Analysis
-
max time kernel
118s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2023, 17:55
Static task
static1
Behavioral task
behavioral1
Sample
27f1a39fbbf89ad3ba78511891f685d69a58750589eb4ebb3a5240e1291799ed.exe
Resource
win10v2004-20230220-en
General
-
Target
27f1a39fbbf89ad3ba78511891f685d69a58750589eb4ebb3a5240e1291799ed.exe
-
Size
562KB
-
MD5
d7d67929d80a9dd8de43103b2e5c6fe0
-
SHA1
02d3c4be29fe54b64a45ada729f353b5ad4576e6
-
SHA256
27f1a39fbbf89ad3ba78511891f685d69a58750589eb4ebb3a5240e1291799ed
-
SHA512
1a9ac2cca28edbe4decfe3cb715d32a7645d1675ed429fd3a344f32a8a15f6c4285663e9007576755fdbab53baa9702a22bf806371c88eee6846e15378b0082f
-
SSDEEP
12288:PMr7y90UEJjPPyz4L8NnL/ylYYyn01FLloDjf0T:4y7E5PE4LsnL/yW0zLlUze
Malware Config
Extracted
redline
fabio
193.233.20.27:4123
-
auth_value
56b82736c3f56b13be8e64c87d2cf9e5
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sf01tV56RH88.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sf01tV56RH88.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sf01tV56RH88.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sf01tV56RH88.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sf01tV56RH88.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sf01tV56RH88.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 32 IoCs
resource yara_rule behavioral1/memory/2612-167-0x0000000004F60000-0x0000000004F9E000-memory.dmp family_redline behavioral1/memory/2612-165-0x0000000004F60000-0x0000000004F9E000-memory.dmp family_redline behavioral1/memory/2612-170-0x0000000002280000-0x0000000002290000-memory.dmp family_redline behavioral1/memory/2612-171-0x0000000004F60000-0x0000000004F9E000-memory.dmp family_redline behavioral1/memory/2612-173-0x0000000004F60000-0x0000000004F9E000-memory.dmp family_redline behavioral1/memory/2612-176-0x0000000004F60000-0x0000000004F9E000-memory.dmp family_redline behavioral1/memory/2612-180-0x0000000004F60000-0x0000000004F9E000-memory.dmp family_redline behavioral1/memory/2612-182-0x0000000004F60000-0x0000000004F9E000-memory.dmp family_redline behavioral1/memory/2612-185-0x0000000004F60000-0x0000000004F9E000-memory.dmp family_redline behavioral1/memory/2612-187-0x0000000004F60000-0x0000000004F9E000-memory.dmp family_redline behavioral1/memory/2612-189-0x0000000004F60000-0x0000000004F9E000-memory.dmp family_redline behavioral1/memory/2612-191-0x0000000004F60000-0x0000000004F9E000-memory.dmp family_redline behavioral1/memory/2612-193-0x0000000004F60000-0x0000000004F9E000-memory.dmp family_redline behavioral1/memory/2612-198-0x0000000004F60000-0x0000000004F9E000-memory.dmp family_redline behavioral1/memory/2612-196-0x0000000004F60000-0x0000000004F9E000-memory.dmp family_redline behavioral1/memory/2612-200-0x0000000004F60000-0x0000000004F9E000-memory.dmp family_redline behavioral1/memory/2612-202-0x0000000004F60000-0x0000000004F9E000-memory.dmp family_redline behavioral1/memory/2612-204-0x0000000004F60000-0x0000000004F9E000-memory.dmp family_redline behavioral1/memory/2612-206-0x0000000004F60000-0x0000000004F9E000-memory.dmp family_redline behavioral1/memory/2612-208-0x0000000004F60000-0x0000000004F9E000-memory.dmp family_redline behavioral1/memory/2612-210-0x0000000004F60000-0x0000000004F9E000-memory.dmp family_redline behavioral1/memory/2612-212-0x0000000004F60000-0x0000000004F9E000-memory.dmp family_redline behavioral1/memory/2612-214-0x0000000004F60000-0x0000000004F9E000-memory.dmp family_redline behavioral1/memory/2612-216-0x0000000004F60000-0x0000000004F9E000-memory.dmp family_redline