Analysis
-
max time kernel
97s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19-03-2023 15:58
Static task
static1
Behavioral task
behavioral1
Sample
2c2c48eef02174e8f733567487802ea3.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2c2c48eef02174e8f733567487802ea3.exe
Resource
win10v2004-20230220-en
General
-
Target
2c2c48eef02174e8f733567487802ea3.exe
-
Size
851KB
-
MD5
2c2c48eef02174e8f733567487802ea3
-
SHA1
fcdba5d0c5ddea9db6e999d6a06cdbdbbb4255ab
-
SHA256
b76bbb384e4d37fa437e57197cc3f87430620cd9a6932c5893bd19b53e11c707
-
SHA512
15178825dc4f8ed5ca7e62842cd8545664f19ecbc316e30a0e66a78298f5f010f4ad475d1eaad9f207d33bae640162b22b1c5facaba33e74c1505f260fe49dc8
-
SSDEEP
12288:WMray900nLaGr3GIHdkpaCIFs6x0b3M0KcqaEf0uX+nm7C74gX62ZOs+S/4GSmj4:oy/nLLq2kwCLq0bHdPE8uXorMgK3sjw
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
ruka
193.233.20.28:4125
-
auth_value
5d1d0e51ebe1e3f16cca573ff651c43c
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h58ue57.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h58ue57.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h58ue57.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" f4729eK.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" f4729eK.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" f4729eK.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" f4729eK.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h58ue57.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection f4729eK.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" f4729eK.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h58ue57.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h58ue57.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral2/memory/1076-203-0x00000000070E0000-0x000000000711E000-memory.dmp family_redline behavioral2/memory/1076-204-0x00000000070E0000-0x000000000711E000-memory.dmp family_redline behavioral2/memory/1076-206-0x00000000070E0000-0x000000000711E000-memory.dmp family_redline behavioral2/memory/1076-208-0x00000000070E0000-0x000000000711E000-memory.dmp family_redline behavioral2/memory/1076-210-0x00000000070E0000-0x000000000711E000-memory.dmp family_redline behavioral2/memory/1076-212-0x00000000070E0000-0x000000000711E000-memory.dmp family_redline behavioral2/memory/1076-214-0x00000000070E0000-0x000000000711E000-memory.dmp family_redline behavioral2/memory/1076-218-0x00000000070E0000-0x000000000711E000-memory.dmp family_redline behavioral2/memory/1076-216-0x00000000070E0000-0x000000000711E000-memory.dmp family_redline behavioral2/memory/1076-220-0x00000000070E0000-0x000000000711E000-memory.dmp family_redline behavioral2/memory/1076-222-0x00000000070E0000-0x000000000711E000-memory.dmp family_redline behavioral2/memory/1076-226-0x00000000070E0000-0x000000000711E000-memory.dmp family_redline behavioral2/memory/1076-224-0x00000000070E0000-0x000000000711E000-memory.dmp family_redline behavioral2/memory/1076-228-0x00000000070E0000-0x000000000711E000-memory.dmp family_redline behavioral2/memory/1076-232-0x00000000070E0000-0x000000000711E000-memory.dmp family_redline behavioral2/memory/1076-236-0x00000000070E0000-0x000000000711E000-memory.dmp family_redline behavioral2/memory/1076-238-0x00000000070E0000-0x000000000711E000-memory.dmp family_redline behavioral2/memory/1076-240-0x00000000070E0000-0x000000000711E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 2932 niba8834.exe 3652 niba9195.exe 224 f4729eK.exe 728 h58ue57.exe 1076 ixAhu95.exe 3916 l11Xy99.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" f4729eK.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h58ue57.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h58ue57.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2c2c48eef02174e8f733567487802ea3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2c2c48eef02174e8f733567487802ea3.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce niba8834.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" niba8834.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce niba9195.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" niba9195.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2248 1076 WerFault.exe 95 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 224 f4729eK.exe 224 f4729eK.exe 728 h58ue57.exe 728 h58ue57.exe 1076 ixAhu95.exe 1076 ixAhu95.exe 3916 l11Xy99.exe 3916 l11Xy99.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 224 f4729eK.exe Token: SeDebugPrivilege 728 h58ue57.exe Token: SeDebugPrivilege 1076 ixAhu95.exe Token: SeDebugPrivilege 3916 l11Xy99.