Analysis
-
max time kernel
43s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
08-03-2023 03:53
Static task
static1
Behavioral task
behavioral1
Sample
0f4ead3d2d7252dbd5f7f634a32831287e207ae933bb3b868f387e7364afcde0.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0f4ead3d2d7252dbd5f7f634a32831287e207ae933bb3b868f387e7364afcde0.exe
Resource
win10-20230220-en
General
-
Target
0f4ead3d2d7252dbd5f7f634a32831287e207ae933bb3b868f387e7364afcde0.exe
-
Size
654KB
-
MD5
a7fc0799d32fba70ad5fd50778666e70
-
SHA1
6b342562e4b060cdc45fc2445b2ad4077f12d082
-
SHA256
0f4ead3d2d7252dbd5f7f634a32831287e207ae933bb3b868f387e7364afcde0
-
SHA512
d78022ac0ffb3accea8f372d96cfd3e3c9912b59dedc7594b3ce269b4874446add9375230d6d763c37758b4e8339639cce200f67079c4cb7bfc7a03edf7e1b46
-
SSDEEP
12288:8MrLy90vtknEZYQVYQLzv2arMPxCq3yG37mQk3r+aIS2k:3yaBZlVYgvxrMPvj318+lS2k
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Extracted
redline
fabio
193.233.20.27:4123
-
auth_value
56b82736c3f56b13be8e64c87d2cf9e5
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" tkrI81aS53.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" tkrI81aS53.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" tkrI81aS53.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" tkrI81aS53.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" tkrI81aS53.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection tkrI81aS53.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 22 IoCs
resource yara_rule behavioral1/memory/1804-123-0x0000000000B50000-0x0000000000B96000-memory.dmp family_redline behavioral1/memory/1804-124-0x0000000000B90000-0x0000000000BD4000-memory.dmp family_redline behavioral1/memory/1804-125-0x0000000000B90000-0x0000000000BCE000-memory.dmp family_redline behavioral1/memory/1804-126-0x0000000000B90000-0x0000000000BCE000-memory.dmp family_redline behavioral1/memory/1804-128-0x0000000000B90000-0x0000000000BCE000-memory.dmp family_redline behavioral1/memory/1804-130-0x0000000000B90000-0x0000000000BCE000-memory.dmp family_redline behavioral1/memory/1804-132-0x0000000000B90000-0x0000000000BCE000-memory.dmp family_redline behavioral1/memory/1804-134-0x0000000000B90000-0x0000000000BCE000-memory.dmp family_redline behavioral1/memory/1804-136-0x0000000000B90000-0x0000000000BCE000-memory.dmp family_redline behavioral1/memory/1804-138-0x0000000000B90000-0x0000000000BCE000-memory.dmp family_redline behavioral1/memory/1804-140-0x0000000000B90000-0x0000000000BCE000-memory.dmp family_redline behavioral1/memory/1804-142-0x0000000000B90000-0x0000000000BCE000-memory.dmp family_redline behavioral1/memory/1804-144-0x0000000000B90000-0x0000000000BCE000-memory.dmp family_redline behavioral1/memory/1804-146-0x0000000000B90000-0x0000000000BCE000-memory.dmp family_redline behavioral1/memory/1804-148-0x0000000000B90000-0x0000000000BCE000-memory.dmp