Analysis
-
max time kernel
54s -
max time network
57s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
06/03/2023, 10:30
Static task
static1
Behavioral task
behavioral1
Sample
005246f6e658ffe0a40c332315f6d49eaef689cacbfdbf3b8a75e8342fa719cb.exe
Resource
win10-20230220-en
General
-
Target
005246f6e658ffe0a40c332315f6d49eaef689cacbfdbf3b8a75e8342fa719cb.exe
-
Size
560KB
-
MD5
06be466217b8384774b1898400dc3892
-
SHA1
8726a74c5aaff8da9de16edf17179f083ea374ff
-
SHA256
005246f6e658ffe0a40c332315f6d49eaef689cacbfdbf3b8a75e8342fa719cb
-
SHA512
7d415286013ff840b06a142219a66c1a10613e2738ce91aa01b9dcd41c86c6697ae16c7d7e1fdd79e81e2fc0986bb8f119c1e66f22a2ddeac7858fa00a10657c
-
SSDEEP
12288:pMryy90rG08j5kt0S+GtEsHlbCUFMVGKT/JL4UncZdP5HNf1q:7y478j65Hl+UFM7LVE5tQ
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Extracted
redline
fabio
193.233.20.27:4123
-
auth_value
56b82736c3f56b13be8e64c87d2cf9e5
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sf30dJ52sJ80.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sf30dJ52sJ80.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sf30dJ52sJ80.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sf30dJ52sJ80.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sf30dJ52sJ80.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/2124-141-0x0000000004770000-0x00000000047B6000-memory.dmp family_redline behavioral1/memory/2124-143-0x0000000004830000-0x0000000004874000-memory.dmp family_redline behavioral1/memory/2124-144-0x0000000004830000-0x000000000486E000-memory.dmp family_redline behavioral1/memory/2124-145-0x0000000004830000-0x000000000486E000-memory.dmp family_redline behavioral1/memory/2124-147-0x0000000004830000-0x000000000486E000-memory.dmp family_redline behavioral1/memory/2124-149-0x0000000004830000-0x000000000486E000-memory.dmp family_redline behavioral1/memory/2124-151-0x0000000004830000-0x000000000486E000-memory.dmp family_redline behavioral1/memory/2124-153-0x0000000004830000-0x000000000486E000-memory.dmp family_redline behavioral1/memory/2124-157-0x0000000004830000-0x000000000486E000-memory.dmp family_redline behavioral1/memory/2124-160-0x0000000004830000-0x000000000486E000-memory.dmp family_redline behavioral1/memory/2124-162-0x0000000004830000-0x000000000486E000-memory.dmp family_redline behavioral1/memory/2124-164-0x0000000004830000-0x000000000486E000-memory.dmp family_redline behavioral1/memory/2124-166-0x0000000004830000-0x000000000486E000-memory.dmp family_redline behavioral1/memory/2124-168-0x0000000004830000-0x000000000486E000-memory.dmp family_redline behavioral1/memory/2124-170-0x0000000004830000-0x000000000486E000-memory.dmp family_redline behavioral1/memory/2124-172-0x0000000004830000-0x000000000486E000-memory.dmp family_redline behavioral1/memory/2124-176-0x0000000004830000-0x000000000486E000-memory.dmp family_redline behavioral1/memory/2124-178-0x0000000004830000-0x000000000486E000-memory.dmp family_redline behavioral1/memory/2124-184-0x0000000004830000-0x000000000486E000-memory.dmp family_redline behavioral1/memory/2124-182-0x0000000004830000-0x000000000486E000-memory.dmp family_redline behavioral1/memory/2124-186-0x0000000004830000-0x000000000486E000-memory.dmp family_redline