Analysis
-
max time kernel
53s -
max time network
63s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
05-03-2023 16:48
Static task
static1
Behavioral task
behavioral1
Sample
1cd12cd722cf5b15ed8632578d3ca54da915c26a48a581f59cbe79b3882985e9.exe
Resource
win10-20230220-en
General
-
Target
1cd12cd722cf5b15ed8632578d3ca54da915c26a48a581f59cbe79b3882985e9.exe
-
Size
530KB
-
MD5
28151b8b7b7243818bb62d6e0eaeab1b
-
SHA1
c6fedac52bef3555dedd0fe54a412fd4257e1c13
-
SHA256
1cd12cd722cf5b15ed8632578d3ca54da915c26a48a581f59cbe79b3882985e9
-
SHA512
95f17bf5056d58ceaadeb67e2a50cf7d9107fa0bdc7973e8252b05d15598545e997d71bd96f561ed2f2d0a863ac3d5d9dabd285910dff7a46d4764396ebbe3f7
-
SSDEEP
12288:IMr5y90cVwfLtnKSnrWTffitxWYoDomXFxleDegykRb8NfxQ54NskB:ByYfLt3WTXGxNsom1Rk0Q2akB
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Extracted
redline
fabio
193.233.20.27:4123
-
auth_value
56b82736c3f56b13be8e64c87d2cf9e5
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sf99RM05Dx04.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sf99RM05Dx04.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sf99RM05Dx04.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sf99RM05Dx04.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sf99RM05Dx04.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 36 IoCs
resource yara_rule behavioral1/memory/3972-142-0x0000000004A90000-0x0000000004AD6000-memory.dmp family_redline behavioral1/memory/3972-144-0x0000000004B10000-0x0000000004B54000-memory.dmp family_redline behavioral1/memory/3972-145-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/3972-148-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/3972-146-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/3972-154-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/3972-152-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/3972-156-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/3972-150-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/3972-166-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/3972-174-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/3972-178-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/3972-184-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/3972-187-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/3972-191-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/3972-199-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/3972-201-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/3972-205-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/3972-211-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/3972-209-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/3972-207-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/3972-203-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/3972-197-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/3972-195-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/3972-193-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/3972-189-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/3972-180-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/3972-176-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/3972-172-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/3972-170-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/3972-168-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/3972-164-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/3972-162-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/3972-160-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/3972-158-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/3972-1063-0x0000000004C10000-0x0000000004C20000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3488 vhAj3877Gb.exe 2692 sf99RM05Dx04.exe 3972 tf42TY21fz61.exe 4836 uhsi12OH85uf.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sf99RM05Dx04.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1cd12cd722cf5b15ed8632578d3ca54da915c26a48a581f59cbe79b3882985e9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1cd12cd722cf5b15ed8632578d3ca54da915c26a48a581f59cbe79b3882985e9.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vhAj3877Gb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vhAj3877Gb.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2692 sf99RM05Dx04.exe 2692 sf99RM05Dx04.exe 3972 tf42TY21fz61.exe 3972 tf42TY21fz61.exe 4836 uhsi12OH85uf.exe 4836 uhsi12OH85uf.