Analysis
-
max time kernel
40s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/03/2023, 04:46
Static task
static1
Behavioral task
behavioral1
Sample
3141d7440a8639b50a6d412e72142542.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
3141d7440a8639b50a6d412e72142542.exe
Resource
win10v2004-20230220-en
General
-
Target
3141d7440a8639b50a6d412e72142542.exe
-
Size
526KB
-
MD5
3141d7440a8639b50a6d412e72142542
-
SHA1
96c0de2895c0a42fd838a9d167cf26e63716b583
-
SHA256
0196d177ad5c0fa45978723063d3ad7ad06e4972986b32f7b4ef9b6ec27176a1
-
SHA512
127e42e0a6870f0d5449ba7361bba71a126c86cf35832bb9b5d7c282908f6775ac4936d987203dc36beecb469d5465c8895da533e1bf07c08f0d00494d72b48e
-
SSDEEP
6144:KNy+bnr+7p0yN90QEjIvVQbe/MsgDmj/Vtp+aLurj3eEhH+6Slkqh0ZyZOLI5Y:nMrTy90+vVQZKVtU1rbFhe6skOvZQEY
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Extracted
redline
fabio
193.233.20.27:4123
-
auth_value
56b82736c3f56b13be8e64c87d2cf9e5
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sf51Lh36Dh40.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sf51Lh36Dh40.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sf51Lh36Dh40.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sf51Lh36Dh40.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sf51Lh36Dh40.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sf51Lh36Dh40.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 37 IoCs
resource yara_rule behavioral1/memory/1504-83-0x0000000002050000-0x0000000002096000-memory.dmp family_redline behavioral1/memory/1504-86-0x00000000023A0000-0x00000000023E4000-memory.dmp family_redline behavioral1/memory/1504-87-0x00000000023A0000-0x00000000023DE000-memory.dmp family_redline behavioral1/memory/1504-88-0x00000000023A0000-0x00000000023DE000-memory.dmp family_redline behavioral1/memory/1504-90-0x00000000023A0000-0x00000000023DE000-memory.dmp family_redline behavioral1/memory/1504-92-0x00000000023A0000-0x00000000023DE000-memory.dmp family_redline behavioral1/memory/1504-94-0x00000000023A0000-0x00000000023DE000-memory.dmp family_redline behavioral1/memory/1504-96-0x00000000023A0000-0x00000000023DE000-memory.dmp family_redline behavioral1/memory/1504-98-0x00000000023A0000-0x00000000023DE000-memory.dmp family_redline behavioral1/memory/1504-100-0x00000000023A0000-0x00000000023DE000-memory.dmp family_redline behavioral1/memory/1504-102-0x00000000023A0000-0x00000000023DE000-memory.dmp family_redline behavioral1/memory/1504-104-0x00000000023A0000-0x00000000023DE000-memory.dmp family_redline behavioral1/memory/1504-106-0x00000000023A0000-0x00000000023DE000-memory.dmp family_redline behavioral1/memory/1504-108-0x00000000023A0000-0x00000000023DE000-memory.dmp family_redline behavioral1/memory/1504-110-0x00000000023A0000-0x00000000023DE000-memory.dmp family_redline behavioral1/memory/1504-112-0x00000000023A0000-0x00000000023DE000-memory.dmp family_redline behavioral1/memory/1504-114-0x00000000023A0000-0x00000000023DE000-memory.dmp family_redline behavioral1/memory/1504-116-0x00000000023A0000-0x00000000023DE000-memory.dmp family_redline behavioral1/memory/1504-118-0x00000000023A0000-0x00000000023DE000-memory.dmp family_redline behavioral1/memory/1504-120-0x00000000023A0000-0x00000000023DE000-memory.dmp family_redline behavioral1/memory/1504-122-0x00000000023A0000-0x00000000023DE000-memory.dmp family_redline behavioral1/memory/1504-124-0x00000000023A0000-0x00000000023DE000-memory.dmp family_redline behavioral1/memory/1504-126-0x00000000023A0000-0x00000000023DE000-memory.dmp