Analysis
-
max time kernel
95s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-03-2023 20:08
Static task
static1
Behavioral task
behavioral1
Sample
9d0d12052e946abb14f33e9e8ff829d3bf9ec9a7dd81b8642cd125c546176cbc.exe
Resource
win10v2004-20230220-en
General
-
Target
9d0d12052e946abb14f33e9e8ff829d3bf9ec9a7dd81b8642cd125c546176cbc.exe
-
Size
526KB
-
MD5
b38f27187d029c14531b21f62125d8ab
-
SHA1
2ad04c23698460fa4b2e3dcc103e5f7eb025c65d
-
SHA256
9d0d12052e946abb14f33e9e8ff829d3bf9ec9a7dd81b8642cd125c546176cbc
-
SHA512
e43c83eb0b30741b5d1e1c096c2c62cbf1f866638d5784b96f508734a8466d7ff7d3d27d847ac0642a051d96ec37fe3ced13ccc64b4fe0e8da336ac670e10a17
-
SSDEEP
12288:dMrty90EMm26Pl3ly4KnQTpXOruCR1NKknfd68t7THWAXR:4yhMk9wpnQVerFNRl6oWaR
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Extracted
redline
fabio
193.233.20.27:4123
-
auth_value
56b82736c3f56b13be8e64c87d2cf9e5
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sf24zN62pG89.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sf24zN62pG89.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sf24zN62pG89.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sf24zN62pG89.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sf24zN62pG89.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sf24zN62pG89.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/4344-158-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/4344-159-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/4344-161-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/4344-163-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/4344-165-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/4344-167-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/4344-169-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/4344-171-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/4344-173-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/4344-175-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/4344-177-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/4344-179-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/4344-181-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/4344-183-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/4344-185-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/4344-187-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/4344-189-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/4344-191-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/4344-193-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/4344-195-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/4344-197-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/4344-199-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/4344-201-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/4344-203-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/4344-205-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/4344-207-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/4344-209-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/4344-211-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/4344-213-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/4344-215-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/4344-217-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/4344-219-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/4344-221-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 544 vhHV8263Wq.exe 368 sf24zN62pG89.exe 4344 tf83yZ69hh20.exe 1100 uhAB70Vk11jS.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sf24zN62pG89.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9d0d12052e946abb14f33e9e8ff829d3bf9ec9a7dd81b8642cd125c546176cbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9d0d12052e946abb14f33e9e8ff829d3bf9ec9a7dd81b8642cd125c546176cbc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vhHV8263Wq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vhHV8263Wq.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4468 4344 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 368 sf24zN62pG89.exe 368 sf24zN62pG89.exe 4344 tf83yZ69hh20.exe 4344 tf83yZ69hh20.exe 1100 uhAB70Vk11jS.exe 1100 uhAB70Vk11jS.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 368 sf24zN62pG89.exe Token: SeDebugPrivilege 4344 tf83yZ69hh20.exe Token: SeDebugPrivilege 1100 uhAB70Vk11jS.