Analysis
-
max time kernel
142s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02/03/2023, 09:16
Static task
static1
Behavioral task
behavioral1
Sample
18dd85fb365b907bfd913272da3ef0f2bfd2131ff1142adbe99b3f75783b49d0.exe
Resource
win10v2004-20230220-en
General
-
Target
18dd85fb365b907bfd913272da3ef0f2bfd2131ff1142adbe99b3f75783b49d0.exe
-
Size
548KB
-
MD5
e3e7dda40dc6e1cdd5e36d6e434ef358
-
SHA1
d321a5afa268791ff2be9bd3ed602cb597ef5384
-
SHA256
18dd85fb365b907bfd913272da3ef0f2bfd2131ff1142adbe99b3f75783b49d0
-
SHA512
38599c41beae6d658e35074152b865a9d058d163b4008bcb183fe1c8fcc0b19f462cfd8f9ff2d14078feba92e33e4647be8f76c180979f37900124441baecfbb
-
SSDEEP
12288:iMrSy90IyJRBxjvB4DrnSyS74cG7M/1Jjs13gxjEw:4ypynBxjZszhSTGqJi3En
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Extracted
redline
fuba
193.56.146.11:4162
-
auth_value
43015841fc23c63b15ca6ffe1d278d5e
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw63uU27Hg38.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw63uU27Hg38.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw63uU27Hg38.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw63uU27Hg38.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sw63uU27Hg38.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw63uU27Hg38.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/4920-158-0x0000000007760000-0x000000000779E000-memory.dmp family_redline behavioral1/memory/4920-159-0x0000000007760000-0x000000000779E000-memory.dmp family_redline behavioral1/memory/4920-171-0x0000000007760000-0x000000000779E000-memory.dmp family_redline behavioral1/memory/4920-173-0x0000000007760000-0x000000000779E000-memory.dmp family_redline behavioral1/memory/4920-179-0x0000000007760000-0x000000000779E000-memory.dmp family_redline behavioral1/memory/4920-177-0x0000000007760000-0x000000000779E000-memory.dmp family_redline behavioral1/memory/4920-181-0x0000000007760000-0x000000000779E000-memory.dmp family_redline behavioral1/memory/4920-187-0x0000000007760000-0x000000000779E000-memory.dmp family_redline behavioral1/memory/4920-195-0x0000000007760000-0x000000000779E000-memory.dmp family_redline behavioral1/memory/4920-201-0x0000000007760000-0x000000000779E000-memory.dmp family_redline behavioral1/memory/4920-209-0x0000000007760000-0x000000000779E000-memory.dmp family_redline behavioral1/memory/4920-215-0x0000000007760000-0x000000000779E000-memory.dmp family_redline behavioral1/memory/4920-221-0x0000000007760000-0x000000000779E000-memory.dmp family_redline behavioral1/memory/4920-219-0x0000000007760000-0x000000000779E000-memory.dmp family_redline behavioral1/memory/4920-217-0x0000000007760000-0x000000000779E000-memory.dmp family_redline behavioral1/memory/4920-213-0x0000000007760000-0x000000000779E000-memory.dmp family_redline behavioral1/memory/4920-211-0x0000000007760000-0x000000000779E000-memory.dmp family_redline behavioral1/memory/4920-207-0x0000000007760000-0x000000000779E000-memory.dmp family_redline behavioral1/memory/4920-205-0x0000000007760000-0x000000000779E000-memory.dmp family_redline behavioral1/memory/4920-203-0x0000000007760000-0x000000000779E000-memory.dmp family_redline behavioral1/memory/4920-199-0x0000000007760000-0x000000000779E000-memory.dmp family_redline