Analysis
-
max time kernel
145s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-03-2023 19:26
Static task
static1
Behavioral task
behavioral1
Sample
bb72baff6dc4c125110b48a1cd9cf5b2b509150cbab50df38959faa1810ca866.exe
Resource
win10v2004-20230220-en
General
-
Target
bb72baff6dc4c125110b48a1cd9cf5b2b509150cbab50df38959faa1810ca866.exe
-
Size
526KB
-
MD5
311d873a22b8c3f8a00a8e8aa4828a63
-
SHA1
bf74603fbaf334c8700e10b2e220b991fc57e433
-
SHA256
bb72baff6dc4c125110b48a1cd9cf5b2b509150cbab50df38959faa1810ca866
-
SHA512
3acd83a060e93995c64b9ab52ce74b253d3f30264c1d8c2bdce3bbded59bd65248f1e38f2d080908d6d6965bfecf706d67a5b73039ba22c8f4d07fd7455de424
-
SSDEEP
12288:PMrUy90DYyUcMpsG0WYub8yNYEMW3FugO1e+YG5O:zyaYy42vDub8yySFEe+O
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Extracted
redline
fabio
193.233.20.27:4123
-
auth_value
56b82736c3f56b13be8e64c87d2cf9e5
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sf87rx82mU45.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sf87rx82mU45.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sf87rx82mU45.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sf87rx82mU45.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sf87rx82mU45.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sf87rx82mU45.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/2840-159-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2840-161-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2840-158-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2840-165-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2840-163-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2840-167-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2840-169-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2840-171-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2840-173-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2840-175-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2840-177-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2840-179-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2840-181-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2840-183-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2840-185-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2840-187-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2840-189-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2840-191-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2840-193-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2840-195-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2840-197-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2840-199-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2840-201-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2840-203-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2840-205-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2840-207-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2840-209-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2840-211-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2840-213-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2840-215-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2840-217-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2840-219-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2840-221-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1072 vhrt8855xn.exe 432 sf87rx82mU45.exe 2840 tf84Fl12yD67.exe 4248 uhSG10tN67Lx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sf87rx82mU45.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce bb72baff6dc4c125110b48a1cd9cf5b2b509150cbab50df38959faa1810ca866.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bb72baff6dc4c125110b48a1cd9cf5b2b509150cbab50df38959faa1810ca866.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vhrt8855xn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vhrt8855xn.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 736 2840 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 432 sf87rx82mU45.exe 432 sf87rx82mU45.exe 2840 tf84Fl12yD67.exe 2840 tf84Fl12yD67.exe 4248 uhSG10tN67Lx.exe 4248 uhSG10tN67Lx.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 432 sf87rx82mU45.exe Token: SeDebugPrivilege 2840 tf84Fl12yD67.exe Token: SeDebugPrivilege 4248 uhSG10tN67Lx.