Analysis
-
max time kernel
55s -
max time network
58s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
19/03/2023, 06:57
Static task
static1
Behavioral task
behavioral1
Sample
241496d527b9607dba4f64f9ad13f42149189295070c19b8b37d2fae551fd2bf.exe
Resource
win10-20230220-en
General
-
Target
241496d527b9607dba4f64f9ad13f42149189295070c19b8b37d2fae551fd2bf.exe
-
Size
851KB
-
MD5
5ca9f06872888453734a2a2f84652106
-
SHA1
1229b505cd58d404263a39920b2bb9ef68ddb50d
-
SHA256
241496d527b9607dba4f64f9ad13f42149189295070c19b8b37d2fae551fd2bf
-
SHA512
7fc459da5f20abe1751944ca52c1e5673605e788a99c12c1cc2beb2d23d66a0c60904fce87767eae8f1b326de20f2edb737fa225311749a740f8e8c0404a122f
-
SSDEEP
24576:/yyEMBa2oCRUMcGbZzDcQ83Gla3vDacOH/:KWa/CyE0HGla3vDnOH
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
relon
193.233.20.30:4125
-
auth_value
17da69809725577b595e217ba006b869
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c41gN05.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b2677HS.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b2677HS.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b2677HS.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c41gN05.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c41gN05.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c41gN05.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c41gN05.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b2677HS.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b2677HS.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/1144-189-0x00000000047B0000-0x00000000047F6000-memory.dmp family_redline behavioral1/memory/1144-190-0x00000000070D0000-0x0000000007114000-memory.dmp family_redline behavioral1/memory/1144-191-0x00000000070D0000-0x000000000710E000-memory.dmp family_redline behavioral1/memory/1144-192-0x00000000070D0000-0x000000000710E000-memory.dmp family_redline behavioral1/memory/1144-196-0x00000000070D0000-0x000000000710E000-memory.dmp family_redline behavioral1/memory/1144-197-0x0000000007210000-0x0000000007220000-memory.dmp family_redline behavioral1/memory/1144-199-0x00000000070D0000-0x000000000710E000-memory.dmp family_redline behavioral1/memory/1144-201-0x00000000070D0000-0x000000000710E000-memory.dmp family_redline behavioral1/memory/1144-203-0x00000000070D0000-0x000000000710E000-memory.dmp family_redline behavioral1/memory/1144-205-0x00000000070D0000-0x000000000710E000-memory.dmp family_redline behavioral1/memory/1144-207-0x00000000070D0000-0x000000000710E000-memory.dmp family_redline behavioral1/memory/1144-209-0x00000000070D0000-0x000000000710E000-memory.dmp family_redline behavioral1/memory/1144-211-0x00000000070D0000-0x000000000710E000-memory.dmp family_redline behavioral1/memory/1144-213-0x00000000070D0000-0x000000000710E000-memory.dmp family_redline behavioral1/memory/1144-215-0x00000000070D0000-0x000000000710E000-memory.dmp family_redline behavioral1/memory/1144-217-0x00000000070D0000-0x000000000710E000-memory.dmp family_redline behavioral1/memory/1144-219-0x00000000070D0000-0x000000000710E000-memory.dmp family_redline behavioral1/memory/1144-221-0x00000000070D0000-0x000000000710E000-memory.dmp family_redline behavioral1/memory/1144-223-0x00000000070D0000-0x000000000710E000-memory.dmp family_redline behavioral1/memory/1144-225-0x00000000070D0000-0x000000000710E000-memory.dmp family_redline behavioral1/memory/1144-227-0x00000000070D0000-0x000000000710E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 2436 tice4104.exe 2524 tice4821.exe 2124 b2677HS.exe 4160 c41gN05.exe 1144 dYdkb03.exe 5020 e83zt90.