Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02/03/2023, 05:34
Static task
static1
Behavioral task
behavioral1
Sample
82634d3998af30fc3d479c925af57d3218fc99a57048535e672f225c97bf2850.exe
Resource
win10v2004-20230220-en
General
-
Target
82634d3998af30fc3d479c925af57d3218fc99a57048535e672f225c97bf2850.exe
-
Size
536KB
-
MD5
56a0e6fde2cbaf44bc78259902cd16f2
-
SHA1
6dfdb284ce71fdef397216d693465a90ccab7b60
-
SHA256
82634d3998af30fc3d479c925af57d3218fc99a57048535e672f225c97bf2850
-
SHA512
75a7518024363f1c0a1568043e3f38dbca73d4baf4497393c86984b39d8471a84ce8daa60f6638c8c46a1c3490568e0593759a326090a813236e808844a6166b
-
SSDEEP
12288:DMrMy90fqcHiv+eyxyIGdNe2e9D3WieAUFm/s6:zyVcCv/y9KU9UF76
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Extracted
redline
fuba
193.56.146.11:4162
-
auth_value
43015841fc23c63b15ca6ffe1d278d5e
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sw01Wx76BF59.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw01Wx76BF59.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw01Wx76BF59.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw01Wx76BF59.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw01Wx76BF59.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw01Wx76BF59.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 34 IoCs
resource yara_rule behavioral1/memory/1836-155-0x0000000002680000-0x00000000026BE000-memory.dmp family_redline behavioral1/memory/1836-156-0x0000000002680000-0x00000000026BE000-memory.dmp family_redline behavioral1/memory/1836-158-0x0000000002680000-0x00000000026BE000-memory.dmp family_redline behavioral1/memory/1836-162-0x0000000002680000-0x00000000026BE000-memory.dmp family_redline behavioral1/memory/1836-165-0x0000000002680000-0x00000000026BE000-memory.dmp family_redline behavioral1/memory/1836-167-0x0000000002680000-0x00000000026BE000-memory.dmp family_redline behavioral1/memory/1836-169-0x0000000002680000-0x00000000026BE000-memory.dmp family_redline behavioral1/memory/1836-171-0x0000000002680000-0x00000000026BE000-memory.dmp family_redline behavioral1/memory/1836-173-0x0000000002680000-0x00000000026BE000-memory.dmp family_redline behavioral1/memory/1836-175-0x0000000002680000-0x00000000026BE000-memory.dmp family_redline behavioral1/memory/1836-177-0x0000000002680000-0x00000000026BE000-memory.dmp family_redline behavioral1/memory/1836-179-0x0000000002680000-0x00000000026BE000-memory.dmp family_redline behavioral1/memory/1836-181-0x0000000002680000-0x00000000026BE000-memory.dmp family_redline behavioral1/memory/1836-183-0x0000000002680000-0x00000000026BE000-memory.dmp family_redline behavioral1/memory/1836-185-0x0000000002680000-0x00000000026BE000-memory.dmp family_redline behavioral1/memory/1836-187-0x0000000002680000-0x00000000026BE000-memory.dmp family_redline behavioral1/memory/1836-189-0x0000000002680000-0x00000000026BE000-memory.dmp family_redline behavioral1/memory/1836-191-0x0000000002680000-0x00000000026BE000-memory.dmp family_redline behavioral1/memory/1836-193-0x0000000002680000-0x00000000026BE000-memory.dmp family_redline behavioral1/memory/1836-195-0x0000000002680000-0x00000000026BE000-memory.dmp family_redline behavioral1/memory/1836-197-0x0000000002680000-0x00000000026BE000-memory.dmp