behavioral1/memory/2124-180-0x0000000004830000-0x000000000486E000-memory.dmp family_redline behavioral1/memory/2124-188-0x0000000004830000-0x000000000486E000-memory.dmp family_redline behavioral1/memory/2124-190-0x0000000004830000-0x000000000486E000-memory.dmp family_redline behavioral1/memory/2124-192-0x0000000004830000-0x000000000486E000-memory.dmp family_redline behavioral1/memory/2124-196-0x0000000004830000-0x000000000486E000-memory.dmp family_redline behavioral1/memory/2124-198-0x0000000004830000-0x000000000486E000-memory.dmp family_redline behavioral1/memory/2124-194-0x0000000004830000-0x000000000486E000-memory.dmp family_redline behavioral1/memory/2124-174-0x0000000004830000-0x000000000486E000-memory.dmp family_redline behavioral1/memory/2124-206-0x0000000004830000-0x000000000486E000-memory.dmp family_redline behavioral1/memory/2124-204-0x0000000004830000-0x000000000486E000-memory.dmp family_redline behavioral1/memory/2124-210-0x0000000004830000-0x000000000486E000-memory.dmp family_redline behavioral1/memory/2124-208-0x0000000004830000-0x000000000486E000-memory.dmp family_redline behavioral1/memory/2124-202-0x0000000004830000-0x000000000486E000-memory.dmp family_redline behavioral1/memory/2124-200-0x0000000004830000-0x000000000486E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2436 vhhg9868ym.exe 2524 sf30dJ52sJ80.exe 2124 tf20pW60EE15.exe 4900 uhRs12xk18Ll.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sf30dJ52sJ80.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 005246f6e658ffe0a40c332315f6d49eaef689cacbfdbf3b8a75e8342fa719cb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 005246f6e658ffe0a40c332315f6d49eaef689cacbfdbf3b8a75e8342fa719cb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vhhg9868ym.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vhhg9868ym.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2524 sf30dJ52sJ80.exe 2524 sf30dJ52sJ80.exe 2124 tf20pW60EE15.exe 2124 tf20pW60EE15.exe 4900 uhRs12xk18Ll.exe 4900 uhRs12xk18Ll.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2524 sf30dJ52sJ80.exe Token: SeDebugPrivilege 2124 tf20pW60EE15.exe Token: SeDebugPrivilege 4900 uhRs12xk18Ll.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2436 2204 005246f6e658ffe0a40c332315f6d49eaef689cacbfdbf3b8a75e8342fa719cb.exe 66 PID 2204 wrote to memory of 2436 2204 005246f6e658ffe0a40c332315f6d49eaef689cacbfdbf3b8a75e8342fa719cb.exe 66 PID 2204 wrote to memory of 2436 2204 005246f6e658ffe0a40c332315f6d49eaef689cacbfdbf3b8a75e8342fa719cb.exe 66 PID 2436 wrote to memory of 2524 2436 vhhg9868ym.exe 67 PID 2436 wrote to memory of 2524 2436 vhhg9868ym.exe 67 PID 2436 wrote to memory of 2124 2436 vhhg9868ym.exe 68 PID 2436 wrote to memory of 2124 2436 vhhg9868ym.exe 68 PID 2436 wrote to memory of 2124 2436 vhhg9868ym.exe 68 PID 2204 wrote to memory of 4900 2204 005246f6e658ffe0a40c332315f6d49eaef689cacbfdbf3b8a75e8342fa719cb.exe 70 PID 2204 wrote to memory of 4900 2204 005246f6e658ffe0a40c332315f6d49eaef689cacbfdbf3b8a75e8342fa719cb.exe 70 PID 2204 wrote to memory of 4900 2204 005246f6e658ffe0a40c332315f6d49eaef689cacbfdbf3b8a75e8342fa719cb.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\005246f6e658ffe0a40c332315f6d49eaef689cacbfdbf3b8a75e8342fa719cb.exe"C:\Users\Admin\AppData\Local\Temp\005246f6e658ffe0a40c332315f6d49eaef689cacbfdbf3b8a75e8342fa719cb.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhhg9868ym.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhhg9868ym.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf30dJ52sJ80.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf30dJ52sJ80.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2524