family_redline behavioral1/memory/1504-128-0x00000000023A0000-0x00000000023DE000-memory.dmp family_redline behavioral1/memory/1504-130-0x00000000023A0000-0x00000000023DE000-memory.dmp family_redline behavioral1/memory/1504-132-0x00000000023A0000-0x00000000023DE000-memory.dmp family_redline behavioral1/memory/1504-134-0x00000000023A0000-0x00000000023DE000-memory.dmp family_redline behavioral1/memory/1504-136-0x00000000023A0000-0x00000000023DE000-memory.dmp family_redline behavioral1/memory/1504-138-0x00000000023A0000-0x00000000023DE000-memory.dmp family_redline behavioral1/memory/1504-140-0x00000000023A0000-0x00000000023DE000-memory.dmp family_redline behavioral1/memory/1504-142-0x00000000023A0000-0x00000000023DE000-memory.dmp family_redline behavioral1/memory/1504-144-0x00000000023A0000-0x00000000023DE000-memory.dmp family_redline behavioral1/memory/1504-146-0x00000000023A0000-0x00000000023DE000-memory.dmp family_redline behavioral1/memory/1504-148-0x00000000023A0000-0x00000000023DE000-memory.dmp family_redline behavioral1/memory/1504-150-0x00000000023A0000-0x00000000023DE000-memory.dmp family_redline behavioral1/memory/1504-343-0x0000000004D00000-0x0000000004D40000-memory.dmp family_redline behavioral1/memory/1504-995-0x0000000004D00000-0x0000000004D40000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1132 vhih9610nV.exe 1904 sf51Lh36Dh40.exe 1504 tf13GC35Xs46.exe 1284 uhRF01dP53Og.exe -
Loads dropped DLL 8 IoCs
pid Process 1324 3141d7440a8639b50a6d412e72142542.exe 1132 vhih9610nV.exe 1132 vhih9610nV.exe 1132 vhih9610nV.exe 1132 vhih9610nV.exe 1504 tf13GC35Xs46.exe 1324 3141d7440a8639b50a6d412e72142542.exe 1284 uhRF01dP53Og.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features sf51Lh36Dh40.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sf51Lh36Dh40.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3141d7440a8639b50a6d412e72142542.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3141d7440a8639b50a6d412e72142542.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce vhih9610nV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vhih9610nV.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1904 sf51Lh36Dh40.exe 1904 sf51Lh36Dh40.exe 1504 tf13GC35Xs46.exe 1504 tf13GC35Xs46.exe 1284 uhRF01dP53Og.exe 1284 uhRF01dP53Og.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1904 sf51Lh36Dh40.exe Token: SeDebugPrivilege 1504 tf13GC35Xs46.exe Token: SeDebugPrivilege 1284 uhRF01dP53Og.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1324 wrote to memory of 1132 1324 3141d7440a8639b50a6d412e72142542.exe 28 PID 1324 wrote to memory of 1132 1324 3141d7440a8639b50a6d412e72142542.exe 28 PID 1324 wrote to memory of 1132 1324 3141d7440a8639b50a6d412e72142542.exe 28 PID 1324 wrote to memory of 1132 1324 3141d7440a8639b50a6d412e72142542.exe 28 PID 1324 wrote to memory of 1132 1324 3141d7440a8639b50a6d412e72142542.exe 28 PID 1324 wrote to memory of 1132 1324 3141d7440a8639b50a6d412e72142542.exe 28 PID 1324 wrote to memory of 1132 1324 3141d7440a8639b50a6d412e72142542.exe 28 PID 1132 wrote to memory of 1904 1132 vhih9610nV.exe 29 PID 1132 wrote to memory of 1904 1132 vhih9610nV.exe 29 PID 1132 wrote to memory of 1904 1132 vhih9610nV.exe 29 PID 1132 wrote to memory of 1904 1132 vhih9610nV.exe 29 PID 1132 wrote to memory of 1904 1132 vhih9610nV.exe 29 PID 1132 wrote to memory of 1904 1132 vhih9610nV.exe 29 PID 1132 wrote to memory of 1904 1132 vhih9610nV.exe 29 PID 1132 wrote to memory