Analysis
-
max time kernel
142s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2023, 23:29
Static task
static1
Behavioral task
behavioral1
Sample
6f7fdd15537f8cb5f6d4a30070aa121a1a4933c8eea72ef460dd23a56199e60c.exe
Resource
win10v2004-20230220-en
General
-
Target
6f7fdd15537f8cb5f6d4a30070aa121a1a4933c8eea72ef460dd23a56199e60c.exe
-
Size
525KB
-
MD5
00b83de606305ac4700ac5bbeecffaa3
-
SHA1
fd170aa760b3bbf39145948230a1a25d0476e849
-
SHA256
6f7fdd15537f8cb5f6d4a30070aa121a1a4933c8eea72ef460dd23a56199e60c
-
SHA512
a5a2bff1275488ee1ca484d8cbc52e35a7a14d665746298a563a8bb5611f5315586b2667faa714b1990c275309ae8f5916521152245944859e68044134a689b5
-
SSDEEP
12288:LMruy90UTqH3uKmYMezEVclcYPCZjebAQXa5Li9PE9:ly9eH3uK/UVV8bQui
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Extracted
redline
fabio
193.233.20.27:4123
-
auth_value
56b82736c3f56b13be8e64c87d2cf9e5
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sf13Qg27TH55.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sf13Qg27TH55.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sf13Qg27TH55.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sf13Qg27TH55.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sf13Qg27TH55.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sf13Qg27TH55.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/3892-158-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3892-159-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3892-161-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3892-163-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3892-165-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3892-167-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3892-169-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3892-171-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3892-173-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3892-175-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3892-177-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3892-179-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3892-181-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3892-183-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3892-185-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3892-187-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3892-189-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3892-191-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3892-193-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3892-195-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3892-197-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3892-199-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3892-201-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3892-203-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3892-205-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3892-207-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3892-209-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3892-211-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3892-213-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3892-215-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3892-217-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3892-219-0x0000000005250000-0x000000000528E000-memory.dmp family_redline behavioral1/memory/3892-221-0x0000000005250000-0x000000000528E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3308 vhwp6796RF.exe 4980 sf13Qg27TH55.exe 3892 tf36wG37Oj61.exe 224 uhft53Mg31Ic.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sf13Qg27TH55.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6f7fdd15537f8cb5f6d4a30070aa121a1a4933c8eea72ef460dd23a56199e60c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vhwp6796RF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vhwp6796RF.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6f7fdd15537f8cb5f6d4a30070aa121a1a4933c8eea72ef460dd23a56199e60c.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2116 sc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3232 3892 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4980 sf13Qg27TH55.exe 4980 sf13Qg27TH55.exe 3892 tf36wG37Oj61.exe 3892 tf36wG37Oj61.exe 224 uhft53Mg31Ic.exe 224 uhft53Mg31Ic.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4980 sf13Qg27TH55.exe Token: SeDebugPrivilege 3892 tf36wG37Oj61.exe Token: SeDebugPrivilege 224 uhft53Mg31Ic.