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf20pW60EE15.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf20pW60EE15.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2124
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhRs12xk18Ll.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhRs12xk18Ll.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4900
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5b2fc4a89ebf383e80ff75e850d6c1d02
SHA1a3cfde511237ad97f4a6e949d15a5ccb8d6e020d
SHA256ce873ffba669a05cac4742ee6a0a89b641a3d3d8039115e089d00446ebc721bf
SHA5120a60fba5bdcc5a9f035dce3caa1acf82f604007cd5241e0704e6fdd7057f306605c6e1ab383fffa3af992311a1c67fac012eb5795b4c8396ffb07fcd46c1821d
-
Filesize
175KB
MD5b2fc4a89ebf383e80ff75e850d6c1d02
SHA1a3cfde511237ad97f4a6e949d15a5ccb8d6e020d
SHA256ce873ffba669a05cac4742ee6a0a89b641a3d3d8039115e089d00446ebc721bf
SHA5120a60fba5bdcc5a9f035dce3caa1acf82f604007cd5241e0704e6fdd7057f306605c6e1ab383fffa3af992311a1c67fac012eb5795b4c8396ffb07fcd46c1821d
-
Filesize
415KB
MD52028d0c150da8bdc3f8f8c1b074c19c5
SHA1ad3c40217d601a75b91e022e601a8240688b48d9
SHA256ed5caf2f46b024f50cf772f732fe8669b69b72916926e40b2ea4d3985d7929a1
SHA512bdbee21ca730693ae45dc739d93e6520155717ca1356788eef9775ace0295955c9879718d3dd27d1c6d23440345317de942b648d1d87280afe28ab14f4bde8f9
-
Filesize
415KB
MD52028d0c150da8bdc3f8f8c1b074c19c5
SHA1ad3c40217d601a75b91e022e601a8240688b48d9
SHA256ed5caf2f46b024f50cf772f732fe8669b69b72916926e40b2ea4d3985d7929a1
SHA512bdbee21ca730693ae45dc739d93e6520155717ca1356788eef9775ace0295955c9879718d3dd27d1c6d23440345317de942b648d1d87280afe28ab14f4bde8f9
-
Filesize
11KB
MD5c980f9b51f735536cb17f33896f058f5
SHA18bb70679a73bf5239032ecde2bc9958f1811dbe7
SHA2568c5ce5f2fce798c91cb265b84aea50262834c4e3399d28efece531e8209a8c66
SHA5125435e6993a4bdc23e93cf3bef623cb5493d37ecf79532316f583a7f1ff2355ca676e3b1f05740a54bd8eb36c86e3169c9f5663ec5ce8bb1f363e254f4461546d
-
Filesize
11KB
MD5c980f9b51f735536cb17f33896f058f5
SHA18bb70679a73bf5239032ecde2bc9958f1811dbe7
SHA2568c5ce5f2fce798c91cb265b84aea50262834c4e3399d28efece531e8209a8c66
SHA5125435e6993a4bdc23e93cf3bef623cb5493d37ecf79532316f583a7f1ff2355ca676e3b1f05740a54bd8eb36c86e3169c9f5663ec5ce8bb1f363e254f4461546d
-
Filesize
416KB
MD59ce8c74a533c9909e622ad2c5700ca63
SHA1bcce3e38eaf3c3b741bad36507671231d94ef844
SHA256a41658d0c260a9fa32e4797a385856dcbcd11ec5afd2135cee0f69ee6a52576d
SHA51298491caf62c0bfd90a89e3172801096e12328a4ac379f99a6895db5d85eb70468ccede97678b46eceabdc419d1114f3da59b9e72d68847be2384c58169cb0e73
-
Filesize
416KB
MD59ce8c74a533c9909e622ad2c5700ca63
SHA1bcce3e38eaf3c3b741bad36507671231d94ef844
SHA256a41658d0c260a9fa32e4797a385856dcbcd11ec5afd2135cee0f69ee6a52576d
SHA51298491caf62c0bfd90a89e3172801096e12328a4ac379f99a6895db5d85eb70468ccede97678b46eceabdc419d1114f3da59b9e72d68847be2384c58169cb0e73