Analysis
-
max time kernel
145s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
20-03-2023 07:39
Static task
static1
Behavioral task
behavioral1
Sample
9d47f8d94813b09ca0e7ef18fbdef5757ae217de5fb119d8f7fec156575ff614.exe
Resource
win10v2004-20230220-en
General
-
Target
9d47f8d94813b09ca0e7ef18fbdef5757ae217de5fb119d8f7fec156575ff614.exe
-
Size
777KB
-
MD5
71d2a6fb901b30b66b77419980ce0454
-
SHA1
a57e66d24cea655f92af14ca679e74f429a4526d
-
SHA256
9d47f8d94813b09ca0e7ef18fbdef5757ae217de5fb119d8f7fec156575ff614
-
SHA512
7ab3ba4db9dba8e6bddfa60b79b32305f3ba37289efd3d3aec22b160a6dc95915a885f1037ffd87a37dca76eea602a23225cd9008b0c7f09fd8f8a7a98f51810
-
SSDEEP
24576:dyLIiMbjcvxiOuoxFUwj7j1JNOX2bM0J8:4EsvPuoXUAhc2bM0J
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
ruka
193.233.20.28:4125
-
auth_value
5d1d0e51ebe1e3f16cca573ff651c43c
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" f4839CJ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h88ev36.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h88ev36.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection f4839CJ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" f4839CJ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" f4839CJ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" f4839CJ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h88ev36.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" f4839CJ.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h88ev36.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h88ev36.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h88ev36.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/1256-202-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/1256-203-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/1256-205-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/1256-207-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/1256-209-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/1256-211-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/1256-213-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/1256-215-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/1256-217-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/1256-219-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/1256-221-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/1256-223-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/1256-225-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/1256-227-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/1256-229-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/1256-231-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/1256-233-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/1256-235-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/1256-395-0x0000000004D60000-0x0000000004D70000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 792 niba6169.exe 4324 niba5474.exe 2840 f4839CJ.exe 2572 h88ev36.exe 1256 iKKzI51.exe 5060 l40Nk75.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" f4839CJ.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h88ev36.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h88ev36.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9d47f8d94813b09ca0e7ef18fbdef5757ae217de5fb119d8f7fec156575ff614.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce niba6169.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" niba6169.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce niba5474.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" niba5474.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9d47f8d94813b09ca0e7ef18fbdef5757ae217de5fb119d8f7fec156575ff614.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2620 2572 WerFault.exe 92 4136 1256 WerFault.exe 98 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2840 f4839CJ.exe 2840 f4839CJ.exe 2572 h88ev36.exe 2572 h88ev36.exe 1256 iKKzI51.exe 1256 iKKzI51.exe 5060 l40Nk75.exe 5060 l40Nk75.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2840 f4839CJ.exe Token: SeDebugPrivilege 2572 h88ev36.exe Token: SeDebugPrivilege 1256 iKKzI51.exe Token: SeDebugPrivilege 5060 l40Nk75.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4832 wrote to memory of 792 4832 9d47f8d94813b09ca0e7ef18fbdef5757ae217de5fb119d8f7fec156575ff614.exe 85 PID 4832 wrote to memory of 792 4832 9d47f8d94813b09ca0e7ef18fbdef5757ae217de5fb119d8f7fec156575ff614.exe 85 PID 4832 wrote to memory of 792 4832 9d47f8d94813b09ca0e7ef18fbdef5757ae217de5fb119d8f7fec156575ff614.exe 85 PID 792 wrote to memory of 4324 792 niba6169.exe 86 PID 792 wrote to memory of 4324 792 niba6169.exe 86 PID 792 wrote to memory of 4324 792 niba6169.exe 86 PID 4324 wrote to memory of 2840 4324 niba5474.exe 87 PID 4324 wrote to memory of 2840 4324 niba5474.exe 87 PID 4324 wrote to memory of 2572 4324 niba5474.exe 92 PID 4324 wrote to memory of 2572 4324 niba5474.exe 92 PID 4324 wrote to memory of 2572 4324 niba5474.exe 92 PID 792 wrote to memory of 1256 792 niba6169.exe 98 PID 792 wrote to memory of 1256 792 niba6169.exe 98 PID 792 wrote to memory of 1256 792 niba6169.exe 98 PID 4832 wrote to memory of 5060 4832 9d47f8d94813b09ca0e7ef18fbdef5757ae217de5fb119d8f7fec156575ff614.exe 103 PID 4832 wrote to memory of 5060 4832 9d47f8d94813b09ca0e7ef18fbdef5757ae217de5fb119d8f7fec156575ff614.exe 103 PID 4832 wrote to memory of 5060 4832 9d47f8d94813b09ca0e7ef18fbdef5757ae217de5fb119d8f7fec156575ff614.