Analysis
-
max time kernel
142s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-03-2023 12:40
Static task
static1
Behavioral task
behavioral1
Sample
b9462d962545ea8c887d588a62ffb218b60af7da0c7be9886f4df6e8cf0f4f96.exe
Resource
win10v2004-20230220-en
General
-
Target
b9462d962545ea8c887d588a62ffb218b60af7da0c7be9886f4df6e8cf0f4f96.exe
-
Size
560KB
-
MD5
f7d6e41f97b216302defeda03e3bab37
-
SHA1
0a59320e832351f1bd63538cd38a164f5957bcd5
-
SHA256
b9462d962545ea8c887d588a62ffb218b60af7da0c7be9886f4df6e8cf0f4f96
-
SHA512
29197448000a20a239f0c86a2bfe1f500d9507aeaebd7cc84a0c6a8a472ef97e98a781e327ad535cc18d29efd7266044f5bf6f7a5bdec5dd74b1b040a0b5a5de
-
SSDEEP
12288:JMrWy90BHwABGoo8QUseVgko8Fo3mGRnBM82elP8LTROq2u:ry4XxoDe1oH37p2eET5
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Extracted
redline
fabio
193.233.20.27:4123
-
auth_value
56b82736c3f56b13be8e64c87d2cf9e5
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sf04oS05pP43.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sf04oS05pP43.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sf04oS05pP43.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sf04oS05pP43.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sf04oS05pP43.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sf04oS05pP43.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/3336-156-0x0000000007920000-0x000000000795E000-memory.dmp family_redline behavioral1/memory/3336-157-0x0000000007920000-0x000000000795E000-memory.dmp family_redline behavioral1/memory/3336-159-0x0000000007920000-0x000000000795E000-memory.dmp family_redline behavioral1/memory/3336-161-0x0000000007920000-0x000000000795E000-memory.dmp family_redline behavioral1/memory/3336-163-0x0000000007920000-0x000000000795E000-memory.dmp family_redline behavioral1/memory/3336-165-0x0000000007920000-0x000000000795E000-memory.dmp family_redline behavioral1/memory/3336-167-0x0000000007920000-0x000000000795E000-memory.dmp family_redline behavioral1/memory/3336-169-0x0000000007920000-0x000000000795E000-memory.dmp family_redline behavioral1/memory/3336-171-0x0000000007920000-0x000000000795E000-memory.dmp family_redline behavioral1/memory/3336-173-0x0000000007920000-0x000000000795E000-memory.dmp family_redline behavioral1/memory/3336-175-0x0000000007920000-0x000000000795E000-memory.dmp family_redline behavioral1/memory/3336-177-0x0000000007920000-0x000000000795E000-memory.dmp family_redline behavioral1/memory/3336-179-0x0000000007920000-0x000000000795E000-memory.dmp family_redline behavioral1/memory/3336-181-0x0000000007920000-0x000000000795E000-memory.dmp family_redline behavioral1/memory/3336-183-0x0000000007920000-0x000000000795E000-memory.dmp family_redline behavioral1/memory/3336-187-0x0000000007920000-0x000000000795E000-memory.dmp family_redline behavioral1/memory/3336-185-0x0000000007920000-0x000000000795E000-memory.dmp family_redline behavioral1/memory/3336-189-0x0000000007920000-0x000000000795E000-memory.dmp family_redline behavioral1/memory/3336-191-0x0000000007920000-0x000000000795E000-memory.dmp family_redline behavioral1/memory/3336-193-0x0000000007920000-0x000000000795E000-memory.dmp family_redline behavioral1/memory/3336-195-0x0000000007920000-0x000000000795E000-memory.dmp family_redline