Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
19/03/2023, 23:52
Static task
static1
Behavioral task
behavioral1
Sample
88398e9ff81c0985313a55a41ecb48c37ab79151ebf7aa8f4a113696bf21b068.exe
Resource
win10-20230220-en
General
-
Target
88398e9ff81c0985313a55a41ecb48c37ab79151ebf7aa8f4a113696bf21b068.exe
-
Size
818KB
-
MD5
58e1076a59d2f30035cb265e8f771ef9
-
SHA1
3fb43e37250b6f09d6c918da8e70e8c0bfb0fdd2
-
SHA256
88398e9ff81c0985313a55a41ecb48c37ab79151ebf7aa8f4a113696bf21b068
-
SHA512
579020f083b8e0df26a396cbb53b40b874d0eff6c36ce00d45378f214d36bab5101874bf07886807765bba43df91788441ba9354243de20be3bdec06fbba6193
-
SSDEEP
24576:QyrdRVIBrH33aO24SApjWmQdFmOkKFL8UkIkzSaW+a:XrbuBHUU6TEKZYSa
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
ruka
193.233.20.28:4125
-
auth_value
5d1d0e51ebe1e3f16cca573ff651c43c
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h20wT75.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h20wT75.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" f2888Uy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" f2888Uy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" f2888Uy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" f2888Uy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h20wT75.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h20wT75.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" f2888Uy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h20wT75.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4472-192-0x00000000026F0000-0x0000000002736000-memory.dmp family_redline behavioral1/memory/4472-193-0x0000000004DA0000-0x0000000004DE4000-memory.dmp family_redline behavioral1/memory/4472-198-0x0000000004DA0000-0x0000000004DDE000-memory.dmp family_redline behavioral1/memory/4472-199-0x0000000004DA0000-0x0000000004DDE000-memory.dmp family_redline behavioral1/memory/4472-201-0x0000000004DA0000-0x0000000004DDE000-memory.dmp family_redline behavioral1/memory/4472-203-0x0000000004DA0000-0x0000000004DDE000-memory.dmp family_redline behavioral1/memory/4472-205-0x0000000004DA0000-0x0000000004DDE000-memory.dmp family_redline behavioral1/memory/4472-207-0x0000000004DA0000-0x0000000004DDE000-memory.dmp family_redline behavioral1/memory/4472-209-0x0000000004DA0000-0x0000000004DDE000-memory.dmp family_redline behavioral1/memory/4472-211-0x0000000004DA0000-0x0000000004DDE000-memory.dmp family_redline behavioral1/memory/4472-213-0x0000000004DA0000-0x0000000004DDE000-memory.dmp family_redline behavioral1/memory/4472-215-0x0000000004DA0000-0x0000000004DDE000-memory.dmp family_redline behavioral1/memory/4472-217-0x0000000004DA0000-0x0000000004DDE000-memory.dmp family_redline behavioral1/memory/4472-219-0x0000000004DA0000-0x0000000004DDE000-memory.dmp family_redline behavioral1/memory/4472-221-0x0000000004DA0000-0x0000000004DDE000-memory.dmp family_redline behavioral1/memory/4472-223-0x0000000004DA0000-0x0000000004DDE000-memory.dmp family_redline behavioral1/memory/4472-225-0x0000000004DA0000-0x0000000004DDE000-memory.dmp family_redline behavioral1/memory/4472-227-0x0000000004DA0000-0x0000000004DDE000-memory.dmp family_redline behavioral1/memory/4472-229-0x0000000004DA0000-0x0000000004DDE000-memory.dmp family_redline behavioral1/memory/4472-231-0x0000000004DA0000-0x0000000004DDE000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 2120 niba2425.exe 4248 niba4794.exe 4668 f2888Uy.exe 4928 h20wT75.exe 4472 iGulO40.exe 4660 l63ny74.