Analysis
-
max time kernel
86s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-03-2023 20:06
Static task
static1
Behavioral task
behavioral1
Sample
cbf862458441bd534acbaf24e25e76e465eeb4af4b4ab45843231b2255a7cf3c.exe
Resource
win10v2004-20230220-en
General
-
Target
cbf862458441bd534acbaf24e25e76e465eeb4af4b4ab45843231b2255a7cf3c.exe
-
Size
526KB
-
MD5
9c6a904813df7d1e79eab081f42d822e
-
SHA1
e8fbc26ab96df61cbebe745a5d94795740c925ce
-
SHA256
cbf862458441bd534acbaf24e25e76e465eeb4af4b4ab45843231b2255a7cf3c
-
SHA512
35cb296a39331a55f976049189bb27b5039d36e2da6cff142c63a37e27557138f4569e894700fa4100b452d1570a2b8d84d2ec2d029908e60751010b4974490b
-
SSDEEP
12288:sMrny90RamUQy0NHE5wmMeakuU91zhYeGbopKiBy:zyHpgNHEqmMTkrzGRbWxy
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Extracted
redline
fabio
193.233.20.27:4123
-
auth_value
56b82736c3f56b13be8e64c87d2cf9e5
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sf14Rp48XY89.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sf14Rp48XY89.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sf14Rp48XY89.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sf14Rp48XY89.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sf14Rp48XY89.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sf14Rp48XY89.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/2156-158-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/2156-159-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/2156-161-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/2156-163-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/2156-165-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/2156-167-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/2156-169-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/2156-171-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/2156-173-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/2156-175-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/2156-177-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/2156-181-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/2156-179-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/2156-183-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/2156-185-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/2156-187-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/2156-189-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/2156-191-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/2156-193-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/2156-195-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/2156-197-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/2156-199-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/2156-201-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/2156-203-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/2156-205-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/2156-207-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/2156-209-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/2156-211-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/2156-213-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/2156-215-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/2156-217-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/2156-219-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/2156-221-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1556 vhCZ2412SW.exe 4052 sf14Rp48XY89.exe 2156 tf97Bg98Ag77.exe 1680 uhmY21SN12fP.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sf14Rp48XY89.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce cbf862458441bd534acbaf24e25e76e465eeb4af4b4ab45843231b2255a7cf3c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cbf862458441bd534acbaf24e25e76e465eeb4af4b4ab45843231b2255a7cf3c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vhCZ2412SW.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vhCZ2412SW.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4896 2156 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4052 sf14Rp48XY89.exe 4052 sf14Rp48XY89.exe 2156 tf97Bg98Ag77.exe 2156 tf97Bg98Ag77.exe 1680 uhmY21SN12fP.exe 1680 uhmY21SN12fP.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4052 sf14Rp48XY89.exe Token: SeDebugPrivilege 2156 tf97Bg98Ag77.exe Token: SeDebugPrivilege 1680 uhmY21SN12fP.