Analysis
-
max time kernel
135s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2023, 12:25
Static task
static1
Behavioral task
behavioral1
Sample
5ace8cba16c7be61c49d5cfa8063a0291e529eba5dd00d8d9b94891b2ebc965c.exe
Resource
win10v2004-20230221-en
General
-
Target
5ace8cba16c7be61c49d5cfa8063a0291e529eba5dd00d8d9b94891b2ebc965c.exe
-
Size
836KB
-
MD5
de1c0df499a0bcddb6c3e982e8be33c6
-
SHA1
5bb5a00009f726115a9fd71602d6fe40f088ed9c
-
SHA256
5ace8cba16c7be61c49d5cfa8063a0291e529eba5dd00d8d9b94891b2ebc965c
-
SHA512
59321b04eb40b57b61ee9f400db542aef4dcce7fcc583f8fd63bcee1490fe98cc969336a55532261fd586dadd514cf60f07920c6c981b5c0d236492a9c7d8590
-
SSDEEP
12288:1Mrmy90xJYxVjfF6AgFS/90+Ud4+yHxUVp4hQIrKborYB4gXZqUaRheSbdVqH:3ypBSFS/k4t46rKbBZZqUaaSaH
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
ruka
193.233.20.28:4125
-
auth_value
5d1d0e51ebe1e3f16cca573ff651c43c
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" f2146Am.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" f2146Am.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" f2146Am.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h31zz68.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h31zz68.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h31zz68.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h31zz68.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection f2146Am.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" f2146Am.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" f2146Am.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h31zz68.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h31zz68.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/3936-210-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/3936-206-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/3936-208-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/3936-212-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/3936-214-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/3936-216-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/3936-218-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/3936-220-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/3936-222-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/3936-224-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/3936-226-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/3936-228-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/3936-232-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/3936-230-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/3936-234-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/3936-236-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/3936-238-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/3936-240-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 2020 niba8724.exe 4560 niba8654.exe 4516 f2146Am.exe 4480 h31zz68.exe 3936 igpMp44.exe 3860 l09Zz33.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" f2146Am.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h31zz68.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h31zz68.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce niba8654.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" niba8654.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5ace8cba16c7be61c49d5cfa8063a0291e529eba5dd00d8d9b94891b2ebc965c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5ace8cba16c7be61c49d5cfa8063a0291e529eba5dd00d8d9b94891b2ebc965c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce niba8724.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" niba8724.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2448 4480 WerFault.exe 87 4492 3936 WerFault.exe 94 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4516 f2146Am.exe 4516 f2146Am.exe 4480 h31zz68.exe 4480 h31zz68.exe 3936 igpMp44.exe 3936 igpMp44.exe 3860 l09Zz33.exe 3860 l09Zz33.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4516 f2146Am.exe Token: SeDebugPrivilege 4480 h31zz68.exe Token: SeDebugPrivilege 3936 igpMp44.exe Token: SeDebugPrivilege 3860 l09Zz33.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4840 wrote to memory of 2020 4840 5ace8cba16c7be61c49d5cfa8063a0291e529eba5dd00d8d9b94891b2ebc965c.exe 83 PID 4840 wrote to memory of 2020 4840 5ace8cba16c7be61c49d5cfa8063a0291e529eba5dd00d8d9b94891b2ebc965c.exe 83 PID 4840 wrote to memory of 2020 4840 5ace8cba16c7be61c49d5cfa8063a0291e529eba5dd00d8d9b94891b2ebc965c.exe 83 PID 2020 wrote to memory of 4560 2020 niba8724.exe 84 PID 2020 wrote to memory of 4560 2020 niba8724.exe 84 PID 2020 wrote to memory of 4560 2020 niba8724.exe 84 PID 4560 wrote to memory of 4516 4560 niba8654.exe 85 PID 4560 wrote to memory of 4516 4560 niba8654.exe 85 PID 4560 wrote to memory of 4480 4560 niba8654.exe 87 PID 4560 wrote to memory of 4480 4560 niba8654.exe 87 PID 4560 wrote to memory of 4480 4560 niba8654.exe 87 PID 2020 wrote to memory of 3936 2020 niba8724.exe 94 PID 2020 wrote to memory of 3936 2020 niba8724.exe 94 PID 2020 wrote to memory of 3936 2020 niba8724.exe 94 PID 4840 wrote to memory of 3860 4840 5ace8cba16c7be61c49d5cfa8063a0291e529eba5dd00d8d9b94891b2ebc965c.exe 98 PID 4840 wrote to memory of 3860 4840 5ace8cba16c7be61c49d5cfa8063a0291e529eba5dd00d8d9b94891b2ebc965c.exe 98 PID 4840 wrote to memory of 3860 4840 5ace8cba16c7be61c49d5cfa8063a0291e529eba5dd00d8d9b94891b2ebc965c.