behavioral1/memory/3336-197-0x0000000007920000-0x000000000795E000-memory.dmp family_redline behavioral1/memory/3336-199-0x0000000007920000-0x000000000795E000-memory.dmp family_redline behavioral1/memory/3336-201-0x0000000007920000-0x000000000795E000-memory.dmp family_redline behavioral1/memory/3336-203-0x0000000007920000-0x000000000795E000-memory.dmp family_redline behavioral1/memory/3336-205-0x0000000007920000-0x000000000795E000-memory.dmp family_redline behavioral1/memory/3336-207-0x0000000007920000-0x000000000795E000-memory.dmp family_redline behavioral1/memory/3336-209-0x0000000007920000-0x000000000795E000-memory.dmp family_redline behavioral1/memory/3336-211-0x0000000007920000-0x000000000795E000-memory.dmp family_redline behavioral1/memory/3336-213-0x0000000007920000-0x000000000795E000-memory.dmp family_redline behavioral1/memory/3336-215-0x0000000007920000-0x000000000795E000-memory.dmp family_redline behavioral1/memory/3336-217-0x0000000007920000-0x000000000795E000-memory.dmp family_redline behavioral1/memory/3336-219-0x0000000007920000-0x000000000795E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 868 vhOD4908om.exe 368 sf04oS05pP43.exe 3336 tf49hV78AQ47.exe 3112 uhAU25FB80HF.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sf04oS05pP43.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b9462d962545ea8c887d588a62ffb218b60af7da0c7be9886f4df6e8cf0f4f96.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vhOD4908om.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vhOD4908om.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b9462d962545ea8c887d588a62ffb218b60af7da0c7be9886f4df6e8cf0f4f96.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2096 3336 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 368 sf04oS05pP43.exe 368 sf04oS05pP43.exe 3336 tf49hV78AQ47.exe 3336 tf49hV78AQ47.exe 3112 uhAU25FB80HF.exe 3112 uhAU25FB80HF.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 368 sf04oS05pP43.exe Token: SeDebugPrivilege 3336 tf49hV78AQ47.exe Token: SeDebugPrivilege 3112 uhAU25FB80HF.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1036 wrote to memory of 868 1036 b9462d962545ea8c887d588a62ffb218b60af7da0c7be9886f4df6e8cf0f4f96.exe 85 PID 1036 wrote to memory of 868 1036 b9462d962545ea8c887d588a62ffb218b60af7da0c7be9886f4df6e8cf0f4f96.exe 85 PID 1036 wrote to memory of 868 1036 b9462d962545ea8c887d588a62ffb218b60af7da0c7be9886f4df6e8cf0f4f96.exe 85 PID 868 wrote to memory of 368 868 vhOD4908om.exe 86 PID 868 wrote to memory of 368 868 vhOD4908om.exe 86 PID 868 wrote to memory of 3336 868 vhOD4908om.exe 92 PID 868 wrote to memory of 3336 868 vhOD4908om.exe 92 PID 868 wrote to memory of 3336 868 vhOD4908om.exe 92 PID 1036 wrote to memory of 3112 1036 b9462d962545ea8c887d588a62ffb218b60af7da0c7be9886f4df6e8cf0f4f96.exe 95 PID 1036 wrote to memory of 3112 1036 b9462d962545ea8c887d588a62ffb218b60af7da0c7be9886f4df6e8cf0f4f96.exe 95 PID 1036 wrote to memory of 3112 1036 b9462d962545ea8c887d588a62ffb218b60af7da0c7be9886f4df6e8cf0f4f96.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9462d962545ea8c887d588a62ffb218b60af7da0c7be9886f4df6e8cf0f4f96.exe"C:\Users\Admin\AppData\Local\Temp\b9462d962545ea8c887d588a62ffb218b60af7da0c7be9886f4df6e8cf0f4f96.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhOD4908om.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhOD4908om.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf04oS05pP43.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf04oS05pP43.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:368