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h20wT75.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" f2888Uy.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h20wT75.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 88398e9ff81c0985313a55a41ecb48c37ab79151ebf7aa8f4a113696bf21b068.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 88398e9ff81c0985313a55a41ecb48c37ab79151ebf7aa8f4a113696bf21b068.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce niba2425.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" niba2425.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce niba4794.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" niba4794.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4668 f2888Uy.exe 4668 f2888Uy.exe 4928 h20wT75.exe 4928 h20wT75.exe 4472 iGulO40.exe 4472 iGulO40.exe 4660 l63ny74.exe 4660 l63ny74.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4668 f2888Uy.exe Token: SeDebugPrivilege 4928 h20wT75.exe Token: SeDebugPrivilege 4472 iGulO40.exe Token: SeDebugPrivilege 4660 l63ny74.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 5044 wrote to memory of 2120 5044 88398e9ff81c0985313a55a41ecb48c37ab79151ebf7aa8f4a113696bf21b068.exe 66 PID 5044 wrote to memory of 2120 5044 88398e9ff81c0985313a55a41ecb48c37ab79151ebf7aa8f4a113696bf21b068.exe 66 PID 5044 wrote to memory of 2120 5044 88398e9ff81c0985313a55a41ecb48c37ab79151ebf7aa8f4a113696bf21b068.exe 66 PID 2120 wrote to memory of 4248 2120 niba2425.exe 67 PID 2120 wrote to memory of 4248 2120 niba2425.exe 67 PID 2120 wrote to memory of 4248 2120 niba2425.exe 67 PID 4248 wrote to memory of 4668 4248 niba4794.exe 68 PID 4248 wrote to memory of 4668 4248 niba4794.exe 68 PID 4248 wrote to memory of 4928 4248 niba4794.exe 69 PID 4248 wrote to memory of 4928 4248 niba4794.exe 69 PID 4248 wrote to memory of 4928 4248 niba4794.exe 69 PID 2120 wrote to memory of 4472 2120 niba2425.exe 70 PID 2120 wrote to memory of 4472 2120 niba2425.exe 70 PID 2120 wrote to memory of 4472 2120 niba2425.exe 70 PID 5044 wrote to memory of 4660 5044 88398e9ff81c0985313a55a41ecb48c37ab79151ebf7aa8f4a113696bf21b068.exe 72 PID 5044 wrote to memory of 4660 5044 88398e9ff81c0985313a55a41ecb48c37ab79151ebf7aa8f4a113696bf21b068.exe 72 PID 5044 wrote to memory of 4660 5044 88398e9ff81c0985313a55a41ecb48c37ab79151ebf7aa8f4a113696bf21b068.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\88398e9ff81c0985313a55a41ecb48c37ab79151ebf7aa8f4a113696bf21b068.exe"C:\Users\Admin\AppData\Local\Temp\88398e9ff81c0985313a55a41ecb48c37ab79151ebf7aa8f4a113696bf21b068.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba2425.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba2425.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba4794.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba4794.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f2888Uy.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f2888Uy.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4668
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h20wT75.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h20wT75.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4928
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iGulO40.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iGulO40.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4472