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1688 wrote to memory of 3308 1688 6f7fdd15537f8cb5f6d4a30070aa121a1a4933c8eea72ef460dd23a56199e60c.exe 86 PID 1688 wrote to memory of 3308 1688 6f7fdd15537f8cb5f6d4a30070aa121a1a4933c8eea72ef460dd23a56199e60c.exe 86 PID 1688 wrote to memory of 3308 1688 6f7fdd15537f8cb5f6d4a30070aa121a1a4933c8eea72ef460dd23a56199e60c.exe 86 PID 3308 wrote to memory of 4980 3308 vhwp6796RF.exe 87 PID 3308 wrote to memory of 4980 3308 vhwp6796RF.exe 87 PID 3308 wrote to memory of 3892 3308 vhwp6796RF.exe 91 PID 3308 wrote to memory of 3892 3308 vhwp6796RF.exe 91 PID 3308 wrote to memory of 3892 3308 vhwp6796RF.exe 91 PID 1688 wrote to memory of 224 1688 6f7fdd15537f8cb5f6d4a30070aa121a1a4933c8eea72ef460dd23a56199e60c.exe 95 PID 1688 wrote to memory of 224 1688 6f7fdd15537f8cb5f6d4a30070aa121a1a4933c8eea72ef460dd23a56199e60c.exe 95 PID 1688 wrote to memory of 224 1688 6f7fdd15537f8cb5f6d4a30070aa121a1a4933c8eea72ef460dd23a56199e60c.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f7fdd15537f8cb5f6d4a30070aa121a1a4933c8eea72ef460dd23a56199e60c.exe"C:\Users\Admin\AppData\Local\Temp\6f7fdd15537f8cb5f6d4a30070aa121a1a4933c8eea72ef460dd23a56199e60c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhwp6796RF.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhwp6796RF.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf13Qg27TH55.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf13Qg27TH55.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4980
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf36wG37Oj61.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf36wG37Oj61.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3892 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3892 -s 13564⤵
- Program crash
PID:3232
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhft53Mg31Ic.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhft53Mg31Ic.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3892 -ip 38921⤵PID:648
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2116
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD585af6e333736b673befbeec4b25b1816
SHA17f371823d34186e57ce73517fbcfb843a1ae5beb
SHA2569d0d193c03dc8bab694b4ddb73ae17335a4d0dd0ab4e2b857de5d5bd91f4c959
SHA5125884770f3c60110982a53637e1b30238a6795b497f3c99596bb0232c75bb69b96bde119903da74dbed984cc7b4f7404597f307e419b0086021c6fcc7a2953b79
-
Filesize
176KB
MD585af6e333736b673befbeec4b25b1816
SHA17f371823d34186e57ce73517fbcfb843a1ae5beb
SHA2569d0d193c03dc8bab694b4ddb73ae17335a4d0dd0ab4e2b857de5d5bd91f4c959
SHA5125884770f3c60110982a53637e1b30238a6795b497f3c99596bb0232c75bb69b96bde119903da74dbed984cc7b4f7404597f307e419b0086021c6fcc7a2953b79
-
Filesize
380KB
MD5c2b1ff4e34ca4f7489e09ea7b74a35ef
SHA1cfccb1022625b07781198d1399e9f6734e50112b
SHA2566dfbec5af4306b4bcc7d2ed4c5208a4ca6490b6bcdc178547d2f088fc4260c57
SHA512e5ac1c50a73d35082f6f1b6cb4bde40984ffd17d127ec1bb26986e12a5ab532bebe7725d53e46517c5500b2b53c01fa8fb1c88df4caf6187a49df2e7d3e8c3f4
-
Filesize
380KB
MD5c2b1ff4e34ca4f7489e09ea7b74a35ef
SHA1cfccb1022625b07781198d1399e9f6734e50112b
SHA2566dfbec5af4306b4bcc7d2ed4c5208a4ca6490b6bcdc178547d2f088fc4260c57
SHA512e5ac1c50a73d35082f6f1b6cb4bde40984ffd17d127ec1bb26986e12a5ab532bebe7725d53e46517c5500b2b53c01fa8fb1c88df4caf6187a49df2e7d3e8c3f4
-
Filesize
12KB
MD54cf9fe78fe40fe24ca1b91b2bb263218
SHA17f5084078f3244c125cf2b532dd92cc804054e2c
SHA256ca1833b0c45c278dfaf0b906c313a2712912bc0558d46e539a88477b96e66ac4
SHA512f7a7891e3efad584d5833e67733e5aa45f0933efd6d6568fcbb6a7f85d366518de80eafdb16c6102cf708349e9dc89e7f19ab366d5b6584fc6930602ee3a0918
-
Filesize
12KB
MD54cf9fe78fe40fe24ca1b91b2bb263218
SHA17f5084078f3244c125cf2b532dd92cc804054e2c
SHA256ca1833b0c45c278dfaf0b906c313a2712912bc0558d46e539a88477b96e66ac4
SHA512f7a7891e3efad584d5833e67733e5aa45f0933efd6d6568fcbb6a7f85d366518de80eafdb16c6102cf708349e9dc89e7f19ab366d5b6584fc6930602ee3a0918
-
Filesize
291KB
MD5249978248eadf5f91425671a026f54a0
SHA180596f205182dcbeb05b93e5cdb77a067c723cf1
SHA2560acc998717f3d96cb94c3160c2f07c54c5244d4d29df38db9ca0b5a71f219682
SHA512aadc502c62ada1e529b0a11a335694cba325cb4d3ae1b85fac8d110238314b4f2bb6f4cae21bb15183a0252835bbc02a0d094c5911d0d7f1c74c4a1ba1167a14
-
Filesize
291KB
MD5249978248eadf5f91425671a026f54a0
SHA180596f205182dcbeb05b93e5cdb77a067c723cf1
SHA2560acc998717f3d96cb94c3160c2f07c54c5244d4d29df38db9ca0b5a71f219682
SHA512aadc502c62ada1e529b0a11a335694cba325cb4d3ae1b85fac8d110238314b4f2bb6f4cae21bb15183a0252835bbc02a0d094c5911d0d7f1c74c4a1ba1167a14