Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2023, 16:35
Static task
static1
Behavioral task
behavioral1
Sample
01a04ae9f81786f1b7420c3f166988eeb2cabdd7bdc60628d19324c58477c197.exe
Resource
win10v2004-20230220-en
General
-
Target
01a04ae9f81786f1b7420c3f166988eeb2cabdd7bdc60628d19324c58477c197.exe
-
Size
836KB
-
MD5
1ce53c1bdcade4082d4b9254364cebc9
-
SHA1
487fa424d35c06121a4672ebf3b69a4d5ada02ba
-
SHA256
01a04ae9f81786f1b7420c3f166988eeb2cabdd7bdc60628d19324c58477c197
-
SHA512
94b6490b6646487ee86b2b05de30430f678d0852765a57d707b10659e69aa166430ebe0bc936ea88a983bfb9c4c41d0d0f81e0ad0bcfecfc58dab718df681cbf
-
SSDEEP
12288:WMrJy90ZZvbhqY+Rdxq3ZCwSyEcC+P4V1dUZk4qprEGkGEZ4ArbkpV5JioQV71xH:fyGvbhY6lHPi1d8k1EOAcZRQZzH
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
ruka
193.233.20.28:4125
-
auth_value
5d1d0e51ebe1e3f16cca573ff651c43c
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h03Vm09.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" f2875Tk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" f2875Tk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h03Vm09.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h03Vm09.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h03Vm09.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h03Vm09.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection f2875Tk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" f2875Tk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" f2875Tk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" f2875Tk.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h03Vm09.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/4984-203-0x00000000070C0000-0x00000000070FE000-memory.dmp family_redline behavioral1/memory/4984-204-0x00000000070C0000-0x00000000070FE000-memory.dmp family_redline behavioral1/memory/4984-206-0x00000000070C0000-0x00000000070FE000-memory.dmp family_redline behavioral1/memory/4984-208-0x00000000070C0000-0x00000000070FE000-memory.dmp family_redline behavioral1/memory/4984-216-0x00000000070C0000-0x00000000070FE000-memory.dmp family_redline behavioral1/memory/4984-212-0x00000000070C0000-0x00000000070FE000-memory.dmp family_redline behavioral1/memory/4984-218-0x00000000070C0000-0x00000000070FE000-memory.dmp family_redline behavioral1/memory/4984-220-0x00000000070C0000-0x00000000070FE000-memory.dmp family_redline behavioral1/memory/4984-222-0x00000000070C0000-0x00000000070FE000-memory.dmp family_redline behavioral1/memory/4984-224-0x00000000070C0000-0x00000000070FE000-memory.dmp family_redline behavioral1/memory/4984-226-0x00000000070C0000-0x00000000070FE000-memory.dmp family_redline behavioral1/memory/4984-228-0x00000000070C0000-0x00000000070FE000-memory.dmp family_redline behavioral1/memory/4984-230-0x00000000070C0000-0x00000000070FE000-memory.dmp family_redline behavioral1/memory/4984-232-0x00000000070C0000-0x00000000070FE000-memory.dmp family_redline behavioral1/memory/4984-234-0x00000000070C0000-0x00000000070FE000-memory.dmp family_redline behavioral1/memory/4984-236-0x00000000070C0000-0x00000000070FE000-memory.dmp family_redline behavioral1/memory/4984-238-0x00000000070C0000-0x00000000070FE000-memory.dmp family_redline behavioral1/memory/4984-240-0x00000000070C0000-0x00000000070FE000-memory.dmp family_redline behavioral1/memory/4984-1120-0x0000000007190000-0x00000000071A0000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 3800 niba5101.exe 1468 niba8045.exe 2268 f2875Tk.exe 4000 h03Vm09.exe 4984 iFogP41.exe 5020 l66WH74.