Analysis
-
max time kernel
143s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02/03/2023, 04:03
Static task
static1
Behavioral task
behavioral1
Sample
9a442589c74d1c8e16ec0f04daef3a03705b7bd68a4bd9c2ab7d4fcb5fda15f4.exe
Resource
win10v2004-20230220-en
General
-
Target
9a442589c74d1c8e16ec0f04daef3a03705b7bd68a4bd9c2ab7d4fcb5fda15f4.exe
-
Size
537KB
-
MD5
6a8239b3306d25d0a30730390b7db631
-
SHA1
7e0ed6c5f4fd55536be18719e95cdc3ff2720771
-
SHA256
9a442589c74d1c8e16ec0f04daef3a03705b7bd68a4bd9c2ab7d4fcb5fda15f4
-
SHA512
c67508b78ad8dbd3dca57f55c0bf0c8978b530010cb343a80480a7a272da461562bdfb55cd2779fd891e706f7b395fb1fb1ff7bfa136f6627952c416ebe5864d
-
SSDEEP
12288:rMrEy901anlXguoqmKtcSCfdpWHbnvCM8pjKrW:jyjRguoqT8gbvUKrW
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Extracted
redline
fuba
193.56.146.11:4162
-
auth_value
43015841fc23c63b15ca6ffe1d278d5e
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw99BX69xT73.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sw99BX69xT73.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw99BX69xT73.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw99BX69xT73.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw99BX69xT73.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw99BX69xT73.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/3340-158-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/3340-159-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/3340-161-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/3340-163-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/3340-165-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/3340-167-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/3340-169-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/3340-171-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/3340-173-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/3340-175-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/3340-177-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/3340-179-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/3340-181-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/3340-183-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/3340-185-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/3340-187-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/3340-189-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/3340-191-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/3340-193-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/3340-195-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/3340-197-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/3340-199-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/3340-201-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/3340-203-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/3340-205-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/3340-207-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/3340-209-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/3340-211-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/3340-213-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/3340-215-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/3340-217-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/3340-219-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/3340-221-0x0000000002530000-0x000000000256E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1120 vpR1057fX.exe 2020 sw99BX69xT73.exe 3340 tsO33Kj91.exe 2740 uPj03WC72.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw99BX69xT73.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9a442589c74d1c8e16ec0f04daef3a03705b7bd68a4bd9c2ab7d4fcb5fda15f4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9a442589c74d1c8e16ec0f04daef3a03705b7bd68a4bd9c2ab7d4fcb5fda15f4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vpR1057fX.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vpR1057fX.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2020 sw99BX69xT73.exe 2020 sw99BX69xT73.exe 3340 tsO33Kj91.exe 3340 tsO33Kj91.exe 2740 uPj03WC72.exe 2740 uPj03WC72.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2020 sw99BX69xT73.exe Token: SeDebugPrivilege 3340 tsO33Kj91.exe Token: SeDebugPrivilege 2740 uPj03WC72.