Analysis
-
max time kernel
90s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
06-03-2023 15:30
Static task
static1
Behavioral task
behavioral1
Sample
72f340a036eb778b8e1e147d149b2877dcc15a6dbab538c12699437ecad4f2f9.exe
Resource
win10v2004-20230221-en
General
-
Target
72f340a036eb778b8e1e147d149b2877dcc15a6dbab538c12699437ecad4f2f9.exe
-
Size
561KB
-
MD5
a914ba69b31d026f95b8bbc7979e9192
-
SHA1
b15ffd47edd1ab0a50f7864f59ce39d0f7b5cf1a
-
SHA256
72f340a036eb778b8e1e147d149b2877dcc15a6dbab538c12699437ecad4f2f9
-
SHA512
e81c2cf37bbf9b6dee0c872f4aa0a85fdcd03071175554e983c59fd92176ffbf9ac67d3f5dcb9d440068895fd46256c09538ec939363736d189eaa66e22818ca
-
SSDEEP
12288:sMr6y90yrie/ODYUlKxaPLLwRrxI0Vb+Udf:Wy1rRrUcaPwFu0iUdf
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Extracted
redline
fabio
193.233.20.27:4123
-
auth_value
56b82736c3f56b13be8e64c87d2cf9e5
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sf60mN16XA90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sf60mN16XA90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sf60mN16XA90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sf60mN16XA90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sf60mN16XA90.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sf60mN16XA90.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/4772-158-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/4772-159-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/4772-161-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/4772-163-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/4772-165-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/4772-167-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/4772-169-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/4772-171-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/4772-173-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/4772-175-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/4772-177-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/4772-179-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/4772-181-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/4772-183-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/4772-185-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/4772-187-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/4772-189-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/4772-191-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/4772-193-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/4772-195-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/4772-197-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/4772-199-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/4772-201-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/4772-203-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/4772-205-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/4772-207-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/4772-209-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/4772-211-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/4772-213-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/4772-215-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/4772-217-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/4772-219-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/4772-221-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2848 vhkj7484EY.exe 5060 sf60mN16XA90.exe 4772 tf51dY77vC73.exe 4964 uhgu57gW44vV.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sf60mN16XA90.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 72f340a036eb778b8e1e147d149b2877dcc15a6dbab538c12699437ecad4f2f9.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vhkj7484EY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vhkj7484EY.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 72f340a036eb778b8e1e147d149b2877dcc15a6dbab538c12699437ecad4f2f9.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4724 4772 WerFault.exe 84 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5060 sf60mN16XA90.exe 5060 sf60mN16XA90.exe 4772 tf51dY77vC73.exe 4772 tf51dY77vC73.exe 4964 uhgu57gW44vV.exe 4964 uhgu57gW44vV.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5060 sf60mN16XA90.exe Token: SeDebugPrivilege 4772 tf51dY77vC73.exe Token: SeDebugPrivilege 4964 uhgu57gW44vV.