Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
11-03-2023 23:09
Static task
static1
Behavioral task
behavioral1
Sample
0170c722261c494ccf2b871ca1011680ad11759db14936ba3bd0941a9233997b.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0170c722261c494ccf2b871ca1011680ad11759db14936ba3bd0941a9233997b.exe
Resource
win10v2004-20230220-en
General
-
Target
0170c722261c494ccf2b871ca1011680ad11759db14936ba3bd0941a9233997b.exe
-
Size
557KB
-
MD5
0209582fbd5345aff1b97ac70407b97f
-
SHA1
dfab2ca620ed3261c2877a8ffe69b0ef590f7eb8
-
SHA256
0170c722261c494ccf2b871ca1011680ad11759db14936ba3bd0941a9233997b
-
SHA512
cba788e2e9d822ffaa96cd88d9ff68695913b3594a18855b160800dcd667e8a57e4ed7aada1dfa82e0573a85e5af9ac7e4be51a4364f463de2f32fd14f6810df
-
SSDEEP
12288:pMrFy902JZic3F6gBcLP/6+hjT5zW7foehM2hqs5p7Afvi1:Ay3Zn3F6gGC+5FWbdMeD5Ug
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Signatures
-
Processes:
sf04PH90rH53.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sf04PH90rH53.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sf04PH90rH53.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sf04PH90rH53.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sf04PH90rH53.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sf04PH90rH53.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sf04PH90rH53.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral2/memory/2492-157-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral2/memory/2492-164-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral2/memory/2492-162-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral2/memory/2492-160-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral2/memory/2492-158-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral2/memory/2492-166-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral2/memory/2492-168-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral2/memory/2492-170-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral2/memory/2492-172-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral2/memory/2492-174-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral2/memory/2492-176-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral2/memory/2492-178-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral2/memory/2492-180-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral2/memory/2492-182-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral2/memory/2492-184-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral2/memory/2492-186-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral2/memory/2492-188-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral2/memory/2492-190-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral2/memory/2492-192-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral2/memory/2492-194-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral2/memory/2492-196-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral2/memory/2492-198-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral2/memory/2492-200-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral2/memory/2492-202-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral2/memory/2492-204-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral2/memory/2492-206-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral2/memory/2492-208-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral2/memory/2492-210-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral2/memory/2492-212-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral2/memory/2492-214-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral2/memory/2492-216-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral2/memory/2492-218-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral2/memory/2492-220-0x0000000007740000-0x000000000777E000-memory.dmp family_redline -
Executes dropped EXE 3 IoCs
Processes:
vhPi1819mH.exesf04PH90rH53.exetf70Sd96zg42.exepid process 4624 vhPi1819mH.exe 4944 sf04PH90rH53.exe 2492 tf70Sd96zg42.exe -
Processes:
sf04PH90rH53.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sf04PH90rH53.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