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d47f8d94813b09ca0e7ef18fbdef5757ae217de5fb119d8f7fec156575ff614.exe"C:\Users\Admin\AppData\Local\Temp\9d47f8d94813b09ca0e7ef18fbdef5757ae217de5fb119d8f7fec156575ff614.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba6169.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba6169.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba5474.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba5474.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f4839CJ.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f4839CJ.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2840
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h88ev36.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h88ev36.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2572 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2572 -s 10845⤵
- Program crash
PID:2620
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iKKzI51.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iKKzI51.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1256 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1256 -s 13724⤵
- Program crash
PID:4136
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l40Nk75.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l40Nk75.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2572 -ip 25721⤵PID:4104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 192 -p 1256 -ip 12561⤵PID:1712
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD56c4c2a56d5dd785adbe4fe60fa3cc1f2
SHA1f8bd4379310258f8e54c47b56f5eec7394adb9a2
SHA256b182f2d3d49bdda2e29a0ed312deef4bee03983de54080c5e97ad6422de192d2
SHA512f6958cab80e2f7736cea307b51be546e50acd5494b72db0343a09e6ef8c446114f51be6c9826fcb6e9f7190e4ec8415c0a403c3c1706183577c2604b877ff830
-
Filesize
175KB
MD56c4c2a56d5dd785adbe4fe60fa3cc1f2
SHA1f8bd4379310258f8e54c47b56f5eec7394adb9a2
SHA256b182f2d3d49bdda2e29a0ed312deef4bee03983de54080c5e97ad6422de192d2
SHA512f6958cab80e2f7736cea307b51be546e50acd5494b72db0343a09e6ef8c446114f51be6c9826fcb6e9f7190e4ec8415c0a403c3c1706183577c2604b877ff830
-
Filesize
635KB
MD59ee41fad82298640207cd9762f00b955
SHA1a6e721587fc42be423c751a558c59991a8416799
SHA256e7641e08eaf08073cc07c1754da3f1f7ff2231f50f6247343c2d716544715742
SHA512001d2372ac237bd6de5748a263ffb933cd7e1dc908b2c6ee5711796d9c68424e1108736fb73f054513be05947fde3ead4c21bfcc3670bbdbdb6e17ba6fb96e63
-
Filesize
635KB
MD59ee41fad82298640207cd9762f00b955
SHA1a6e721587fc42be423c751a558c59991a8416799
SHA256e7641e08eaf08073cc07c1754da3f1f7ff2231f50f6247343c2d716544715742
SHA512001d2372ac237bd6de5748a263ffb933cd7e1dc908b2c6ee5711796d9c68424e1108736fb73f054513be05947fde3ead4c21bfcc3670bbdbdb6e17ba6fb96e63
-
Filesize
287KB
MD56b03c99951b713a913267b61dc1368d3
SHA1c6ea2082cc95ca6a1544cbafad57b252aac0b858
SHA256f5d7e436783a4b4a21ae9267fb4f042e3b821de28f3c2d27c52891f5d7662d67
SHA512043040bb7233d76c93e58fdfa2cc068cf1d56339640787d7f1e3ae6dcccbd1d200ad59650d103c26b89496f3334aa45fede3994cc64caba66443059bcab8b963
-
Filesize
287KB
MD56b03c99951b713a913267b61dc1368d3
SHA1c6ea2082cc95ca6a1544cbafad57b252aac0b858
SHA256f5d7e436783a4b4a21ae9267fb4f042e3b821de28f3c2d27c52891f5d7662d67
SHA512043040bb7233d76c93e58fdfa2cc068cf1d56339640787d7f1e3ae6dcccbd1d200ad59650d103c26b89496f3334aa45fede3994cc64caba66443059bcab8b963
-
Filesize
314KB
MD59c6141d83d9d2364b170913692ef2f30
SHA1c6d482654ff59a5d64f701e5964332002eb09963
SHA25626e88732f5f9773c2c2e4ab41019e75d775ea897625d9709b7f4fddff94410a4
SHA512338aa28cbdfb514bdee0c155116b8a982ba57655a369dd19b4ce4e00bf23983107613459e8f3cf266d31e723bf40e72d632b2c7d2436e66ee5ad7e430f4ea511
-
Filesize
314KB
MD59c6141d83d9d2364b170913692ef2f30
SHA1c6d482654ff59a5d64f701e5964332002eb09963
SHA25626e88732f5f9773c2c2e4ab41019e75d775ea897625d9709b7f4fddff94410a4
SHA512338aa28cbdfb514bdee0c155116b8a982ba57655a369dd19b4ce4e00bf23983107613459e8f3cf266d31e723bf40e72d632b2c7d2436e66ee5ad7e430f4ea511
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
229KB
MD59e3a6aa10101dd67fb18ed773dbb0062
SHA18271e0202b0ea9a259e1c4ddcf968c6e7d1c471b
SHA256c753470dc3b4d4fb9188bb7d59597e1fb616c2a7178ad03c88b2f8d70f31c36e
SHA512b796eef19f1bf185a6fef34591aa67d0e66d00d999e3f12eadacb89eae51074714be320d208c0bda6ec9e50b557d99ddbc35dd81782ee9ddba8a769208ad36eb
-
Filesize
229KB
MD59e3a6aa10101dd67fb18ed773dbb0062
SHA18271e0202b0ea9a259e1c4ddcf968c6e7d1c471b
SHA256c753470dc3b4d4fb9188bb7d59597e1fb616c2a7178ad03c88b2f8d70f31c36e
SHA512b796eef19f1bf185a6fef34591aa67d0e66d00d999e3f12eadacb89eae51074714be320d208c0bda6ec9e50b557d99ddbc35dd81782ee9ddba8a769208ad36eb