behavioral1/memory/2612-218-0x0000000004F60000-0x0000000004F9E000-memory.dmp family_redline behavioral1/memory/2612-220-0x0000000004F60000-0x0000000004F9E000-memory.dmp family_redline behavioral1/memory/2612-222-0x0000000004F60000-0x0000000004F9E000-memory.dmp family_redline behavioral1/memory/2612-224-0x0000000004F60000-0x0000000004F9E000-memory.dmp family_redline behavioral1/memory/2612-226-0x0000000004F60000-0x0000000004F9E000-memory.dmp family_redline behavioral1/memory/2612-228-0x0000000004F60000-0x0000000004F9E000-memory.dmp family_redline behavioral1/memory/2612-230-0x0000000004F60000-0x0000000004F9E000-memory.dmp family_redline behavioral1/memory/2612-232-0x0000000004F60000-0x0000000004F9E000-memory.dmp family_redline -
Executes dropped EXE 5 IoCs
pid Process 2096 vhUf0497Fh.exe 2444 sf01tV56RH88.exe 2148 tf12Mj80Wb42.exe 2612 tf12Mj80Wb42.exe 3640 uhky53Bv03dE.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sf01tV56RH88.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vhUf0497Fh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 27f1a39fbbf89ad3ba78511891f685d69a58750589eb4ebb3a5240e1291799ed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 27f1a39fbbf89ad3ba78511891f685d69a58750589eb4ebb3a5240e1291799ed.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vhUf0497Fh.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2148 set thread context of 2612 2148 tf12Mj80Wb42.exe 94 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2444 sf01tV56RH88.exe 2444 sf01tV56RH88.exe 3640 uhky53Bv03dE.exe 3640 uhky53Bv03dE.exe 2612 tf12Mj80Wb42.exe 2612 tf12Mj80Wb42.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2444 sf01tV56RH88.exe Token: SeDebugPrivilege 2612 tf12Mj80Wb42.exe Token: SeDebugPrivilege 3640 uhky53Bv03dE.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1944 wrote to memory of 2096 1944 27f1a39fbbf89ad3ba78511891f685d69a58750589eb4ebb3a5240e1291799ed.exe 86 PID 1944 wrote to memory of 2096 1944 27f1a39fbbf89ad3ba78511891f685d69a58750589eb4ebb3a5240e1291799ed.exe 86 PID 1944 wrote to memory of 2096 1944 27f1a39fbbf89ad3ba78511891f685d69a58750589eb4ebb3a5240e1291799ed.exe 86 PID 2096 wrote to memory of 2444 2096 vhUf0497Fh.exe 87 PID 2096 wrote to memory of 2444 2096 vhUf0497Fh.exe 87 PID 2096 wrote to memory of 2148 2096 vhUf0497Fh.exe 93 PID 2096 wrote to memory of 2148 2096 vhUf0497Fh.exe 93 PID 2096 wrote to memory of 2148 2096 vhUf0497Fh.exe 93 PID 2148 wrote to memory of 2612 2148 tf12Mj80Wb42.exe 94 PID 2148 wrote to memory of 2612 2148 tf12Mj80Wb42.exe 94 PID 2148 wrote to memory of 2612 2148 tf12Mj80Wb42.exe 94 PID 2148 wrote to memory of 2612 2148 tf12Mj80Wb42.exe 94 PID 2148 wrote to memory of 2612 2148 tf12Mj80Wb42.exe 94 PID 2148 wrote to memory of 2612 2148 tf12Mj80Wb42.exe 94 PID 2148 wrote to memory of 2612 2148 tf12Mj80Wb42.exe 94 PID 2148 wrote to memory of 2612 2148 tf12Mj80Wb42.exe 94 PID 2148 wrote to memory of 2612 2148 tf12Mj80Wb42.exe 94 PID 1944 wrote to memory of 3640 1944 27f1a39fbbf89ad3ba78511891f685d69a58750589eb4ebb3a5240e1291799ed.exe 95 PID 1944 wrote to memory of 3640 1944 27f1a39fbbf89ad3ba78511891f685d69a58750589eb4ebb3a5240e1291799ed.exe 95 PID 1944 wrote to memory of 3640 1944 27f1a39fbbf89ad3ba78511891f685d69a58750589eb4ebb3a5240e1291799ed.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\27f1a39fbbf89ad3ba78511891f685d69a58750589eb4ebb3a5240e1291799ed.exe"C:\Users\Admin\AppData\Local\Temp\27f1a39fbbf89ad3ba78511891f685d69a58750589eb4ebb3a5240e1291799ed.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhUf0497Fh.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhUf0497Fh.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf01tV56RH88.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf01tV56RH88.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2444