vhPi1819mH.exe0170c722261c494ccf2b871ca1011680ad11759db14936ba3bd0941a9233997b.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vhPi1819mH.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vhPi1819mH.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0170c722261c494ccf2b871ca1011680ad11759db14936ba3bd0941a9233997b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0170c722261c494ccf2b871ca1011680ad11759db14936ba3bd0941a9233997b.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
sf04PH90rH53.exepid process 4944 sf04PH90rH53.exe 4944 sf04PH90rH53.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
sf04PH90rH53.exetf70Sd96zg42.exedescription pid process Token: SeDebugPrivilege 4944 sf04PH90rH53.exe Token: SeDebugPrivilege 2492 tf70Sd96zg42.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
0170c722261c494ccf2b871ca1011680ad11759db14936ba3bd0941a9233997b.exevhPi1819mH.exedescription pid process target process PID 4244 wrote to memory of 4624 4244 0170c722261c494ccf2b871ca1011680ad11759db14936ba3bd0941a9233997b.exe vhPi1819mH.exe PID 4244 wrote to memory of 4624 4244 0170c722261c494ccf2b871ca1011680ad11759db14936ba3bd0941a9233997b.exe vhPi1819mH.exe PID 4244 wrote to memory of 4624 4244 0170c722261c494ccf2b871ca1011680ad11759db14936ba3bd0941a9233997b.exe vhPi1819mH.exe PID 4624 wrote to memory of 4944 4624 vhPi1819mH.exe sf04PH90rH53.exe PID 4624 wrote to memory of 4944 4624 vhPi1819mH.exe sf04PH90rH53.exe PID 4624 wrote to memory of 2492 4624 vhPi1819mH.exe tf70Sd96zg42.exe PID 4624 wrote to memory of 2492 4624 vhPi1819mH.exe tf70Sd96zg42.exe PID 4624 wrote to memory of 2492 4624 vhPi1819mH.exe tf70Sd96zg42.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0170c722261c494ccf2b871ca1011680ad11759db14936ba3bd0941a9233997b.exe"C:\Users\Admin\AppData\Local\Temp\0170c722261c494ccf2b871ca1011680ad11759db14936ba3bd0941a9233997b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhPi1819mH.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhPi1819mH.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf04PH90rH53.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf04PH90rH53.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf70Sd96zg42.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf70Sd96zg42.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhPi1819mH.exeFilesize
412KB
MD50bb3a91e84a7eafefe55dafab4a53554
SHA16754e4b511267a582fa38edc40c636fb81556004
SHA256585425ecf7fb784a52ddf361e8b4a3ae8fef8d5f82682070ef09632391c7a26b
SHA5124cab71a1f7d5b1b10645e02d1946c3b22f5468863f40a9427f5f960406e2bf158fd485dc7cb1ae3d53ac2c1ad2ba81127502ab903fe47a610ca183cdccacc3fb
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhPi1819mH.exeFilesize
412KB
MD50bb3a91e84a7eafefe55dafab4a53554
SHA16754e4b511267a582fa38edc40c636fb81556004
SHA256585425ecf7fb784a52ddf361e8b4a3ae8fef8d5f82682070ef09632391c7a26b
SHA5124cab71a1f7d5b1b10645e02d1946c3b22f5468863f40a9427f5f960406e2bf158fd485dc7cb1ae3d53ac2c1ad2ba81127502ab903fe47a610ca183cdccacc3fb
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf04PH90rH53.exeFilesize
11KB
MD5857e6b9680004607d4a8466fe38fee52
SHA109d52e2aad34051300c436abe882625483b74462
SHA256e557bdc852841736a14bf139d34bd3170f3aafdf22ec886533a7d20505ffc851
SHA512e6d1d91df90cbff233f179bbfe1233b28beaa8f26f98e490bc2dd22036a1fd314adce8203968ba37b7bfb6fd6edf2accde9c239ddcbe42802a8bba03deeaf767
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf04PH90rH53.exeFilesize
11KB
MD5857e6b9680004607d4a8466fe38fee52
SHA109d52e2aad34051300c436abe882625483b74462
SHA256e557bdc852841736a14bf139d34bd3170f3aafdf22ec886533a7d20505ffc851
SHA512e6d1d91df90cbff233f179bbfe1233b28beaa8f26f98e490bc2dd22036a1fd314adce8203968ba37b7bfb6fd6edf2accde9c239ddcbe42802a8bba03deeaf767
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf70Sd96zg42.exeFilesize
409KB
MD5d918db9077504212d04e97bc5857b710
SHA1cbac3bfca65f8dfe4efd408bcf480f3d603f1d06
SHA256ab46765a44c015f420a104a2ffee2d036dc0cb4ce25e72be2540eed2cd521bb3
SHA512f00800d9c2616090029632b5fea54abacc92e9c323feda1ea3c50a2ffdacd0f047d4da66b185b75d4570bee869c9684a3746b1daf58cc66278cbb09a0946f187