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b2677HS.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c41gN05.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c41gN05.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice4104.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice4104.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice4821.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice4821.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 241496d527b9607dba4f64f9ad13f42149189295070c19b8b37d2fae551fd2bf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 241496d527b9607dba4f64f9ad13f42149189295070c19b8b37d2fae551fd2bf.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2124 b2677HS.exe 2124 b2677HS.exe 4160 c41gN05.exe 4160 c41gN05.exe 1144 dYdkb03.exe 1144 dYdkb03.exe 5020 e83zt90.exe 5020 e83zt90.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2124 b2677HS.exe Token: SeDebugPrivilege 4160 c41gN05.exe Token: SeDebugPrivilege 1144 dYdkb03.exe Token: SeDebugPrivilege 5020 e83zt90.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2436 2204 241496d527b9607dba4f64f9ad13f42149189295070c19b8b37d2fae551fd2bf.exe 66 PID 2204 wrote to memory of 2436 2204 241496d527b9607dba4f64f9ad13f42149189295070c19b8b37d2fae551fd2bf.exe 66 PID 2204 wrote to memory of 2436 2204 241496d527b9607dba4f64f9ad13f42149189295070c19b8b37d2fae551fd2bf.exe 66 PID 2436 wrote to memory of 2524 2436 tice4104.exe 67 PID 2436 wrote to memory of 2524 2436 tice4104.exe 67 PID 2436 wrote to memory of 2524 2436 tice4104.exe 67 PID 2524 wrote to memory of 2124 2524 tice4821.exe 68 PID 2524 wrote to memory of 2124 2524 tice4821.exe 68 PID 2524 wrote to memory of 4160 2524 tice4821.exe 69 PID 2524 wrote to memory of 4160 2524 tice4821.exe 69 PID 2524 wrote to memory of 4160 2524 tice4821.exe 69 PID 2436 wrote to memory of 1144 2436 tice4104.exe 70 PID 2436 wrote to memory of 1144 2436 tice4104.exe 70 PID 2436 wrote to memory of 1144 2436 tice4104.exe 70 PID 2204 wrote to memory of 5020 2204 241496d527b9607dba4f64f9ad13f42149189295070c19b8b37d2fae551fd2bf.exe 72 PID 2204 wrote to memory of 5020 2204 241496d527b9607dba4f64f9ad13f42149189295070c19b8b37d2fae551fd2bf.exe 72 PID 2204 wrote to memory of 5020 2204 241496d527b9607dba4f64f9ad13f42149189295070c19b8b37d2fae551fd2bf.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\241496d527b9607dba4f64f9ad13f42149189295070c19b8b37d2fae551fd2bf.exe"C:\Users\Admin\AppData\Local\Temp\241496d527b9607dba4f64f9ad13f42149189295070c19b8b37d2fae551fd2bf.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice4104.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice4104.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice4821.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice4821.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2677HS.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2677HS.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2124
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c41gN05.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c41gN05.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4160