family_redline behavioral1/memory/1804-150-0x0000000000B90000-0x0000000000BCE000-memory.dmp family_redline behavioral1/memory/1804-152-0x0000000000B90000-0x0000000000BCE000-memory.dmp family_redline behavioral1/memory/1804-154-0x0000000000B90000-0x0000000000BCE000-memory.dmp family_redline behavioral1/memory/1804-156-0x0000000000B90000-0x0000000000BCE000-memory.dmp family_redline behavioral1/memory/1804-158-0x0000000000B90000-0x0000000000BCE000-memory.dmp family_redline behavioral1/memory/1804-412-0x0000000004A90000-0x0000000004AD0000-memory.dmp family_redline behavioral1/memory/1804-1034-0x0000000004A90000-0x0000000004AD0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1692 ykrj86yy99.exe 860 tkrI81aS53.exe 1804 ukSy39Sw39.exe 1164 xkor78Mv29.exe -
Loads dropped DLL 10 IoCs
pid Process 1704 0f4ead3d2d7252dbd5f7f634a32831287e207ae933bb3b868f387e7364afcde0.exe 1692 ykrj86yy99.exe 1692 ykrj86yy99.exe 1692 ykrj86yy99.exe 860 tkrI81aS53.exe 1692 ykrj86yy99.exe 1692 ykrj86yy99.exe 1804 ukSy39Sw39.exe 1704 0f4ead3d2d7252dbd5f7f634a32831287e207ae933bb3b868f387e7364afcde0.exe 1164 xkor78Mv29.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" tkrI81aS53.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features tkrI81aS53.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0f4ead3d2d7252dbd5f7f634a32831287e207ae933bb3b868f387e7364afcde0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0f4ead3d2d7252dbd5f7f634a32831287e207ae933bb3b868f387e7364afcde0.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce ykrj86yy99.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ykrj86yy99.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 860 tkrI81aS53.exe 860 tkrI81aS53.exe 1804 ukSy39Sw39.exe 1804 ukSy39Sw39.exe 1164 xkor78Mv29.exe 1164 xkor78Mv29.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 860 tkrI81aS53.exe Token: SeDebugPrivilege 1804 ukSy39Sw39.exe Token: SeDebugPrivilege 1164 xkor78Mv29.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1704 wrote to memory of 1692 1704 0f4ead3d2d7252dbd5f7f634a32831287e207ae933bb3b868f387e7364afcde0.exe 28 PID 1704 wrote to memory of 1692 1704 0f4ead3d2d7252dbd5f7f634a32831287e207ae933bb3b868f387e7364afcde0.exe 28 PID 1704 wrote to memory of 1692 1704 0f4ead3d2d7252dbd5f7f634a32831287e207ae933bb3b868f387e7364afcde0.exe 28 PID 1704 wrote to memory of 1692 1704 0f4ead3d2d7252dbd5f7f634a32831287e207ae933bb3b868f387e7364afcde0.exe 28 PID 1704 wrote to memory of 1692 1704 0f4ead3d2d7252dbd5f7f634a32831287e207ae933bb3b868f387e7364afcde0.exe 28 PID 1704 wrote to memory of 1692 1704 0f4ead3d2d7252dbd5f7f634a32831287e207ae933bb3b868f387e7364afcde0.exe 28 PID 1704 wrote to memory of 1692 1704 0f4ead3d2d7252dbd5f7f634a32831287e207ae933bb3b868f387e7364afcde0.exe 28 PID 1692 wrote to memory of 860 1692 ykrj86yy99.exe 29 PID 1692 