Analysis
-
max time kernel
87s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19-03-2023 09:12
Static task
static1
Behavioral task
behavioral1
Sample
8fdcaa817ab20b80c3c152dce5cefe19e1ad79c060947122bd9e5b45554a32f0.exe
Resource
win10v2004-20230220-en
General
-
Target
8fdcaa817ab20b80c3c152dce5cefe19e1ad79c060947122bd9e5b45554a32f0.exe
-
Size
836KB
-
MD5
b2ae86a7a394bfd92885bf965488688f
-
SHA1
57dd12246541a1450352c32f98c2cac74696da01
-
SHA256
8fdcaa817ab20b80c3c152dce5cefe19e1ad79c060947122bd9e5b45554a32f0
-
SHA512
07cfdd0a9638bfa36b73d6d6dbd262288ce95ae3f3db65ffdc7b2e37090fcfe75163bdf2e45eb1bc8d670ef773533db9259d51dcfa16bba39fb16fbfde047fa4
-
SSDEEP
12288:KMrDy90N2T227bPCg2K+iIpgZh1PejyfdKG1DdVt/CVr33w9PDk7vDB1MWkUMGip:xyuInPCCqOT0Gx/6bKA7vDX0GT6
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
ruka
193.233.20.28:4125
-
auth_value
5d1d0e51ebe1e3f16cca573ff651c43c
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" f8997sv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h01xT24.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h01xT24.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h01xT24.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection f8997sv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" f8997sv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" f8997sv.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h01xT24.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h01xT24.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h01xT24.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" f8997sv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" f8997sv.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/8-202-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/8-205-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/8-203-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/8-207-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/8-209-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/8-212-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/8-216-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/8-215-0x0000000004890000-0x00000000048A0000-memory.dmp family_redline behavioral1/memory/8-219-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/8-221-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/8-223-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/8-225-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/8-227-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/8-229-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/8-231-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/8-233-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/8-235-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/8-237-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/8-239-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 4208 niba1200.exe 1780 niba3226.exe 4352 f8997sv.exe 4072 h01xT24.exe 8 iJJoa04.exe 4864 l27ET62.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h01xT24.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h01xT24.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" f8997sv.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 8fdcaa817ab20b80c3c152dce5cefe19e1ad79c060947122bd9e5b45554a32f0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8fdcaa817ab20b80c3c152dce5cefe19e1ad79c060947122bd9e5b45554a32f0.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce niba1200.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" niba1200.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce niba3226.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" niba3226.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 5016 4072 WerFault.exe 88 1452 8 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4352 f8997sv.exe 4352 f8997sv.exe 4072 h01xT24.exe 4072 h01xT24.exe 8 iJJoa04.exe 8 iJJoa04.exe 4864 l27ET62.exe 4864 l27ET62.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4352 f8997sv.exe Token: SeDebugPrivilege 4072 h01xT24.exe Token: SeDebugPrivilege 8 iJJoa04.exe Token: SeDebugPrivilege 4864 l27ET62.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4236 wrote to memory of 4208 4236 8fdcaa817ab20b80c3c152dce5cefe19e1ad79c060947122bd9e5b45554a32f0.exe 83 PID 4236 wrote to memory of 4208 4236 8fdcaa817ab20b80c3c152dce5cefe19e1ad79c060947122bd9e5b45554a32f0.exe 83 PID 4236 wrote to memory of 4208 4236 8fdcaa817ab20b80c3c152dce5cefe19e1ad79c060947122bd9e5b45554a32f0.exe 83 PID 4208 wrote to memory of 1780 4208 niba1200.exe 84 PID 4208 wrote to memory of 1780 4208 niba1200.exe 84 PID 4208 wrote to memory of 1780 4208 niba1200.exe 84 PID 1780 wrote to memory of 4352 1780 niba3226.exe 85 PID 1780 wrote to memory of 4352 1780 niba3226.exe 85 PID 1780 wrote to memory of 4072 1780 niba3226.exe 88 PID 1780 wrote to memory of 4072 1780 niba3226.exe 88 PID 1780 wrote to memory of 4072 1780 niba3226.exe 88 PID 4208 wrote to memory of 8 4208 niba1200.exe 91 PID 4208 wrote to memory of 8 4208 niba1200.exe 91 PID 4208 wrote to memory of 8 4208 niba1200.exe 91 PID 4236 wrote to memory of 4864 4236 8fdcaa817ab20b80c3c152dce5cefe19e1ad79c060947122bd9e5b45554a32f0.exe 98 PID 4236 wrote to memory of 4864 4236 8fdcaa817ab20b80c3c152dce5cefe19e1ad79c060947122bd9e5b45554a32f0.exe 98 PID 4236 wrote to memory of 4864 4236 8fdcaa817ab20b80c3c152dce5cefe19e1ad79c060947122bd9e5b45554a32f0.