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3184 wrote to memory of 1072 3184 bb72baff6dc4c125110b48a1cd9cf5b2b509150cbab50df38959faa1810ca866.exe 85 PID 3184 wrote to memory of 1072 3184 bb72baff6dc4c125110b48a1cd9cf5b2b509150cbab50df38959faa1810ca866.exe 85 PID 3184 wrote to memory of 1072 3184 bb72baff6dc4c125110b48a1cd9cf5b2b509150cbab50df38959faa1810ca866.exe 85 PID 1072 wrote to memory of 432 1072 vhrt8855xn.exe 86 PID 1072 wrote to memory of 432 1072 vhrt8855xn.exe 86 PID 1072 wrote to memory of 2840 1072 vhrt8855xn.exe 91 PID 1072 wrote to memory of 2840 1072 vhrt8855xn.exe 91 PID 1072 wrote to memory of 2840 1072 vhrt8855xn.exe 91 PID 3184 wrote to memory of 4248 3184 bb72baff6dc4c125110b48a1cd9cf5b2b509150cbab50df38959faa1810ca866.exe 95 PID 3184 wrote to memory of 4248 3184 bb72baff6dc4c125110b48a1cd9cf5b2b509150cbab50df38959faa1810ca866.exe 95 PID 3184 wrote to memory of 4248 3184 bb72baff6dc4c125110b48a1cd9cf5b2b509150cbab50df38959faa1810ca866.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb72baff6dc4c125110b48a1cd9cf5b2b509150cbab50df38959faa1810ca866.exe"C:\Users\Admin\AppData\Local\Temp\bb72baff6dc4c125110b48a1cd9cf5b2b509150cbab50df38959faa1810ca866.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhrt8855xn.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhrt8855xn.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf87rx82mU45.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf87rx82mU45.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:432
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf84Fl12yD67.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf84Fl12yD67.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2840 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2840 -s 19604⤵
- Program crash
PID:736
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhSG10tN67Lx.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhSG10tN67Lx.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4248
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2840 -ip 28401⤵PID:2808
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD51ff813a23a00855892cbeee34abf6648
SHA154c9a2fa83ee80668e47423174de06f15a4b67ea
SHA2563412d77cdb7a46be153b580a3d6add25e54e67f8e28c9852d893d997bfab4ca6
SHA512e947d2fa6a95c880aa4ac2f2f5368457bb26c5850330c64b7454a6c1dcf505c2b85f5c5fe950d7fd83ae194b45205933c4902be6026a4a2e221c24cc4fb13a14
-
Filesize
175KB
MD51ff813a23a00855892cbeee34abf6648
SHA154c9a2fa83ee80668e47423174de06f15a4b67ea
SHA2563412d77cdb7a46be153b580a3d6add25e54e67f8e28c9852d893d997bfab4ca6
SHA512e947d2fa6a95c880aa4ac2f2f5368457bb26c5850330c64b7454a6c1dcf505c2b85f5c5fe950d7fd83ae194b45205933c4902be6026a4a2e221c24cc4fb13a14
-
Filesize
381KB
MD52124158ee8eae0250220fdb25e3d77fd
SHA1032fbbc6f8acac03c0f585331ea4c7f376cae717
SHA256224687499cc1121b225f9a860f979232e2bdc40fba988854adf45db8b5751fe0
SHA51250b0447b39c2cc917da808bd8464db529b5cc3fad4282c7a62208bdaf23d9f23f168348c6e71e9ed942c28dcddda251c3c3c11e91c3a8f3161ab4382dab7d0f7
-
Filesize
381KB
MD52124158ee8eae0250220fdb25e3d77fd
SHA1032fbbc6f8acac03c0f585331ea4c7f376cae717
SHA256224687499cc1121b225f9a860f979232e2bdc40fba988854adf45db8b5751fe0
SHA51250b0447b39c2cc917da808bd8464db529b5cc3fad4282c7a62208bdaf23d9f23f168348c6e71e9ed942c28dcddda251c3c3c11e91c3a8f3161ab4382dab7d0f7
-
Filesize
11KB
MD5c223b21f10a9faeda79c1124b3746efd
SHA1c80cb91330141bfe37ab8f869db188cda6e6e34d
SHA25631b0d9c21e14e7a9e05aaaa58e7869179c49b6dacc169ccaf70bc264d0874349
SHA512a1f9c003526d448aaa7371a79674353338187a65639530e5d2afd28a713f2e88b894bcedabd3d34ba13a895f224bdea2fcea04bdc0000a8cedab8baf8b751d10
-
Filesize
11KB
MD5c223b21f10a9faeda79c1124b3746efd
SHA1c80cb91330141bfe37ab8f869db188cda6e6e34d
SHA25631b0d9c21e14e7a9e05aaaa58e7869179c49b6dacc169ccaf70bc264d0874349
SHA512a1f9c003526d448aaa7371a79674353338187a65639530e5d2afd28a713f2e88b894bcedabd3d34ba13a895f224bdea2fcea04bdc0000a8cedab8baf8b751d10
-
Filesize
292KB
MD5bd407beaed8912f6f9f5b269e5a85686
SHA1f9d8fc6c0a1ca9a1e0af1ca278f629994df04b1b
SHA2563fb5f126878146985387aac28dc8b1c17d8ee6ae3630a0c754c135138180d367
SHA51279eca3bfa76f241986888271cbcf4858a6eb2c729b1dbebcf000ae13b9fb1e981360c930e40c39437c027794ecce33d9302e6db93d65208ad6bb458aa1b2ff72
-
Filesize
292KB
MD5bd407beaed8912f6f9f5b269e5a85686
SHA1f9d8fc6c0a1ca9a1e0af1ca278f629994df04b1b
SHA2563fb5f126878146985387aac28dc8b1c17d8ee6ae3630a0c754c135138180d367
SHA51279eca3bfa76f241986888271cbcf4858a6eb2c729b1dbebcf000ae13b9fb1e981360c930e40c39437c027794ecce33d9302e6db93d65208ad6bb458aa1b2ff72