of 1504 1132 vhih9610nV.exe 30 PID 1132 wrote to memory of 1504 1132 vhih9610nV.exe 30 PID 1132 wrote to memory of 1504 1132 vhih9610nV.exe 30 PID 1132 wrote to memory of 1504 1132 vhih9610nV.exe 30 PID 1132 wrote to memory of 1504 1132 vhih9610nV.exe 30 PID 1132 wrote to memory of 1504 1132 vhih9610nV.exe 30 PID 1132 wrote to memory of 1504 1132 vhih9610nV.exe 30 PID 1324 wrote to memory of 1284 1324 3141d7440a8639b50a6d412e72142542.exe 32 PID 1324 wrote to memory of 1284 1324 3141d7440a8639b50a6d412e72142542.exe 32 PID 1324 wrote to memory of 1284 1324 3141d7440a8639b50a6d412e72142542.exe 32 PID 1324 wrote to memory of 1284 1324 3141d7440a8639b50a6d412e72142542.exe 32 PID 1324 wrote to memory of 1284 1324 3141d7440a8639b50a6d412e72142542.exe 32 PID 1324 wrote to memory of 1284 1324 3141d7440a8639b50a6d412e72142542.exe 32 PID 1324 wrote to memory of 1284 1324 3141d7440a8639b50a6d412e72142542.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\3141d7440a8639b50a6d412e72142542.exe"C:\Users\Admin\AppData\Local\Temp\3141d7440a8639b50a6d412e72142542.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhih9610nV.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhih9610nV.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf51Lh36Dh40.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf51Lh36Dh40.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1904
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf13GC35Xs46.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf13GC35Xs46.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1504
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhRF01dP53Og.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhRF01dP53Og.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1284
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD591dcaa5b0aeaf9d32758d9c455f35aea
SHA1e1dd4b7dce0ed3725a6d3b00189602a9cbebcf1e
SHA256db07aa2921d48b8f95ea16ac28a10632ef5ca6ec7017aa60f0b87db6f8f8da3c
SHA512dfe4a740261df3cbd8e0e8ab2bc2f2aec2ddd9c4c4b02b56e53a099669cfc8db14484ffd3a8f3eb0f2cc0f9ddcda67c398f7b65b77109a6934bcaaef2b448042
-
Filesize
175KB
MD591dcaa5b0aeaf9d32758d9c455f35aea
SHA1e1dd4b7dce0ed3725a6d3b00189602a9cbebcf1e
SHA256db07aa2921d48b8f95ea16ac28a10632ef5ca6ec7017aa60f0b87db6f8f8da3c
SHA512dfe4a740261df3cbd8e0e8ab2bc2f2aec2ddd9c4c4b02b56e53a099669cfc8db14484ffd3a8f3eb0f2cc0f9ddcda67c398f7b65b77109a6934bcaaef2b448042
-
Filesize
382KB
MD5c94aa0235fb31f34b6a80ee2abc7e55b
SHA1e78eb67672bae6b07610dce71807e72a32a4abbc
SHA25662f91bb1b5b4d12e37576de5504cad9701241339183151753e343d6c05365cfa
SHA512a6cc4879862dc94ac111a7cf4dc1b4cb3163e266163561229e6d8fbfdaa380af8318b3e0b704e4f15ad15fb4a42fdf91e881d62b987bffd5bea35857f313729f
-
Filesize
382KB
MD5c94aa0235fb31f34b6a80ee2abc7e55b
SHA1e78eb67672bae6b07610dce71807e72a32a4abbc
SHA25662f91bb1b5b4d12e37576de5504cad9701241339183151753e343d6c05365cfa
SHA512a6cc4879862dc94ac111a7cf4dc1b4cb3163e266163561229e6d8fbfdaa380af8318b3e0b704e4f15ad15fb4a42fdf91e881d62b987bffd5bea35857f313729f
-
Filesize
11KB
MD5a7534f66029c6222f23ca72c9c6176b0
SHA11b9b0e304d5d10aa50aacfd4019f8f0e06bc2dc7
SHA25636f053773aef714bbcb52d55f7c8acf99be0e987c65194e46f795d4557eef661
SHA512442bc1f195cb18a16c3ea14015aeb849ffcbc230d7ca2cb2a84a7e35770b0cf31b39f4233c8d42a1dfe2711d0b84ffe6b250fe15445eb0d7e3618a01ca2e1677
-
Filesize
11KB
MD5a7534f66029c6222f23ca72c9c6176b0
SHA11b9b0e304d5d10aa50aacfd4019f8f0e06bc2dc7
SHA25636f053773aef714bbcb52d55f7c8acf99be0e987c65194e46f795d4557eef661
