Analysis
-
max time kernel
54s -
max time network
57s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
06-03-2023 09:31
Static task
static1
Behavioral task
behavioral1
Sample
299b582522935e8ffc09f9e8106f487f8c97b69739035494460b516992400029.exe
Resource
win10-20230220-en
General
-
Target
299b582522935e8ffc09f9e8106f487f8c97b69739035494460b516992400029.exe
-
Size
560KB
-
MD5
13729256530eb38553d0a8bef168b6d4
-
SHA1
3f28ac30c1ffe13c7d5e0a2860adfcc96d6e2457
-
SHA256
299b582522935e8ffc09f9e8106f487f8c97b69739035494460b516992400029
-
SHA512
838388a152a6c074b09ebe57fac3938a6a4ae2ba7c174e72fcd8286096d6323d2e5d54206dd81cd6d71bfe2886cfed6a923e9e0cdc801af20a196fdab0d62f47
-
SSDEEP
12288:RMrzy90K+lmcp2e8fuj0F5VGKT/76SUBqv19n6K:WyCmcb2Y0F5d6ho19T
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Extracted
redline
fabio
193.233.20.27:4123
-
auth_value
56b82736c3f56b13be8e64c87d2cf9e5
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sf77Me36Ha14.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sf77Me36Ha14.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sf77Me36Ha14.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sf77Me36Ha14.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sf77Me36Ha14.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 36 IoCs
resource yara_rule behavioral1/memory/5024-136-0x0000000004780000-0x00000000047C6000-memory.dmp family_redline behavioral1/memory/5024-139-0x0000000007180000-0x00000000071C4000-memory.dmp family_redline behavioral1/memory/5024-140-0x0000000007310000-0x0000000007320000-memory.dmp family_redline behavioral1/memory/5024-143-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/5024-144-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/5024-146-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/5024-148-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/5024-150-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/5024-152-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/5024-154-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/5024-156-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/5024-158-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/5024-160-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/5024-162-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/5024-164-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/5024-166-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/5024-168-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/5024-170-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/5024-172-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/5024-174-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/5024-176-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/5024-178-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/5024-180-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/5024-182-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/5024-184-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/5024-186-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/5024-188-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/5024-190-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/5024-192-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/5024-194-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/5024-196-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/5024-198-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/5024-200-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/5024-204-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/5024-206-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/5024-202-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2240 vhgR4902PQ.exe 4596 sf77Me36Ha14.exe 5024 tf22Bc53JW42.exe 4188 uhON68Sc35XD.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sf77Me36Ha14.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vhgR4902PQ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vhgR4902PQ.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 299b582522935e8ffc09f9e8106f487f8c97b69739035494460b516992400029.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 299b582522935e8ffc09f9e8106f487f8c97b69739035494460b516992400029.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4596 sf77Me36Ha14.exe 4596 sf77Me36Ha14.exe 5024 tf22Bc53JW42.exe 5024 tf22Bc53JW42.exe 4188 uhON68Sc35XD.exe 4188 uhON68Sc35XD.