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" f2875Tk.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h03Vm09.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h03Vm09.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 01a04ae9f81786f1b7420c3f166988eeb2cabdd7bdc60628d19324c58477c197.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 01a04ae9f81786f1b7420c3f166988eeb2cabdd7bdc60628d19324c58477c197.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce niba5101.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" niba5101.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce niba8045.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" niba8045.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3004 4000 WerFault.exe 99 2252 4984 WerFault.exe 104 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2268 f2875Tk.exe 2268 f2875Tk.exe 4000 h03Vm09.exe 4000 h03Vm09.exe 4984 iFogP41.exe 4984 iFogP41.exe 5020 l66WH74.exe 5020 l66WH74.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2268 f2875Tk.exe Token: SeDebugPrivilege 4000 h03Vm09.exe Token: SeDebugPrivilege 4984 iFogP41.exe Token: SeDebugPrivilege 5020 l66WH74.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4120 wrote to memory of 3800 4120 01a04ae9f81786f1b7420c3f166988eeb2cabdd7bdc60628d19324c58477c197.exe 86 PID 4120 wrote to memory of 3800 4120 01a04ae9f81786f1b7420c3f166988eeb2cabdd7bdc60628d19324c58477c197.exe 86 PID 4120 wrote to memory of 3800 4120 01a04ae9f81786f1b7420c3f166988eeb2cabdd7bdc60628d19324c58477c197.exe 86 PID 3800 wrote to memory of 1468 3800 niba5101.exe 87 PID 3800 wrote to memory of 1468 3800 niba5101.exe 87 PID 3800 wrote to memory of 1468 3800 niba5101.exe 87 PID 1468 wrote to memory of 2268 1468 niba8045.exe 88 PID 1468 wrote to memory of 2268 1468 niba8045.exe 88 PID 1468 wrote to memory of 4000 1468 niba8045.exe 99 PID 1468 wrote to memory of 4000 1468 niba8045.exe 99 PID 1468 wrote to memory of 4000 1468 niba8045.exe 99 PID 3800 wrote to memory of 4984 3800 niba5101.exe 104 PID 3800 wrote to memory of 4984 3800 niba5101.exe 104 PID 3800 wrote to memory of 4984 3800 niba5101.exe 104 PID 4120 wrote to memory of 5020 4120 01a04ae9f81786f1b7420c3f166988eeb2cabdd7bdc60628d19324c58477c197.exe 109 PID 4120 wrote to memory of 5020 4120 01a04ae9f81786f1b7420c3f166988eeb2cabdd7bdc60628d19324c58477c197.exe 109 PID 4120 wrote to memory of 5020 4120 01a04ae9f81786f1b7420c3f166988eeb2cabdd7bdc60628d19324c58477c197.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\01a04ae9f81786f1b7420c3f166988eeb2cabdd7bdc60628d19324c58477c197.exe"C:\Users\Admin\AppData\Local\Temp\01a04ae9f81786f1b7420c3f166988eeb2cabdd7bdc60628d19324c58477c197.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba5101.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba5101.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba8045.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba8045.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f2875Tk.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f2875Tk.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2268
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h03Vm09.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h03Vm09.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4000 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 10765⤵
- Program crash
PID:3004
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iFogP41.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iFogP41.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4984 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4984 -s 13324⤵