behavioral1/memory/4920-197-0x0000000007760000-0x000000000779E000-memory.dmp family_redline behavioral1/memory/4920-193-0x0000000007760000-0x000000000779E000-memory.dmp family_redline behavioral1/memory/4920-191-0x0000000007760000-0x000000000779E000-memory.dmp family_redline behavioral1/memory/4920-189-0x0000000007760000-0x000000000779E000-memory.dmp family_redline behavioral1/memory/4920-185-0x0000000007760000-0x000000000779E000-memory.dmp family_redline behavioral1/memory/4920-183-0x0000000007760000-0x000000000779E000-memory.dmp family_redline behavioral1/memory/4920-175-0x0000000007760000-0x000000000779E000-memory.dmp family_redline behavioral1/memory/4920-169-0x0000000007760000-0x000000000779E000-memory.dmp family_redline behavioral1/memory/4920-167-0x0000000007760000-0x000000000779E000-memory.dmp family_redline behavioral1/memory/4920-165-0x0000000007760000-0x000000000779E000-memory.dmp family_redline behavioral1/memory/4920-163-0x0000000007760000-0x000000000779E000-memory.dmp family_redline behavioral1/memory/4920-161-0x0000000007760000-0x000000000779E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2160 vNE2147Ip.exe 3528 sw63uU27Hg38.exe 4920 tOC03Ym16.exe 4800 uez84AM23.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw63uU27Hg38.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 18dd85fb365b907bfd913272da3ef0f2bfd2131ff1142adbe99b3f75783b49d0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 18dd85fb365b907bfd913272da3ef0f2bfd2131ff1142adbe99b3f75783b49d0.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vNE2147Ip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vNE2147Ip.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2888 4920 WerFault.exe 87 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3528 sw63uU27Hg38.exe 3528 sw63uU27Hg38.exe 4920 tOC03Ym16.exe 4920 tOC03Ym16.exe 4800 uez84AM23.exe 4800 uez84AM23.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3528 sw63uU27Hg38.exe Token: SeDebugPrivilege 4920 tOC03Ym16.exe Token: SeDebugPrivilege 4800 uez84AM23.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4540 wrote to memory of 2160 4540 18dd85fb365b907bfd913272da3ef0f2bfd2131ff1142adbe99b3f75783b49d0.exe 85 PID 4540 wrote to memory of 2160 4540 18dd85fb365b907bfd913272da3ef0f2bfd2131ff1142adbe99b3f75783b49d0.exe 85 PID 4540 wrote to memory of 2160 4540 18dd85fb365b907bfd913272da3ef0f2bfd2131ff1142adbe99b3f75783b49d0.exe 85 PID 2160 wrote to memory of 3528 2160 vNE2147Ip.exe 86 PID 2160 wrote to memory of 3528 2160 vNE2147Ip.exe 86 PID 2160 wrote to memory of 4920 2160 vNE2147Ip.exe 87 PID 2160 wrote to memory of 4920 2160 vNE2147Ip.exe 87 PID 2160 wrote to memory of 4920 2160 vNE2147Ip.exe 87 PID 4540 wrote to memory of 4800 4540 18dd85fb365b907bfd913272da3ef0f2bfd2131ff1142adbe99b3f75783b49d0.exe 93 PID 4540 wrote to memory of 4800 4540 18dd85fb365b907bfd913272da3ef0f2bfd2131ff1142adbe99b3f75783b49d0.exe 93 PID 4540 wrote to memory of 4800 4540 18dd85fb365b907bfd913272da3ef0f2bfd2131ff1142adbe99b3f75783b49d0.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\18dd85fb365b907bfd913272da3ef0f2bfd2131ff1142adbe99b3f75783b49d0.exe"C:\Users\Admin\AppData\Local\Temp\18dd85fb365b907bfd913272da3ef0f2bfd2131ff1142adbe99b3f75783b49d0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vNE2147Ip.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vNE2147Ip.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw63uU27Hg38.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw63uU27Hg38.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3528
