Analysis
-
max time kernel
95s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2023, 21:50
Static task
static1
Behavioral task
behavioral1
Sample
d8d5567987cd6edabb0793079623324a2c661942c4f5575cc7a07f337e5296ed.exe
Resource
win10v2004-20230220-en
General
-
Target
d8d5567987cd6edabb0793079623324a2c661942c4f5575cc7a07f337e5296ed.exe
-
Size
526KB
-
MD5
b1d8c55cdb5168fd4ee5a3d2c118509c
-
SHA1
5ed6079331bd5f5aee9c76c24b2c4e1719e122e8
-
SHA256
d8d5567987cd6edabb0793079623324a2c661942c4f5575cc7a07f337e5296ed
-
SHA512
ecb7254bb4c5b1d8dd4d39383deff6b7a3063a135b58e1847e73d5486e493ceb2525adc7144265c6d501af6134e133cb0cb114614025210558609eaff0fdd58c
-
SSDEEP
12288:fMrwy90Zp2RwWMcXC7TQfVNI+5MADdvPp9vNYVm3/:TyjBMq50+5MAF7vO83/
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Extracted
redline
fabio
193.233.20.27:4123
-
auth_value
56b82736c3f56b13be8e64c87d2cf9e5
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sf22ec10yC74.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sf22ec10yC74.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sf22ec10yC74.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sf22ec10yC74.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sf22ec10yC74.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sf22ec10yC74.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/2460-156-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/2460-157-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/2460-159-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/2460-161-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/2460-163-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/2460-165-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/2460-167-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/2460-169-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/2460-171-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/2460-173-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/2460-175-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/2460-177-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/2460-179-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/2460-181-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/2460-183-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/2460-185-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/2460-189-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/2460-187-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/2460-191-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/2460-193-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/2460-195-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/2460-197-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/2460-199-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/2460-201-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/2460-203-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/2460-205-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/2460-207-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/2460-209-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/2460-211-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/2460-213-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/2460-215-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/2460-217-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/2460-219-0x0000000002500000-0x000000000253E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2464 vhpl5021Gm.exe 4296 sf22ec10yC74.exe 2460 tf06cz30rM11.exe 2472 uhAh67ef21Ab.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sf22ec10yC74.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d8d5567987cd6edabb0793079623324a2c661942c4f5575cc7a07f337e5296ed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d8d5567987cd6edabb0793079623324a2c661942c4f5575cc7a07f337e5296ed.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vhpl5021Gm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vhpl5021Gm.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4100 2460 WerFault.exe 88 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4296 sf22ec10yC74.exe 4296 sf22ec10yC74.exe 2460 tf06cz30rM11.exe 2460 tf06cz30rM11.exe 2472 uhAh67ef21Ab.exe 2472 uhAh67ef21Ab.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4296 sf22ec10yC74.exe Token: SeDebugPrivilege 2460 tf06cz30rM11.exe Token: SeDebugPrivilege 2472 uhAh67ef21Ab.