Analysis
-
max time kernel
143s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19-03-2023 07:52
Static task
static1
Behavioral task
behavioral1
Sample
9f2a2fc1dda81f7747cf49a1999b87e4.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
9f2a2fc1dda81f7747cf49a1999b87e4.exe
Resource
win10v2004-20230220-en
General
-
Target
9f2a2fc1dda81f7747cf49a1999b87e4.exe
-
Size
866KB
-
MD5
9f2a2fc1dda81f7747cf49a1999b87e4
-
SHA1
5abdc7ab4c726665bccb0f1557faa860455852ff
-
SHA256
6abbeec35a40919325f069ec47dccfc1b6d4132ef0f9114acc19778f1cfd21ea
-
SHA512
7e37517c6fc135fd3905d8851b73e82df160fb03dcfc23c44562b9aa68c8a5a887d4924ab1557ef6e3a57217252ab7b0fdf7adaa4ca21889a48ee6ffda7d7e1b
-
SSDEEP
12288:xMrBy90He3BbmlZh5uxsbqVTb149z0Tf3R0f8332Jtzs6j/cRJp/Y+62uSD+R1Mb:4yo4FWLWV1+z0Tq0nEtzvcRJmCDlmc
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
relon
193.233.20.30:4125
-
auth_value
17da69809725577b595e217ba006b869
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b5609il.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c30JV57.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c30JV57.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c30JV57.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b5609il.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b5609il.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b5609il.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b5609il.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b5609il.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c30JV57.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c30JV57.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c30JV57.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral2/memory/4876-208-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral2/memory/4876-207-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral2/memory/4876-210-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral2/memory/4876-212-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral2/memory/4876-214-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral2/memory/4876-216-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral2/memory/4876-218-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral2/memory/4876-220-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral2/memory/4876-222-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral2/memory/4876-224-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral2/memory/4876-226-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral2/memory/4876-230-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral2/memory/4876-228-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral2/memory/4876-232-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral2/memory/4876-234-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral2/memory/4876-236-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral2/memory/4876-238-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral2/memory/4876-1124-0x0000000007230000-0x0000000007240000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 2636 tice9853.exe 4396 tice9775.exe 1272 b5609il.exe 4460 c30JV57.exe 4876 dpaPD71.exe 3984 e97ID96.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b5609il.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c30JV57.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c30JV57.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9f2a2fc1dda81f7747cf49a1999b87e4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9f2a2fc1dda81f7747cf49a1999b87e4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice9853.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice9853.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice9775.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice9775.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1468 sc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 820 4876 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1272 b5609il.exe 1272 b5609il.exe 4460 c30JV57.exe 4460 c30JV57.exe 4876 dpaPD71.exe 4876 dpaPD71.exe 3984 e97ID96.exe 3984 e97ID96.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1272 b5609il.exe Token: SeDebugPrivilege 4460 c30JV57.exe Token: SeDebugPrivilege 4876 dpaPD71.exe Token: SeDebugPrivilege 3984 e97ID96.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2636 2032 9f2a2fc1dda81f7747cf49a1999b87e4.exe 85 PID 2032 wrote to memory of 2636 2032 9f2a2fc1dda81f7747cf49a1999b87e4.exe 85 PID 2032 wrote to memory of 2636 2032 9f2a2fc1dda81f7747cf49a1999b87e4.exe 85 PID 2636 wrote to memory of 4396 2636 tice9853.exe 86 PID 2636 wrote to memory of 4396 2636 tice9853.exe 86 PID 2636 wrote to memory of 4396 2636 tice9853.exe 86 PID 4396 wrote to memory of 1272 4396 tice9775.exe 87 PID 4396 wrote to memory of 1272 4396 tice9775.exe 87 PID 4396 wrote to memory of 4460 4396 tice9775.exe 91 PID 4396 wrote to memory of 4460 4396 tice9775.exe 91 PID 4396 wrote to memory of 4460 4396 tice9775.exe 91 PID 2636 wrote to memory of 4876 2636 tice9853.exe 92 PID 2636 wrote to memory of 4876 2636 tice9853.exe 92 PID 2636 wrote to memory of 4876 2636 tice9853.exe 92 PID 2032 wrote to memory of 3984 2032 9f2a2fc1dda81f7747cf49a1999b87e4.exe 101 PID 2032 wrote to memory of 3984 2032 9f2a2fc1dda81f7747cf49a1999b87e4.exe 101 PID 2032 wrote to memory of 3984 2032 9f2a2fc1dda81f7747cf49a1999b87e4.