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3528 wrote to memory of 2848 3528 72f340a036eb778b8e1e147d149b2877dcc15a6dbab538c12699437ecad4f2f9.exe 82 PID 3528 wrote to memory of 2848 3528 72f340a036eb778b8e1e147d149b2877dcc15a6dbab538c12699437ecad4f2f9.exe 82 PID 3528 wrote to memory of 2848 3528 72f340a036eb778b8e1e147d149b2877dcc15a6dbab538c12699437ecad4f2f9.exe 82 PID 2848 wrote to memory of 5060 2848 vhkj7484EY.exe 83 PID 2848 wrote to memory of 5060 2848 vhkj7484EY.exe 83 PID 2848 wrote to memory of 4772 2848 vhkj7484EY.exe 84 PID 2848 wrote to memory of 4772 2848 vhkj7484EY.exe 84 PID 2848 wrote to memory of 4772 2848 vhkj7484EY.exe 84 PID 3528 wrote to memory of 4964 3528 72f340a036eb778b8e1e147d149b2877dcc15a6dbab538c12699437ecad4f2f9.exe 91 PID 3528 wrote to memory of 4964 3528 72f340a036eb778b8e1e147d149b2877dcc15a6dbab538c12699437ecad4f2f9.exe 91 PID 3528 wrote to memory of 4964 3528 72f340a036eb778b8e1e147d149b2877dcc15a6dbab538c12699437ecad4f2f9.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\72f340a036eb778b8e1e147d149b2877dcc15a6dbab538c12699437ecad4f2f9.exe"C:\Users\Admin\AppData\Local\Temp\72f340a036eb778b8e1e147d149b2877dcc15a6dbab538c12699437ecad4f2f9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhkj7484EY.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhkj7484EY.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf60mN16XA90.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf60mN16XA90.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5060
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf51dY77vC73.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf51dY77vC73.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4772 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4772 -s 13484⤵
- Program crash
PID:4724
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhgu57gW44vV.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhgu57gW44vV.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4772 -ip 47721⤵PID:4556
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD5d4fc510335949c387e03829b383de43c
SHA172ee0f28feb55609c1a7ec319721f3c39c9da46e
SHA2567edb759f56cb64cb102b34bd9dced93faacb39fffc1e036cffad7169b6183d9c
SHA512b4021a1b5469588a138d78731071c86535275fc5610d240bb4599016a741c54ecd95ed4f3e1292d1ea0ec41c9427ec1a5c97f3089cfeba25652a168f1ff81319
-
Filesize
176KB
MD5d4fc510335949c387e03829b383de43c
SHA172ee0f28feb55609c1a7ec319721f3c39c9da46e
SHA2567edb759f56cb64cb102b34bd9dced93faacb39fffc1e036cffad7169b6183d9c
SHA512b4021a1b5469588a138d78731071c86535275fc5610d240bb4599016a741c54ecd95ed4f3e1292d1ea0ec41c9427ec1a5c97f3089cfeba25652a168f1ff81319
-
Filesize
417KB
MD5bf557664a7de13ccc9345e819ae13c3e
SHA17ee0f7dabe3e4d3096f35ca949444aff25d4dd09
SHA2565facbbbd6bd10a8a42a1de180714b2048bb63a3e32336eaa979614023752dc5b
SHA5120355ac2c966376b0a63dee43872d55b0d5f6c9fea26239dbf70435efa246b3258b1e8b173b5030dfebbf6cc45c60b66c222d16bfe6e45e56c99fc326094e133b
-
Filesize
417KB
MD5bf557664a7de13ccc9345e819ae13c3e
SHA17ee0f7dabe3e4d3096f35ca949444aff25d4dd09
SHA2565facbbbd6bd10a8a42a1de180714b2048bb63a3e32336eaa979614023752dc5b
SHA5120355ac2c966376b0a63dee43872d55b0d5f6c9fea26239dbf70435efa246b3258b1e8b173b5030dfebbf6cc45c60b66c222d16bfe6e45e56c99fc326094e133b
-
Filesize
11KB
MD5bd54d4b6d2cb5901604bcc2a5863ccf8
SHA184e2ae749b37e4643c248782ce63c7def197c152
SHA256b8a2f4c7d66da807cd608860844105396d09203aad100f6970483d737490b372
SHA51209483ce50f32c3c27d0477ed758b78c7c8f098756e2edec6a544345c7434336ce100a4f155dbce473ffdb1f42fe3a310b259d79c2032a895283f12fb85d8e47a
-
Filesize
11KB
MD5bd54d4b6d2cb5901604bcc2a5863ccf8
SHA184e2ae749b37e4643c248782ce63c7def197c152
SHA256b8a2f4c7d66da807cd608860844105396d09203aad100f6970483d737490b372
SHA51209483ce50f32c3c27d0477ed758b78c7c8f098756e2edec6a544345c7434336ce100a4f155dbce473ffdb1f42fe3a310b259d79c2032a895283f12fb85d8e47a
-
Filesize
420KB
MD526c4ff23e7d77f037b4cf034354d85b2
SHA1c6596b283bc440832c9baf35453ebc4d9fb70115
SHA25661a27dc04dc6709f1cd05c3b9bd7bae777e915f524decb5948c8cb8f26ff2b19
SHA512c2befc78aa793989b2838803971cd9675a35c1c657a127a69f4bbbd852b77f79df2d733b934d1411b07fe7f01f75359749382be7e8b0c6c9d2b582a5423fc1f9
-
Filesize
420KB
MD526c4ff23e7d77f037b4cf034354d85b2
SHA1c6596b283bc440832c9baf35453ebc4d9fb70115
SHA25661a27dc04dc6709f1cd05c3b9bd7bae777e915f524decb5948c8cb8f26ff2b19
SHA512c2befc78aa793989b2838803971cd9675a35c1c657a127a69f4bbbd852b77f79df2d733b934d1411b07fe7f01f75359749382be7e8b0c6c9d2b582a5423fc1f9