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dYdkb03.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dYdkb03.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1144
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e83zt90.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e83zt90.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5020
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD56fbff2d7c9ba7f0a71f02a5c70df9dfc
SHA1003da0075734cd2d7f201c5b0e4779b8e1f33621
SHA256cb56407367a42f61993842b66bcd24993a30c87116313c26d6af9e37bbb1b6b3
SHA51225842b9df4767b16096f2bfcedc9d368a9696e6c6d9c7b2c75987769a5b338ae04b23b1e89f18eef2244e84f04e4acf6af56643a97abfe5b605f66cba0bac27f
-
Filesize
175KB
MD56fbff2d7c9ba7f0a71f02a5c70df9dfc
SHA1003da0075734cd2d7f201c5b0e4779b8e1f33621
SHA256cb56407367a42f61993842b66bcd24993a30c87116313c26d6af9e37bbb1b6b3
SHA51225842b9df4767b16096f2bfcedc9d368a9696e6c6d9c7b2c75987769a5b338ae04b23b1e89f18eef2244e84f04e4acf6af56643a97abfe5b605f66cba0bac27f
-
Filesize
706KB
MD5a3aa504ff99a08b56ed57a9fdd69da76
SHA1f6edf7d7d69aa671e1d5f2b5cdb11f5a5003cf74
SHA256e70eacc9fcfe19fbf2d2a9eb050e2803dc1365f15a89baee26e63d1ae8c0e647
SHA5129ac43cd85b7dd98bb72452402ebf134b4c395709457f6141e9afe53bb7c8c0054a0a7ed88a50f27815e180cdbfbd0d9de729c9f662fbe282bb3d92892758db84
-
Filesize
706KB
MD5a3aa504ff99a08b56ed57a9fdd69da76
SHA1f6edf7d7d69aa671e1d5f2b5cdb11f5a5003cf74
SHA256e70eacc9fcfe19fbf2d2a9eb050e2803dc1365f15a89baee26e63d1ae8c0e647
SHA5129ac43cd85b7dd98bb72452402ebf134b4c395709457f6141e9afe53bb7c8c0054a0a7ed88a50f27815e180cdbfbd0d9de729c9f662fbe282bb3d92892758db84
-
Filesize
391KB
MD5b2c99ed90e107e7f2b59ac36be9650a0
SHA12d98c4bc94c510f9bc96fd7b822d7c4e67e47a25
SHA2564b7c16b60accc72b5681419826873300af501c618a541b951ec1e263f000c289
SHA512c78fa75e197e8dc444d180e0ba805d32e3dc5e056dd045504551fb25a047243fc43eee20b3c5a10eb82778ab1d93a1472811677ea4a17cc0bea4ce8f0dfd71ab
-
Filesize
391KB
MD5b2c99ed90e107e7f2b59ac36be9650a0
SHA12d98c4bc94c510f9bc96fd7b822d7c4e67e47a25
SHA2564b7c16b60accc72b5681419826873300af501c618a541b951ec1e263f000c289
SHA512c78fa75e197e8dc444d180e0ba805d32e3dc5e056dd045504551fb25a047243fc43eee20b3c5a10eb82778ab1d93a1472811677ea4a17cc0bea4ce8f0dfd71ab
-
Filesize
353KB
MD5033acb10cb5390e6c91def767b836d12
SHA166d30260e4bdc16dc0f602feb07b05542c859dc5
SHA256beca09949c82888a167535f5f2780ddfd1f7d8c01ea78b4dbc62eb314ce17681
SHA5126a13d803a2876d1d9ddbeb5920c1436c349c215a2df26b07a89b5ab505f6e8fd1828ae39237531ca79e536c8802fecb29325a79b101f083a4700983d29a63a42
-
Filesize
353KB
MD5033acb10cb5390e6c91def767b836d12
SHA166d30260e4bdc16dc0f602feb07b05542c859dc5
SHA256beca09949c82888a167535f5f2780ddfd1f7d8c01ea78b4dbc62eb314ce17681
SHA5126a13d803a2876d1d9ddbeb5920c1436c349c215a2df26b07a89b5ab505f6e8fd1828ae39237531ca79e536c8802fecb29325a79b101f083a4700983d29a63a42
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
333KB
MD5ff688d640a085c3c0f75a24a5d5b8b83
SHA119dfca18197e53384f58d3b54edfb8934f176b4c
SHA25615c560b28427af09a1a0b0c7e60dadf8e96c1cbce1607d517d1f1c70308d6dd4
SHA5127851b026a83836b614dd26e0962e0e7f8d6b252ba0ff0a0b7297dc247fb21683ff7e1617c0cc8ddac9e9ccad743f3ebadc0e32c30178f293377945aafbfc236a
-
Filesize
333KB
MD5ff688d640a085c3c0f75a24a5d5b8b83
SHA119dfca18197e53384f58d3b54edfb8934f176b4c
SHA25615c560b28427af09a1a0b0c7e60dadf8e96c1cbce1607d517d1f1c70308d6dd4
SHA5127851b026a83836b614dd26e0962e0e7f8d6b252ba0ff0a0b7297dc247fb21683ff7e1617c0cc8ddac9e9ccad743f3ebadc0e32c30178f293377945aafbfc236a