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3720 wrote to memory of 544 3720 9d0d12052e946abb14f33e9e8ff829d3bf9ec9a7dd81b8642cd125c546176cbc.exe 83 PID 3720 wrote to memory of 544 3720 9d0d12052e946abb14f33e9e8ff829d3bf9ec9a7dd81b8642cd125c546176cbc.exe 83 PID 3720 wrote to memory of 544 3720 9d0d12052e946abb14f33e9e8ff829d3bf9ec9a7dd81b8642cd125c546176cbc.exe 83 PID 544 wrote to memory of 368 544 vhHV8263Wq.exe 84 PID 544 wrote to memory of 368 544 vhHV8263Wq.exe 84 PID 544 wrote to memory of 4344 544 vhHV8263Wq.exe 91 PID 544 wrote to memory of 4344 544 vhHV8263Wq.exe 91 PID 544 wrote to memory of 4344 544 vhHV8263Wq.exe 91 PID 3720 wrote to memory of 1100 3720 9d0d12052e946abb14f33e9e8ff829d3bf9ec9a7dd81b8642cd125c546176cbc.exe 96 PID 3720 wrote to memory of 1100 3720 9d0d12052e946abb14f33e9e8ff829d3bf9ec9a7dd81b8642cd125c546176cbc.exe 96 PID 3720 wrote to memory of 1100 3720 9d0d12052e946abb14f33e9e8ff829d3bf9ec9a7dd81b8642cd125c546176cbc.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d0d12052e946abb14f33e9e8ff829d3bf9ec9a7dd81b8642cd125c546176cbc.exe"C:\Users\Admin\AppData\Local\Temp\9d0d12052e946abb14f33e9e8ff829d3bf9ec9a7dd81b8642cd125c546176cbc.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhHV8263Wq.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhHV8263Wq.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf24zN62pG89.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf24zN62pG89.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:368
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf83yZ69hh20.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf83yZ69hh20.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4344 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4344 -s 18844⤵
- Program crash
PID:4468
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhAB70Vk11jS.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhAB70Vk11jS.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4344 -ip 43441⤵PID:1768
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD556fc9c3d5793a07914d070a4abd9d9aa
SHA1e94b6a9d747b4da2812d2fc798b782f373d2c064
SHA2566d600b95c3148d7a2276a9e376d5ac98ca34812c0665488d75002938cc0ad59c
SHA51253683e8b775ac59447886279c5ba4a97a07c44e552bd536f1e38dd73e9acb27563753a4d0fa543b8ec250a3b3cf40d33a09a3a76e07c74118d43af32e402404c
-
Filesize
175KB
MD556fc9c3d5793a07914d070a4abd9d9aa
SHA1e94b6a9d747b4da2812d2fc798b782f373d2c064
SHA2566d600b95c3148d7a2276a9e376d5ac98ca34812c0665488d75002938cc0ad59c
SHA51253683e8b775ac59447886279c5ba4a97a07c44e552bd536f1e38dd73e9acb27563753a4d0fa543b8ec250a3b3cf40d33a09a3a76e07c74118d43af32e402404c
-
Filesize
382KB
MD5b252caec1a62b360969092fce64b4ddb
SHA1f6bb42cb448d9418386427ce686b7ed810315ab7
SHA256d0548b26200786e2dcf3d77847cd509bee08ae8578ff9eba0f3d111d21336817
SHA5124a77eabd6f11d6d9f85aebb38c65d7613a2c2379f17ea638bf6e76d4059a82dd11fbc178caf91b2a358e6d86d9a92ff1781d52f14db355f79b3af4773635b4e6
-
Filesize
382KB
MD5b252caec1a62b360969092fce64b4ddb
SHA1f6bb42cb448d9418386427ce686b7ed810315ab7
SHA256d0548b26200786e2dcf3d77847cd509bee08ae8578ff9eba0f3d111d21336817
SHA5124a77eabd6f11d6d9f85aebb38c65d7613a2c2379f17ea638bf6e76d4059a82dd11fbc178caf91b2a358e6d86d9a92ff1781d52f14db355f79b3af4773635b4e6
-
Filesize
11KB
MD52d9818d5f12b57309b5b4dccc23f5af0
SHA1c9d976335bf43ce2b64c4dc938053b0920209c45
SHA25628e01dedce1f1e61271b8c02daba44d2cf8b7f9006027e6cc0476e832420f04c
SHA51278ca691563f8d1f5578ffaf324ed26366ec9bd4185ec7d1c190d140eff8d628e3228921ecc5caf9131ed3f518076b6d202f1cfbe96dd75923d7688c68f8e363c
-
Filesize
11KB
MD52d9818d5f12b57309b5b4dccc23f5af0
SHA1c9d976335bf43ce2b64c4dc938053b0920209c45
SHA25628e01dedce1f1e61271b8c02daba44d2cf8b7f9006027e6cc0476e832420f04c
SHA51278ca691563f8d1f5578ffaf324ed26366ec9bd4185ec7d1c190d140eff8d628e3228921ecc5caf9131ed3f518076b6d202f1cfbe96dd75923d7688c68f8e363c
-
Filesize
292KB
MD5bd407beaed8912f6f9f5b269e5a85686
SHA1f9d8fc6c0a1ca9a1e0af1ca278f629994df04b1b
SHA2563fb5f126878146985387aac28dc8b1c17d8ee6ae3630a0c754c135138180d367
SHA51279eca3bfa76f241986888271cbcf4858a6eb2c729b1dbebcf000ae13b9fb1e981360c930e40c39437c027794ecce33d9302e6db93d65208ad6bb458aa1b2ff72
-
Filesize
292KB
MD5bd407beaed8912f6f9f5b269e5a85686
SHA1f9d8fc6c0a1ca9a1e0af1ca278f629994df04b1b
SHA2563fb5f126878146985387aac28dc8b1c17d8ee6ae3630a0c754c135138180d367
SHA51279eca3bfa76f241986888271cbcf4858a6eb2c729b1dbebcf000ae13b9fb1e981360c930e40c39437c027794ecce33d9302e6db93d65208ad6bb458aa1b2ff72