Analysis
-
max time kernel
57s -
max time network
69s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
19/03/2023, 00:35
Static task
static1
Behavioral task
behavioral1
Sample
5343026eefc6e3e86fa8799bacc73b5da65e8178fc720a8556e68459edb1c9d8.exe
Resource
win10-20230220-en
General
-
Target
5343026eefc6e3e86fa8799bacc73b5da65e8178fc720a8556e68459edb1c9d8.exe
-
Size
836KB
-
MD5
cee8ca3f2e1fb0a20f274228580dd444
-
SHA1
6c47b664e82be101d9674956d2b749426ea746a9
-
SHA256
5343026eefc6e3e86fa8799bacc73b5da65e8178fc720a8556e68459edb1c9d8
-
SHA512
3d5057fea77e385cb3738132c598537785471352f4569017bbd56509a29d1541411605f18ae9c838d175968fd3eda7b7fbbd88158909655cd330a2de63c89b51
-
SSDEEP
12288:gMr4y90c3P+QUNvpkSw8WjpsSuv3BWSLMdHd3IsvuXC/xA1YAmE+E1BLJ+Qdv:IyHQl7NfBTSHhIsvj/xA0ESQdv
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
ruka
193.233.20.28:4125
-
auth_value
5d1d0e51ebe1e3f16cca573ff651c43c
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h57Ul55.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h57Ul55.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" f5244KH.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" f5244KH.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" f5244KH.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" f5244KH.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h57Ul55.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" f5244KH.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h57Ul55.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h57Ul55.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/1516-192-0x0000000004BA0000-0x0000000004BE6000-memory.dmp family_redline behavioral1/memory/1516-193-0x0000000004D50000-0x0000000004D94000-memory.dmp family_redline behavioral1/memory/1516-194-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/1516-195-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/1516-197-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/1516-199-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/1516-201-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/1516-203-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/1516-205-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/1516-207-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/1516-209-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/1516-211-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/1516-216-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/1516-219-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/1516-221-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/1516-223-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/1516-225-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/1516-227-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/1516-229-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/1516-231-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/1516-1113-0x0000000004DF0000-0x0000000004E00000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 2524 niba4439.exe 3192 niba6489.exe 3944 f5244KH.exe 3932 h57Ul55.exe 1516 izPRH04.exe 708 l41KC41.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h57Ul55.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h57Ul55.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" f5244KH.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce niba6489.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" niba6489.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5343026eefc6e3e86fa8799bacc73b5da65e8178fc720a8556e68459edb1c9d8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5343026eefc6e3e86fa8799bacc73b5da65e8178fc720a8556e68459edb1c9d8.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce niba4439.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" niba4439.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3944 f5244KH.exe 3944 f5244KH.exe 3932 h57Ul55.exe 3932 h57Ul55.exe 1516 izPRH04.exe 1516 izPRH04.exe 708 l41KC41.exe 708 l41KC41.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3944 f5244KH.exe Token: SeDebugPrivilege 3932 h57Ul55.exe Token: SeDebugPrivilege 1516 izPRH04.exe Token: SeDebugPrivilege 708 l41KC41.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2288 wrote to memory of 2524 2288 5343026eefc6e3e86fa8799bacc73b5da65e8178fc720a8556e68459edb1c9d8.exe 66 PID 2288 wrote to memory of 2524 2288 5343026eefc6e3e86fa8799bacc73b5da65e8178fc720a8556e68459edb1c9d8.exe 66 PID 2288 wrote to memory of 2524 2288 5343026eefc6e3e86fa8799bacc73b5da65e8178fc720a8556e68459edb1c9d8.exe 66 PID 2524 wrote to memory of 3192 2524 niba4439.exe 67 PID 2524 wrote to memory of 3192 2524 niba4439.exe 67 PID 2524 wrote to memory of 3192 2524 niba4439.exe 67 PID 3192 wrote to memory of 3944 3192 niba6489.exe 68 PID 3192 wrote to memory of 3944 3192 niba6489.exe 68 PID 3192 wrote to memory of 3932 3192 niba6489.exe 69 PID 3192 wrote to memory of 3932 3192 niba6489.exe 69 PID 3192 wrote to memory of 3932 3192 niba6489.exe 69 PID 2524 wrote to memory of 1516 2524 niba4439.exe 70 PID 2524 wrote to memory of 1516 2524 niba4439.exe 70 PID 2524 wrote to memory of 1516 2524 niba4439.exe 70 PID 2288 wrote to memory of 708 2288 5343026eefc6e3e86fa8799bacc73b5da65e8178fc720a8556e68459edb1c9d8.exe 72 PID 2288 wrote to memory of 708 2288 5343026eefc6e3e86fa8799bacc73b5da65e8178fc720a8556e68459edb1c9d8.exe 72 PID 2288 wrote to memory of 708 2288 5343026eefc6e3e86fa8799bacc73b5da65e8178fc720a8556e68459edb1c9d8.