Analysis
-
max time kernel
88s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
20/03/2023, 08:10
Static task
static1
Behavioral task
behavioral1
Sample
8b566d7de819b061a6170eef427c21bae8d4ece39bdec5fdd173da2c6951493b.exe
Resource
win10v2004-20230221-en
General
-
Target
8b566d7de819b061a6170eef427c21bae8d4ece39bdec5fdd173da2c6951493b.exe
-
Size
778KB
-
MD5
ee91d97c48558255657d77c94fc9df9c
-
SHA1
7119fa2ad662892cad69a54091d06d9fe813afe6
-
SHA256
8b566d7de819b061a6170eef427c21bae8d4ece39bdec5fdd173da2c6951493b
-
SHA512
6a7811e489068b658b1f65b858b6b110412158829eccfd1f3d1de5425dffb7589ca1cdb4dc10afe129773eaef736ab79b2f04413bde742085a66f96540232523
-
SSDEEP
12288:3MrHy90AbEB7iKbntl6j6CFQ28oY0GgCb+//gieruNFgU/6m/0P/Q3pCgb:IyJ+GItl6jpDBCnpaNim/0/2
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
ruka
193.233.20.28:4125
-
auth_value
5d1d0e51ebe1e3f16cca573ff651c43c
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" f5986jc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h81BB39.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h81BB39.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h81BB39.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" f5986jc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" f5986jc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" f5986jc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" f5986jc.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h81BB39.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h81BB39.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h81BB39.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection f5986jc.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/3764-203-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/3764-205-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/3764-202-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/3764-207-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/3764-209-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/3764-211-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/3764-215-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/3764-221-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/3764-219-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/3764-223-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/3764-225-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/3764-227-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/3764-229-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/3764-231-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/3764-233-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/3764-235-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/3764-237-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/3764-239-0x0000000002640000-0x000000000267E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 4708 niba4015.exe 2304 niba6394.exe 2336 f5986jc.exe 4012 h81BB39.exe 3764 iqXzX64.exe 2720 l96ZN99.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" f5986jc.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h81BB39.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h81BB39.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 8b566d7de819b061a6170eef427c21bae8d4ece39bdec5fdd173da2c6951493b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8b566d7de819b061a6170eef427c21bae8d4ece39bdec5fdd173da2c6951493b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce niba4015.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" niba4015.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce niba6394.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" niba6394.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4728 4012 WerFault.exe 93 4744 3764 WerFault.exe 96 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2336 f5986jc.exe 2336 f5986jc.exe 4012 h81BB39.exe 4012 h81BB39.exe 3764 iqXzX64.exe 3764 iqXzX64.exe 2720 l96ZN99.exe 2720 l96ZN99.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2336 f5986jc.exe Token: SeDebugPrivilege 4012 h81BB39.exe Token: SeDebugPrivilege 3764 iqXzX64.exe Token: SeDebugPrivilege 2720 l96ZN99.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4544 wrote to memory of 4708 4544 8b566d7de819b061a6170eef427c21bae8d4ece39bdec5fdd173da2c6951493b.exe 85 PID 4544 wrote to memory of 4708 4544 8b566d7de819b061a6170eef427c21bae8d4ece39bdec5fdd173da2c6951493b.exe 85 PID 4544 wrote to memory of 4708 4544 8b566d7de819b061a6170eef427c21bae8d4ece39bdec5fdd173da2c6951493b.exe 85 PID 4708 wrote to memory of 2304 4708 niba4015.exe 86 PID 4708 wrote to memory of 2304 4708 niba4015.exe 86 PID 4708 wrote to memory of 2304 4708 niba4015.exe 86 PID 2304 wrote to memory of 2336 2304 niba6394.exe 87 PID 2304 wrote to memory of 2336 2304 niba6394.exe 87 PID 2304 wrote to memory of 4012 2304 niba6394.exe 93 PID 2304 wrote to memory of 4012 2304 niba6394.exe 93 PID 2304 wrote to memory of 4012 2304 niba6394.exe 93 PID 4708 wrote to memory of 3764 4708 niba4015.exe 96 PID 4708 wrote to memory of 3764 4708 niba4015.exe 96 PID 4708 wrote to memory of 3764 4708 niba4015.exe 96 PID 4544 wrote to memory of 2720 4544 8b566d7de819b061a6170eef427c21bae8d4ece39bdec5fdd173da2c6951493b.exe 101 PID 4544 wrote to memory of 2720 4544 8b566d7de819b061a6170eef427c21bae8d4ece39bdec5fdd173da2c6951493b.exe 101 PID 4544 wrote to memory of 2720 4544 8b566d7de819b061a6170eef427c21bae8d4ece39bdec5fdd173da2c6951493b.