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4884 wrote to memory of 1556 4884 cbf862458441bd534acbaf24e25e76e465eeb4af4b4ab45843231b2255a7cf3c.exe 84 PID 4884 wrote to memory of 1556 4884 cbf862458441bd534acbaf24e25e76e465eeb4af4b4ab45843231b2255a7cf3c.exe 84 PID 4884 wrote to memory of 1556 4884 cbf862458441bd534acbaf24e25e76e465eeb4af4b4ab45843231b2255a7cf3c.exe 84 PID 1556 wrote to memory of 4052 1556 vhCZ2412SW.exe 85 PID 1556 wrote to memory of 4052 1556 vhCZ2412SW.exe 85 PID 1556 wrote to memory of 2156 1556 vhCZ2412SW.exe 90 PID 1556 wrote to memory of 2156 1556 vhCZ2412SW.exe 90 PID 1556 wrote to memory of 2156 1556 vhCZ2412SW.exe 90 PID 4884 wrote to memory of 1680 4884 cbf862458441bd534acbaf24e25e76e465eeb4af4b4ab45843231b2255a7cf3c.exe 96 PID 4884 wrote to memory of 1680 4884 cbf862458441bd534acbaf24e25e76e465eeb4af4b4ab45843231b2255a7cf3c.exe 96 PID 4884 wrote to memory of 1680 4884 cbf862458441bd534acbaf24e25e76e465eeb4af4b4ab45843231b2255a7cf3c.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\cbf862458441bd534acbaf24e25e76e465eeb4af4b4ab45843231b2255a7cf3c.exe"C:\Users\Admin\AppData\Local\Temp\cbf862458441bd534acbaf24e25e76e465eeb4af4b4ab45843231b2255a7cf3c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhCZ2412SW.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhCZ2412SW.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf14Rp48XY89.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf14Rp48XY89.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4052
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf97Bg98Ag77.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf97Bg98Ag77.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2156 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2156 -s 13484⤵
- Program crash
PID:4896
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhmY21SN12fP.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhmY21SN12fP.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2156 -ip 21561⤵PID:4008
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD51f80b36516ac99776b88a34fc86ee28c
SHA176f5e768cb2ac1070ec67f580211c99d76fb20e2
SHA256e6b0585675fa7142e949f85dee5029117f42e0a61a68a39362c8075d130d122b
SHA512ca48d6d25676cc25862db3f5b8ecf961297acf7c8c273b8f20cc1a6e86749826e4cc64e411ccf228ce73791bda6fc75b06e3806fe7fa30aef4b5c8426e4249cd
-
Filesize
175KB
MD51f80b36516ac99776b88a34fc86ee28c
SHA176f5e768cb2ac1070ec67f580211c99d76fb20e2
SHA256e6b0585675fa7142e949f85dee5029117f42e0a61a68a39362c8075d130d122b
SHA512ca48d6d25676cc25862db3f5b8ecf961297acf7c8c273b8f20cc1a6e86749826e4cc64e411ccf228ce73791bda6fc75b06e3806fe7fa30aef4b5c8426e4249cd
-
Filesize
382KB
MD550464c8c22d58ba3ad2a0b85a9f0ff25
SHA1e0175aff19c06096837ae48f8d0c917079bdbc22
SHA2564a4ea80882220cc641f2cdf1c877870e14858a5765f4d62ed58231b9fdfb99e6
SHA5127004cf38600f6d96a3a18d755bbd05afa3ad2532edd459dc17e20e37d9e83fcf6d6f41704ddf11c5ba235ddba958c8efcce2a6f1113d28e496785e81b1ba790e
-
Filesize
382KB
MD550464c8c22d58ba3ad2a0b85a9f0ff25
SHA1e0175aff19c06096837ae48f8d0c917079bdbc22
SHA2564a4ea80882220cc641f2cdf1c877870e14858a5765f4d62ed58231b9fdfb99e6
SHA5127004cf38600f6d96a3a18d755bbd05afa3ad2532edd459dc17e20e37d9e83fcf6d6f41704ddf11c5ba235ddba958c8efcce2a6f1113d28e496785e81b1ba790e
-
Filesize
11KB
MD577e9b29a0a32549aa24c2ae2b1d71bf4
SHA1b6e145f586e69c19974efb89a9490efa7f82c6bc
SHA2564228657b24c3bac980858f252272a6e3181f45d225a7d2247dfd35fc9c4abeee
SHA5129d0d4e57b9c7a470e3ea7e6c74897fbd33fc7d38a389126c3049a4265f39b45da6ee23fc08975d1be67b8f528a90ca94e8b4daaea881c43a7a9a0cc1eb772d42
-
Filesize
11KB
MD577e9b29a0a32549aa24c2ae2b1d71bf4
SHA1b6e145f586e69c19974efb89a9490efa7f82c6bc
SHA2564228657b24c3bac980858f252272a6e3181f45d225a7d2247dfd35fc9c4abeee
SHA5129d0d4e57b9c7a470e3ea7e6c74897fbd33fc7d38a389126c3049a4265f39b45da6ee23fc08975d1be67b8f528a90ca94e8b4daaea881c43a7a9a0cc1eb772d42
-
Filesize
292KB
MD5bd407beaed8912f6f9f5b269e5a85686
SHA1f9d8fc6c0a1ca9a1e0af1ca278f629994df04b1b
SHA2563fb5f126878146985387aac28dc8b1c17d8ee6ae3630a0c754c135138180d367
SHA51279eca3bfa76f241986888271cbcf4858a6eb2c729b1dbebcf000ae13b9fb1e981360c930e40c39437c027794ecce33d9302e6db93d65208ad6bb458aa1b2ff72
-
Filesize
292KB
MD5bd407beaed8912f6f9f5b269e5a85686
SHA1f9d8fc6c0a1ca9a1e0af1ca278f629994df04b1b
SHA2563fb5f126878146985387aac28dc8b1c17d8ee6ae3630a0c754c135138180d367
SHA51279eca3bfa76f241986888271cbcf4858a6eb2c729b1dbebcf000ae13b9fb1e981360c930e40c39437c027794ecce33d9302e6db93d65208ad6bb458aa1b2ff72