Analysis
-
max time kernel
77s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2023, 01:01
Static task
static1
Behavioral task
behavioral1
Sample
2b60dd4c6e082d05717e54335a5fe7fca84dbb96bee4a5e95d01574275cb5d41.exe
Resource
win10v2004-20230221-en
General
-
Target
2b60dd4c6e082d05717e54335a5fe7fca84dbb96bee4a5e95d01574275cb5d41.exe
-
Size
553KB
-
MD5
12c9efe05435d34998d5252b987fa4cc
-
SHA1
2eec29b8bed3fac0822434349d45c56925e1b28c
-
SHA256
2b60dd4c6e082d05717e54335a5fe7fca84dbb96bee4a5e95d01574275cb5d41
-
SHA512
5766aaa5b476de2a62077bd82c1de840a2c70bf94958c4c6aa186152175e4470231a06bd19bf3c72353852dfbec086e3cf819d4c77d0041f67383d25ee5391f4
-
SSDEEP
12288:pMrxy90n7lFj2c88X31i1o1YzV7TKWl64VZlpclX:0yNR8Xg1omKWlDVZfS
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Extracted
redline
misha
193.56.146.11:4173
-
auth_value
e17e441c954db214b94a603a7b0b1aea
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection s8867RO.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" s8867RO.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" s8867RO.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" s8867RO.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" s8867RO.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" s8867RO.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/2040-158-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2040-160-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2040-157-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2040-162-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2040-164-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2040-166-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2040-170-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2040-168-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2040-172-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2040-174-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2040-176-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2040-178-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2040-180-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2040-182-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2040-184-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2040-186-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2040-188-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2040-190-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2040-192-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2040-194-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2040-196-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2040-198-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2040-200-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2040-202-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2040-204-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2040-206-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2040-208-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2040-210-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2040-212-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2040-214-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2040-216-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2040-218-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline behavioral1/memory/2040-220-0x0000000004AE0000-0x0000000004B1E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4008 vkjL0369nz.exe 4804 s8867RO.exe 2040 t93dQ49.exe 4940 urGlS67.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" s8867RO.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2b60dd4c6e082d05717e54335a5fe7fca84dbb96bee4a5e95d01574275cb5d41.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2b60dd4c6e082d05717e54335a5fe7fca84dbb96bee4a5e95d01574275cb5d41.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vkjL0369nz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vkjL0369nz.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3772 2040 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4804 s8867RO.exe 4804 s8867RO.exe 2040 t93dQ49.exe 2040 t93dQ49.exe 4940 urGlS67.exe 4940 urGlS67.