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b566d7de819b061a6170eef427c21bae8d4ece39bdec5fdd173da2c6951493b.exe"C:\Users\Admin\AppData\Local\Temp\8b566d7de819b061a6170eef427c21bae8d4ece39bdec5fdd173da2c6951493b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba4015.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba4015.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba6394.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba6394.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f5986jc.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f5986jc.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2336
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h81BB39.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h81BB39.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4012 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4012 -s 10805⤵
- Program crash
PID:4728
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iqXzX64.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iqXzX64.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3764 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3764 -s 17124⤵
- Program crash
PID:4744
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l96ZN99.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l96ZN99.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4012 -ip 40121⤵PID:1292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 396 -p 3764 -ip 37641⤵PID:2760
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD56c4c2a56d5dd785adbe4fe60fa3cc1f2
SHA1f8bd4379310258f8e54c47b56f5eec7394adb9a2
SHA256b182f2d3d49bdda2e29a0ed312deef4bee03983de54080c5e97ad6422de192d2
SHA512f6958cab80e2f7736cea307b51be546e50acd5494b72db0343a09e6ef8c446114f51be6c9826fcb6e9f7190e4ec8415c0a403c3c1706183577c2604b877ff830
-
Filesize
175KB
MD56c4c2a56d5dd785adbe4fe60fa3cc1f2
SHA1f8bd4379310258f8e54c47b56f5eec7394adb9a2
SHA256b182f2d3d49bdda2e29a0ed312deef4bee03983de54080c5e97ad6422de192d2
SHA512f6958cab80e2f7736cea307b51be546e50acd5494b72db0343a09e6ef8c446114f51be6c9826fcb6e9f7190e4ec8415c0a403c3c1706183577c2604b877ff830
-
Filesize
636KB
MD5a1b44e00233cf259c409b68a5f789686
SHA1b4f03c03a2d03c435b6c8ed74ada3445f4fb8c64
SHA2567a22f9cd66b659acf31c6d516a07eb6b9557454f7f69d8959b4dc3932f83f516
SHA5121e502bce978da9eabaa1e8d6a9fc36ce9afc63c3b86fd201a710a722998669197ed5107b7de42f4e916a0b665ff9ae4e0ebb4e10f0367a28d61eca560c9a0f24
-
Filesize
636KB
MD5a1b44e00233cf259c409b68a5f789686
SHA1b4f03c03a2d03c435b6c8ed74ada3445f4fb8c64
SHA2567a22f9cd66b659acf31c6d516a07eb6b9557454f7f69d8959b4dc3932f83f516
SHA5121e502bce978da9eabaa1e8d6a9fc36ce9afc63c3b86fd201a710a722998669197ed5107b7de42f4e916a0b665ff9ae4e0ebb4e10f0367a28d61eca560c9a0f24
-
Filesize
287KB
MD5ddbae6f47fde055e04d84b3095f366bb
SHA1463913a60eb2a46e4762de0cdbad2be27a54c5ad
SHA25688658a3754250858c9033491376b58347c8499c02bc67ecef764bb399e3de75b
SHA5125843bfda113278471c3cfeaf2e5851c6fa2573cfc9248c474e8ff12ba9de3ae7fbdccc0b0b0c538f94b46f8815b3def6d16f9256959e127e4a21212df12b124d
-
Filesize
287KB
MD5ddbae6f47fde055e04d84b3095f366bb
SHA1463913a60eb2a46e4762de0cdbad2be27a54c5ad
SHA25688658a3754250858c9033491376b58347c8499c02bc67ecef764bb399e3de75b
SHA5125843bfda113278471c3cfeaf2e5851c6fa2573cfc9248c474e8ff12ba9de3ae7fbdccc0b0b0c538f94b46f8815b3def6d16f9256959e127e4a21212df12b124d
-
Filesize
314KB
MD5bafe450e24019dea498cb45208176efe
SHA12af2991ed68ea181d7b3bc9a9a5cd599a9c5fc60
SHA2566a596b708b6ae2934119ddf3db7b8777aa6419071134c6b9b6e144ac093f7859
SHA512157bd842017b7b6dba39081c0a8c8f7555e673f374a721990daa3a098915c5a1fe7cd3bca0493c4f3af4da2776ccf1838fc476fd6af884a5a62ee46a9e661ddf
-
Filesize
314KB
MD5bafe450e24019dea498cb45208176efe
SHA12af2991ed68ea181d7b3bc9a9a5cd599a9c5fc60
SHA2566a596b708b6ae2934119ddf3db7b8777aa6419071134c6b9b6e144ac093f7859
SHA512157bd842017b7b6dba39081c0a8c8f7555e673f374a721990daa3a098915c5a1fe7cd3bca0493c4f3af4da2776ccf1838fc476fd6af884a5a62ee46a9e661ddf
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
229KB
MD57c65b5ec2a0c617c4256f8dbd4f94f38
SHA1e7ccfe208cf7ebd8a1b5c87c1a84bca6368f8210
SHA256847a67e1583594ffa5bec4ef5e34e9555748b2cb48bae0ddec182b606c6724e4
SHA512ede8932c93a2a624658bf8ea02abcff2cd8b9cdbaad975fd59bdec45729abe9e6c5d6845ed9a6f66a716869ebc94b1b1636598fb772a8ab409cd6eec9b2fa102
-
Filesize
229KB
MD57c65b5ec2a0c617c4256f8dbd4f94f38
SHA1e7ccfe208cf7ebd8a1b5c87c1a84bca6368f8210
SHA256847a67e1583594ffa5bec4ef5e34e9555748b2cb48bae0ddec182b606c6724e4
SHA512ede8932c93a2a624658bf8ea02abcff2cd8b9cdbaad975fd59bdec45729abe9e6c5d6845ed9a6f66a716869ebc94b1b1636598fb772a8ab409cd6eec9b2fa102