wrote to memory of 860 1692 ykrj86yy99.exe 29 PID 1692 wrote to memory of 860 1692 ykrj86yy99.exe 29 PID 1692 wrote to memory of 860 1692 ykrj86yy99.exe 29 PID 1692 wrote to memory of 860 1692 ykrj86yy99.exe 29 PID 1692 wrote to memory of 860 1692 ykrj86yy99.exe 29 PID 1692 wrote to memory of 860 1692 ykrj86yy99.exe 29 PID 1692 wrote to memory of 1804 1692 ykrj86yy99.exe 30 PID 1692 wrote to memory of 1804 1692 ykrj86yy99.exe 30 PID 1692 wrote to memory of 1804 1692 ykrj86yy99.exe 30 PID 1692 wrote to memory of 1804 1692 ykrj86yy99.exe 30 PID 1692 wrote to memory of 1804 1692 ykrj86yy99.exe 30 PID 1692 wrote to memory of 1804 1692 ykrj86yy99.exe 30 PID 1692 wrote to memory of 1804 1692 ykrj86yy99.exe 30 PID 1704 wrote to memory of 1164 1704 0f4ead3d2d7252dbd5f7f634a32831287e207ae933bb3b868f387e7364afcde0.exe 32 PID 1704 wrote to memory of 1164 1704 0f4ead3d2d7252dbd5f7f634a32831287e207ae933bb3b868f387e7364afcde0.exe 32 PID 1704 wrote to memory of 1164 1704 0f4ead3d2d7252dbd5f7f634a32831287e207ae933bb3b868f387e7364afcde0.exe 32 PID 1704 wrote to memory of 1164 1704 0f4ead3d2d7252dbd5f7f634a32831287e207ae933bb3b868f387e7364afcde0.exe 32 PID 1704 wrote to memory of 1164 1704 0f4ead3d2d7252dbd5f7f634a32831287e207ae933bb3b868f387e7364afcde0.exe 32 PID 1704 wrote to memory of 1164 1704 0f4ead3d2d7252dbd5f7f634a32831287e207ae933bb3b868f387e7364afcde0.exe 32 PID 1704 wrote to memory of 1164 1704 0f4ead3d2d7252dbd5f7f634a32831287e207ae933bb3b868f387e7364afcde0.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f4ead3d2d7252dbd5f7f634a32831287e207ae933bb3b868f387e7364afcde0.exe"C:\Users\Admin\AppData\Local\Temp\0f4ead3d2d7252dbd5f7f634a32831287e207ae933bb3b868f387e7364afcde0.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ykrj86yy99.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ykrj86yy99.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkrI81aS53.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkrI81aS53.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:860
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ukSy39Sw39.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ukSy39Sw39.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1804
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xkor78Mv29.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xkor78Mv29.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1164
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5a4e95ed385c90a7c64c64969288e953a
SHA1369284ca4c20d42eb975f16d2cce2f41eb0838bc
SHA2565cc58e3a6e92a6b49984b3b66a3c6029982968ffc32bf98a73886cce23746532
SHA5123748857026bc1c1b643783add2a97ebd701af2fc754c64b9d75488dc0c25dfc662480ee6f4034338628121a0a8a8cd0eff107bf06bfc148acce005134b651d1c
-
Filesize
175KB
MD5a4e95ed385c90a7c64c64969288e953a
SHA1369284ca4c20d42eb975f16d2cce2f41eb0838bc
