_redline behavioral1/memory/4180-153-0x0000000005030000-0x000000000506E000-memory.dmp family_redline behavioral1/memory/4180-155-0x0000000005030000-0x000000000506E000-memory.dmp family_redline behavioral1/memory/4180-157-0x0000000005030000-0x000000000506E000-memory.dmp family_redline behavioral1/memory/4180-159-0x0000000005030000-0x000000000506E000-memory.dmp family_redline behavioral1/memory/4180-161-0x0000000005030000-0x000000000506E000-memory.dmp family_redline behavioral1/memory/4180-163-0x0000000005030000-0x000000000506E000-memory.dmp family_redline behavioral1/memory/4180-165-0x0000000005030000-0x000000000506E000-memory.dmp family_redline behavioral1/memory/4180-167-0x0000000005030000-0x000000000506E000-memory.dmp family_redline behavioral1/memory/4180-169-0x0000000005030000-0x000000000506E000-memory.dmp family_redline behavioral1/memory/4180-171-0x0000000005030000-0x000000000506E000-memory.dmp family_redline behavioral1/memory/4180-173-0x0000000005030000-0x000000000506E000-memory.dmp family_redline behavioral1/memory/4180-175-0x0000000005030000-0x000000000506E000-memory.dmp family_redline behavioral1/memory/4180-177-0x0000000005030000-0x000000000506E000-memory.dmp family_redline behavioral1/memory/4180-179-0x0000000005030000-0x000000000506E000-memory.dmp family_redline behavioral1/memory/4180-181-0x0000000005030000-0x000000000506E000-memory.dmp family_redline behavioral1/memory/4180-183-0x0000000005030000-0x000000000506E000-memory.dmp family_redline behavioral1/memory/4180-185-0x0000000005030000-0x000000000506E000-memory.dmp family_redline behavioral1/memory/4180-187-0x0000000005030000-0x000000000506E000-memory.dmp family_redline behavioral1/memory/4180-189-0x0000000005030000-0x000000000506E000-memory.dmp family_redline behavioral1/memory/4180-191-0x0000000005030000-0x000000000506E000-memory.dmp family_redline behavioral1/memory/4180-193-0x0000000005030000-0x000000000506E000-memory.dmp family_redline behavioral1/memory/4180-195-0x0000000005030000-0x000000000506E000-memory.dmp family_redline behavioral1/memory/4180-197-0x0000000005030000-0x000000000506E000-memory.dmp family_redline behavioral1/memory/4180-199-0x0000000005030000-0x000000000506E000-memory.dmp family_redline behavioral1/memory/4180-201-0x0000000005030000-0x000000000506E000-memory.dmp family_redline behavioral1/memory/4180-203-0x0000000005030000-0x000000000506E000-memory.dmp family_redline behavioral1/memory/4180-205-0x0000000005030000-0x000000000506E000-memory.dmp family_redline behavioral1/memory/4180-207-0x0000000005030000-0x000000000506E000-memory.dmp family_redline behavioral1/memory/4180-209-0x0000000005030000-0x000000000506E000-memory.dmp family_redline behavioral1/memory/4180-211-0x0000000005030000-0x000000000506E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 396 vqF9767lO.exe 3320 sw74od59iq93.exe 4180 tSD19Iz02.exe 1560 uST04bv99.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw74od59iq93.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vqF9767lO.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vqF9767lO.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 967e76e82025963405f0592f376daa76f3e5af0fb72a3ce1548b9b7d8da3658f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 967e76e82025963405f0592f376daa76f3e5af0fb72a3ce1548b9b7d8da3658f.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3320 sw74od59iq93.exe 3320 sw74od59iq93.exe 4180 tSD19Iz02.exe 4180 tSD19Iz02.exe 1560 uST04bv99.exe 1560 uST04bv99.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3320 sw74od59iq93.exe Token: SeDebugPrivilege 4180 tSD19Iz02.exe Token: SeDebugPrivilege 1560 uST04bv99.