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf49hV78AQ47.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf49hV78AQ47.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3336 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3336 -s 13604⤵
- Program crash
PID:2096
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhAU25FB80HF.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhAU25FB80HF.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3336 -ip 33361⤵PID:4220
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD583c79b4efbf772201aec168bf28f02f4
SHA14b0335879698f789f640b9522f79bafd79001071
SHA256f296295c63b3b774f3307456b0b7522b51ccadf6784ad57f08b63432fdac42a3
SHA512d164687a8b7cf1561cc31faca95fb735edd4624c5de1f7c4e76f0cebcca7ca8f1398681aa068056849e49f721aaa90fae1870bb59d13836edd1b9c761da51578
-
Filesize
176KB
MD583c79b4efbf772201aec168bf28f02f4
SHA14b0335879698f789f640b9522f79bafd79001071
SHA256f296295c63b3b774f3307456b0b7522b51ccadf6784ad57f08b63432fdac42a3
SHA512d164687a8b7cf1561cc31faca95fb735edd4624c5de1f7c4e76f0cebcca7ca8f1398681aa068056849e49f721aaa90fae1870bb59d13836edd1b9c761da51578
-
Filesize
416KB
MD5a00f2a0c1548e1557c8f2d2d04e03cc3
SHA17505789b374f56f9327f8bc1c596fafdb3cb4225
SHA2564f79112ad10172a7fcb9df63d7d0167d22c9b00a7a32cbc203167345be1bb912
SHA51270e93984af9aac359503d0f356c3e76fd2ddbabe1f49d35b374c0ad0cb410ff026eabed72de9f93ab74d695af3897d0b1e3c839274a66994cd2e84c9f2381ac9
-
Filesize
416KB
MD5a00f2a0c1548e1557c8f2d2d04e03cc3
SHA17505789b374f56f9327f8bc1c596fafdb3cb4225
SHA2564f79112ad10172a7fcb9df63d7d0167d22c9b00a7a32cbc203167345be1bb912
SHA51270e93984af9aac359503d0f356c3e76fd2ddbabe1f49d35b374c0ad0cb410ff026eabed72de9f93ab74d695af3897d0b1e3c839274a66994cd2e84c9f2381ac9
-
Filesize
11KB
MD577c06d90742d8a47aaa9a0de251e354c
SHA17093e1dfd6707015b4d55e0cae3bd895de53ef97
SHA256d26e443a261981f9b6d556f0ffa0afea82e397b727b99910706252cb1b3bd012
SHA5123e10d699112f347f9e1706339222a3ae1776b8540480466f065d208be9283bd52492387c80e713ec2dca576093c24e889a63150683853798b46535dbd509268f
-
Filesize
11KB
MD577c06d90742d8a47aaa9a0de251e354c
SHA17093e1dfd6707015b4d55e0cae3bd895de53ef97
SHA256d26e443a261981f9b6d556f0ffa0afea82e397b727b99910706252cb1b3bd012
SHA5123e10d699112f347f9e1706339222a3ae1776b8540480466f065d208be9283bd52492387c80e713ec2dca576093c24e889a63150683853798b46535dbd509268f
-
Filesize
415KB
MD579645f4c4f6de9b74ca0120b7a2ff217
SHA1e093a94b5415be8ebbc90a52807b811eb339823e
SHA256cfa90800c04f1f257f52d7f8d63b001b37796b3f1da67b271d6c76feeda8306a
SHA51213ae7f81ffa0ff1196334f870cdcaa7ac46be0bd6de36caceda5251b77a3dac0ccc8b33dc2ec7ca4a06bb96bf5017d68ea74ba373ebcdebf0e9318bb11803cd0
-
Filesize
415KB
MD579645f4c4f6de9b74ca0120b7a2ff217
SHA1e093a94b5415be8ebbc90a52807b811eb339823e
SHA256cfa90800c04f1f257f52d7f8d63b001b37796b3f1da67b271d6c76feeda8306a
SHA51213ae7f81ffa0ff1196334f870cdcaa7ac46be0bd6de36caceda5251b77a3dac0ccc8b33dc2ec7ca4a06bb96bf5017d68ea74ba373ebcdebf0e9318bb11803cd0