Analysis
-
max time kernel
113s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2023, 15:03
Static task
static1
Behavioral task
behavioral1
Sample
ee4ea72a2c7e2f31d0fee8003143c8d7f875954fb1b1488a261bf05bdcf010ac.exe
Resource
win10v2004-20230220-en
General
-
Target
ee4ea72a2c7e2f31d0fee8003143c8d7f875954fb1b1488a261bf05bdcf010ac.exe
-
Size
836KB
-
MD5
b2d26f46a7133b07faa4c1d97b80e731
-
SHA1
8885fcb664b7db820eae13366a9805ea8e00f9e5
-
SHA256
ee4ea72a2c7e2f31d0fee8003143c8d7f875954fb1b1488a261bf05bdcf010ac
-
SHA512
b4a4821f52bf4f41596f15e11884474e28bfde6c534ef8a39f6b2b8f3a4719118c3ef4b399bd6b0ae5629f4725f1a4e2711ae3a2a5c15e23d839bd0df7b77641
-
SSDEEP
12288:VMrpy90UqSTD3BipUWGT1CPNBZJJGCP1HMvGy5exxQsSGBh4Z4Au07pVxuGg383P:syZ1NsUWF3ZJJBPxAQxvbAnRO3fW
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
ruka
193.233.20.28:4125
-
auth_value
5d1d0e51ebe1e3f16cca573ff651c43c
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" f2774Ka.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" f2774Ka.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" f2774Ka.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h33Qh09.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h33Qh09.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h33Qh09.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection f2774Ka.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" f2774Ka.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h33Qh09.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h33Qh09.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" f2774Ka.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h33Qh09.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/3908-205-0x0000000007690000-0x00000000076CE000-memory.dmp family_redline behavioral1/memory/3908-204-0x0000000007690000-0x00000000076CE000-memory.dmp family_redline behavioral1/memory/3908-207-0x0000000007690000-0x00000000076CE000-memory.dmp family_redline behavioral1/memory/3908-209-0x0000000007690000-0x00000000076CE000-memory.dmp family_redline behavioral1/memory/3908-211-0x0000000007690000-0x00000000076CE000-memory.dmp family_redline behavioral1/memory/3908-213-0x0000000007690000-0x00000000076CE000-memory.dmp family_redline behavioral1/memory/3908-217-0x0000000007690000-0x00000000076CE000-memory.dmp family_redline behavioral1/memory/3908-215-0x0000000007690000-0x00000000076CE000-memory.dmp family_redline behavioral1/memory/3908-219-0x0000000007690000-0x00000000076CE000-memory.dmp family_redline behavioral1/memory/3908-221-0x0000000007690000-0x00000000076CE000-memory.dmp family_redline behavioral1/memory/3908-223-0x0000000007690000-0x00000000076CE000-memory.dmp family_redline behavioral1/memory/3908-225-0x0000000007690000-0x00000000076CE000-memory.dmp family_redline behavioral1/memory/3908-227-0x0000000007690000-0x00000000076CE000-memory.dmp family_redline behavioral1/memory/3908-229-0x0000000007690000-0x00000000076CE000-memory.dmp family_redline behavioral1/memory/3908-233-0x0000000007690000-0x00000000076CE000-memory.dmp family_redline behavioral1/memory/3908-231-0x0000000007690000-0x00000000076CE000-memory.dmp family_redline behavioral1/memory/3908-235-0x0000000007690000-0x00000000076CE000-memory.dmp family_redline behavioral1/memory/3908-290-0x0000000004D30000-0x0000000004D40000-memory.dmp family_redline behavioral1/memory/3908-291-0x0000000004D30000-0x0000000004D40000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 4916 niba7035.exe 3996 niba4424.exe 3712 f2774Ka.exe 1320 h33Qh09.exe 3908 imHhl86.exe 4524 l61QP79.