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4804 s8867RO.exe Token: SeDebugPrivilege 2040 t93dQ49.exe Token: SeDebugPrivilege 4940 urGlS67.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4364 wrote to memory of 4008 4364 2b60dd4c6e082d05717e54335a5fe7fca84dbb96bee4a5e95d01574275cb5d41.exe 84 PID 4364 wrote to memory of 4008 4364 2b60dd4c6e082d05717e54335a5fe7fca84dbb96bee4a5e95d01574275cb5d41.exe 84 PID 4364 wrote to memory of 4008 4364 2b60dd4c6e082d05717e54335a5fe7fca84dbb96bee4a5e95d01574275cb5d41.exe 84 PID 4008 wrote to memory of 4804 4008 vkjL0369nz.exe 85 PID 4008 wrote to memory of 4804 4008 vkjL0369nz.exe 85 PID 4008 wrote to memory of 2040 4008 vkjL0369nz.exe 89 PID 4008 wrote to memory of 2040 4008 vkjL0369nz.exe 89 PID 4008 wrote to memory of 2040 4008 vkjL0369nz.exe 89 PID 4364 wrote to memory of 4940 4364 2b60dd4c6e082d05717e54335a5fe7fca84dbb96bee4a5e95d01574275cb5d41.exe 96 PID 4364 wrote to memory of 4940 4364 2b60dd4c6e082d05717e54335a5fe7fca84dbb96bee4a5e95d01574275cb5d41.exe 96 PID 4364 wrote to memory of 4940 4364 2b60dd4c6e082d05717e54335a5fe7fca84dbb96bee4a5e95d01574275cb5d41.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b60dd4c6e082d05717e54335a5fe7fca84dbb96bee4a5e95d01574275cb5d41.exe"C:\Users\Admin\AppData\Local\Temp\2b60dd4c6e082d05717e54335a5fe7fca84dbb96bee4a5e95d01574275cb5d41.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vkjL0369nz.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vkjL0369nz.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s8867RO.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s8867RO.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4804
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\t93dQ49.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\t93dQ49.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2040 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2040 -s 13524⤵
- Program crash
PID:3772
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\urGlS67.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\urGlS67.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2040 -ip 20401⤵PID:440
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5fb6b1dfc1d31819df66b4eba004f4f1e
SHA18fb4085acc6bdac0c653130d20ccf87dc0a4bc16
SHA2564a8cf958110e605398244c588878680f5f367bf064573a69fded3f4ca70c7549
SHA512270f0208fac6330d413709de2f1aa348f20e434bb70b886a96e7db87f74607c9dcbee92b458ea375ca9d22a89af46b31655b84d6f26fac3d12e63f8242d41f3a
-
Filesize
175KB
MD5fb6b1dfc1d31819df66b4eba004f4f1e
SHA18fb4085acc6bdac0c653130d20ccf87dc0a4bc16
SHA2564a8cf958110e605398244c588878680f5f367bf064573a69fded3f4ca70c7549
SHA512270f0208fac6330d413709de2f1aa348f20e434bb70b886a96e7db87f74607c9dcbee92b458ea375ca9d22a89af46b31655b84d6f26fac3d12e63f8242d41f3a
-
Filesize
408KB
MD527157fbb7fe46b2a94a4aefc73d04fe1
SHA1c12bf534adc27d329e3d2d9ea0c0fc1e2cc4e172
SHA2566753fc1dc77304cb3196d8386337ecfe675266f734a195923c1b1ea33ed97f26
SHA512b60971a2d07d062ff55816335ac80f92b56f5097c86496668c0a0fe49bffb5c69881b6f442bdb8b3194ea4eec9fed95439f2021de7e220f1522ef3b9dd5cb080
-
Filesize
408KB
MD527157fbb7fe46b2a94a4aefc73d04fe1
SHA1c12bf534adc27d329e3d2d9ea0c0fc1e2cc4e172
SHA2566753fc1dc77304cb3196d8386337ecfe675266f734a195923c1b1ea33ed97f26
SHA512b60971a2d07d062ff55816335ac80f92b56f5097c86496668c0a0fe49bffb5c69881b6f442bdb8b3194ea4eec9fed95439f2021de7e220f1522ef3b9dd5cb080
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
379KB
MD5078594e2ec8f1b2481d493ca8b67af44
SHA1d961fe2be92902c074b04272f277320fa994490a
SHA2568bb2f1b6ab119fe6fc0293fa4e325c01dbdd79a5dcb2b73db5d151217dba7c0e
SHA5120d6610de14191c8f5491a80cc8f50fc70011636e35b6b30295abcba780879b882e70dbb9ca33be81ad697bf1cdee7b68a1474b20968db6fc1d71e2e8cce227c6
-
Filesize
379KB
MD5078594e2ec8f1b2481d493ca8b67af44
SHA1d961fe2be92902c074b04272f277320fa994490a
SHA2568bb2f1b6ab119fe6fc0293fa4e325c01dbdd79a5dcb2b73db5d151217dba7c0e
SHA5120d6610de14191c8f5491a80cc8f50fc70011636e35b6b30295abcba780879b882e70dbb9ca33be81ad697bf1cdee7b68a1474b20968db6fc1d71e2e8cce227c6