Analysis
-
max time kernel
53s -
max time network
154s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
19-03-2023 20:41
Static task
static1
Behavioral task
behavioral1
Sample
228e170cbc2dcce5b087bb38e579e4f111c030457d1bad8e464642ba5a1a6da7.exe
Resource
win10-20230220-en
General
-
Target
228e170cbc2dcce5b087bb38e579e4f111c030457d1bad8e464642ba5a1a6da7.exe
-
Size
835KB
-
MD5
a247cad43660b92642f7c99e179e7842
-
SHA1
6f5f285ddfcc77d66ea4a90e9390601a0e19c8c0
-
SHA256
228e170cbc2dcce5b087bb38e579e4f111c030457d1bad8e464642ba5a1a6da7
-
SHA512
f37b26e5c02202e11001df51b084e010fe29cba2219eefd96cbcadcd97a51124615343aec0a7108efb9f037eed67dbddc69078b8fcd08b3175dd36657f1ef317
-
SSDEEP
12288:dMr0y902mnKm+DRmdm4wRbNpEyaXDkLsLYo6o8qbv+jJrK8HEd8m7RDVX+Mixhml:hy7Lm8fjojYLskoxt2K7RJxixFtYoW
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
vint
193.233.20.30:4125
-
auth_value
fb8811912f8370b3d23bffda092d88d0
Signatures
-
Processes:
v3857Sr.exew16dl02.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" v3857Sr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" v3857Sr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" v3857Sr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" w16dl02.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" w16dl02.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" v3857Sr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" v3857Sr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" w16dl02.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" w16dl02.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" w16dl02.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/1416-187-0x00000000048D0000-0x0000000004916000-memory.dmp family_redline behavioral1/memory/1416-189-0x0000000004C30000-0x0000000004C74000-memory.dmp family_redline behavioral1/memory/1416-193-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral1/memory/1416-194-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral1/memory/1416-196-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral1/memory/1416-198-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral1/memory/1416-200-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral1/memory/1416-202-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral1/memory/1416-204-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral1/memory/1416-206-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral1/memory/1416-208-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral1/memory/1416-210-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral1/memory/1416-212-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral1/memory/1416-214-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral1/memory/1416-216-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral1/memory/1416-218-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral1/memory/1416-220-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral1/memory/1416-222-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral1/memory/1416-224-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral1/memory/1416-226-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
Processes:
zip1862.exezip7830.exev3857Sr.exew16dl02.exexFhEK44.exey78YX10.exepid process 3020 zip1862.exe 4592 zip7830.exe 4948 v3857Sr.exe 2088 w16dl02.exe 1416 xFhEK44.exe 4828 y78YX10.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
v3857Sr.exew16dl02.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" v3857Sr.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features w16dl02.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" w16dl02.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
228e170cbc2dcce5b087bb38e579e4f111c030457d1bad8e464642ba5a1a6da7.exezip1862.exezip7830.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 228e170cbc2dcce5b087bb38e579e4f111c030457d1bad8e464642ba5a1a6da7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 228e170cbc2dcce5b087bb38e579e4f111c030457d1bad8e464642ba5a1a6da7.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zip1862.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zip1862.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zip7830.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zip7830.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
v3857Sr.exew16dl02.exexFhEK44.exey78YX10.exepid process 4948 v3857Sr.exe 4948 v3857Sr.exe 2088 w16dl02.exe 2088 w16dl02.exe 1416 xFhEK44.exe 1416 xFhEK44.exe 4828 y78YX10.exe 4828 y78YX10.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
v3857Sr.exew16dl02.exexFhEK44.exey78YX10.exedescription pid process Token: SeDebugPrivilege 4948 v3857Sr.exe Token: SeDebugPrivilege 2088 w16dl02.exe Token: SeDebugPrivilege 1416 xFhEK44.exe Token: SeDebugPrivilege 4828 y78YX10.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