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf12Mj80Wb42.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf12Mj80Wb42.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf12Mj80Wb42.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf12Mj80Wb42.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2612
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhky53Bv03dE.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhky53Bv03dE.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3640
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD5419a48ebe5452f8af10fafc1bac94359
SHA1a62c08978b0ba0d6057ccc2551848032403ff0c8
SHA256be5ab1ab600697fb895d51eb9829bec49fc56c4b3e3bf383cf409025bf3e6906
SHA5123778d40e04f61316203ee073c892ecdd91e32edf7be56044c2249dfda9a1860fe15130111821b5b33bd346796ff803483c71ce2954923cff3acccfdc95ae77f1
-
Filesize
176KB
MD5419a48ebe5452f8af10fafc1bac94359
SHA1a62c08978b0ba0d6057ccc2551848032403ff0c8
SHA256be5ab1ab600697fb895d51eb9829bec49fc56c4b3e3bf383cf409025bf3e6906
SHA5123778d40e04f61316203ee073c892ecdd91e32edf7be56044c2249dfda9a1860fe15130111821b5b33bd346796ff803483c71ce2954923cff3acccfdc95ae77f1
-
Filesize
417KB
MD565340dcae151fcfa3a5ed1b0d92f4a77
SHA1810bd330b02927af519b7a1bb324c53b11bf9044
SHA2565937b94037a4804fe6e4bdb5fc66174965fe421f6cae5f7dc9622113442820fa
SHA512de4b5925aef337f1f38441e7988077f16e153893d92cb76c64f7bfd50c15dd8b52620221f24860275b3c6a8342ef5b1b1bc82d0276f94ca5233edef2afe763f4
-
Filesize
417KB
MD565340dcae151fcfa3a5ed1b0d92f4a77
SHA1810bd330b02927af519b7a1bb324c53b11bf9044
SHA2565937b94037a4804fe6e4bdb5fc66174965fe421f6cae5f7dc9622113442820fa
SHA512de4b5925aef337f1f38441e7988077f16e153893d92cb76c64f7bfd50c15dd8b52620221f24860275b3c6a8342ef5b1b1bc82d0276f94ca5233edef2afe763f4
-
Filesize
12KB
MD56654387c0152108bea0c0766fc4f4631
SHA136756902f50f59db94e85ba755c742eda871b16a
SHA256aa41485a0c6b11dae864530cb15bf4233ff11fb5c0e3da5a9095719ce0899a3a
SHA51224f9acae9612ca5ae42d0e6404d100b84aa77e4b4ec867bab49a71417fdc818a91159ad6eb21c14597130706f7c3380582a5a8ea6ca95933a637ed3b21982e12
-
Filesize
12KB
MD56654387c0152108bea0c0766fc4f4631
SHA136756902f50f59db94e85ba755c742eda871b16a
SHA256aa41485a0c6b11dae864530cb15bf4233ff11fb5c0e3da5a9095719ce0899a3a
SHA51224f9acae9612ca5ae42d0e6404d100b84aa77e4b4ec867bab49a71417fdc818a91159ad6eb21c14597130706f7c3380582a5a8ea6ca95933a637ed3b21982e12
-
Filesize
421KB
MD5a1a8c7e021590c6ccb05a2a54e7d6f12
SHA176cabb2806779c8bcaba0f6ca25de05d2a4cda32
SHA256ffa315cca20806209add23fb058b99380ac07212267bf8fceb265976a24207b8
SHA512556cb80ba26000eb1426c652b995add13e2f8eb062820d34549317e82e785805b10d19b72942c505e3e1a0c5d985e9e01fcff7ab41124d903b72ce0570acaac2
-
Filesize
421KB
MD5a1a8c7e021590c6ccb05a2a54e7d6f12
SHA176cabb2806779c8bcaba0f6ca25de05d2a4cda32
SHA256ffa315cca20806209add23fb058b99380ac07212267bf8fceb265976a24207b8
SHA512556cb80ba26000eb1426c652b995add13e2f8eb062820d34549317e82e785805b10d19b72942c505e3e1a0c5d985e9e01fcff7ab41124d903b72ce0570acaac2
-
Filesize
421KB
MD5a1a8c7e021590c6ccb05a2a54e7d6f12
SHA176cabb2806779c8bcaba0f6ca25de05d2a4cda32
SHA256ffa315cca20806209add23fb058b99380ac07212267bf8fceb265976a24207b8
SHA512556cb80ba26000eb1426c652b995add13e2f8eb062820d34549317e82e785805b10d19b72942c505e3e1a0c5d985e9e01fcff7ab41124d903b72ce0570acaac2