Analysis
-
max time kernel
144s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2023, 06:43
Static task
static1
Behavioral task
behavioral1
Sample
469cc82ca9e821ef410447e616ab4e340d6e2e535adec14b8554ce9a7175853c.exe
Resource
win10v2004-20230220-en
General
-
Target
469cc82ca9e821ef410447e616ab4e340d6e2e535adec14b8554ce9a7175853c.exe
-
Size
557KB
-
MD5
1dce306b8d420c0929122b14e460c619
-
SHA1
a2b2a56c6b29498068f145e77e8387f67328b1ca
-
SHA256
469cc82ca9e821ef410447e616ab4e340d6e2e535adec14b8554ce9a7175853c
-
SHA512
cf53ccf5b21d97f77f6ec73f5dfd0d0677bcf1bd8acfd18d95c068da8eeda02f4ba673d7ba3875da222801c75368b6b553e020005321adcdfb3503eb5db7e6d5
-
SSDEEP
12288:aMrky90fGxy2DUwO+Ffiy7GfG24UpdYFv1:ayBxZYwO+ZFGfGrUHYFt
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Extracted
redline
fabio
193.233.20.27:4123
-
auth_value
56b82736c3f56b13be8e64c87d2cf9e5
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sf82qa84VY90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sf82qa84VY90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sf82qa84VY90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sf82qa84VY90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sf82qa84VY90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sf82qa84VY90.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 34 IoCs
resource yara_rule behavioral1/memory/856-156-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/856-157-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/856-159-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/856-161-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/856-163-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/856-165-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/856-167-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/856-169-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/856-171-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/856-173-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/856-175-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/856-177-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/856-179-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/856-182-0x0000000007250000-0x0000000007260000-memory.dmp family_redline behavioral1/memory/856-185-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/856-181-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/856-187-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/856-189-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/856-191-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/856-193-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/856-195-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/856-199-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/856-197-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/856-201-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/856-203-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/856-205-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/856-207-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/856-209-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/856-211-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/856-213-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/856-215-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/856-217-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/856-219-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/856-221-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4256 vhEg5850Nd.exe 3272 sf82qa84VY90.exe 856 tf53br33uA36.exe 2676 uhkl33MS83bB.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sf82qa84VY90.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 469cc82ca9e821ef410447e616ab4e340d6e2e535adec14b8554ce9a7175853c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 469cc82ca9e821ef410447e616ab4e340d6e2e535adec14b8554ce9a7175853c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vhEg5850Nd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vhEg5850Nd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 5060 856 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3272 sf82qa84VY90.exe 3272 sf82qa84VY90.exe 856 tf53br33uA36.exe 856 tf53br33uA36.exe 2676 uhkl33MS83bB.exe 2676 uhkl33MS83bB.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3272 sf82qa84VY90.exe Token: SeDebugPrivilege 856 tf53br33uA36.exe Token: SeDebugPrivilege 2676 uhkl33MS83bB.