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" f2774Ka.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h33Qh09.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h33Qh09.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ee4ea72a2c7e2f31d0fee8003143c8d7f875954fb1b1488a261bf05bdcf010ac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ee4ea72a2c7e2f31d0fee8003143c8d7f875954fb1b1488a261bf05bdcf010ac.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce niba7035.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" niba7035.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce niba4424.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" niba4424.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3992 1320 WerFault.exe 93 1624 3908 WerFault.exe 96 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3712 f2774Ka.exe 3712 f2774Ka.exe 1320 h33Qh09.exe 1320 h33Qh09.exe 3908 imHhl86.exe 3908 imHhl86.exe 4524 l61QP79.exe 4524 l61QP79.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3712 f2774Ka.exe Token: SeDebugPrivilege 1320 h33Qh09.exe Token: SeDebugPrivilege 3908 imHhl86.exe Token: SeDebugPrivilege 4524 l61QP79.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2080 wrote to memory of 4916 2080 ee4ea72a2c7e2f31d0fee8003143c8d7f875954fb1b1488a261bf05bdcf010ac.exe 87 PID 2080 wrote to memory of 4916 2080 ee4ea72a2c7e2f31d0fee8003143c8d7f875954fb1b1488a261bf05bdcf010ac.exe 87 PID 2080 wrote to memory of 4916 2080 ee4ea72a2c7e2f31d0fee8003143c8d7f875954fb1b1488a261bf05bdcf010ac.exe 87 PID 4916 wrote to memory of 3996 4916 niba7035.exe 88 PID 4916 wrote to memory of 3996 4916 niba7035.exe 88 PID 4916 wrote to memory of 3996 4916 niba7035.exe 88 PID 3996 wrote to memory of 3712 3996 niba4424.exe 89 PID 3996 wrote to memory of 3712 3996 niba4424.exe 89 PID 3996 wrote to memory of 1320 3996 niba4424.exe 93 PID 3996 wrote to memory of 1320 3996 niba4424.exe 93 PID 3996 wrote to memory of 1320 3996 niba4424.exe 93 PID 4916 wrote to memory of 3908 4916 niba7035.exe 96 PID 4916 wrote to memory of 3908 4916 niba7035.exe 96 PID 4916 wrote to memory of 3908 4916 niba7035.exe 96 PID 2080 wrote to memory of 4524 2080 ee4ea72a2c7e2f31d0fee8003143c8d7f875954fb1b1488a261bf05bdcf010ac.exe 111 PID 2080 wrote to memory of 4524 2080 ee4ea72a2c7e2f31d0fee8003143c8d7f875954fb1b1488a261bf05bdcf010ac.exe 111 PID 2080 wrote to memory of 4524 2080 ee4ea72a2c7e2f31d0fee8003143c8d7f875954fb1b1488a261bf05bdcf010ac.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee4ea72a2c7e2f31d0fee8003143c8d7f875954fb1b1488a261bf05bdcf010ac.exe"C:\Users\Admin\AppData\Local\Temp\ee4ea72a2c7e2f31d0fee8003143c8d7f875954fb1b1488a261bf05bdcf010ac.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba7035.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba7035.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba4424.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba4424.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f2774Ka.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f2774Ka.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3712
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h33Qh09.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h33Qh09.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1320 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1320 -s 10805⤵
- Program crash
PID:3992
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\imHhl86.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\imHhl86.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3908 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3908 -s 13324⤵