SHA512442bc1f195cb18a16c3ea14015aeb849ffcbc230d7ca2cb2a84a7e35770b0cf31b39f4233c8d42a1dfe2711d0b84ffe6b250fe15445eb0d7e3618a01ca2e1677
-
Filesize
364KB
MD50fb36e6dfd2286b0bb7e48c476a3f73b
SHA138801c7ea1faf291cb471397c38630a305518828
SHA256edb3b7633dd16579b23dc83d9950c525d7a9c2bec60785c04dc3b63ea3eaba8e
SHA51295c334ce7bae2ccdff2bf4f288c544a2d87946405b723367df421de635a8037167aaeb9b655dd48f8ed9a10a5cfad6b25b4bfd5dc88e99c26ded8e4d694de64d
-
Filesize
364KB
MD50fb36e6dfd2286b0bb7e48c476a3f73b
SHA138801c7ea1faf291cb471397c38630a305518828
SHA256edb3b7633dd16579b23dc83d9950c525d7a9c2bec60785c04dc3b63ea3eaba8e
SHA51295c334ce7bae2ccdff2bf4f288c544a2d87946405b723367df421de635a8037167aaeb9b655dd48f8ed9a10a5cfad6b25b4bfd5dc88e99c26ded8e4d694de64d
-
Filesize
364KB
MD50fb36e6dfd2286b0bb7e48c476a3f73b
SHA138801c7ea1faf291cb471397c38630a305518828
SHA256edb3b7633dd16579b23dc83d9950c525d7a9c2bec60785c04dc3b63ea3eaba8e
SHA51295c334ce7bae2ccdff2bf4f288c544a2d87946405b723367df421de635a8037167aaeb9b655dd48f8ed9a10a5cfad6b25b4bfd5dc88e99c26ded8e4d694de64d
-
Filesize
175KB
MD591dcaa5b0aeaf9d32758d9c455f35aea
SHA1e1dd4b7dce0ed3725a6d3b00189602a9cbebcf1e
SHA256db07aa2921d48b8f95ea16ac28a10632ef5ca6ec7017aa60f0b87db6f8f8da3c
SHA512dfe4a740261df3cbd8e0e8ab2bc2f2aec2ddd9c4c4b02b56e53a099669cfc8db14484ffd3a8f3eb0f2cc0f9ddcda67c398f7b65b77109a6934bcaaef2b448042
-
Filesize
175KB
MD591dcaa5b0aeaf9d32758d9c455f35aea
SHA1e1dd4b7dce0ed3725a6d3b00189602a9cbebcf1e
SHA256db07aa2921d48b8f95ea16ac28a10632ef5ca6ec7017aa60f0b87db6f8f8da3c
SHA512dfe4a740261df3cbd8e0e8ab2bc2f2aec2ddd9c4c4b02b56e53a099669cfc8db14484ffd3a8f3eb0f2cc0f9ddcda67c398f7b65b77109a6934bcaaef2b448042
-
Filesize
382KB
MD5c94aa0235fb31f34b6a80ee2abc7e55b
SHA1e78eb67672bae6b07610dce71807e72a32a4abbc
SHA25662f91bb1b5b4d12e37576de5504cad9701241339183151753e343d6c05365cfa
SHA512a6cc4879862dc94ac111a7cf4dc1b4cb3163e266163561229e6d8fbfdaa380af8318b3e0b704e4f15ad15fb4a42fdf91e881d62b987bffd5bea35857f313729f
-
Filesize
382KB
MD5c94aa0235fb31f34b6a80ee2abc7e55b
SHA1e78eb67672bae6b07610dce71807e72a32a4abbc
SHA25662f91bb1b5b4d12e37576de5504cad9701241339183151753e343d6c05365cfa
SHA512a6cc4879862dc94ac111a7cf4dc1b4cb3163e266163561229e6d8fbfdaa380af8318b3e0b704e4f15ad15fb4a42fdf91e881d62b987bffd5bea35857f313729f
-
Filesize
11KB
MD5a7534f66029c6222f23ca72c9c6176b0
SHA11b9b0e304d5d10aa50aacfd4019f8f0e06bc2dc7
SHA25636f053773aef714bbcb52d55f7c8acf99be0e987c65194e46f795d4557eef661
SHA512442bc1f195cb18a16c3ea14015aeb849ffcbc230d7ca2cb2a84a7e35770b0cf31b39f4233c8d42a1dfe2711d0b84ffe6b250fe15445eb0d7e3618a01ca2e1677
-
Filesize
364KB
MD50fb36e6dfd2286b0bb7e48c476a3f73b
SHA138801c7ea1faf291cb471397c38630a305518828
SHA256edb3b7633dd16579b23dc83d9950c525d7a9c2bec60785c04dc3b63ea3eaba8e
SHA51295c334ce7bae2ccdff2bf4f288c544a2d87946405b723367df421de635a8037167aaeb9b655dd48f8ed9a10a5cfad6b25b4bfd5dc88e99c26ded8e4d694de64d
-
Filesize
364KB
MD50fb36e6dfd2286b0bb7e48c476a3f73b
SHA138801c7ea1faf291cb471397c38630a305518828
SHA256edb3b7633dd16579b23dc83d9950c525d7a9c2bec60785c04dc3b63ea3eaba8e
SHA51295c334ce7bae2ccdff2bf4f288c544a2d87946405b723367df421de635a8037167aaeb9b655dd48f8ed9a10a5cfad6b25b4bfd5dc88e99c26ded8e4d694de64d
-
Filesize
364KB
MD50fb36e6dfd2286b0bb7e48c476a3f73b
SHA138801c7ea1faf291cb471397c38630a305518828
SHA256edb3b7633dd16579b23dc83d9950c525d7a9c2bec60785c04dc3b63ea3eaba8e
SHA51295c334ce7bae2ccdff2bf4f288c544a2d87946405b723367df421de635a8037167aaeb9b655dd48f8ed9a10a5cfad6b25b4bfd5dc88e99c26ded8e4d694de64d