Analysis
-
max time kernel
127s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2023, 03:17
Static task
static1
Behavioral task
behavioral1
Sample
e39ed6e459dbb7646bbedc451d6881ec9bd99455c0ec38bb714a3fded93f308f.exe
Resource
win10v2004-20230220-en
General
-
Target
e39ed6e459dbb7646bbedc451d6881ec9bd99455c0ec38bb714a3fded93f308f.exe
-
Size
526KB
-
MD5
d0e299697f773a5bccb3c51514f54c5c
-
SHA1
a42b14f38ddacb7725acc1b1356b56ab4a322d2b
-
SHA256
e39ed6e459dbb7646bbedc451d6881ec9bd99455c0ec38bb714a3fded93f308f
-
SHA512
a2f0d1f068a905b13054df36b96ea6b37ce9fff5451daf68a8e922a44ea8f114af035aa04cef84bc04f25c5adeb36f51b9dc2734f6968f694e5a1f872277ab00
-
SSDEEP
12288:ZMr0y90FVOTtqGWb8BS/q7jOVt9YCYfQpgUKObON:BycVOTt8bZ4jU0fVUKOM
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Extracted
redline
fabio
193.233.20.27:4123
-
auth_value
56b82736c3f56b13be8e64c87d2cf9e5
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sf98WF65RG94.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sf98WF65RG94.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sf98WF65RG94.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sf98WF65RG94.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sf98WF65RG94.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sf98WF65RG94.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 36 IoCs
resource yara_rule behavioral1/memory/1600-155-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/1600-156-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/1600-158-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/1600-160-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/1600-162-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/1600-164-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/1600-168-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/1600-166-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/1600-170-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/1600-172-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/1600-174-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/1600-176-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/1600-178-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/1600-180-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/1600-182-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/1600-185-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/1600-184-0x0000000004C50000-0x0000000004C60000-memory.dmp family_redline behavioral1/memory/1600-188-0x0000000004C50000-0x0000000004C60000-memory.dmp family_redline behavioral1/memory/1600-189-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/1600-191-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/1600-193-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/1600-195-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/1600-197-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/1600-199-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/1600-201-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/1600-203-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/1600-205-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/1600-207-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/1600-209-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/1600-211-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/1600-213-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/1600-215-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/1600-217-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/1600-219-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/1600-221-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/1600-1072-0x0000000004C50000-0x0000000004C60000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4780 vhpT9205Ei.exe 632 sf98WF65RG94.exe 1600 tf83Uz33Lf31.exe 4712 uhLS33Kz90do.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sf98WF65RG94.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e39ed6e459dbb7646bbedc451d6881ec9bd99455c0ec38bb714a3fded93f308f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vhpT9205Ei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vhpT9205Ei.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e39ed6e459dbb7646bbedc451d6881ec9bd99455c0ec38bb714a3fded93f308f.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 704 1600 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 632 sf98WF65RG94.exe 632 sf98WF65RG94.exe 1600 tf83Uz33Lf31.exe 1600 tf83Uz33Lf31.exe 4712 uhLS33Kz90do.exe 4712 uhLS33Kz90do.