family_redline behavioral1/memory/1836-199-0x0000000002680000-0x00000000026BE000-memory.dmp family_redline behavioral1/memory/1836-201-0x0000000002680000-0x00000000026BE000-memory.dmp family_redline behavioral1/memory/1836-203-0x0000000002680000-0x00000000026BE000-memory.dmp family_redline behavioral1/memory/1836-205-0x0000000002680000-0x00000000026BE000-memory.dmp family_redline behavioral1/memory/1836-207-0x0000000002680000-0x00000000026BE000-memory.dmp family_redline behavioral1/memory/1836-211-0x0000000002680000-0x00000000026BE000-memory.dmp family_redline behavioral1/memory/1836-213-0x0000000002680000-0x00000000026BE000-memory.dmp family_redline behavioral1/memory/1836-209-0x0000000002680000-0x00000000026BE000-memory.dmp family_redline behavioral1/memory/1836-215-0x0000000002680000-0x00000000026BE000-memory.dmp family_redline behavioral1/memory/1836-217-0x0000000002680000-0x00000000026BE000-memory.dmp family_redline behavioral1/memory/1836-219-0x0000000002680000-0x00000000026BE000-memory.dmp family_redline behavioral1/memory/1836-221-0x0000000002680000-0x00000000026BE000-memory.dmp family_redline behavioral1/memory/1836-1073-0x0000000002310000-0x0000000002320000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2612 viR4220LT.exe 1276 sw01Wx76BF59.exe 1836 tlE75XZ44.exe 4644 uhP88Rp94.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw01Wx76BF59.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 82634d3998af30fc3d479c925af57d3218fc99a57048535e672f225c97bf2850.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 82634d3998af30fc3d479c925af57d3218fc99a57048535e672f225c97bf2850.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce viR4220LT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" viR4220LT.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1276 sw01Wx76BF59.exe 1276 sw01Wx76BF59.exe 1836 tlE75XZ44.exe 1836 tlE75XZ44.exe 4644 uhP88Rp94.exe 4644 uhP88Rp94.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1276 sw01Wx76BF59.exe Token: SeDebugPrivilege 1836 tlE75XZ44.exe Token: SeDebugPrivilege 4644 uhP88Rp94.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3348 wrote to memory of 2612 3348 82634d3998af30fc3d479c925af57d3218fc99a57048535e672f225c97bf2850.exe 82 PID 3348 wrote to memory of 2612 3348 82634d3998af30fc3d479c925af57d3218fc99a57048535e672f225c97bf2850.exe 82 PID 3348 wrote to memory of 2612 3348 82634d3998af30fc3d479c925af57d3218fc99a57048535e672f225c97bf2850.exe 82 PID 2612 wrote to memory of 1276 2612 viR4220LT.exe 83 PID 2612 wrote to memory of 1276 2612 viR4220LT.exe 83 PID 2612 wrote to memory of 1836 2612 viR4220LT.exe 86 PID 2612 wrote to memory of 1836 2612 viR4220LT.exe 86 PID 2612 wrote to memory of 1836 2612 viR4220LT.exe 86 PID 3348 wrote to memory of 4644 3348 82634d3998af30fc3d479c925af57d3218fc99a57048535e672f225c97bf2850.exe 87 PID 3348 wrote to memory of 4644 3348 82634d3998af30fc3d479c925af57d3218fc99a57048535e672f225c97bf2850.exe 87 PID 3348 wrote to memory of 4644 3348 82634d3998af30fc3d479c925af57d3218fc99a57048535e672f225c97bf2850.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\82634d3998af30fc3d479c925af57d3218fc99a57048535e672f225c97bf2850.exe"C:\Users\Admin\AppData\Local\Temp\82634d3998af30fc3d479c925af57d3218fc99a57048535e672f225c97bf2850.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\viR4220LT.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\viR4220LT.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw01Wx76BF59.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw01Wx76BF59.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1276