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4596 sf77Me36Ha14.exe Token: SeDebugPrivilege 5024 tf22Bc53JW42.exe Token: SeDebugPrivilege 4188 uhON68Sc35XD.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3144 wrote to memory of 2240 3144 299b582522935e8ffc09f9e8106f487f8c97b69739035494460b516992400029.exe 66 PID 3144 wrote to memory of 2240 3144 299b582522935e8ffc09f9e8106f487f8c97b69739035494460b516992400029.exe 66 PID 3144 wrote to memory of 2240 3144 299b582522935e8ffc09f9e8106f487f8c97b69739035494460b516992400029.exe 66 PID 2240 wrote to memory of 4596 2240 vhgR4902PQ.exe 67 PID 2240 wrote to memory of 4596 2240 vhgR4902PQ.exe 67 PID 2240 wrote to memory of 5024 2240 vhgR4902PQ.exe 68 PID 2240 wrote to memory of 5024 2240 vhgR4902PQ.exe 68 PID 2240 wrote to memory of 5024 2240 vhgR4902PQ.exe 68 PID 3144 wrote to memory of 4188 3144 299b582522935e8ffc09f9e8106f487f8c97b69739035494460b516992400029.exe 70 PID 3144 wrote to memory of 4188 3144 299b582522935e8ffc09f9e8106f487f8c97b69739035494460b516992400029.exe 70 PID 3144 wrote to memory of 4188 3144 299b582522935e8ffc09f9e8106f487f8c97b69739035494460b516992400029.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\299b582522935e8ffc09f9e8106f487f8c97b69739035494460b516992400029.exe"C:\Users\Admin\AppData\Local\Temp\299b582522935e8ffc09f9e8106f487f8c97b69739035494460b516992400029.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhgR4902PQ.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhgR4902PQ.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf77Me36Ha14.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf77Me36Ha14.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4596
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf22Bc53JW42.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf22Bc53JW42.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5024
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhON68Sc35XD.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhON68Sc35XD.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4188
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD58316151a7cea8134a6b4692de0b049d9
SHA18b5a119dd6003bdfd48be9648213cf1c441f8a2a
SHA25632ddf60dd4f3851ecfd8547b1642a8fe9a160a82ee4b9fc9c014174670627f49
SHA512bc827d4e378851406532a2df0b58779516d0e23de00371d9384b23ef1965d373880e85dd181fd8c033f35d305dc77eb852d3cdfeb8b4542d07f2c75fa0c6b15e
-
Filesize
175KB
MD58316151a7cea8134a6b4692de0b049d9
SHA18b5a119dd6003bdfd48be9648213cf1c441f8a2a
SHA25632ddf60dd4f3851ecfd8547b1642a8fe9a160a82ee4b9fc9c014174670627f49
SHA512bc827d4e378851406532a2df0b58779516d0e23de00371d9384b23ef1965d373880e85dd181fd8c033f35d305dc77eb852d3cdfeb8b4542d07f2c75fa0c6b15e
-
Filesize
416KB
MD50de43d24e1e458c89c680c4e2d66613d
SHA1e879b29089117a39a0beb15fc2b9c274dece8660
SHA25676ecf5f11203460a9686c92ad40e1c00ecc43f12e956c1ad4fb889428e747381
SHA512b9af448958a0accb03e07c9cd195dfe81056df784456a2cef69c8d9d8235546107eb8d271d7433397313ee1b50f5894d45464ce729a9053bbe49aa2e1d97133b
-
Filesize
416KB
MD50de43d24e1e458c89c680c4e2d66613d
SHA1e879b29089117a39a0beb15fc2b9c274dece8660
SHA25676ecf5f11203460a9686c92ad40e1c00ecc43f12e956c1ad4fb889428e747381
SHA512b9af448958a0accb03e07c9cd195dfe81056df784456a2cef69c8d9d8235546107eb8d271d7433397313ee1b50f5894d45464ce729a9053bbe49aa2e1d97133b
-
Filesize
11KB
MD562b8448602912c5a4caa3818007e4ab8
SHA10de47962c460ec3dd1e45520ed05f266a8f5f0c9
SHA2568ebabbe67449efc5d326756db691ba352153e008af6817b8b3c40655b4cd3436
SHA512a42af56818b631ee8fb9d6b408ecfcde0990f7132de9749635b42886c930141b664732d73898655f4454d430da2d3f59789bd71fc70165acf05b1b6eb3b8765a
-
Filesize
11KB
MD562b8448602912c5a4caa3818007e4ab8
SHA10de47962c460ec3dd1e45520ed05f266a8f5f0c9
SHA2568ebabbe67449efc5d326756db691ba352153e008af6817b8b3c40655b4cd3436
SHA512a42af56818b631ee8fb9d6b408ecfcde0990f7132de9749635b42886c930141b664732d73898655f4454d430da2d3f59789bd71fc70165acf05b1b6eb3b8765a
-
Filesize
416KB
MD59ce8c74a533c9909e622ad2c5700ca63
SHA1bcce3e38eaf3c3b741bad36507671231d94ef844
SHA256a41658d0c260a9fa32e4797a385856dcbcd11ec5afd2135cee0f69ee6a52576d
SHA51298491caf62c0bfd90a89e3172801096e12328a4ac379f99a6895db5d85eb70468ccede97678b46eceabdc419d1114f3da59b9e72d68847be2384c58169cb0e73
-
Filesize
416KB
MD59ce8c74a533c9909e622ad2c5700ca63
SHA1bcce3e38eaf3c3b741bad36507671231d94ef844
SHA256a41658d0c260a9fa32e4797a385856dcbcd11ec5afd2135cee0f69ee6a52576d
SHA51298491caf62c0bfd90a89e3172801096e12328a4ac379f99a6895db5d85eb70468ccede97678b46eceabdc419d1114f3da59b9e72d68847be2384c58169cb0e73