Analysis
-
max time kernel
126s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
20/03/2023, 21:31
Static task
static1
Behavioral task
behavioral1
Sample
36d558d8dbee8ff1affdbba3d2404a2fbbe298c3e67833ba466bdd9bccb752c1.exe
Resource
win10v2004-20230220-en
General
-
Target
36d558d8dbee8ff1affdbba3d2404a2fbbe298c3e67833ba466bdd9bccb752c1.exe
-
Size
777KB
-
MD5
50905642143622f308b1cf6125ff366e
-
SHA1
9b56c5c2564b0d245cc9cd16501f33ef947876d1
-
SHA256
36d558d8dbee8ff1affdbba3d2404a2fbbe298c3e67833ba466bdd9bccb752c1
-
SHA512
550bdb2eab156466257eb52f9367ab59b7d42ed236ad2e81e20ffa5269f16a70fb4057532e1a6f093e444de753ad7df07b0d8410c941b4c9f8d737190c41184b
-
SSDEEP
12288:eMr7y90Ce/a1Xb+pHVtP4Bfd+gfbPfAE0S7SpeMOdz5ImFuWV53/5pX3:9ySAXKpf4Bt35SIMG863/5F3
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
ruka
193.233.20.28:4125
-
auth_value
5d1d0e51ebe1e3f16cca573ff651c43c
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h70jB10.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h70jB10.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h70jB10.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection f9329TH.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" f9329TH.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" f9329TH.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" f9329TH.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h70jB10.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" f9329TH.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" f9329TH.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h70jB10.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h70jB10.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4336-202-0x00000000050D0000-0x000000000510E000-memory.dmp family_redline behavioral1/memory/4336-203-0x00000000050D0000-0x000000000510E000-memory.dmp family_redline behavioral1/memory/4336-205-0x00000000050D0000-0x000000000510E000-memory.dmp family_redline behavioral1/memory/4336-207-0x00000000050D0000-0x000000000510E000-memory.dmp family_redline behavioral1/memory/4336-209-0x00000000050D0000-0x000000000510E000-memory.dmp family_redline behavioral1/memory/4336-211-0x00000000050D0000-0x000000000510E000-memory.dmp family_redline behavioral1/memory/4336-216-0x00000000050D0000-0x000000000510E000-memory.dmp family_redline behavioral1/memory/4336-219-0x00000000050D0000-0x000000000510E000-memory.dmp family_redline behavioral1/memory/4336-221-0x00000000050D0000-0x000000000510E000-memory.dmp family_redline behavioral1/memory/4336-223-0x00000000050D0000-0x000000000510E000-memory.dmp family_redline behavioral1/memory/4336-225-0x00000000050D0000-0x000000000510E000-memory.dmp family_redline behavioral1/memory/4336-227-0x00000000050D0000-0x000000000510E000-memory.dmp family_redline behavioral1/memory/4336-229-0x00000000050D0000-0x000000000510E000-memory.dmp family_redline behavioral1/memory/4336-231-0x00000000050D0000-0x000000000510E000-memory.dmp family_redline behavioral1/memory/4336-233-0x00000000050D0000-0x000000000510E000-memory.dmp family_redline behavioral1/memory/4336-235-0x00000000050D0000-0x000000000510E000-memory.dmp family_redline behavioral1/memory/4336-237-0x00000000050D0000-0x000000000510E000-memory.dmp family_redline behavioral1/memory/4336-239-0x00000000050D0000-0x000000000510E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 4932 niba4455.exe 4868 niba1275.exe 4736 f9329TH.exe 1972 h70jB10.exe 4336 iqqZr16.exe 4868 l51vA54.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h70jB10.