228e170cbc2dcce5b087bb38e579e4f111c030457d1bad8e464642ba5a1a6da7.exezip1862.exezip7830.exedescription pid process target process PID 2568 wrote to memory of 3020 2568 228e170cbc2dcce5b087bb38e579e4f111c030457d1bad8e464642ba5a1a6da7.exe zip1862.exe PID 2568 wrote to memory of 3020 2568 228e170cbc2dcce5b087bb38e579e4f111c030457d1bad8e464642ba5a1a6da7.exe zip1862.exe PID 2568 wrote to memory of 3020 2568 228e170cbc2dcce5b087bb38e579e4f111c030457d1bad8e464642ba5a1a6da7.exe zip1862.exe PID 3020 wrote to memory of 4592 3020 zip1862.exe zip7830.exe PID 3020 wrote to memory of 4592 3020 zip1862.exe zip7830.exe PID 3020 wrote to memory of 4592 3020 zip1862.exe zip7830.exe PID 4592 wrote to memory of 4948 4592 zip7830.exe v3857Sr.exe PID 4592 wrote to memory of 4948 4592 zip7830.exe v3857Sr.exe PID 4592 wrote to memory of 2088 4592 zip7830.exe w16dl02.exe PID 4592 wrote to memory of 2088 4592 zip7830.exe w16dl02.exe PID 4592 wrote to memory of 2088 4592 zip7830.exe w16dl02.exe PID 3020 wrote to memory of 1416 3020 zip1862.exe xFhEK44.exe PID 3020 wrote to memory of 1416 3020 zip1862.exe xFhEK44.exe PID 3020 wrote to memory of 1416 3020 zip1862.exe xFhEK44.exe PID 2568 wrote to memory of 4828 2568 228e170cbc2dcce5b087bb38e579e4f111c030457d1bad8e464642ba5a1a6da7.exe y78YX10.exe PID 2568 wrote to memory of 4828 2568 228e170cbc2dcce5b087bb38e579e4f111c030457d1bad8e464642ba5a1a6da7.exe y78YX10.exe PID 2568 wrote to memory of 4828 2568 228e170cbc2dcce5b087bb38e579e4f111c030457d1bad8e464642ba5a1a6da7.exe y78YX10.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\228e170cbc2dcce5b087bb38e579e4f111c030457d1bad8e464642ba5a1a6da7.exe"C:\Users\Admin\AppData\Local\Temp\228e170cbc2dcce5b087bb38e579e4f111c030457d1bad8e464642ba5a1a6da7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zip1862.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zip1862.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zip7830.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zip7830.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3857Sr.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3857Sr.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w16dl02.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w16dl02.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xFhEK44.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xFhEK44.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y78YX10.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y78YX10.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4828
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD53389637c0d072121bf1b127629736d37
SHA1300e915efdf2479bfd0d3699c0a6bc51260f9655
SHA2562b74c4ce2674a8fc0c78fffa39c5de5e43ae28b8bf425349a5f97c6a61135153
SHA512a32cc060d2600f6ca94ffdce07c95ea5e2f56c0b418260456b568cb41e5f55db0c4fc97c35ca4103c674e61a17300d834d2c0da5a78b7084b6bc342fd23a7fb4
-
Filesize
175KB
MD53389637c0d072121bf1b127629736d37
SHA1300e915efdf2479bfd0d3699c0a6bc51260f9655
SHA2562b74c4ce2674a8fc0c78fffa39c5de5e43ae28b8bf425349a5f97c6a61135153
SHA512a32cc060d2600f6ca94ffdce07c95ea5e2f56c0b418260456b568cb41e5f55db0c4fc97c35ca4103c674e61a17300d834d2c0da5a78b7084b6bc342fd23a7fb4
-
Filesize
694KB
MD5f72160da08bfe8dc72248f5bd911bf24
SHA184241db136a1a3a3ac596d3884967f3d65f1d9d4
SHA2564734900f858c8bd337093323f7ad60bd4fd6f04407e9d28b812511494623d4f4
SHA512282384736025c385add40d29af40e9b6d5734521dcdcc3afe77e3c7c32331032adba9f1b65c032303b162c0c4eadd3a784cb6dd41e94ab9672ed3c4de9bba1bf
-
Filesize
694KB
MD5f72160da08bfe8dc72248f5bd911bf24
SHA184241db136a1a3a3ac596d3884967f3d65f1d9d4
SHA2564734900f858c8bd337093323f7ad60bd4fd6f04407e9d28b812511494623d4f4
SHA512282384736025c385add40d29af40e9b6d5734521dcdcc3afe77e3c7c32331032adba9f1b65c032303b162c0c4eadd3a784cb6dd41e94ab9672ed3c4de9bba1bf
-
Filesize
391KB
MD5d36427559523e49e9c8ce5e4224457e4
SHA10b45340716816ab13348dd95b79d2cc05c38c894
SHA256d4d450fd951990a6671d33e94d4f88a209f391d99b0df2283ad77c499de1e19c
SHA5121fec7ba54f597b21b85d924639166cf95693b90f29df2e8c90add31d678165bf8e173f60a2ad0822793f5248634429a90ffd696c06daab857c9ec1d87d92a0e3
-
Filesize
391KB
MD5d36427559523e49e9c8ce5e4224457e4
SHA10b45340716816ab13348dd95b79d2cc05c38c894
SHA256d4d450fd951990a6671d33e94d4f88a209f391d99b0df2283ad77c499de1e19c
SHA5121fec7ba54f597b21b85d924639166cf95693b90f29df2e8c90add31d678165bf8e173f60a2ad0822793f5248634429a90ffd696c06daab857c9ec1d87d92a0e3
-
Filesize
344KB
MD5eb7437d8daf02c2d4b6f53ba02f4b50e
SHA171a567dc922ece276b2c31f13cc983ec7986a024
SHA256a1c977fb39a4db88dea54581705b4225f0922cfb1c286e910baac840ec1bef91
SHA5125511281fa2817e8720c8ca32f73a355fd30cc4e4b175926e3b49c41bed8830bb41d2ff31e2871ecfbc427cd23df78b00b5ee042d1e552803c7eb7713611097e0
-
Filesize
344KB
MD5eb7437d8daf02c2d4b6f53ba02f4b50e
SHA171a567dc922ece276b2c31f13cc983ec7986a024
SHA256a1c977fb39a4db88dea54581705b4225f0922cfb1c286e910baac840ec1bef91
SHA5125511281fa2817e8720c8ca32f73a355fd30cc4e4b175926e3b49c41bed8830bb41d2ff31e2871ecfbc427cd23df78b00b5ee042d1e552803c7eb7713611097e0
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
334KB
MD52004d5d5c01c4fd6186ddf135c099e23
SHA188fc74a784ab8ab3d60b41b56c3c5cdad98b79c2
SHA2564d26dc1fcceca217ffc1d35727ac7352688908fb013213431b66c099275a9053
SHA5121244a67fcb7ae43193cf74c371ffcb1e237779a72589ea56da143d1e7e072afb3800cc63f9dc5623e4ca83746d09b2db4ba6b513597a98585d8b29ba291c509c
-
Filesize
334KB
MD52004d5d5c01c4fd6186ddf135c099e23
SHA188fc74a784ab8ab3d60b41b56c3c5cdad98b79c2
SHA2564d26dc1fcceca217ffc1d35727ac7352688908fb013213431b66c099275a9053
SHA5121244a67fcb7ae43193cf74c371ffcb1e237779a72589ea56da143d1e7e072afb3800cc63f9dc5623e4ca83746d09b2db4ba6b513597a98585d8b29ba291c509c