Analysis
-
max time kernel
143s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2023, 02:29
Static task
static1
Behavioral task
behavioral1
Sample
5190a86e760ae3c1eb27ef5ee753eff002a3cccdcb74f3b64b1568ef0bc8c7cf.exe
Resource
win10v2004-20230220-en
General
-
Target
5190a86e760ae3c1eb27ef5ee753eff002a3cccdcb74f3b64b1568ef0bc8c7cf.exe
-
Size
526KB
-
MD5
9692007af8be6fd3bc5c72c1e9da34c9
-
SHA1
8dee89f4afdf5681fb57243ec1a6a0c5bf392c21
-
SHA256
5190a86e760ae3c1eb27ef5ee753eff002a3cccdcb74f3b64b1568ef0bc8c7cf
-
SHA512
bf2f23791e60beaae89c43d45f1befa3729ac285cd3f29b621399287d75be9c27ab1eeb1a170741c2b63fddfa632a287682d1a0223ea29707a521a8f72056e39
-
SSDEEP
12288:eMrQy90j8Kw23FvvD7rkm+3lVV9FRZPARq7fyT:Oy4xvDOJRZPAFT
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Extracted
redline
fabio
193.233.20.27:4123
-
auth_value
56b82736c3f56b13be8e64c87d2cf9e5
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sf86On78Za40.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sf86On78Za40.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sf86On78Za40.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sf86On78Za40.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sf86On78Za40.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sf86On78Za40.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/768-157-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/768-158-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/768-160-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/768-162-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/768-164-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/768-166-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/768-168-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/768-170-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/768-172-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/768-174-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/768-176-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/768-178-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/768-180-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/768-182-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/768-184-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/768-186-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/768-188-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/768-190-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/768-192-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/768-194-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/768-196-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/768-198-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/768-200-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/768-202-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/768-204-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/768-206-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/768-208-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/768-210-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/768-212-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/768-214-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/768-216-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/768-218-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/768-220-0x0000000002500000-0x000000000253E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3656 vhZL2787Nn.exe 2252 sf86On78Za40.exe 768 tf23Gi22Fj19.exe 64 uhcr36Tb67Ny.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sf86On78Za40.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5190a86e760ae3c1eb27ef5ee753eff002a3cccdcb74f3b64b1568ef0bc8c7cf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5190a86e760ae3c1eb27ef5ee753eff002a3cccdcb74f3b64b1568ef0bc8c7cf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vhZL2787Nn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vhZL2787Nn.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2116 768 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2252 sf86On78Za40.exe 2252 sf86On78Za40.exe 768 tf23Gi22Fj19.exe 768 tf23Gi22Fj19.exe 64 uhcr36Tb67Ny.exe 64 uhcr36Tb67Ny.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2252 sf86On78Za40.exe Token: SeDebugPrivilege 768 tf23Gi22Fj19.exe Token: SeDebugPrivilege 64 uhcr36Tb67Ny.