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" f9329TH.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h70jB10.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 36d558d8dbee8ff1affdbba3d2404a2fbbe298c3e67833ba466bdd9bccb752c1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 36d558d8dbee8ff1affdbba3d2404a2fbbe298c3e67833ba466bdd9bccb752c1.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce niba4455.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" niba4455.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce niba1275.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" niba1275.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2644 1972 WerFault.exe 94 3948 4336 WerFault.exe 98 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4736 f9329TH.exe 4736 f9329TH.exe 1972 h70jB10.exe 1972 h70jB10.exe 4336 iqqZr16.exe 4336 iqqZr16.exe 4868 l51vA54.exe 4868 l51vA54.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4736 f9329TH.exe Token: SeDebugPrivilege 1972 h70jB10.exe Token: SeDebugPrivilege 4336 iqqZr16.exe Token: SeDebugPrivilege 4868 l51vA54.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 720 wrote to memory of 4932 720 36d558d8dbee8ff1affdbba3d2404a2fbbe298c3e67833ba466bdd9bccb752c1.exe 85 PID 720 wrote to memory of 4932 720 36d558d8dbee8ff1affdbba3d2404a2fbbe298c3e67833ba466bdd9bccb752c1.exe 85 PID 720 wrote to memory of 4932 720 36d558d8dbee8ff1affdbba3d2404a2fbbe298c3e67833ba466bdd9bccb752c1.exe 85 PID 4932 wrote to memory of 4868 4932 niba4455.exe 86 PID 4932 wrote to memory of 4868 4932 niba4455.exe 86 PID 4932 wrote to memory of 4868 4932 niba4455.exe 86 PID 4868 wrote to memory of 4736 4868 niba1275.exe 87 PID 4868 wrote to memory of 4736 4868 niba1275.exe 87 PID 4868 wrote to memory of 1972 4868 niba1275.exe 94 PID 4868 wrote to memory of 1972 4868 niba1275.exe 94 PID 4868 wrote to memory of 1972 4868 niba1275.exe 94 PID 4932 wrote to memory of 4336 4932 niba4455.exe 98 PID 4932 wrote to memory of 4336 4932 niba4455.exe 98 PID 4932 wrote to memory of 4336 4932 niba4455.exe 98 PID 720 wrote to memory of 4868 720 36d558d8dbee8ff1affdbba3d2404a2fbbe298c3e67833ba466bdd9bccb752c1.exe 106 PID 720 wrote to memory of 4868 720 36d558d8dbee8ff1affdbba3d2404a2fbbe298c3e67833ba466bdd9bccb752c1.exe 106 PID 720 wrote to memory of 4868 720 36d558d8dbee8ff1affdbba3d2404a2fbbe298c3e67833ba466bdd9bccb752c1.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\36d558d8dbee8ff1affdbba3d2404a2fbbe298c3e67833ba466bdd9bccb752c1.exe"C:\Users\Admin\AppData\Local\Temp\36d558d8dbee8ff1affdbba3d2404a2fbbe298c3e67833ba466bdd9bccb752c1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:720 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba4455.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba4455.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba1275.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba1275.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f9329TH.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f9329TH.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4736
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h70jB10.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h70jB10.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1972 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1972 -s 10885⤵
- Program crash
PID:2644
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iqqZr16.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iqqZr16.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4336 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4336 -s 13284⤵