SHA2565cc58e3a6e92a6b49984b3b66a3c6029982968ffc32bf98a73886cce23746532
SHA5123748857026bc1c1b643783add2a97ebd701af2fc754c64b9d75488dc0c25dfc662480ee6f4034338628121a0a8a8cd0eff107bf06bfc148acce005134b651d1c
-
Filesize
510KB
MD5a5e528d280a33c17fb7c7326e79463b1
SHA19219b69ba6675f1c25e126e7ca26c96488c3db64
SHA2569b9192b0c88708447c9833b103f5bf8e3fd9b842f2ffbbae02575161af637e9e
SHA512c0333f07275dec05a7cf1030e98f6da7626f95dc6c2c77423e3fdc6342e373e3a387d490dda5d8a69ae5027ddd568d84cae6cc7fa5fd44e4df66ce39ead9f58e
-
Filesize
510KB
MD5a5e528d280a33c17fb7c7326e79463b1
SHA19219b69ba6675f1c25e126e7ca26c96488c3db64
SHA2569b9192b0c88708447c9833b103f5bf8e3fd9b842f2ffbbae02575161af637e9e
SHA512c0333f07275dec05a7cf1030e98f6da7626f95dc6c2c77423e3fdc6342e373e3a387d490dda5d8a69ae5027ddd568d84cae6cc7fa5fd44e4df66ce39ead9f58e
-
Filesize
306KB
MD5dd96910ebcd391990c3c0e402f9ec86c
SHA1cc9b7cd8a44db8ad7c208c225d196c11f0c4b8cd
SHA2564affbd332223ac9c7e583bb0bd8004461c13a910a0a6390ad40e3be357ea6541
SHA512f1aaef515729474a41d937935e303d4bce30398088e872aa07fadd56ed4acb224fc4130a4424311f6ecd137ba0c863e7628785498f9ace5539942aea01250c2c
-
Filesize
306KB
MD5dd96910ebcd391990c3c0e402f9ec86c
SHA1cc9b7cd8a44db8ad7c208c225d196c11f0c4b8cd
SHA2564affbd332223ac9c7e583bb0bd8004461c13a910a0a6390ad40e3be357ea6541
SHA512f1aaef515729474a41d937935e303d4bce30398088e872aa07fadd56ed4acb224fc4130a4424311f6ecd137ba0c863e7628785498f9ace5539942aea01250c2c
-
Filesize
306KB
MD5dd96910ebcd391990c3c0e402f9ec86c
SHA1cc9b7cd8a44db8ad7c208c225d196c11f0c4b8cd
SHA2564affbd332223ac9c7e583bb0bd8004461c13a910a0a6390ad40e3be357ea6541
SHA512f1aaef515729474a41d937935e303d4bce30398088e872aa07fadd56ed4acb224fc4130a4424311f6ecd137ba0c863e7628785498f9ace5539942aea01250c2c
-
Filesize
292KB
MD5bde0fb595e9feb2667d8a8a78e326546
SHA1eead81585ede57400b7ec1bb906e9040e3f83833
SHA25672d6957bb47831ab0efe5678b31a54548a7733240fe207fa3b47497f4177ea8d
SHA5121f0ffa48e149869b3f6042752c4e80843441d242f539a7c863baae3f926fc55255d7eaa974c978e0655b5310b750a8844ea23670fe3079b53d62ce5c83412359
-
Filesize
292KB
MD5bde0fb595e9feb2667d8a8a78e326546
SHA1eead81585ede57400b7ec1bb906e9040e3f83833
SHA25672d6957bb47831ab0efe5678b31a54548a7733240fe207fa3b47497f4177ea8d
SHA5121f0ffa48e149869b3f6042752c4e80843441d242f539a7c863baae3f926fc55255d7eaa974c978e0655b5310b750a8844ea23670fe3079b53d62ce5c83412359
-
Filesize
292KB
MD5bde0fb595e9feb2667d8a8a78e326546
SHA1eead81585ede57400b7ec1bb906e9040e3f83833
SHA25672d6957bb47831ab0efe5678b31a54548a7733240fe207fa3b47497f4177ea8d
SHA5121f0ffa48e149869b3f6042752c4e80843441d242f539a7c863baae3f926fc55255d7eaa974c978e0655b5310b750a8844ea23670fe3079b53d62ce5c83412359
-
Filesize
175KB
MD5a4e95ed385c90a7c64c64969288e953a
SHA1369284ca4c20d42eb975f16d2cce2f41eb0838bc
SHA2565cc58e3a6e92a6b49984b3b66a3c6029982968ffc32bf98a73886cce23746532