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ace8cba16c7be61c49d5cfa8063a0291e529eba5dd00d8d9b94891b2ebc965c.exe"C:\Users\Admin\AppData\Local\Temp\5ace8cba16c7be61c49d5cfa8063a0291e529eba5dd00d8d9b94891b2ebc965c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba8724.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba8724.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba8654.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba8654.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f2146Am.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f2146Am.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4516
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h31zz68.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h31zz68.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4480 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 10765⤵
- Program crash
PID:2448
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\igpMp44.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\igpMp44.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3936 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3936 -s 13644⤵
- Program crash
PID:4492
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l09Zz33.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l09Zz33.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4480 -ip 44801⤵PID:4484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3936 -ip 39361⤵PID:4132
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD56c4c2a56d5dd785adbe4fe60fa3cc1f2
SHA1f8bd4379310258f8e54c47b56f5eec7394adb9a2
SHA256b182f2d3d49bdda2e29a0ed312deef4bee03983de54080c5e97ad6422de192d2
SHA512f6958cab80e2f7736cea307b51be546e50acd5494b72db0343a09e6ef8c446114f51be6c9826fcb6e9f7190e4ec8415c0a403c3c1706183577c2604b877ff830
-
Filesize
175KB
MD56c4c2a56d5dd785adbe4fe60fa3cc1f2
SHA1f8bd4379310258f8e54c47b56f5eec7394adb9a2
SHA256b182f2d3d49bdda2e29a0ed312deef4bee03983de54080c5e97ad6422de192d2
SHA512f6958cab80e2f7736cea307b51be546e50acd5494b72db0343a09e6ef8c446114f51be6c9826fcb6e9f7190e4ec8415c0a403c3c1706183577c2604b877ff830
-
Filesize
694KB
MD5d2dadb04eed238962bfb7cb206b573a5
SHA1b0da7aad4fa7db235e51626a9e767c3f04b6bcf9
SHA256873884d16bc013421a6a3be94fe8af86e4c7b60fd9257cb1a867fa9878ede20c
SHA512e4ebd93c115d1199884bd91dfbfcb5dde2de44b1e85a82c9f17561e4947404125221124e84d3525353328e9e4e8fefd032474d2024087a22be26526b3c74780a
-
Filesize
694KB
MD5d2dadb04eed238962bfb7cb206b573a5
SHA1b0da7aad4fa7db235e51626a9e767c3f04b6bcf9
SHA256873884d16bc013421a6a3be94fe8af86e4c7b60fd9257cb1a867fa9878ede20c
SHA512e4ebd93c115d1199884bd91dfbfcb5dde2de44b1e85a82c9f17561e4947404125221124e84d3525353328e9e4e8fefd032474d2024087a22be26526b3c74780a
-
Filesize
391KB
MD538afff26641445b827dda05d618342ad
SHA132112799e0d5265e887d081e4e3e3dbcc6fcaf78
SHA256391d9ab58a50ce7427c3c20880b31021da557b0d1d5f7fc14ecb0c52c4c54894
SHA512a44e101c2fa526234164203411858614466d454f7e0ede46a76359618f379c8b73ccef7efe964a1d99ac67d1a34d51fcf228f8b2b0ee7c3d8e3c2e5394acef62
-
Filesize
391KB
MD538afff26641445b827dda05d618342ad
SHA132112799e0d5265e887d081e4e3e3dbcc6fcaf78
SHA256391d9ab58a50ce7427c3c20880b31021da557b0d1d5f7fc14ecb0c52c4c54894
SHA512a44e101c2fa526234164203411858614466d454f7e0ede46a76359618f379c8b73ccef7efe964a1d99ac67d1a34d51fcf228f8b2b0ee7c3d8e3c2e5394acef62
-
Filesize
344KB
MD5fd9166791791cd5ec8358931ed2798ba
SHA1d71fc7855d91a4eef8a00adcb1fba4af08b837a9
SHA25684fba56b221b9348864d9da76b72109554ca01e99451b804b506bd4980bc4f96
SHA512fe5f3a3dd923d17a6ccb0bcd60c3fb41db2bd96ee0bda664545c8d8e2a90a2b51fe806bf826df7ef63a465ce59fe2efa2785cfda880de799921168722e642333
-
Filesize
344KB
MD5fd9166791791cd5ec8358931ed2798ba
SHA1d71fc7855d91a4eef8a00adcb1fba4af08b837a9
SHA25684fba56b221b9348864d9da76b72109554ca01e99451b804b506bd4980bc4f96
SHA512fe5f3a3dd923d17a6ccb0bcd60c3fb41db2bd96ee0bda664545c8d8e2a90a2b51fe806bf826df7ef63a465ce59fe2efa2785cfda880de799921168722e642333
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
333KB
MD5855281856a949e9f667a49e3e6eefd81
SHA1b9e1a9dc8e0f559c62ccfa09da2081a6e7653b94
SHA256d9e1460916a5072cb49230080c5c899f38546468aa626a88f943491bd0f1bf03
SHA5124db7c745e6fe5e73748f822973023feb38912dcf0865714d3965d67485ff0d6962d4623e56b3e1c6593db410f7b1e2dba531be986040d9064fade500a8e2d501
-
Filesize
333KB
MD5855281856a949e9f667a49e3e6eefd81
SHA1b9e1a9dc8e0f559c62ccfa09da2081a6e7653b94
SHA256d9e1460916a5072cb49230080c5c899f38546468aa626a88f943491bd0f1bf03
SHA5124db7c745e6fe5e73748f822973023feb38912dcf0865714d3965d67485ff0d6962d4623e56b3e1c6593db410f7b1e2dba531be986040d9064fade500a8e2d501