- Program crash
PID:2252
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l66WH74.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l66WH74.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4000 -ip 40001⤵PID:5068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4984 -ip 49841⤵PID:3764
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD56c4c2a56d5dd785adbe4fe60fa3cc1f2
SHA1f8bd4379310258f8e54c47b56f5eec7394adb9a2
SHA256b182f2d3d49bdda2e29a0ed312deef4bee03983de54080c5e97ad6422de192d2
SHA512f6958cab80e2f7736cea307b51be546e50acd5494b72db0343a09e6ef8c446114f51be6c9826fcb6e9f7190e4ec8415c0a403c3c1706183577c2604b877ff830
-
Filesize
175KB
MD56c4c2a56d5dd785adbe4fe60fa3cc1f2
SHA1f8bd4379310258f8e54c47b56f5eec7394adb9a2
SHA256b182f2d3d49bdda2e29a0ed312deef4bee03983de54080c5e97ad6422de192d2
SHA512f6958cab80e2f7736cea307b51be546e50acd5494b72db0343a09e6ef8c446114f51be6c9826fcb6e9f7190e4ec8415c0a403c3c1706183577c2604b877ff830
-
Filesize
693KB
MD511b0300b59922c9a9e4dfa4ea7f6a988
SHA11832e7801102f29a00777b638d6e96019815c297
SHA2568dd60cf942deca6f523cce15a421dcc36ea0b24d4143a56d8bf3d89ab353da30
SHA5122067d2fb95b95df401150070d32f3d2e6d5ec478c1ae744e99d384664e924f28a0e0712a3abecee5b6f6417e74ffb5df74260e7157d4fe0f9d23e81ac777c870
-
Filesize
693KB
MD511b0300b59922c9a9e4dfa4ea7f6a988
SHA11832e7801102f29a00777b638d6e96019815c297
SHA2568dd60cf942deca6f523cce15a421dcc36ea0b24d4143a56d8bf3d89ab353da30
SHA5122067d2fb95b95df401150070d32f3d2e6d5ec478c1ae744e99d384664e924f28a0e0712a3abecee5b6f6417e74ffb5df74260e7157d4fe0f9d23e81ac777c870
-
Filesize
391KB
MD55706f238ca704c3d8eb9c8576e6ee75e
SHA18434a2643f95417266cf9344a8e7ee96b154d26a
SHA256d5c0be21def1e199505ce226c4feaa3096844141cb7f0d8117124f2ebfd86510
SHA512cb2b4652783dba86093961a573a3cbd6bca50aa028043b1fe73a75f857219b0e330909c0cde260dd85f9d135d272c4c2dbfdc8b084b8bf7a6363692efcbec70d
-
Filesize
391KB
MD55706f238ca704c3d8eb9c8576e6ee75e
SHA18434a2643f95417266cf9344a8e7ee96b154d26a
SHA256d5c0be21def1e199505ce226c4feaa3096844141cb7f0d8117124f2ebfd86510
SHA512cb2b4652783dba86093961a573a3cbd6bca50aa028043b1fe73a75f857219b0e330909c0cde260dd85f9d135d272c4c2dbfdc8b084b8bf7a6363692efcbec70d
-
Filesize
344KB
MD5ebf146f617a85b9d9a65a004e9231ed5
SHA122b7c0556ecfd346f257768f90f30e6aecf98b68
SHA25697479782ecef5bc9e699b1dfa874b7d5f803f03f9ade5c3b23e2cc9d7c220444
SHA5121e776552fbc768e4de8283be8c762a2ff209e7e766804e5ebe240fbd18b5899700e4b459a293f72cb35a3c0806dbac7202a10cee8fade21dc8b64c1b1aca23e3
-
Filesize
344KB
MD5ebf146f617a85b9d9a65a004e9231ed5
SHA122b7c0556ecfd346f257768f90f30e6aecf98b68
SHA25697479782ecef5bc9e699b1dfa874b7d5f803f03f9ade5c3b23e2cc9d7c220444
SHA5121e776552fbc768e4de8283be8c762a2ff209e7e766804e5ebe240fbd18b5899700e4b459a293f72cb35a3c0806dbac7202a10cee8fade21dc8b64c1b1aca23e3
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
333KB
MD5cb600cb5c6f9c841b44d335ab4d529a9
SHA115c6f86fcc11acf9b854b0c86b6dab2bd9bf4ce9
SHA256fd9e09312ab253e696a640448a893fd211c535931a7b1a589202076bc409be90
SHA512a951e39e48cb12c1310a04269293082910b25c8c6bf66bd435fd9c96edd16e761f12276ad5cfd0c8935bf45dad582a6b2251d6082851c51086f9ccdee17a0cf0
-
Filesize
333KB
MD5cb600cb5c6f9c841b44d335ab4d529a9
SHA115c6f86fcc11acf9b854b0c86b6dab2bd9bf4ce9
SHA256fd9e09312ab253e696a640448a893fd211c535931a7b1a589202076bc409be90
SHA512a951e39e48cb12c1310a04269293082910b25c8c6bf66bd435fd9c96edd16e761f12276ad5cfd0c8935bf45dad582a6b2251d6082851c51086f9ccdee17a0cf0