SHA5123748857026bc1c1b643783add2a97ebd701af2fc754c64b9d75488dc0c25dfc662480ee6f4034338628121a0a8a8cd0eff107bf06bfc148acce005134b651d1c
-
Filesize
175KB
MD5a4e95ed385c90a7c64c64969288e953a
SHA1369284ca4c20d42eb975f16d2cce2f41eb0838bc
SHA2565cc58e3a6e92a6b49984b3b66a3c6029982968ffc32bf98a73886cce23746532
SHA5123748857026bc1c1b643783add2a97ebd701af2fc754c64b9d75488dc0c25dfc662480ee6f4034338628121a0a8a8cd0eff107bf06bfc148acce005134b651d1c
-
Filesize
510KB
MD5a5e528d280a33c17fb7c7326e79463b1
SHA19219b69ba6675f1c25e126e7ca26c96488c3db64
SHA2569b9192b0c88708447c9833b103f5bf8e3fd9b842f2ffbbae02575161af637e9e
SHA512c0333f07275dec05a7cf1030e98f6da7626f95dc6c2c77423e3fdc6342e373e3a387d490dda5d8a69ae5027ddd568d84cae6cc7fa5fd44e4df66ce39ead9f58e
-
Filesize
510KB
MD5a5e528d280a33c17fb7c7326e79463b1
SHA19219b69ba6675f1c25e126e7ca26c96488c3db64
SHA2569b9192b0c88708447c9833b103f5bf8e3fd9b842f2ffbbae02575161af637e9e
SHA512c0333f07275dec05a7cf1030e98f6da7626f95dc6c2c77423e3fdc6342e373e3a387d490dda5d8a69ae5027ddd568d84cae6cc7fa5fd44e4df66ce39ead9f58e
-
Filesize
306KB
MD5dd96910ebcd391990c3c0e402f9ec86c
SHA1cc9b7cd8a44db8ad7c208c225d196c11f0c4b8cd
SHA2564affbd332223ac9c7e583bb0bd8004461c13a910a0a6390ad40e3be357ea6541
SHA512f1aaef515729474a41d937935e303d4bce30398088e872aa07fadd56ed4acb224fc4130a4424311f6ecd137ba0c863e7628785498f9ace5539942aea01250c2c
-
Filesize
306KB
MD5dd96910ebcd391990c3c0e402f9ec86c
SHA1cc9b7cd8a44db8ad7c208c225d196c11f0c4b8cd
SHA2564affbd332223ac9c7e583bb0bd8004461c13a910a0a6390ad40e3be357ea6541
SHA512f1aaef515729474a41d937935e303d4bce30398088e872aa07fadd56ed4acb224fc4130a4424311f6ecd137ba0c863e7628785498f9ace5539942aea01250c2c
-
Filesize
306KB
MD5dd96910ebcd391990c3c0e402f9ec86c
SHA1cc9b7cd8a44db8ad7c208c225d196c11f0c4b8cd
SHA2564affbd332223ac9c7e583bb0bd8004461c13a910a0a6390ad40e3be357ea6541
SHA512f1aaef515729474a41d937935e303d4bce30398088e872aa07fadd56ed4acb224fc4130a4424311f6ecd137ba0c863e7628785498f9ace5539942aea01250c2c
-
Filesize
292KB
MD5bde0fb595e9feb2667d8a8a78e326546
SHA1eead81585ede57400b7ec1bb906e9040e3f83833
SHA25672d6957bb47831ab0efe5678b31a54548a7733240fe207fa3b47497f4177ea8d
SHA5121f0ffa48e149869b3f6042752c4e80843441d242f539a7c863baae3f926fc55255d7eaa974c978e0655b5310b750a8844ea23670fe3079b53d62ce5c83412359
-
Filesize
292KB
MD5bde0fb595e9feb2667d8a8a78e326546
SHA1eead81585ede57400b7ec1bb906e9040e3f83833
SHA25672d6957bb47831ab0efe5678b31a54548a7733240fe207fa3b47497f4177ea8d
SHA5121f0ffa48e149869b3f6042752c4e80843441d242f539a7c863baae3f926fc55255d7eaa974c978e0655b5310b750a8844ea23670fe3079b53d62ce5c83412359
-
Filesize
292KB
MD5bde0fb595e9feb2667d8a8a78e326546
SHA1eead81585ede57400b7ec1bb906e9040e3f83833
SHA25672d6957bb47831ab0efe5678b31a54548a7733240fe207fa3b47497f4177ea8d
SHA5121f0ffa48e149869b3f6042752c4e80843441d242f539a7c863baae3f926fc55255d7eaa974c978e0655b5310b750a8844ea23670fe3079b53d62ce5c83412359