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f2a2fc1dda81f7747cf49a1999b87e4.exe"C:\Users\Admin\AppData\Local\Temp\9f2a2fc1dda81f7747cf49a1999b87e4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice9853.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice9853.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice9775.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice9775.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5609il.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5609il.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1272
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c30JV57.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c30JV57.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4460
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dpaPD71.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dpaPD71.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4876 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 18404⤵
- Program crash
PID:820
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e97ID96.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e97ID96.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4876 -ip 48761⤵PID:972
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:1468
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD56fbff2d7c9ba7f0a71f02a5c70df9dfc
SHA1003da0075734cd2d7f201c5b0e4779b8e1f33621
SHA256cb56407367a42f61993842b66bcd24993a30c87116313c26d6af9e37bbb1b6b3
SHA51225842b9df4767b16096f2bfcedc9d368a9696e6c6d9c7b2c75987769a5b338ae04b23b1e89f18eef2244e84f04e4acf6af56643a97abfe5b605f66cba0bac27f
-
Filesize
175KB
MD56fbff2d7c9ba7f0a71f02a5c70df9dfc
SHA1003da0075734cd2d7f201c5b0e4779b8e1f33621
SHA256cb56407367a42f61993842b66bcd24993a30c87116313c26d6af9e37bbb1b6b3
SHA51225842b9df4767b16096f2bfcedc9d368a9696e6c6d9c7b2c75987769a5b338ae04b23b1e89f18eef2244e84f04e4acf6af56643a97abfe5b605f66cba0bac27f
-
Filesize
721KB
MD526ebfd9c205fcefcf63ed869b401f52b
SHA1f5fb4e23ec254ca4d678b6bde2d75a63f28052fd
SHA2564160bd15b0817eb6b122dd27cc15ceae6e398a12155ac6e618afad8dabdc83d9
SHA512344e9d0cdd68e7ce55a4fa27e0a45bd254fc02ba724c3613382351009d3c7f973e132125718adecb788e36bd58ee91dc51a4b232ff48253cb54a0709335c6f9a
-
Filesize
721KB
MD526ebfd9c205fcefcf63ed869b401f52b
SHA1f5fb4e23ec254ca4d678b6bde2d75a63f28052fd
SHA2564160bd15b0817eb6b122dd27cc15ceae6e398a12155ac6e618afad8dabdc83d9
SHA512344e9d0cdd68e7ce55a4fa27e0a45bd254fc02ba724c3613382351009d3c7f973e132125718adecb788e36bd58ee91dc51a4b232ff48253cb54a0709335c6f9a
-
Filesize
391KB
MD534506dbc96d1f09df75a08a6296a9360
SHA172946d6177c42f1522251e0d8535e75e4de37ca8
SHA2561fc305bd660a80cd21dd7adb484d96284ef8d8898557a5c6e454bdfce70686c6
SHA512877a2b1f73c3d79ea9e6e5caf3be87ee2c49de0c779741e6c67d96021f269d89f1406d5c52b58fe817dd969d7b43ca04ebf3c44d3214bcdc270531b772eefb3a
-
Filesize
391KB
MD534506dbc96d1f09df75a08a6296a9360
SHA172946d6177c42f1522251e0d8535e75e4de37ca8
SHA2561fc305bd660a80cd21dd7adb484d96284ef8d8898557a5c6e454bdfce70686c6
SHA512877a2b1f73c3d79ea9e6e5caf3be87ee2c49de0c779741e6c67d96021f269d89f1406d5c52b58fe817dd969d7b43ca04ebf3c44d3214bcdc270531b772eefb3a
-
Filesize
368KB
MD5ca54334bd51c57e7decdb1ad786f8dc0
SHA1ab8202995ace7d8eb8a14a5070190d86e192e646
SHA25666e341cb8bd750366cd87fd807fa174e5401a7b14fae708364acf0ccd5e5d6a3
SHA512bba5c6e12e090a5f898cb1f804127b15819265eb10dfac131a2810503057b83f2cf257eebd3525c0c20a87db07d2ee06d9ab5ee7fa26b5804ddb59cc68977100
-
Filesize
368KB
MD5ca54334bd51c57e7decdb1ad786f8dc0
SHA1ab8202995ace7d8eb8a14a5070190d86e192e646
SHA25666e341cb8bd750366cd87fd807fa174e5401a7b14fae708364acf0ccd5e5d6a3
SHA512bba5c6e12e090a5f898cb1f804127b15819265eb10dfac131a2810503057b83f2cf257eebd3525c0c20a87db07d2ee06d9ab5ee7fa26b5804ddb59cc68977100
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
371KB
MD556ba78d46d205b34297e21562bf7b3d9
SHA1019d574df9d64d5f6f41c8902982c865b415bd4d
SHA256061316f7deaa9dbf1739d4cf77926a8d5368aa22b9c5dbbc034c53894511d05a
SHA512aecf463501b9e58432a0ca4079297f1fe77cd9ba183c952a6dbd4d40a5d1d87e3bb9cbafa0952417959ac46f7a2e1cd1f9b65c0a2a794b858a00ee3a6991c466
-
Filesize
371KB
MD556ba78d46d205b34297e21562bf7b3d9
SHA1019d574df9d64d5f6f41c8902982c865b415bd4d
SHA256061316f7deaa9dbf1739d4cf77926a8d5368aa22b9c5dbbc034c53894511d05a
SHA512aecf463501b9e58432a0ca4079297f1fe77cd9ba183c952a6dbd4d40a5d1d87e3bb9cbafa0952417959ac46f7a2e1cd1f9b65c0a2a794b858a00ee3a6991c466