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2692 sf99RM05Dx04.exe Token: SeDebugPrivilege 3972 tf42TY21fz61.exe Token: SeDebugPrivilege 4836 uhsi12OH85uf.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1808 wrote to memory of 3488 1808 1cd12cd722cf5b15ed8632578d3ca54da915c26a48a581f59cbe79b3882985e9.exe 66 PID 1808 wrote to memory of 3488 1808 1cd12cd722cf5b15ed8632578d3ca54da915c26a48a581f59cbe79b3882985e9.exe 66 PID 1808 wrote to memory of 3488 1808 1cd12cd722cf5b15ed8632578d3ca54da915c26a48a581f59cbe79b3882985e9.exe 66 PID 3488 wrote to memory of 2692 3488 vhAj3877Gb.exe 67 PID 3488 wrote to memory of 2692 3488 vhAj3877Gb.exe 67 PID 3488 wrote to memory of 3972 3488 vhAj3877Gb.exe 68 PID 3488 wrote to memory of 3972 3488 vhAj3877Gb.exe 68 PID 3488 wrote to memory of 3972 3488 vhAj3877Gb.exe 68 PID 1808 wrote to memory of 4836 1808 1cd12cd722cf5b15ed8632578d3ca54da915c26a48a581f59cbe79b3882985e9.exe 70 PID 1808 wrote to memory of 4836 1808 1cd12cd722cf5b15ed8632578d3ca54da915c26a48a581f59cbe79b3882985e9.exe 70 PID 1808 wrote to memory of 4836 1808 1cd12cd722cf5b15ed8632578d3ca54da915c26a48a581f59cbe79b3882985e9.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\1cd12cd722cf5b15ed8632578d3ca54da915c26a48a581f59cbe79b3882985e9.exe"C:\Users\Admin\AppData\Local\Temp\1cd12cd722cf5b15ed8632578d3ca54da915c26a48a581f59cbe79b3882985e9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhAj3877Gb.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhAj3877Gb.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf99RM05Dx04.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf99RM05Dx04.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2692
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf42TY21fz61.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf42TY21fz61.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3972
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhsi12OH85uf.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhsi12OH85uf.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4836
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD542e978c33b8a19b0f32a3c2c0aec776a
SHA13bd693727fc27db4fb66d904c0a7e396c0e56dd8
SHA256f3e432622ba83199143b54790b81b4c4176ea93eda1b35ccc560a52bad4b15a0
SHA5120001ae7783e867b6dbe277a5f551ef7fcc882529325891cea62e3b9d669162c08860b40acad54535624534496c68ce493de9d86389bdd4528fc45b07c3270e3e
-
Filesize
175KB
MD542e978c33b8a19b0f32a3c2c0aec776a
SHA13bd693727fc27db4fb66d904c0a7e396c0e56dd8
SHA256f3e432622ba83199143b54790b81b4c4176ea93eda1b35ccc560a52bad4b15a0
SHA5120001ae7783e867b6dbe277a5f551ef7fcc882529325891cea62e3b9d669162c08860b40acad54535624534496c68ce493de9d86389bdd4528fc45b07c3270e3e
-
Filesize
385KB
MD55426266794bb726526b84f617b629a74
SHA14f7f22389e8c5137943b171bf2501d67ef314dd7
SHA256e638b32d10a090adca49a9c8e46a6c2b7bced16e3dcd1f92c2313ca9d431e019
SHA5124fb566be34032fe4e72629194aac05b2512e98be3cb1a3107870604e05511c2f0c1e7e17ff64ea00109b5c22655bd5f78ee5dab473dc6069be39d6ba3505557a
-
Filesize
385KB
MD55426266794bb726526b84f617b629a74
SHA14f7f22389e8c5137943b171bf2501d67ef314dd7
SHA256e638b32d10a090adca49a9c8e46a6c2b7bced16e3dcd1f92c2313ca9d431e019
SHA5124fb566be34032fe4e72629194aac05b2512e98be3cb1a3107870604e05511c2f0c1e7e17ff64ea00109b5c22655bd5f78ee5dab473dc6069be39d6ba3505557a
-
Filesize
11KB
MD5f1192cacffcfa84eb702b9ba7a3afeeb
SHA1ca4e6ccf69873de09572dad637cb6fa05e201bd7
SHA2563517a090418034893dac026a3440e3352e75bb58008542434e0fd2d7e0d14700
SHA5121778b77dc634b22f73dcbd0a697c347ce7d9373d6d0029f6440414844108e87ae6543ab6124651489ad853c37ea9bfaf5dbf3cec365d85f1244f0c04a5d8dbb0
-
Filesize
11KB
MD5f1192cacffcfa84eb702b9ba7a3afeeb
SHA1ca4e6ccf69873de09572dad637cb6fa05e201bd7
SHA2563517a090418034893dac026a3440e3352e75bb58008542434e0fd2d7e0d14700
SHA5121778b77dc634b22f73dcbd0a697c347ce7d9373d6d0029f6440414844108e87ae6543ab6124651489ad853c37ea9bfaf5dbf3cec365d85f1244f0c04a5d8dbb0
-
Filesize
294KB
MD5cdcef278fd567074f7fd62913f828c7f
SHA1f8f15924c0670526951bd988acd59ba3b0f95889
SHA256fdc600b7491c442a1c8538b09303b44c51fe3436671493cbc7ab0ca5bd512243
SHA51206d63079ba454a6f9d86208369ace8125db61e97d5dce25ca0a2e6c244403ff9ef7bed684c48592248273a5ffa5a79c56c4f2ce941fe2eb04800606072178d2d
-
Filesize
294KB
MD5cdcef278fd567074f7fd62913f828c7f
SHA1f8f15924c0670526951bd988acd59ba3b0f95889
SHA256fdc600b7491c442a1c8538b09303b44c51fe3436671493cbc7ab0ca5bd512243
SHA51206d63079ba454a6f9d86208369ace8125db61e97d5dce25ca0a2e6c244403ff9ef7bed684c48592248273a5ffa5a79c56c4f2ce941fe2eb04800606072178d2d