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 548 wrote to memory of 1120 548 9a442589c74d1c8e16ec0f04daef3a03705b7bd68a4bd9c2ab7d4fcb5fda15f4.exe 84 PID 548 wrote to memory of 1120 548 9a442589c74d1c8e16ec0f04daef3a03705b7bd68a4bd9c2ab7d4fcb5fda15f4.exe 84 PID 548 wrote to memory of 1120 548 9a442589c74d1c8e16ec0f04daef3a03705b7bd68a4bd9c2ab7d4fcb5fda15f4.exe 84 PID 1120 wrote to memory of 2020 1120 vpR1057fX.exe 85 PID 1120 wrote to memory of 2020 1120 vpR1057fX.exe 85 PID 1120 wrote to memory of 3340 1120 vpR1057fX.exe 91 PID 1120 wrote to memory of 3340 1120 vpR1057fX.exe 91 PID 1120 wrote to memory of 3340 1120 vpR1057fX.exe 91 PID 548 wrote to memory of 2740 548 9a442589c74d1c8e16ec0f04daef3a03705b7bd68a4bd9c2ab7d4fcb5fda15f4.exe 92 PID 548 wrote to memory of 2740 548 9a442589c74d1c8e16ec0f04daef3a03705b7bd68a4bd9c2ab7d4fcb5fda15f4.exe 92 PID 548 wrote to memory of 2740 548 9a442589c74d1c8e16ec0f04daef3a03705b7bd68a4bd9c2ab7d4fcb5fda15f4.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a442589c74d1c8e16ec0f04daef3a03705b7bd68a4bd9c2ab7d4fcb5fda15f4.exe"C:\Users\Admin\AppData\Local\Temp\9a442589c74d1c8e16ec0f04daef3a03705b7bd68a4bd9c2ab7d4fcb5fda15f4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vpR1057fX.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vpR1057fX.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw99BX69xT73.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw99BX69xT73.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2020
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tsO33Kj91.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tsO33Kj91.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3340
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uPj03WC72.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uPj03WC72.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2740
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD55f52e5cc527bf15801d9ba3c66abd6a1
SHA1b0485d0da550519881672e755a549fb5e15a442b
SHA256aa1b3f4b860810e0d61f810baf9a16494801a4a974f9c8c38602f33fabec888f
SHA512952a22260ed9fdb74ee3bdcc8f82a99e7a69a6269507e31601526dbe7046c02d8c492edbd73d7d979e5f09d128506b9ce71aa910d73d599d5e413f9485b27adc
-
Filesize
175KB
MD55f52e5cc527bf15801d9ba3c66abd6a1
SHA1b0485d0da550519881672e755a549fb5e15a442b
SHA256aa1b3f4b860810e0d61f810baf9a16494801a4a974f9c8c38602f33fabec888f
SHA512952a22260ed9fdb74ee3bdcc8f82a99e7a69a6269507e31601526dbe7046c02d8c492edbd73d7d979e5f09d128506b9ce71aa910d73d599d5e413f9485b27adc
-
Filesize
391KB
MD557d4da526844fe7396fc6bf0042d7a17
SHA126fb077be4f5d9d9578bd0c2c0b2dea8c90876a6
SHA256fb3ef084c73c3090366c6ccb55fc02fd2a95fd865738783b8d34ed262d022036
SHA51286a9e578374de7e1d71f0b3bf7463ffe38a4171c5a66d2495ae51074f75e696d8fe39dea43c62df08ce1ec40a5579709ba18d961dbe75c649e4954e521cfb63b
-
Filesize
391KB
MD557d4da526844fe7396fc6bf0042d7a17
SHA126fb077be4f5d9d9578bd0c2c0b2dea8c90876a6
SHA256fb3ef084c73c3090366c6ccb55fc02fd2a95fd865738783b8d34ed262d022036
SHA51286a9e578374de7e1d71f0b3bf7463ffe38a4171c5a66d2495ae51074f75e696d8fe39dea43c62df08ce1ec40a5579709ba18d961dbe75c649e4954e521cfb63b
-
Filesize
12KB
MD5324dc4d6ae8bff10db1fb70e357b4da2
SHA1151867d86bf72f9ce40935dfbaf11b4ee2416f7e
SHA256f1a2ff1456669837ac5346f97a4bded18e06caf4e8003501256be79b27f469d7
SHA512caef8ac352ccabee7357b8baa2320186a6db774e80e85e6cad4d9ab61ac39aadf3304d70a0104c1fc24df7a16cbd8c1437905c0a216db1f2a51208e31f6e3b3b
-
Filesize
12KB
MD5324dc4d6ae8bff10db1fb70e357b4da2
SHA1151867d86bf72f9ce40935dfbaf11b4ee2416f7e
SHA256f1a2ff1456669837ac5346f97a4bded18e06caf4e8003501256be79b27f469d7
SHA512caef8ac352ccabee7357b8baa2320186a6db774e80e85e6cad4d9ab61ac39aadf3304d70a0104c1fc24df7a16cbd8c1437905c0a216db1f2a51208e31f6e3b3b
-
Filesize
304KB
MD56940451e769c094029427d1531775121
SHA103c763ca8ebc6896fb35c9f8d4d3fc64d03fe850
SHA256ab9bbcc3bb273a1f13db7566032205b26f5a4a634194ba39007349aa34801dca
SHA51253578c0693e6a171feec767f38f4601da453875d14a37f82e3ca30cce3b7217d4b5b0a6de659d54d11810ee238bd5816d2bc9635cf20dcd9f73901a09c08ff06
-
Filesize
304KB
MD56940451e769c094029427d1531775121
SHA103c763ca8ebc6896fb35c9f8d4d3fc64d03fe850
SHA256ab9bbcc3bb273a1f13db7566032205b26f5a4a634194ba39007349aa34801dca
SHA51253578c0693e6a171feec767f38f4601da453875d14a37f82e3ca30cce3b7217d4b5b0a6de659d54d11810ee238bd5816d2bc9635cf20dcd9f73901a09c08ff06