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tlE75XZ44.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tlE75XZ44.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1836
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhP88Rp94.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhP88Rp94.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4644
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD53139c3bcce98ee877a437c29f8cb80f6
SHA1e08f34aaada2c1aa13ce372eb2c0c348c484e788
SHA2563ca7657339d741aa4f0cac1c6f006c303f6b50a7cba5fb7dda9fe0e6300d8ff0
SHA51237ee1d1d73d42c555fb22515c6ed91270f2507e392e55b013582516b8b15835ae3c1f31c513f78b1f877d3ec5f9fcff818595d44cfc7c63bfe438834c4b50023
-
Filesize
175KB
MD53139c3bcce98ee877a437c29f8cb80f6
SHA1e08f34aaada2c1aa13ce372eb2c0c348c484e788
SHA2563ca7657339d741aa4f0cac1c6f006c303f6b50a7cba5fb7dda9fe0e6300d8ff0
SHA51237ee1d1d73d42c555fb22515c6ed91270f2507e392e55b013582516b8b15835ae3c1f31c513f78b1f877d3ec5f9fcff818595d44cfc7c63bfe438834c4b50023
-
Filesize
391KB
MD5dbcf5b463f84a033af6c4500864ad4f3
SHA1594e5186f0999563c93862754b1ec3d9769a44fb
SHA256b0c8c58fa92079d94000ac4ed48ed7f8d1610ac71f8a696482ebfbb725e6e3c2
SHA5127ccd1b4047f1a3065892753e7ba6609ee0ea7d815aff99e9d3dacee7548fa67d9f963ff4399d34a4b7d948ffedede458131c1e0802ad2f3a078c78c9fbd97c9b
-
Filesize
391KB
MD5dbcf5b463f84a033af6c4500864ad4f3
SHA1594e5186f0999563c93862754b1ec3d9769a44fb
SHA256b0c8c58fa92079d94000ac4ed48ed7f8d1610ac71f8a696482ebfbb725e6e3c2
SHA5127ccd1b4047f1a3065892753e7ba6609ee0ea7d815aff99e9d3dacee7548fa67d9f963ff4399d34a4b7d948ffedede458131c1e0802ad2f3a078c78c9fbd97c9b
-
Filesize
12KB
MD5dd1c4d88b91749169dc38505624dbc94
SHA1ddd248f01f004fe29d4d9929f5a378621285f979
SHA2561e1f72280c6aa08b2c60a4e208aedb74d132bda9868b454a405d358152de9135
SHA5129df621e7962f7a2a3c06a7f6734eaa59f88662c5e4a642f1922a22089be1040e144d5dbf07abb2fb9e2bba1aa641000fd499ac64bbf32d834c06193fcefd3bf9
-
Filesize
12KB
MD5dd1c4d88b91749169dc38505624dbc94
SHA1ddd248f01f004fe29d4d9929f5a378621285f979
SHA2561e1f72280c6aa08b2c60a4e208aedb74d132bda9868b454a405d358152de9135
SHA5129df621e7962f7a2a3c06a7f6734eaa59f88662c5e4a642f1922a22089be1040e144d5dbf07abb2fb9e2bba1aa641000fd499ac64bbf32d834c06193fcefd3bf9
-
Filesize
304KB
MD596f412e9d1af706687c3bbdcf537b3e5
SHA171e807888a86b44247d2b12d72d5823094724c77
SHA256192cf1ff85c6ca01e2d26f99ecb55fab5f80c2ff70f3d54dacb449f8b853c0ff
SHA51222d47a05a99f654617d79b58f614d87d5792584cee7e4276d1f84fdfa9d164717d4019330afca7b345942871969f94526283d62948dfea9196b7d73f89430b7c
-
Filesize
304KB
MD596f412e9d1af706687c3bbdcf537b3e5
SHA171e807888a86b44247d2b12d72d5823094724c77
SHA256192cf1ff85c6ca01e2d26f99ecb55fab5f80c2ff70f3d54dacb449f8b853c0ff
SHA51222d47a05a99f654617d79b58f614d87d5792584cee7e4276d1f84fdfa9d164717d4019330afca7b345942871969f94526283d62948dfea9196b7d73f89430b7c