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1480 wrote to memory of 3656 1480 5190a86e760ae3c1eb27ef5ee753eff002a3cccdcb74f3b64b1568ef0bc8c7cf.exe 84 PID 1480 wrote to memory of 3656 1480 5190a86e760ae3c1eb27ef5ee753eff002a3cccdcb74f3b64b1568ef0bc8c7cf.exe 84 PID 1480 wrote to memory of 3656 1480 5190a86e760ae3c1eb27ef5ee753eff002a3cccdcb74f3b64b1568ef0bc8c7cf.exe 84 PID 3656 wrote to memory of 2252 3656 vhZL2787Nn.exe 85 PID 3656 wrote to memory of 2252 3656 vhZL2787Nn.exe 85 PID 3656 wrote to memory of 768 3656 vhZL2787Nn.exe 92 PID 3656 wrote to memory of 768 3656 vhZL2787Nn.exe 92 PID 3656 wrote to memory of 768 3656 vhZL2787Nn.exe 92 PID 1480 wrote to memory of 64 1480 5190a86e760ae3c1eb27ef5ee753eff002a3cccdcb74f3b64b1568ef0bc8c7cf.exe 98 PID 1480 wrote to memory of 64 1480 5190a86e760ae3c1eb27ef5ee753eff002a3cccdcb74f3b64b1568ef0bc8c7cf.exe 98 PID 1480 wrote to memory of 64 1480 5190a86e760ae3c1eb27ef5ee753eff002a3cccdcb74f3b64b1568ef0bc8c7cf.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\5190a86e760ae3c1eb27ef5ee753eff002a3cccdcb74f3b64b1568ef0bc8c7cf.exe"C:\Users\Admin\AppData\Local\Temp\5190a86e760ae3c1eb27ef5ee753eff002a3cccdcb74f3b64b1568ef0bc8c7cf.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhZL2787Nn.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhZL2787Nn.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf86On78Za40.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf86On78Za40.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2252
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf23Gi22Fj19.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf23Gi22Fj19.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:768 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 768 -s 21564⤵
- Program crash
PID:2116
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhcr36Tb67Ny.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhcr36Tb67Ny.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:64
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 768 -ip 7681⤵PID:4800
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5adb965dfcde4f0478482442d396c4541
SHA1dc59391fd7b59c21569eabd9169532690630fc23
SHA256700b75a4a46441f1979358dfceadd7336698522a8550fc9a343d13686c06cd40
SHA512d3b3db251ba77c793f80b8d5762207daf9238a8e3e49f15116e6f6bde2bd52eea1b1b68ed20d034fcadccd2c3c3f85813a73dba6505d74d424cd2382d90338b5
-
Filesize
175KB
MD5adb965dfcde4f0478482442d396c4541
SHA1dc59391fd7b59c21569eabd9169532690630fc23
SHA256700b75a4a46441f1979358dfceadd7336698522a8550fc9a343d13686c06cd40
SHA512d3b3db251ba77c793f80b8d5762207daf9238a8e3e49f15116e6f6bde2bd52eea1b1b68ed20d034fcadccd2c3c3f85813a73dba6505d74d424cd2382d90338b5
-
Filesize
381KB
MD57b80b190c334942ea9b292c3a4121c94
SHA14d660f60ef5b295ed9037b12651b23fa85430178
SHA25660fdc4681e02b810c42dcedc8c32d0c5b329385a79ce1db8dbdeeffdbb52afb6
SHA512820b209ebe19e326d7f2f259b6025f3721c40dbd2e8d1f2c7a4cd978c1650e443dfd44efbefe3934258fc79457edc690a7361a87500ed58d286ef2d24a1f5a9a
-
Filesize
381KB
MD57b80b190c334942ea9b292c3a4121c94
SHA14d660f60ef5b295ed9037b12651b23fa85430178
SHA25660fdc4681e02b810c42dcedc8c32d0c5b329385a79ce1db8dbdeeffdbb52afb6
SHA512820b209ebe19e326d7f2f259b6025f3721c40dbd2e8d1f2c7a4cd978c1650e443dfd44efbefe3934258fc79457edc690a7361a87500ed58d286ef2d24a1f5a9a
-
Filesize
11KB
MD52154b674f244d75c338daae45fcb7e99
SHA175b5e21fde2bcebb0c521f417232ed50792feb34
SHA2567b240330a66ff49bac6e8f123ed69ee5f1c41b5db6479600eb779db9a734cd31
SHA51281bf7a749a103fefa8d5f83e243224ab2ae4351d884e51e09aa10e1c993d1341e7dee8bc5c4e5aa8ba9d6ca59a10ed70d2b8a2cba4977880839026cc8eec1703
-
Filesize
11KB
MD52154b674f244d75c338daae45fcb7e99
SHA175b5e21fde2bcebb0c521f417232ed50792feb34
SHA2567b240330a66ff49bac6e8f123ed69ee5f1c41b5db6479600eb779db9a734cd31
SHA51281bf7a749a103fefa8d5f83e243224ab2ae4351d884e51e09aa10e1c993d1341e7dee8bc5c4e5aa8ba9d6ca59a10ed70d2b8a2cba4977880839026cc8eec1703
-
Filesize
292KB
MD5bde0fb595e9feb2667d8a8a78e326546
SHA1eead81585ede57400b7ec1bb906e9040e3f83833
SHA25672d6957bb47831ab0efe5678b31a54548a7733240fe207fa3b47497f4177ea8d
SHA5121f0ffa48e149869b3f6042752c4e80843441d242f539a7c863baae3f926fc55255d7eaa974c978e0655b5310b750a8844ea23670fe3079b53d62ce5c83412359
-
Filesize
292KB
MD5bde0fb595e9feb2667d8a8a78e326546
SHA1eead81585ede57400b7ec1bb906e9040e3f83833
SHA25672d6957bb47831ab0efe5678b31a54548a7733240fe207fa3b47497f4177ea8d
SHA5121f0ffa48e149869b3f6042752c4e80843441d242f539a7c863baae3f926fc55255d7eaa974c978e0655b5310b750a8844ea23670fe3079b53d62ce5c83412359