Analysis
-
max time kernel
79s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2023, 20:54
Static task
static1
Behavioral task
behavioral1
Sample
31fa2886f668de5025c8389f8540a46e7762ef41ded481462416ceda3e427c07.exe
Resource
win10v2004-20230221-en
General
-
Target
31fa2886f668de5025c8389f8540a46e7762ef41ded481462416ceda3e427c07.exe
-
Size
526KB
-
MD5
2bc315815f30ca673c42852eb9f70c46
-
SHA1
123665b7721b1bf2c80cbda8a1783ca57744e0df
-
SHA256
31fa2886f668de5025c8389f8540a46e7762ef41ded481462416ceda3e427c07
-
SHA512
93e0e2bdadd80507b9fa268aa8a7c2eecb3e97ad1be1daee54d90ed749f19fcfa0b4005162e6ed02bd52cdcf038dd557376ca397c64c38aea5fb5e390e739dfa
-
SSDEEP
12288:IMrAy90hBhfQhV1HdIiqOChWyXuZ+1prRA6+9ukD:IyW/fsVUOChhXHpeL
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Extracted
redline
fabio
193.233.20.27:4123
-
auth_value
56b82736c3f56b13be8e64c87d2cf9e5
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sf41Qq05bi78.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sf41Qq05bi78.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sf41Qq05bi78.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sf41Qq05bi78.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sf41Qq05bi78.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sf41Qq05bi78.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/4808-156-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/4808-157-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/4808-159-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/4808-161-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/4808-163-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/4808-165-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/4808-167-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/4808-169-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/4808-171-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/4808-173-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/4808-175-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/4808-177-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/4808-179-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/4808-181-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/4808-183-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/4808-187-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/4808-189-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/4808-191-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/4808-193-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/4808-195-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/4808-197-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/4808-199-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/4808-201-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/4808-203-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/4808-205-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/4808-207-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/4808-209-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/4808-211-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/4808-213-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/4808-215-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/4808-217-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/4808-219-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/4808-221-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4668 vhfy4915yw.exe 4268 sf41Qq05bi78.exe 4808 tf69WY71se82.exe 2736 uheh14kW23Vi.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sf41Qq05bi78.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vhfy4915yw.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 31fa2886f668de5025c8389f8540a46e7762ef41ded481462416ceda3e427c07.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 31fa2886f668de5025c8389f8540a46e7762ef41ded481462416ceda3e427c07.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vhfy4915yw.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2576 4808 WerFault.exe 95 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4268 sf41Qq05bi78.exe 4268 sf41Qq05bi78.exe 4808 tf69WY71se82.exe 4808 tf69WY71se82.exe 2736 uheh14kW23Vi.exe 2736 uheh14kW23Vi.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4268 sf41Qq05bi78.exe Token: SeDebugPrivilege 4808 tf69WY71se82.exe Token: SeDebugPrivilege 2736 uheh14kW23Vi.