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tOC03Ym16.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tOC03Ym16.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4920 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4920 -s 13484⤵
- Program crash
PID:2888
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uez84AM23.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uez84AM23.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4920 -ip 49201⤵PID:2088
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5fab3279892ab0cf8c3e57d993b05f65d
SHA196e64efaf593fcc646f592ea2f7ab8cc0a8d0ecd
SHA2567761311c28140a751946da7cb2768550803a1be9fcdb714b2afe2e5625f8e431
SHA5127361b645cf1e364aa2b9dec9e8dea355f1b0a3e36a8d1f126c8ad2e50a36d0f71fc1cb89dc74379bcbd323fe959be43d2ed7d8b7137d489e0448a4b5f59a3e32
-
Filesize
175KB
MD5fab3279892ab0cf8c3e57d993b05f65d
SHA196e64efaf593fcc646f592ea2f7ab8cc0a8d0ecd
SHA2567761311c28140a751946da7cb2768550803a1be9fcdb714b2afe2e5625f8e431
SHA5127361b645cf1e364aa2b9dec9e8dea355f1b0a3e36a8d1f126c8ad2e50a36d0f71fc1cb89dc74379bcbd323fe959be43d2ed7d8b7137d489e0448a4b5f59a3e32
-
Filesize
404KB
MD5af83b7aac9c00ac2437d2d0ede36a8e3
SHA18a62faa6be16fc3c904acdb8bf0e4edbce48be53
SHA2564ba855ed59aabed247026c3e973184bf61519d49bbfb15d7e467f8e7ce2a3ae1
SHA51243b837f5a114fb342a2c450820531daef474e858a0ea7d252c00d49b5357d9c8745ad00294ec6c22f4c8eb8804d4397eec5786838400e1da919e88fce7faab1e
-
Filesize
404KB
MD5af83b7aac9c00ac2437d2d0ede36a8e3
SHA18a62faa6be16fc3c904acdb8bf0e4edbce48be53
SHA2564ba855ed59aabed247026c3e973184bf61519d49bbfb15d7e467f8e7ce2a3ae1
SHA51243b837f5a114fb342a2c450820531daef474e858a0ea7d252c00d49b5357d9c8745ad00294ec6c22f4c8eb8804d4397eec5786838400e1da919e88fce7faab1e
-
Filesize
12KB
MD51a7a640f8f6cd1dee20713bbbad2d767
SHA10921e87f4a3f445f1e83d62fb30241874c6a1a40
SHA256eca0d10844a5907fc1b0281ca27af1a2416ee7d6a65915aa3e86fe79a9498127
SHA512cf81673089fae1d68da09293cb37aea0cc6325d7699b3e12722bf73ccb9908b7acaeb9d789b8057e84cf54cba16724e18747b5bc528143dc4e9fc55f20a30d91
-
Filesize
12KB
MD51a7a640f8f6cd1dee20713bbbad2d767
SHA10921e87f4a3f445f1e83d62fb30241874c6a1a40
SHA256eca0d10844a5907fc1b0281ca27af1a2416ee7d6a65915aa3e86fe79a9498127
SHA512cf81673089fae1d68da09293cb37aea0cc6325d7699b3e12722bf73ccb9908b7acaeb9d789b8057e84cf54cba16724e18747b5bc528143dc4e9fc55f20a30d91
-
Filesize
380KB
MD5a3da8951bb23f305fd251958e8535aa4
SHA1ef6115e81f6e8a5a7ed3428db8ff7e34619e7e54
SHA256786dcca370472e838015aaff2797f569f05b3fe168087a60e95294354ced715a
SHA512be73e7708641e3d8d8f3f7b9136287bdf4de58798dd98ba5b03d1e486ff97aafcba07f428d135c87cb84098595e711a64d72b3ec43100375049d49d88618fe9d
-
Filesize
380KB
MD5a3da8951bb23f305fd251958e8535aa4
SHA1ef6115e81f6e8a5a7ed3428db8ff7e34619e7e54
SHA256786dcca370472e838015aaff2797f569f05b3fe168087a60e95294354ced715a
SHA512be73e7708641e3d8d8f3f7b9136287bdf4de58798dd98ba5b03d1e486ff97aafcba07f428d135c87cb84098595e711a64d72b3ec43100375049d49d88618fe9d