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 5092 wrote to memory of 4256 5092 469cc82ca9e821ef410447e616ab4e340d6e2e535adec14b8554ce9a7175853c.exe 84 PID 5092 wrote to memory of 4256 5092 469cc82ca9e821ef410447e616ab4e340d6e2e535adec14b8554ce9a7175853c.exe 84 PID 5092 wrote to memory of 4256 5092 469cc82ca9e821ef410447e616ab4e340d6e2e535adec14b8554ce9a7175853c.exe 84 PID 4256 wrote to memory of 3272 4256 vhEg5850Nd.exe 85 PID 4256 wrote to memory of 3272 4256 vhEg5850Nd.exe 85 PID 4256 wrote to memory of 856 4256 vhEg5850Nd.exe 90 PID 4256 wrote to memory of 856 4256 vhEg5850Nd.exe 90 PID 4256 wrote to memory of 856 4256 vhEg5850Nd.exe 90 PID 5092 wrote to memory of 2676 5092 469cc82ca9e821ef410447e616ab4e340d6e2e535adec14b8554ce9a7175853c.exe 94 PID 5092 wrote to memory of 2676 5092 469cc82ca9e821ef410447e616ab4e340d6e2e535adec14b8554ce9a7175853c.exe 94 PID 5092 wrote to memory of 2676 5092 469cc82ca9e821ef410447e616ab4e340d6e2e535adec14b8554ce9a7175853c.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\469cc82ca9e821ef410447e616ab4e340d6e2e535adec14b8554ce9a7175853c.exe"C:\Users\Admin\AppData\Local\Temp\469cc82ca9e821ef410447e616ab4e340d6e2e535adec14b8554ce9a7175853c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhEg5850Nd.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhEg5850Nd.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf82qa84VY90.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf82qa84VY90.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3272
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf53br33uA36.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf53br33uA36.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:856 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 856 -s 18964⤵
- Program crash
PID:5060
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhkl33MS83bB.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhkl33MS83bB.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 856 -ip 8561⤵PID:548
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD58fd92236c4427e2a4b8db9e955091e7b
SHA11586ada7966dd53e35fdec464e6bbbd47c45224a
SHA256331303f5c6f3a8ae7a84f854c3127d4fd41e3d75e7313d184177f6a0c96b0ff0
SHA512d440c1209e387bcd338c565da61c91be7ff69ba38b77582c27e760d79f7b856ebeb341ccefe17346039faefba17cc19072dfa640e82a9ebaedfb09a0469cd7fc
-
Filesize
175KB
MD58fd92236c4427e2a4b8db9e955091e7b
SHA11586ada7966dd53e35fdec464e6bbbd47c45224a
SHA256331303f5c6f3a8ae7a84f854c3127d4fd41e3d75e7313d184177f6a0c96b0ff0
SHA512d440c1209e387bcd338c565da61c91be7ff69ba38b77582c27e760d79f7b856ebeb341ccefe17346039faefba17cc19072dfa640e82a9ebaedfb09a0469cd7fc
-
Filesize
412KB
MD5aee25169d3df76b8aafa9b3283cc807b
SHA1cfb4e39a2ae4a1dd790f47ed698bee321b34eee3
SHA256aebcbd25537ad0e09e273a00c71435c762d8c9fbc49479a396d06aabdbc8cd78
SHA5127bdec400f7201d40ff455499f2c26aa3ec2ee832a325e0a374970e31fd0e6674a069371467f1a05599f9e5996e200dac494f0f11ba265b79359ff3050b49d486
-
Filesize
412KB
MD5aee25169d3df76b8aafa9b3283cc807b
SHA1cfb4e39a2ae4a1dd790f47ed698bee321b34eee3
SHA256aebcbd25537ad0e09e273a00c71435c762d8c9fbc49479a396d06aabdbc8cd78
SHA5127bdec400f7201d40ff455499f2c26aa3ec2ee832a325e0a374970e31fd0e6674a069371467f1a05599f9e5996e200dac494f0f11ba265b79359ff3050b49d486
-
Filesize
11KB
MD5f98262dafbc87c8f25177129b13c62f0
SHA115185689422140bacdec8095d5eb0407347993b7
SHA25634243e0a87cee8c94d413dd9d3d478fe849e29d3ab802b99f4ada3e0dbf0eaa4
SHA512e0fdf9ab1e81bbb3de224a07607dcb94859a6e2bd2855a66fd3be4d1a59aac60ed36c296cbcff9c3e8d65be82f9defd1c2a556d038ec469699bea645a67831c2
-
Filesize
11KB
MD5f98262dafbc87c8f25177129b13c62f0
SHA115185689422140bacdec8095d5eb0407347993b7
SHA25634243e0a87cee8c94d413dd9d3d478fe849e29d3ab802b99f4ada3e0dbf0eaa4
SHA512e0fdf9ab1e81bbb3de224a07607dcb94859a6e2bd2855a66fd3be4d1a59aac60ed36c296cbcff9c3e8d65be82f9defd1c2a556d038ec469699bea645a67831c2
-
Filesize
409KB
MD5d918db9077504212d04e97bc5857b710
SHA1cbac3bfca65f8dfe4efd408bcf480f3d603f1d06
SHA256ab46765a44c015f420a104a2ffee2d036dc0cb4ce25e72be2540eed2cd521bb3
SHA512f00800d9c2616090029632b5fea54abacc92e9c323feda1ea3c50a2ffdacd0f047d4da66b185b75d4570bee869c9684a3746b1daf58cc66278cbb09a0946f187
-
Filesize
409KB
MD5d918db9077504212d04e97bc5857b710
SHA1cbac3bfca65f8dfe4efd408bcf480f3d603f1d06
SHA256ab46765a44c015f420a104a2ffee2d036dc0cb4ce25e72be2540eed2cd521bb3
SHA512f00800d9c2616090029632b5fea54abacc92e9c323feda1ea3c50a2ffdacd0f047d4da66b185b75d4570bee869c9684a3746b1daf58cc66278cbb09a0946f187