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf70Sd96zg42.exeFilesize
409KB
MD5d918db9077504212d04e97bc5857b710
SHA1cbac3bfca65f8dfe4efd408bcf480f3d603f1d06
SHA256ab46765a44c015f420a104a2ffee2d036dc0cb4ce25e72be2540eed2cd521bb3
SHA512f00800d9c2616090029632b5fea54abacc92e9c323feda1ea3c50a2ffdacd0f047d4da66b185b75d4570bee869c9684a3746b1daf58cc66278cbb09a0946f187
-
memory/2492-153-0x0000000007180000-0x0000000007724000-memory.dmpFilesize
5.6MB
-
memory/2492-154-0x0000000002DC0000-0x0000000002E0B000-memory.dmpFilesize
300KB
-
memory/2492-155-0x0000000007170000-0x0000000007180000-memory.dmpFilesize
64KB
-
memory/2492-156-0x0000000007170000-0x0000000007180000-memory.dmpFilesize
64KB
-
memory/2492-157-0x0000000007740000-0x000000000777E000-memory.dmpFilesize
248KB
-
memory/2492-164-0x0000000007740000-0x000000000777E000-memory.dmpFilesize
248KB
-
memory/2492-162-0x0000000007740000-0x000000000777E000-memory.dmpFilesize
248KB
-
memory/2492-160-0x0000000007740000-0x000000000777E000-memory.dmpFilesize
248KB
-
memory/2492-158-0x0000000007740000-0x000000000777E000-memory.dmpFilesize
248KB
-
memory/2492-166-0x0000000007740000-0x000000000777E000-memory.dmpFilesize
248KB
-
memory/2492-168-0x0000000007740000-0x000000000777E000-memory.dmpFilesize
248KB
-
memory/2492-170-0x0000000007740000-0x000000000777E000-memory.dmpFilesize
248KB
-
memory/2492-172-0x0000000007740000-0x000000000777E000-memory.dmpFilesize
248KB
-
memory/2492-174-0x0000000007740000-0x000000000777E000-memory.dmpFilesize
248KB
-
memory/2492-176-0x0000000007740000-0x000000000777E000-memory.dmpFilesize
248KB
-
memory/2492-178-0x0000000007740000-0x000000000777E000-memory.dmpFilesize
248KB
-
memory/2492-180-0x0000000007740000-0x000000000777E000-memory.dmpFilesize
248KB
-
memory/2492-182-0x0000000007740000-0x000000000777E000-memory.dmpFilesize
248KB
-
memory/2492-184-0x0000000007740000-0x000000000777E000-memory.dmpFilesize
248KB
-
memory/2492-186-0x0000000007740000-0x000000000777E000-memory.dmpFilesize
248KB
-
memory/2492-188-0x0000000007740000-0x000000000777E000-memory.dmpFilesize
248KB
-
memory/2492-190-0x0000000007740000-0x000000000777E000-memory.dmpFilesize
248KB
-
memory/2492-192-0x0000000007740000-0x000000000777E000-memory.dmpFilesize
248KB
-
memory/2492-194-0x0000000007740000-0x000000000777E000-memory.dmpFilesize
248KB
-
memory/2492-196-0x0000000007740000-0x000000000777E000-memory.dmpFilesize
248KB
-
memory/2492-198-0x0000000007740000-0x000000000777E000-memory.dmpFilesize
248KB
-
memory/2492-200-0x0000000007740000-0x000000000777E000-memory.dmpFilesize
248KB
-
memory/2492-202-0x0000000007740000-0x000000000777E000-memory.dmpFilesize
248KB
-
memory/2492-204-0x0000000007740000-0x000000000777E000-memory.dmpFilesize
248KB
-
memory/2492-206-0x0000000007740000-0x000000000777E000-memory.dmpFilesize
248KB
-
memory/2492-208-0x0000000007740000-0x000000000777E000-memory.dmpFilesize
248KB
-
memory/2492-210-0x0000000007740000-0x000000000777E000-memory.dmpFilesize
248KB
-
memory/2492-212-0x0000000007740000-0x000000000777E000-memory.dmpFilesize
248KB
-
memory/2492-214-0x0000000007740000-0x000000000777E000-memory.dmpFilesize
248KB
-
memory/2492-216-0x0000000007740000-0x000000000777E000-memory.dmpFilesize
248KB
-
memory/2492-218-0x0000000007740000-0x000000000777E000-memory.dmpFilesize
248KB
-
memory/2492-220-0x0000000007740000-0x000000000777E000-memory.dmpFilesize
248KB
-
memory/2492-1063-0x0000000007920000-0x0000000007F38000-memory.dmpFilesize
6.1MB
-
memory/2492-1064-0x0000000007FC0000-0x00000000080CA000-memory.dmpFilesize
1.0MB
-
memory/2492-1065-0x0000000008100000-0x0000000008112000-memory.dmpFilesize
72KB
-
memory/2492-1066-0x0000000008120000-0x000000000815C000-memory.dmpFilesize
240KB
-
memory/2492-1067-0x0000000007170000-0x0000000007180000-memory.dmpFilesize
64KB
-
memory/2492-1069-0x0000000007170000-0x0000000007180000-memory.dmpFilesize
64KB
-
memory/2492-1070-0x0000000007170000-0x0000000007180000-memory.dmpFilesize
64KB
-
memory/2492-1071-0x0000000007170000-0x0000000007180000-memory.dmpFilesize
64KB
-
memory/4944-147-0x0000000000570000-0x000000000057A000-memory.dmpFilesize
40KB