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4568 wrote to memory of 4668 4568 31fa2886f668de5025c8389f8540a46e7762ef41ded481462416ceda3e427c07.exe 84 PID 4568 wrote to memory of 4668 4568 31fa2886f668de5025c8389f8540a46e7762ef41ded481462416ceda3e427c07.exe 84 PID 4568 wrote to memory of 4668 4568 31fa2886f668de5025c8389f8540a46e7762ef41ded481462416ceda3e427c07.exe 84 PID 4668 wrote to memory of 4268 4668 vhfy4915yw.exe 85 PID 4668 wrote to memory of 4268 4668 vhfy4915yw.exe 85 PID 4668 wrote to memory of 4808 4668 vhfy4915yw.exe 95 PID 4668 wrote to memory of 4808 4668 vhfy4915yw.exe 95 PID 4668 wrote to memory of 4808 4668 vhfy4915yw.exe 95 PID 4568 wrote to memory of 2736 4568 31fa2886f668de5025c8389f8540a46e7762ef41ded481462416ceda3e427c07.exe 99 PID 4568 wrote to memory of 2736 4568 31fa2886f668de5025c8389f8540a46e7762ef41ded481462416ceda3e427c07.exe 99 PID 4568 wrote to memory of 2736 4568 31fa2886f668de5025c8389f8540a46e7762ef41ded481462416ceda3e427c07.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\31fa2886f668de5025c8389f8540a46e7762ef41ded481462416ceda3e427c07.exe"C:\Users\Admin\AppData\Local\Temp\31fa2886f668de5025c8389f8540a46e7762ef41ded481462416ceda3e427c07.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhfy4915yw.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhfy4915yw.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf41Qq05bi78.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf41Qq05bi78.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4268
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf69WY71se82.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf69WY71se82.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4808 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4808 -s 13444⤵
- Program crash
PID:2576
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uheh14kW23Vi.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uheh14kW23Vi.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4808 -ip 48081⤵PID:4648
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5335f48344ef9923d915662b2f260b00b
SHA167948489307dde50a449298b957d5b5cbcd5704e
SHA256b93521b9e07c726cdac33b3c51c3903270715f3e4b259dfac710c1eea1fed5d8
SHA5129cbbcdbb81222f124b823a296ace7bf7f7ebc3e4662762659140bfea3088a7cd20feab4ae25e4a6593a75d1c859b9bcbf948ee0aab42770237d25741e0b40963
-
Filesize
175KB
MD5335f48344ef9923d915662b2f260b00b
SHA167948489307dde50a449298b957d5b5cbcd5704e
SHA256b93521b9e07c726cdac33b3c51c3903270715f3e4b259dfac710c1eea1fed5d8
SHA5129cbbcdbb81222f124b823a296ace7bf7f7ebc3e4662762659140bfea3088a7cd20feab4ae25e4a6593a75d1c859b9bcbf948ee0aab42770237d25741e0b40963
-
Filesize
382KB
MD5758bf82855d4a57a64bdc95cb208db14
SHA1ebca87ced489f7dee44934f08019246b69cb63c0
SHA2567bd1918a98fa3515a93da822ab72a880a4c22facfe704aaa048b5263cebfd637
SHA5129535be14008fae6b9e01d96bad6bcf386c887b20c8a3724d3ca180c5ee2ef2417eefab46f6f664f3460c54370a941ea36d8932b720ae8096ee9ddb6bb42d0f19
-
Filesize
382KB
MD5758bf82855d4a57a64bdc95cb208db14
SHA1ebca87ced489f7dee44934f08019246b69cb63c0
SHA2567bd1918a98fa3515a93da822ab72a880a4c22facfe704aaa048b5263cebfd637
SHA5129535be14008fae6b9e01d96bad6bcf386c887b20c8a3724d3ca180c5ee2ef2417eefab46f6f664f3460c54370a941ea36d8932b720ae8096ee9ddb6bb42d0f19
-
Filesize
11KB
MD5ea130a0e7d62ffd43a0f29dd0141af9a
SHA1e150260a7a9e43f11cb7434c28541b65a36b8f44
SHA256e77ef407d5340d0e23e807b940ebb632a47877ac2aecac4fba8da704d782a858
SHA51275c34d73cbe8e2c882d81da61c1259857bd201c5e716b17c6c89a300bb9b0b240c383857d06bb676cb55a9f6188e249551818d0627289600c4750e488d573b9a
-
Filesize
11KB
MD5ea130a0e7d62ffd43a0f29dd0141af9a
SHA1e150260a7a9e43f11cb7434c28541b65a36b8f44
SHA256e77ef407d5340d0e23e807b940ebb632a47877ac2aecac4fba8da704d782a858
SHA51275c34d73cbe8e2c882d81da61c1259857bd201c5e716b17c6c89a300bb9b0b240c383857d06bb676cb55a9f6188e249551818d0627289600c4750e488d573b9a
-
Filesize
292KB
MD5bd407beaed8912f6f9f5b269e5a85686
SHA1f9d8fc6c0a1ca9a1e0af1ca278f629994df04b1b
SHA2563fb5f126878146985387aac28dc8b1c17d8ee6ae3630a0c754c135138180d367
SHA51279eca3bfa76f241986888271cbcf4858a6eb2c729b1dbebcf000ae13b9fb1e981360c930e40c39437c027794ecce33d9302e6db93d65208ad6bb458aa1b2ff72
-
Filesize
292KB
MD5bd407beaed8912f6f9f5b269e5a85686
SHA1f9d8fc6c0a1ca9a1e0af1ca278f629994df04b1b
SHA2563fb5f126878146985387aac28dc8b1c17d8ee6ae3630a0c754c135138180d367
SHA51279eca3bfa76f241986888271cbcf4858a6eb2c729b1dbebcf000ae13b9fb1e981360c930e40c39437c027794ecce33d9302e6db93d65208ad6bb458aa1b2ff72