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\5343026eefc6e3e86fa8799bacc73b5da65e8178fc720a8556e68459edb1c9d8.exe"C:\Users\Admin\AppData\Local\Temp\5343026eefc6e3e86fa8799bacc73b5da65e8178fc720a8556e68459edb1c9d8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba4439.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba4439.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba6489.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba6489.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f5244KH.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f5244KH.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3944
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h57Ul55.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h57Ul55.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3932
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\izPRH04.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\izPRH04.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1516
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l41KC41.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l41KC41.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:708
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD56c4c2a56d5dd785adbe4fe60fa3cc1f2
SHA1f8bd4379310258f8e54c47b56f5eec7394adb9a2
SHA256b182f2d3d49bdda2e29a0ed312deef4bee03983de54080c5e97ad6422de192d2
SHA512f6958cab80e2f7736cea307b51be546e50acd5494b72db0343a09e6ef8c446114f51be6c9826fcb6e9f7190e4ec8415c0a403c3c1706183577c2604b877ff830
-
Filesize
175KB
MD56c4c2a56d5dd785adbe4fe60fa3cc1f2
SHA1f8bd4379310258f8e54c47b56f5eec7394adb9a2
SHA256b182f2d3d49bdda2e29a0ed312deef4bee03983de54080c5e97ad6422de192d2
SHA512f6958cab80e2f7736cea307b51be546e50acd5494b72db0343a09e6ef8c446114f51be6c9826fcb6e9f7190e4ec8415c0a403c3c1706183577c2604b877ff830
-
Filesize
694KB
MD5d752d8668c6a87cd55e860a35b52ebe5
SHA1f5c0698e0af36eba42170129777d40966e06ce62
SHA256d32ca05b227bcdadce85a7ad98fb5212b8ebbf0ebae97d2ce7aff7c17b365471
SHA512b6724fb612cf52e3cd31576ece930ae8ff2c15ce1d7cc240269ec26316391ffd1d26de6582e4093f56f7ef8878b8dc536cc9db423b8e90915c40c8767bf71a58
-
Filesize
694KB
MD5d752d8668c6a87cd55e860a35b52ebe5
SHA1f5c0698e0af36eba42170129777d40966e06ce62
SHA256d32ca05b227bcdadce85a7ad98fb5212b8ebbf0ebae97d2ce7aff7c17b365471
SHA512b6724fb612cf52e3cd31576ece930ae8ff2c15ce1d7cc240269ec26316391ffd1d26de6582e4093f56f7ef8878b8dc536cc9db423b8e90915c40c8767bf71a58
-
Filesize
391KB
MD59cca7a971af44c39d2d34219313039ff
SHA1364b612893740be6d32d17935bc2a80b96e4bcd7
SHA25620f28a091054822a0becf1c50efcab193d93ae3601b8297b7b96ff02906e95aa
SHA51225ab2e0440772751191f00c5521dba37074b4bb0aaeb9a8c8e00f6b73b114812c5a947c166157ce0bf319a8beed6ca5023203abf9d9deed39bca7bc739acd821
-
Filesize
391KB
MD59cca7a971af44c39d2d34219313039ff
SHA1364b612893740be6d32d17935bc2a80b96e4bcd7
SHA25620f28a091054822a0becf1c50efcab193d93ae3601b8297b7b96ff02906e95aa
SHA51225ab2e0440772751191f00c5521dba37074b4bb0aaeb9a8c8e00f6b73b114812c5a947c166157ce0bf319a8beed6ca5023203abf9d9deed39bca7bc739acd821
-
Filesize
344KB
MD589b4f5cec7b80981f377aa25deb726f1
SHA12b6c249a857846eadb077d7001fc70e8cc7b92a0
SHA2569b4baabdad40f82ef6aa47d40f66f870477e78f007a37f146c094a100e6e1c04
SHA5120ee4c4d12966f5d0fce1901aeab7b8a9d698d1308afad9e7be4a05c226032bf23bc685d0777a4d8a9806993be92a0132761d31815bda543611312c26e99e11fe
-
Filesize
344KB
MD589b4f5cec7b80981f377aa25deb726f1
SHA12b6c249a857846eadb077d7001fc70e8cc7b92a0
SHA2569b4baabdad40f82ef6aa47d40f66f870477e78f007a37f146c094a100e6e1c04
SHA5120ee4c4d12966f5d0fce1901aeab7b8a9d698d1308afad9e7be4a05c226032bf23bc685d0777a4d8a9806993be92a0132761d31815bda543611312c26e99e11fe
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
333KB
MD5e2151ee216de322a1c3c5a7a9353bdd5
SHA13d9f049d90ceb02bf3038d03e3db32ee93d7c360
SHA256e845424b3e6face22b56e544476182b4c9f7e0b8c799ffaacdf9a04d9477c2ae
SHA51298689a5a87423230fb742d814f31e42ebab0bf47ff1b745e63d3715ae25f5fb53ac650477f2e2fd4b076f13be862672b04783dad6d127c4e893a4e73639e6f6f
-
Filesize
333KB
MD5e2151ee216de322a1c3c5a7a9353bdd5
SHA13d9f049d90ceb02bf3038d03e3db32ee93d7c360
SHA256e845424b3e6face22b56e544476182b4c9f7e0b8c799ffaacdf9a04d9477c2ae
SHA51298689a5a87423230fb742d814f31e42ebab0bf47ff1b745e63d3715ae25f5fb53ac650477f2e2fd4b076f13be862672b04783dad6d127c4e893a4e73639e6f6f