- Program crash
PID:3948
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l51vA54.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l51vA54.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1972 -ip 19721⤵PID:3948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4336 -ip 43361⤵PID:2800
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD56c4c2a56d5dd785adbe4fe60fa3cc1f2
SHA1f8bd4379310258f8e54c47b56f5eec7394adb9a2
SHA256b182f2d3d49bdda2e29a0ed312deef4bee03983de54080c5e97ad6422de192d2
SHA512f6958cab80e2f7736cea307b51be546e50acd5494b72db0343a09e6ef8c446114f51be6c9826fcb6e9f7190e4ec8415c0a403c3c1706183577c2604b877ff830
-
Filesize
175KB
MD56c4c2a56d5dd785adbe4fe60fa3cc1f2
SHA1f8bd4379310258f8e54c47b56f5eec7394adb9a2
SHA256b182f2d3d49bdda2e29a0ed312deef4bee03983de54080c5e97ad6422de192d2
SHA512f6958cab80e2f7736cea307b51be546e50acd5494b72db0343a09e6ef8c446114f51be6c9826fcb6e9f7190e4ec8415c0a403c3c1706183577c2604b877ff830
-
Filesize
635KB
MD5bae3b577fe15012108101ccd9bae76a8
SHA10085950c025c1883e2f209b3343a832f19d564b6
SHA2560ea810e96cda12f467455543998f5519a357bcfb4f493eb273b9d427e5084366
SHA5122a4b45e030f976176bd65091fd5f8c91236e9cb479292eb44866735bc96a2ae2b41147283ba4a22d8d8a6a394fee317dffc1d70e1c744c2b8479438c78330ac8
-
Filesize
635KB
MD5bae3b577fe15012108101ccd9bae76a8
SHA10085950c025c1883e2f209b3343a832f19d564b6
SHA2560ea810e96cda12f467455543998f5519a357bcfb4f493eb273b9d427e5084366
SHA5122a4b45e030f976176bd65091fd5f8c91236e9cb479292eb44866735bc96a2ae2b41147283ba4a22d8d8a6a394fee317dffc1d70e1c744c2b8479438c78330ac8
-
Filesize
288KB
MD59f300e714582cf30200c070f4515ed86
SHA15545c6f30025286bed08a2f5da2de79b719cd8d0
SHA2565e0610385d79988d40fa8421f79d448fadaf3e77600cac0feadddd7ae637be60
SHA512840bb27c618ca02dcf573c6bb3e0e6aa00cf337e459b675af6b4942e9ad7b8d83bcb594e0e45927ab30dc63747715da58caa28bf7529c48b547aa2ecbb2faf24
-
Filesize
288KB
MD59f300e714582cf30200c070f4515ed86
SHA15545c6f30025286bed08a2f5da2de79b719cd8d0
SHA2565e0610385d79988d40fa8421f79d448fadaf3e77600cac0feadddd7ae637be60
SHA512840bb27c618ca02dcf573c6bb3e0e6aa00cf337e459b675af6b4942e9ad7b8d83bcb594e0e45927ab30dc63747715da58caa28bf7529c48b547aa2ecbb2faf24
-
Filesize
314KB
MD5af0058d30c47db6fe0f7a96d65d15df5
SHA133b599454ba33907ad048d66946022cb4402c784
SHA256a9b62539d58795a73fc071b6933b2bccf2a88e0dba9063ab4bf97d85f81aee43
SHA5125e683d2e659872e30e6f1864a5e969d27ad44cb66d5d27efbf1980fd87c4126071fa8c486bed76bf950b27b0e1a05035cc6756e16e0faeba350620851b84280d
-
Filesize
314KB
MD5af0058d30c47db6fe0f7a96d65d15df5
SHA133b599454ba33907ad048d66946022cb4402c784
SHA256a9b62539d58795a73fc071b6933b2bccf2a88e0dba9063ab4bf97d85f81aee43
SHA5125e683d2e659872e30e6f1864a5e969d27ad44cb66d5d27efbf1980fd87c4126071fa8c486bed76bf950b27b0e1a05035cc6756e16e0faeba350620851b84280d
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
230KB
MD5223ab64f490821614f3da60859048f2f
SHA1b0c0b568e13dccee21422b8acefe5db337d76123
SHA25657bf1e5b85cf8cdeef1bc5c054a280b87aaf85621a9a79857e1283e6f8635dd2
SHA5129449127e83ed3924922281f4d235670716569f9526c0b56c3752bd249b0af91cab652ca8204bc8fa6180da08264c427171965a7aa0ce360204c29f3f1784f6de
-
Filesize
230KB
MD5223ab64f490821614f3da60859048f2f
SHA1b0c0b568e13dccee21422b8acefe5db337d76123
SHA25657bf1e5b85cf8cdeef1bc5c054a280b87aaf85621a9a79857e1283e6f8635dd2
SHA5129449127e83ed3924922281f4d235670716569f9526c0b56c3752bd249b0af91cab652ca8204bc8fa6180da08264c427171965a7aa0ce360204c29f3f1784f6de