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3188 wrote to memory of 396 3188 967e76e82025963405f0592f376daa76f3e5af0fb72a3ce1548b9b7d8da3658f.exe 66 PID 3188 wrote to memory of 396 3188 967e76e82025963405f0592f376daa76f3e5af0fb72a3ce1548b9b7d8da3658f.exe 66 PID 3188 wrote to memory of 396 3188 967e76e82025963405f0592f376daa76f3e5af0fb72a3ce1548b9b7d8da3658f.exe 66 PID 396 wrote to memory of 3320 396 vqF9767lO.exe 67 PID 396 wrote to memory of 3320 396 vqF9767lO.exe 67 PID 396 wrote to memory of 4180 396 vqF9767lO.exe 68 PID 396 wrote to memory of 4180 396 vqF9767lO.exe 68 PID 396 wrote to memory of 4180 396 vqF9767lO.exe 68 PID 3188 wrote to memory of 1560 3188 967e76e82025963405f0592f376daa76f3e5af0fb72a3ce1548b9b7d8da3658f.exe 70 PID 3188 wrote to memory of 1560 3188 967e76e82025963405f0592f376daa76f3e5af0fb72a3ce1548b9b7d8da3658f.exe 70 PID 3188 wrote to memory of 1560 3188 967e76e82025963405f0592f376daa76f3e5af0fb72a3ce1548b9b7d8da3658f.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\967e76e82025963405f0592f376daa76f3e5af0fb72a3ce1548b9b7d8da3658f.exe"C:\Users\Admin\AppData\Local\Temp\967e76e82025963405f0592f376daa76f3e5af0fb72a3ce1548b9b7d8da3658f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vqF9767lO.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vqF9767lO.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw74od59iq93.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw74od59iq93.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3320
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tSD19Iz02.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tSD19Iz02.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4180
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uST04bv99.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uST04bv99.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1560
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD56fbf763f3c22ee09126d104cb7978419
SHA1a1cf7ab691c932104a88270d75b93f55cdfd720c
SHA256b88fe659f4f9d9e3a576b6389e145f223afd6db6beab20310057c408dd2deec8
SHA512b677ef17f477eb0a4b9e26cfbe0ebbf9273239773059ee39e7cf425e4a18244d7580a8420c641932e8e14dc25a1f5f81ce273b5e8027ac0cb19522aef33f4e2e
-
Filesize
175KB
MD56fbf763f3c22ee09126d104cb7978419
SHA1a1cf7ab691c932104a88270d75b93f55cdfd720c
SHA256b88fe659f4f9d9e3a576b6389e145f223afd6db6beab20310057c408dd2deec8
SHA512b677ef17f477eb0a4b9e26cfbe0ebbf9273239773059ee39e7cf425e4a18244d7580a8420c641932e8e14dc25a1f5f81ce273b5e8027ac0cb19522aef33f4e2e
-
Filesize
392KB
MD5a3bd90753681e761c29fe568b1e0f5bb
SHA11dd5c68616b86b02d1492d39be9bb32f13250d19
SHA256b5992fc5afabc123e49686f306b5d8ad42ff3cb52ad39ac00b83c828df31efe0
SHA5129dfe4708a45a3a6d7e0e61b4e56139a07b8435ff952bcceef42951e6e1e86091ceb72899d70eb3c43d498da2f1a947905bfc01382c1173b451f93e2a180faf08
-
Filesize
392KB
MD5a3bd90753681e761c29fe568b1e0f5bb
SHA11dd5c68616b86b02d1492d39be9bb32f13250d19
SHA256b5992fc5afabc123e49686f306b5d8ad42ff3cb52ad39ac00b83c828df31efe0
SHA5129dfe4708a45a3a6d7e0e61b4e56139a07b8435ff952bcceef42951e6e1e86091ceb72899d70eb3c43d498da2f1a947905bfc01382c1173b451f93e2a180faf08
-
Filesize
12KB
MD5d992a50d35503669deab5e78c9c0cfbc
SHA134c5b257cf937569e876a8173332d109902f5c7a
SHA2563215011960b66d9fd7c955dd8b208ec06ed32ad2563dc1d1fa7e1bc47d5dd21e
SHA512032b68585f93efc15af0ef2a9a09b5757294ee1521406b89f901bc9f4fe7092ebf1ff369a72236aca468a71438686d3a2fd1f851d0d750d458af83e0c87bb2c2
-
Filesize
12KB
MD5d992a50d35503669deab5e78c9c0cfbc
SHA134c5b257cf937569e876a8173332d109902f5c7a
SHA2563215011960b66d9fd7c955dd8b208ec06ed32ad2563dc1d1fa7e1bc47d5dd21e
SHA512032b68585f93efc15af0ef2a9a09b5757294ee1521406b89f901bc9f4fe7092ebf1ff369a72236aca468a71438686d3a2fd1f851d0d750d458af83e0c87bb2c2
-
Filesize
304KB
MD56940451e769c094029427d1531775121
SHA103c763ca8ebc6896fb35c9f8d4d3fc64d03fe850
SHA256ab9bbcc3bb273a1f13db7566032205b26f5a4a634194ba39007349aa34801dca
SHA51253578c0693e6a171feec767f38f4601da453875d14a37f82e3ca30cce3b7217d4b5b0a6de659d54d11810ee238bd5816d2bc9635cf20dcd9f73901a09c08ff06
-
Filesize
304KB
MD56940451e769c094029427d1531775121
SHA103c763ca8ebc6896fb35c9f8d4d3fc64d03fe850
SHA256ab9bbcc3bb273a1f13db7566032205b26f5a4a634194ba39007349aa34801dca
SHA51253578c0693e6a171feec767f38f4601da453875d14a37f82e3ca30cce3b7217d4b5b0a6de659d54d11810ee238bd5816d2bc9635cf20dcd9f73901a09c08ff06