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1220 wrote to memory of 2464 1220 d8d5567987cd6edabb0793079623324a2c661942c4f5575cc7a07f337e5296ed.exe 86 PID 1220 wrote to memory of 2464 1220 d8d5567987cd6edabb0793079623324a2c661942c4f5575cc7a07f337e5296ed.exe 86 PID 1220 wrote to memory of 2464 1220 d8d5567987cd6edabb0793079623324a2c661942c4f5575cc7a07f337e5296ed.exe 86 PID 2464 wrote to memory of 4296 2464 vhpl5021Gm.exe 87 PID 2464 wrote to memory of 4296 2464 vhpl5021Gm.exe 87 PID 2464 wrote to memory of 2460 2464 vhpl5021Gm.exe 88 PID 2464 wrote to memory of 2460 2464 vhpl5021Gm.exe 88 PID 2464 wrote to memory of 2460 2464 vhpl5021Gm.exe 88 PID 1220 wrote to memory of 2472 1220 d8d5567987cd6edabb0793079623324a2c661942c4f5575cc7a07f337e5296ed.exe 91 PID 1220 wrote to memory of 2472 1220 d8d5567987cd6edabb0793079623324a2c661942c4f5575cc7a07f337e5296ed.exe 91 PID 1220 wrote to memory of 2472 1220 d8d5567987cd6edabb0793079623324a2c661942c4f5575cc7a07f337e5296ed.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\d8d5567987cd6edabb0793079623324a2c661942c4f5575cc7a07f337e5296ed.exe"C:\Users\Admin\AppData\Local\Temp\d8d5567987cd6edabb0793079623324a2c661942c4f5575cc7a07f337e5296ed.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhpl5021Gm.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhpl5021Gm.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf22ec10yC74.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf22ec10yC74.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4296
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf06cz30rM11.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf06cz30rM11.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2460 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2460 -s 13524⤵
- Program crash
PID:4100
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhAh67ef21Ab.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhAh67ef21Ab.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2472
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2460 -ip 24601⤵PID:3196
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD5b97201d1e129189102564257fc92f3b2
SHA167b711134fe5a8256b9213af113197d99e0f1c99
SHA256224b0eadcf72e0f244e774906812f4281939ff8a610e881f73ddce2099c47479
SHA51235dc60e3773ca7315f8357a294dc4d4e834ef518b92ca1c7da5b2bb8f6c3ab4b1ee181606cc36ac175b2e452602e388f410283337a60d8e6cb96e57471708a90
-
Filesize
176KB
MD5b97201d1e129189102564257fc92f3b2
SHA167b711134fe5a8256b9213af113197d99e0f1c99
SHA256224b0eadcf72e0f244e774906812f4281939ff8a610e881f73ddce2099c47479
SHA51235dc60e3773ca7315f8357a294dc4d4e834ef518b92ca1c7da5b2bb8f6c3ab4b1ee181606cc36ac175b2e452602e388f410283337a60d8e6cb96e57471708a90
-
Filesize
381KB
MD5ce0d06cb212127ad1e74972464fd5d70
SHA12b14273451ab3c59c3885c62dbce2e73e38d1c30
SHA256329a42063ffec8046d42056a2998d639427e4a2ad659d0203601704fae7c002b
SHA512e133fee44413bfefbc4ca8794aa8aedcef347f2c090d4a7a1514bc58bd59a4742e281ac7453afb056c3438a23536c5d901ca44f08e2695ad1eb515e43e81dfdd
-
Filesize
381KB
MD5ce0d06cb212127ad1e74972464fd5d70
SHA12b14273451ab3c59c3885c62dbce2e73e38d1c30
SHA256329a42063ffec8046d42056a2998d639427e4a2ad659d0203601704fae7c002b
SHA512e133fee44413bfefbc4ca8794aa8aedcef347f2c090d4a7a1514bc58bd59a4742e281ac7453afb056c3438a23536c5d901ca44f08e2695ad1eb515e43e81dfdd
-
Filesize
11KB
MD5036116115ab9622ae5e42117bb20db6a
SHA1ad597c5c21afae12511a30191ee3a1d2326c1654
SHA256730bde99bd70063e39c20056d3ca04365b199d06e3d01dbaf6201e04f258735e
SHA5126cf43fdafc3cffde3003243634633a7d8b0ebffbe86c6796b083bb040707903e6007840e8defafc6aace75d2e72f9c21c30493c565415ac70a5903dfc1796474
-
Filesize
11KB
MD5036116115ab9622ae5e42117bb20db6a
SHA1ad597c5c21afae12511a30191ee3a1d2326c1654
SHA256730bde99bd70063e39c20056d3ca04365b199d06e3d01dbaf6201e04f258735e
SHA5126cf43fdafc3cffde3003243634633a7d8b0ebffbe86c6796b083bb040707903e6007840e8defafc6aace75d2e72f9c21c30493c565415ac70a5903dfc1796474
-
Filesize
292KB
MD533eef0ef7d3d426c664f6e3380b0a87c
SHA166eea27c3262719cb51de3a08a47b13da67f33b7
SHA2564dec2b62f8f47bed9dad690b372fe7ab707a251657470a0cc9b85cf603ce441e
SHA512cc0b998114447a96d23f8cbd4ede81b5f103f204cd5a887fbe892b67ce836226bcc0d15ec60f9a754d166e57c5d9fd10c6e2b1851416654f504860ffd93cd6c5
-
Filesize
292KB
MD533eef0ef7d3d426c664f6e3380b0a87c
SHA166eea27c3262719cb51de3a08a47b13da67f33b7
SHA2564dec2b62f8f47bed9dad690b372fe7ab707a251657470a0cc9b85cf603ce441e
SHA512cc0b998114447a96d23f8cbd4ede81b5f103f204cd5a887fbe892b67ce836226bcc0d15ec60f9a754d166e57c5d9fd10c6e2b1851416654f504860ffd93cd6c5