- Program crash
PID:1624
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l61QP79.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l61QP79.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1320 -ip 13201⤵PID:4120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3908 -ip 39081⤵PID:5056
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD56c4c2a56d5dd785adbe4fe60fa3cc1f2
SHA1f8bd4379310258f8e54c47b56f5eec7394adb9a2
SHA256b182f2d3d49bdda2e29a0ed312deef4bee03983de54080c5e97ad6422de192d2
SHA512f6958cab80e2f7736cea307b51be546e50acd5494b72db0343a09e6ef8c446114f51be6c9826fcb6e9f7190e4ec8415c0a403c3c1706183577c2604b877ff830
-
Filesize
175KB
MD56c4c2a56d5dd785adbe4fe60fa3cc1f2
SHA1f8bd4379310258f8e54c47b56f5eec7394adb9a2
SHA256b182f2d3d49bdda2e29a0ed312deef4bee03983de54080c5e97ad6422de192d2
SHA512f6958cab80e2f7736cea307b51be546e50acd5494b72db0343a09e6ef8c446114f51be6c9826fcb6e9f7190e4ec8415c0a403c3c1706183577c2604b877ff830
-
Filesize
694KB
MD5cb467993a90df4239c840720bd9a9d96
SHA1904e7250112b3fd197066a258c221a26c53eb284
SHA25633952e6ae855c5ed49bf7fbd8a08449821698757190762fb446ad72f06876b47
SHA5127f3ed12baa5e502adc96bee81608df1bf5d6baa99f1604b9eb2b63736a33f7aadf40a6fb3097c7580cab0dcdf21988fe85a57cd64d4af11d007b3b45b8a9af50
-
Filesize
694KB
MD5cb467993a90df4239c840720bd9a9d96
SHA1904e7250112b3fd197066a258c221a26c53eb284
SHA25633952e6ae855c5ed49bf7fbd8a08449821698757190762fb446ad72f06876b47
SHA5127f3ed12baa5e502adc96bee81608df1bf5d6baa99f1604b9eb2b63736a33f7aadf40a6fb3097c7580cab0dcdf21988fe85a57cd64d4af11d007b3b45b8a9af50
-
Filesize
391KB
MD500acbc79201036129a236af4535d85ac
SHA1bf6f281165106e074f216afa31b14ab73fea8339
SHA25698ec74bfc01abeb031b366118becb11fa3584da8b340b00b2ca819b4b8b629ca
SHA512264dd80054169f748ff4290a0be2c28a4c1129db3733d30f01db0ac109513e79fdc326316a62910e510d25d8ed9c7340ba07534f5bbfb27a3c68c00e98b4e477
-
Filesize
391KB
MD500acbc79201036129a236af4535d85ac
SHA1bf6f281165106e074f216afa31b14ab73fea8339
SHA25698ec74bfc01abeb031b366118becb11fa3584da8b340b00b2ca819b4b8b629ca
SHA512264dd80054169f748ff4290a0be2c28a4c1129db3733d30f01db0ac109513e79fdc326316a62910e510d25d8ed9c7340ba07534f5bbfb27a3c68c00e98b4e477
-
Filesize
344KB
MD50b2901c4ff8de4201ddebcaeeb5d7035
SHA1331c6c62b2c0afe1b2786ba15b5a1abef89c5d63
SHA256567c72aa4f0d75c6e9b303415eafd652c62ecabd4ca085f4ecd6b20c8c0039e2
SHA5123683e83b4c95265d6461229d01b05c0be32c4e2dcee7fb4f7fd2d7d151aca56bbeb22d7abc85201d2af25417518d1b5c9f941d128e9ee122995ee1f68fff4687
-
Filesize
344KB
MD50b2901c4ff8de4201ddebcaeeb5d7035
SHA1331c6c62b2c0afe1b2786ba15b5a1abef89c5d63
SHA256567c72aa4f0d75c6e9b303415eafd652c62ecabd4ca085f4ecd6b20c8c0039e2
SHA5123683e83b4c95265d6461229d01b05c0be32c4e2dcee7fb4f7fd2d7d151aca56bbeb22d7abc85201d2af25417518d1b5c9f941d128e9ee122995ee1f68fff4687
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
333KB
MD509b4acfc657a6f5d6f77b0aa3d2f6ee1
SHA1c847ce70399168643e96d002689119f0abf7cabc
SHA25660d49ec5846e49aebd74d6002189ba7fbb29bba64872f5b182a2c2739ecac978
SHA512352732319545638be7095752126f7b76d416b0affdb1b47773e04f5ed700f6d79b615c590bedec4a15e8095a9d5be017ce7b61b9707e8ec916bb9978ab69e3cf
-
Filesize
333KB
MD509b4acfc657a6f5d6f77b0aa3d2f6ee1
SHA1c847ce70399168643e96d002689119f0abf7cabc
SHA25660d49ec5846e49aebd74d6002189ba7fbb29bba64872f5b182a2c2739ecac978
SHA512352732319545638be7095752126f7b76d416b0affdb1b47773e04f5ed700f6d79b615c590bedec4a15e8095a9d5be017ce7b61b9707e8ec916bb9978ab69e3cf