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\8fdcaa817ab20b80c3c152dce5cefe19e1ad79c060947122bd9e5b45554a32f0.exe"C:\Users\Admin\AppData\Local\Temp\8fdcaa817ab20b80c3c152dce5cefe19e1ad79c060947122bd9e5b45554a32f0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba1200.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba1200.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba3226.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba3226.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f8997sv.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f8997sv.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4352
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h01xT24.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h01xT24.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4072 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4072 -s 10285⤵
- Program crash
PID:5016
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iJJoa04.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iJJoa04.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:8 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8 -s 13644⤵
- Program crash
PID:1452
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l27ET62.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l27ET62.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4072 -ip 40721⤵PID:3776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 8 -ip 81⤵PID:1504
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD56c4c2a56d5dd785adbe4fe60fa3cc1f2
SHA1f8bd4379310258f8e54c47b56f5eec7394adb9a2
SHA256b182f2d3d49bdda2e29a0ed312deef4bee03983de54080c5e97ad6422de192d2
SHA512f6958cab80e2f7736cea307b51be546e50acd5494b72db0343a09e6ef8c446114f51be6c9826fcb6e9f7190e4ec8415c0a403c3c1706183577c2604b877ff830
-
Filesize
175KB
MD56c4c2a56d5dd785adbe4fe60fa3cc1f2
SHA1f8bd4379310258f8e54c47b56f5eec7394adb9a2
SHA256b182f2d3d49bdda2e29a0ed312deef4bee03983de54080c5e97ad6422de192d2
SHA512f6958cab80e2f7736cea307b51be546e50acd5494b72db0343a09e6ef8c446114f51be6c9826fcb6e9f7190e4ec8415c0a403c3c1706183577c2604b877ff830
-
Filesize
694KB
MD53be4a956a239cd855e656253e03e2ce7
SHA1193941ccedfb023d87105cda9e38a675548efd03
SHA2569d7b9261f2bc9b3399156fe2409f396f8e8ef1fb2f5471e807980291d53615ef
SHA512852c696532abc7601c6c80365be76fee12032cea3c003d3f0ff71372efff7aaa81485aab92da12ebe1ebf65aef888fcad9de1e8f7d25e396d7bb1f2b077a1170
-
Filesize
694KB
MD53be4a956a239cd855e656253e03e2ce7
SHA1193941ccedfb023d87105cda9e38a675548efd03
SHA2569d7b9261f2bc9b3399156fe2409f396f8e8ef1fb2f5471e807980291d53615ef
SHA512852c696532abc7601c6c80365be76fee12032cea3c003d3f0ff71372efff7aaa81485aab92da12ebe1ebf65aef888fcad9de1e8f7d25e396d7bb1f2b077a1170
-
Filesize
391KB
MD53587248040029f30b57a39ce357ac1bb
SHA1976c7171a1d70a692ed31356ec5c865f86ecf961
SHA25630d8e5476363aaa62ec14e102f64b7941dd3b5e1f2787094c731ad0891bcf44a
SHA51210e8a69d79038a287b05d7766055ca053df34c2299030d7aff61bcb74bc1f8ebe7aa019c656bb83dc45f2407d46dd6d8d841f3891674613c7a44cfb394caef9d
-
Filesize
391KB
MD53587248040029f30b57a39ce357ac1bb
SHA1976c7171a1d70a692ed31356ec5c865f86ecf961
SHA25630d8e5476363aaa62ec14e102f64b7941dd3b5e1f2787094c731ad0891bcf44a
SHA51210e8a69d79038a287b05d7766055ca053df34c2299030d7aff61bcb74bc1f8ebe7aa019c656bb83dc45f2407d46dd6d8d841f3891674613c7a44cfb394caef9d
-
Filesize
344KB
MD50c9292c659edf03a632187ff90ab9a12
SHA1ed28d2224b147b16f910dd7a62a4edc6da3e7316
SHA2565d7380b96328808bbcec57d56e66bc1ec99e030b1c406bce0a158ee5b0bbbdce
SHA512f65c4ee6a363d234aa870b7f0d083180e337615a5dd65c8cb0e7b3b8468b7f60c652a9f9d7a49dddd947c451bd1afdf2faa50da65b98e2bdc1fc5b41de5e12bb
-
Filesize
344KB
MD50c9292c659edf03a632187ff90ab9a12
SHA1ed28d2224b147b16f910dd7a62a4edc6da3e7316
SHA2565d7380b96328808bbcec57d56e66bc1ec99e030b1c406bce0a158ee5b0bbbdce
SHA512f65c4ee6a363d234aa870b7f0d083180e337615a5dd65c8cb0e7b3b8468b7f60c652a9f9d7a49dddd947c451bd1afdf2faa50da65b98e2bdc1fc5b41de5e12bb
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
333KB
MD526b4f35363006564c38d79e8c06bc7bc
SHA1a23d32fbe78c4ea7d79a8f81ad666dd4445f1de1
SHA2562406bc13f67bbd266aae7cbda172088775a1fbb420d5b512eaf898455dba90dd
SHA5125c51f60b1bcbf86b4175589ce29e33e283579f9c28424e942f121dff12114738699b631e38ee276fa630db5e6a4aa01e1965f2bd4edea0942bd3868c19154278
-
Filesize
333KB
MD526b4f35363006564c38d79e8c06bc7bc
SHA1a23d32fbe78c4ea7d79a8f81ad666dd4445f1de1
SHA2562406bc13f67bbd266aae7cbda172088775a1fbb420d5b512eaf898455dba90dd
SHA5125c51f60b1bcbf86b4175589ce29e33e283579f9c28424e942f121dff12114738699b631e38ee276fa630db5e6a4aa01e1965f2bd4edea0942bd3868c19154278