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 632 sf98WF65RG94.exe Token: SeDebugPrivilege 1600 tf83Uz33Lf31.exe Token: SeDebugPrivilege 4712 uhLS33Kz90do.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3728 wrote to memory of 4780 3728 e39ed6e459dbb7646bbedc451d6881ec9bd99455c0ec38bb714a3fded93f308f.exe 84 PID 3728 wrote to memory of 4780 3728 e39ed6e459dbb7646bbedc451d6881ec9bd99455c0ec38bb714a3fded93f308f.exe 84 PID 3728 wrote to memory of 4780 3728 e39ed6e459dbb7646bbedc451d6881ec9bd99455c0ec38bb714a3fded93f308f.exe 84 PID 4780 wrote to memory of 632 4780 vhpT9205Ei.exe 85 PID 4780 wrote to memory of 632 4780 vhpT9205Ei.exe 85 PID 4780 wrote to memory of 1600 4780 vhpT9205Ei.exe 90 PID 4780 wrote to memory of 1600 4780 vhpT9205Ei.exe 90 PID 4780 wrote to memory of 1600 4780 vhpT9205Ei.exe 90 PID 3728 wrote to memory of 4712 3728 e39ed6e459dbb7646bbedc451d6881ec9bd99455c0ec38bb714a3fded93f308f.exe 95 PID 3728 wrote to memory of 4712 3728 e39ed6e459dbb7646bbedc451d6881ec9bd99455c0ec38bb714a3fded93f308f.exe 95 PID 3728 wrote to memory of 4712 3728 e39ed6e459dbb7646bbedc451d6881ec9bd99455c0ec38bb714a3fded93f308f.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\e39ed6e459dbb7646bbedc451d6881ec9bd99455c0ec38bb714a3fded93f308f.exe"C:\Users\Admin\AppData\Local\Temp\e39ed6e459dbb7646bbedc451d6881ec9bd99455c0ec38bb714a3fded93f308f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhpT9205Ei.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhpT9205Ei.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf98WF65RG94.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf98WF65RG94.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:632
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf83Uz33Lf31.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf83Uz33Lf31.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1600 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 13484⤵
- Program crash
PID:704
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhLS33Kz90do.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhLS33Kz90do.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1600 -ip 16001⤵PID:4692
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5d9ea2edae77ddaf8a34f61515b28b58f
SHA1ef8874a396c655bcf4a28b544b3ab52151cded9e
SHA256687cc9b0a731227ddad51cf1968be5935290770025a251c44178e17e8f4b03aa
SHA512a0145b9621923dc04a83a097115b418d026130b16645b555ef45e3a56712e69ddc9ca8c60c5b9c66e5e9811f7320b3a99b8247951884f7f1e2d41fc2966c8291
-
Filesize
175KB
MD5d9ea2edae77ddaf8a34f61515b28b58f
SHA1ef8874a396c655bcf4a28b544b3ab52151cded9e
SHA256687cc9b0a731227ddad51cf1968be5935290770025a251c44178e17e8f4b03aa
SHA512a0145b9621923dc04a83a097115b418d026130b16645b555ef45e3a56712e69ddc9ca8c60c5b9c66e5e9811f7320b3a99b8247951884f7f1e2d41fc2966c8291
-
Filesize
382KB
MD59ffdd9b94aece0740d4ec272bc793736
SHA10acfbdba45acf596450d20224c10c2677cad2b41
SHA2569c272dc6d8327c61b2e696482d238b9f27fda3054199a05ed2585f0f5858ccab
SHA512dfeb893b2d20377b3b97b8d3a393563b8bfbe4428b8a5475e1d73d333d5c7d7d96b29583f3952b49433edd1169fc096aaf01394b3aedc697dd9c4f568b3182a1
-
Filesize
382KB
MD59ffdd9b94aece0740d4ec272bc793736
SHA10acfbdba45acf596450d20224c10c2677cad2b41
SHA2569c272dc6d8327c61b2e696482d238b9f27fda3054199a05ed2585f0f5858ccab
SHA512dfeb893b2d20377b3b97b8d3a393563b8bfbe4428b8a5475e1d73d333d5c7d7d96b29583f3952b49433edd1169fc096aaf01394b3aedc697dd9c4f568b3182a1
-
Filesize
11KB
MD52d4e895d4c80ddccf0937e4b40a2b758
SHA1e59050092e1904af66c6e1d4c06fc3da11d5d462
SHA256c0b421f56b61a59a22b05b0609640ade7584d64e0cf666b6f2975f02a976ddd1
SHA5126e552e0984efaaf9bc4d7346dca9322a0d6da8bb7834e4c76ac3edd26bcf47dea1cb9c8866b8494a110b9f31a262141a54f5b72bc9114457f1e0631411d8635d
-
Filesize
11KB
MD52d4e895d4c80ddccf0937e4b40a2b758
SHA1e59050092e1904af66c6e1d4c06fc3da11d5d462
SHA256c0b421f56b61a59a22b05b0609640ade7584d64e0cf666b6f2975f02a976ddd1
SHA5126e552e0984efaaf9bc4d7346dca9322a0d6da8bb7834e4c76ac3edd26bcf47dea1cb9c8866b8494a110b9f31a262141a54f5b72bc9114457f1e0631411d8635d
-
Filesize
364KB
MD50fb36e6dfd2286b0bb7e48c476a3f73b
SHA138801c7ea1faf291cb471397c38630a305518828
SHA256edb3b7633dd16579b23dc83d9950c525d7a9c2bec60785c04dc3b63ea3eaba8e
SHA51295c334ce7bae2ccdff2bf4f288c544a2d87946405b723367df421de635a8037167aaeb9b655dd48f8ed9a10a5cfad6b25b4bfd5dc88e99c26ded8e4d694de64d
-
Filesize
364KB
MD50fb36e6dfd2286b0bb7e48c476a3f73b
SHA138801c7ea1faf291cb471397c38630a305518828
SHA256edb3b7633dd16579b23dc83d9950c525d7a9c2bec60785c04dc3b63ea3eaba8e
SHA51295c334ce7bae2ccdff2bf4f288c544a2d87946405b723367df421de635a8037167aaeb9b655dd48f8ed9a10a5cfad6b25b4bfd5dc88e99c26ded8e4d694de64d