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l63ny74.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l63ny74.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4660
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD56c4c2a56d5dd785adbe4fe60fa3cc1f2
SHA1f8bd4379310258f8e54c47b56f5eec7394adb9a2
SHA256b182f2d3d49bdda2e29a0ed312deef4bee03983de54080c5e97ad6422de192d2
SHA512f6958cab80e2f7736cea307b51be546e50acd5494b72db0343a09e6ef8c446114f51be6c9826fcb6e9f7190e4ec8415c0a403c3c1706183577c2604b877ff830
-
Filesize
175KB
MD56c4c2a56d5dd785adbe4fe60fa3cc1f2
SHA1f8bd4379310258f8e54c47b56f5eec7394adb9a2
SHA256b182f2d3d49bdda2e29a0ed312deef4bee03983de54080c5e97ad6422de192d2
SHA512f6958cab80e2f7736cea307b51be546e50acd5494b72db0343a09e6ef8c446114f51be6c9826fcb6e9f7190e4ec8415c0a403c3c1706183577c2604b877ff830
-
Filesize
676KB
MD5d95a2548d49a7600a9a865ea2e8f3e2a
SHA1b6a087a1572bb9e5e50a670c1b91443bb5e2c825
SHA2567c0b81145a70ad8989ad92e19f176068c5d0d0925b2eb8ae8f799a777fe5da4d
SHA5122b7a2d98cf5c3e4af2aa505ca62b76d43954486ddc2892b0725c58fe7233d55ecd7c5a3c27ce750066f12400e1a1d8449fa04ca849672132cda6b023483d2d5d
-
Filesize
676KB
MD5d95a2548d49a7600a9a865ea2e8f3e2a
SHA1b6a087a1572bb9e5e50a670c1b91443bb5e2c825
SHA2567c0b81145a70ad8989ad92e19f176068c5d0d0925b2eb8ae8f799a777fe5da4d
SHA5122b7a2d98cf5c3e4af2aa505ca62b76d43954486ddc2892b0725c58fe7233d55ecd7c5a3c27ce750066f12400e1a1d8449fa04ca849672132cda6b023483d2d5d
-
Filesize
349KB
MD5aa64dc13e80527fcc251736bf4d10a2c
SHA1847f86d295d2dbcd8293358449ae2a7341309cf6
SHA25648a6533292f6e22c4fdbe84ec887b975bd9119c13384f8d26af3912624b8af21
SHA51294135a738376c004e090f11e3b2a504d4d29ed0efd258f13cfd1849fee8ed272ceaa9f3555195132613dd5ade3c787d49bf31301d26388b07c43123ad9522f93
-
Filesize
349KB
MD5aa64dc13e80527fcc251736bf4d10a2c
SHA1847f86d295d2dbcd8293358449ae2a7341309cf6
SHA25648a6533292f6e22c4fdbe84ec887b975bd9119c13384f8d26af3912624b8af21
SHA51294135a738376c004e090f11e3b2a504d4d29ed0efd258f13cfd1849fee8ed272ceaa9f3555195132613dd5ade3c787d49bf31301d26388b07c43123ad9522f93
-
Filesize
334KB
MD536a630afcd567f371af08601cc1f9f8d
SHA167519fe4fa01639baea7c91db26dd92412cf427f
SHA256e91e421b5f09f158801ebcba5e4c158699e1cdf57f3113f735a9c92fa29b130e
SHA5128e5e4da57e7951d9a6fb2e18556da45f48b950a1a2c865f1744c13907a2e1501edf0cb9fa91cfec686567ff8f10c9648c75f61b08e5e1f8b0c46f05f4129f50f
-
Filesize
334KB
MD536a630afcd567f371af08601cc1f9f8d
SHA167519fe4fa01639baea7c91db26dd92412cf427f
SHA256e91e421b5f09f158801ebcba5e4c158699e1cdf57f3113f735a9c92fa29b130e
SHA5128e5e4da57e7951d9a6fb2e18556da45f48b950a1a2c865f1744c13907a2e1501edf0cb9fa91cfec686567ff8f10c9648c75f61b08e5e1f8b0c46f05f4129f50f
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
290KB
MD5e6c9638787c91cf6226fe44512d7155a
SHA1a90e30d0f4a23150c6a915a864110436cb3549a1
SHA2569b2aa59104bc44588c93dca5c9d4e59f42525afada6dee07eb4da20e0eb06cf4
SHA512a76ad22e078535eb1b4443a9dcff0311e422c5c0a7cbd269a759694b21819a5d63c39705ad5a7a7bd37130bb480a86588aebbe52b21eee84c40ff5d4a29b2eac
-
Filesize
290KB
MD5e6c9638787c91cf6226fe44512d7155a
SHA1a90e30d0f4a23150c6a915a864110436cb3549a1
SHA2569b2aa59104bc44588c93dca5c9d4e59f42525afada6dee07eb4da20e0eb06cf4
SHA512a76ad22e078535eb1b4443a9dcff0311e422c5c0a7cbd269a759694b21819a5d63c39705ad5a7a7bd37130bb480a86588aebbe52b21eee84c40ff5d4a29b2eac