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4680 wrote to memory of 2932 4680 2c2c48eef02174e8f733567487802ea3.exe 88 PID 4680 wrote to memory of 2932 4680 2c2c48eef02174e8f733567487802ea3.exe 88 PID 4680 wrote to memory of 2932 4680 2c2c48eef02174e8f733567487802ea3.exe 88 PID 2932 wrote to memory of 3652 2932 niba8834.exe 89 PID 2932 wrote to memory of 3652 2932 niba8834.exe 89 PID 2932 wrote to memory of 3652 2932 niba8834.exe 89 PID 3652 wrote to memory of 224 3652 niba9195.exe 90 PID 3652 wrote to memory of 224 3652 niba9195.exe 90 PID 3652 wrote to memory of 728 3652 niba9195.exe 94 PID 3652 wrote to memory of 728 3652 niba9195.exe 94 PID 3652 wrote to memory of 728 3652 niba9195.exe 94 PID 2932 wrote to memory of 1076 2932 niba8834.exe 95 PID 2932 wrote to memory of 1076 2932 niba8834.exe 95 PID 2932 wrote to memory of 1076 2932 niba8834.exe 95 PID 4680 wrote to memory of 3916 4680 2c2c48eef02174e8f733567487802ea3.exe 109 PID 4680 wrote to memory of 3916 4680 2c2c48eef02174e8f733567487802ea3.exe 109 PID 4680 wrote to memory of 3916 4680 2c2c48eef02174e8f733567487802ea3.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c2c48eef02174e8f733567487802ea3.exe"C:\Users\Admin\AppData\Local\Temp\2c2c48eef02174e8f733567487802ea3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba8834.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba8834.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba9195.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba9195.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f4729eK.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f4729eK.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:224
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h58ue57.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h58ue57.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:728
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ixAhu95.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ixAhu95.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1076 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1076 -s 11284⤵
- Program crash
PID:2248
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l11Xy99.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l11Xy99.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1076 -ip 10761⤵PID:3988
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD56c4c2a56d5dd785adbe4fe60fa3cc1f2
SHA1f8bd4379310258f8e54c47b56f5eec7394adb9a2
SHA256b182f2d3d49bdda2e29a0ed312deef4bee03983de54080c5e97ad6422de192d2
SHA512f6958cab80e2f7736cea307b51be546e50acd5494b72db0343a09e6ef8c446114f51be6c9826fcb6e9f7190e4ec8415c0a403c3c1706183577c2604b877ff830
-
Filesize
175KB
MD56c4c2a56d5dd785adbe4fe60fa3cc1f2
SHA1f8bd4379310258f8e54c47b56f5eec7394adb9a2
SHA256b182f2d3d49bdda2e29a0ed312deef4bee03983de54080c5e97ad6422de192d2
SHA512f6958cab80e2f7736cea307b51be546e50acd5494b72db0343a09e6ef8c446114f51be6c9826fcb6e9f7190e4ec8415c0a403c3c1706183577c2604b877ff830
-
Filesize
709KB
MD51678d76e36f7728e5ad532146f036815
SHA154b555412d2eda4b1f5687f7421f3ba7435c633f
SHA256ec7dbc043169eda7fa4554d84c35113e255133c8e53edb081c79ffa3df480b23
SHA512e064654ee55b6a1bd39d4ee2790d7225647d0f44bb6f6d196b96c362aa5ff6b4e8ef7e5bd61f5b19a1806aa5f06d46ccee9c966abcea0782fa25212cb2b91f76
-
Filesize
709KB
MD51678d76e36f7728e5ad532146f036815
SHA154b555412d2eda4b1f5687f7421f3ba7435c633f
SHA256ec7dbc043169eda7fa4554d84c35113e255133c8e53edb081c79ffa3df480b23
SHA512e064654ee55b6a1bd39d4ee2790d7225647d0f44bb6f6d196b96c362aa5ff6b4e8ef7e5bd61f5b19a1806aa5f06d46ccee9c966abcea0782fa25212cb2b91f76
-
Filesize
391KB
MD5e4bf62eafdc094185baa6dea2cd2d63c
SHA15ab62d6653b7177bb12d93d9919539483f54bd1a
SHA25630a72269293aa2f6743812b95f1131d55478f7f6bb914238cada6f07b05f9256
SHA5129a4427151de6335fbfad6456eee7270c4ad80548c865d14d2bac274674a79f59c0c622082e87934e44911966a187d46a46d23fc99656217b629c9dfcee04c8db
-
Filesize
391KB
MD5e4bf62eafdc094185baa6dea2cd2d63c
SHA15ab62d6653b7177bb12d93d9919539483f54bd1a
SHA25630a72269293aa2f6743812b95f1131d55478f7f6bb914238cada6f07b05f9256
SHA5129a4427151de6335fbfad6456eee7270c4ad80548c865d14d2bac274674a79f59c0c622082e87934e44911966a187d46a46d23fc99656217b629c9dfcee04c8db
-
Filesize
358KB
MD5b203df902f972793f928ad80cb77f5af
SHA119b6563addd65b329f2def37a398c59946f17725
SHA2563813743ca72052932232e83aac922dbcb1ee7d228efdca2e4d21c7d5c39e7627
SHA512c43ada2f7351da6a681d2d5649436ac06968a033715b913d1c9b734beb8c5ee8a55c8222d42090c63d9e757715a1344a02af01c50c94ac33c2383153bba1817a
-
Filesize
358KB
MD5b203df902f972793f928ad80cb77f5af
SHA119b6563addd65b329f2def37a398c59946f17725
SHA2563813743ca72052932232e83aac922dbcb1ee7d228efdca2e4d21c7d5c39e7627
SHA512c43ada2f7351da6a681d2d5649436ac06968a033715b913d1c9b734beb8c5ee8a55c8222d42090c63d9e757715a1344a02af01c50c94ac33c2383153bba1817a
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
371KB
MD52de96ff50865de29b9b309a3ae971085
SHA1ecd1c914799c1c4caed028ecf41ab9396abd9e82
SHA2563bf73b9162bcad22357518f998b0a139970d5d04bbe2267ed14d787ada480bc5
SHA512c71d841ce7dc49e09922083dd0ecba4d92c29cbff8b1ab8fcf5557d92229a27e804d4a2a8d65e5d3a02b03c9e4ed4a9c0415b43ad6b7842a61d56921914bf3e9
-
Filesize
371KB
MD52de96ff50865de29b9b309a3ae971085
SHA1ecd1c914799c1c4caed028ecf41ab9396abd9e82
SHA2563bf73b9162bcad22357518f998b0a139970d5d04bbe2267ed14d787ada480bc5
SHA512c71d841ce7dc49e09922083dd0ecba4d92c29cbff8b1ab8fcf5557d92229a27e804d4a2a8d65e5d3a02b03c9e4ed4a9c0415b43ad6b7842a61d56921914bf3e9