Analysis
-
max time kernel
87s -
max time network
90s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
20/03/2023, 18:04
Static task
static1
Behavioral task
behavioral1
Sample
4d362e718a8723a49dbaaa774ed4a67e6bdd88ae5426266ac3e3aaae2022a884.exe
Resource
win10-20230220-en
General
-
Target
4d362e718a8723a49dbaaa774ed4a67e6bdd88ae5426266ac3e3aaae2022a884.exe
-
Size
777KB
-
MD5
6ccdd4cb532d005482a8ac41b470ee07
-
SHA1
7d6f82c09866853e84c1f6016f57b10304ec7f8d
-
SHA256
4d362e718a8723a49dbaaa774ed4a67e6bdd88ae5426266ac3e3aaae2022a884
-
SHA512
f0c2c20b31009594fcad0443d17e6dd08450d9284ea9e8749ba35ccaf4f22e438b2310ddf336754a29f9563e755491e0e25269696bb006cbb64165c22171680a
-
SSDEEP
24576:Fy1lOlHY80nJm0Z0xri/me9s5X2OH+EsH8:gZx0xueeEGbH
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
ruka
193.233.20.28:4125
-
auth_value
5d1d0e51ebe1e3f16cca573ff651c43c
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" f2818rF.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" f2818rF.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" f2818rF.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" f2818rF.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h10Ee02.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h10Ee02.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h10Ee02.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h10Ee02.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" f2818rF.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h10Ee02.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/1956-190-0x00000000023C0000-0x0000000002406000-memory.dmp family_redline behavioral1/memory/1956-191-0x0000000004A60000-0x0000000004AA4000-memory.dmp family_redline behavioral1/memory/1956-192-0x0000000004A60000-0x0000000004A9E000-memory.dmp family_redline behavioral1/memory/1956-193-0x0000000004A60000-0x0000000004A9E000-memory.dmp family_redline behavioral1/memory/1956-195-0x0000000004A60000-0x0000000004A9E000-memory.dmp family_redline behavioral1/memory/1956-197-0x0000000004A60000-0x0000000004A9E000-memory.dmp family_redline behavioral1/memory/1956-199-0x0000000004A60000-0x0000000004A9E000-memory.dmp family_redline behavioral1/memory/1956-201-0x0000000004A60000-0x0000000004A9E000-memory.dmp family_redline behavioral1/memory/1956-203-0x0000000004A60000-0x0000000004A9E000-memory.dmp family_redline behavioral1/memory/1956-205-0x0000000004A60000-0x0000000004A9E000-memory.dmp family_redline behavioral1/memory/1956-207-0x0000000004A60000-0x0000000004A9E000-memory.dmp family_redline behavioral1/memory/1956-209-0x0000000004A60000-0x0000000004A9E000-memory.dmp family_redline behavioral1/memory/1956-211-0x0000000004A60000-0x0000000004A9E000-memory.dmp family_redline behavioral1/memory/1956-213-0x0000000004A60000-0x0000000004A9E000-memory.dmp family_redline behavioral1/memory/1956-215-0x0000000004A60000-0x0000000004A9E000-memory.dmp family_redline behavioral1/memory/1956-217-0x0000000004A60000-0x0000000004A9E000-memory.dmp family_redline behavioral1/memory/1956-219-0x0000000004A60000-0x0000000004A9E000-memory.dmp family_redline behavioral1/memory/1956-221-0x0000000004A60000-0x0000000004A9E000-memory.dmp family_redline behavioral1/memory/1956-223-0x0000000004A60000-0x0000000004A9E000-memory.dmp family_redline behavioral1/memory/1956-225-0x0000000004A60000-0x0000000004A9E000-memory.dmp family_redline behavioral1/memory/1956-259-0x0000000004BB0000-0x0000000004BC0000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 2804 niba9576.exe 2592 niba4005.exe 5012 f2818rF.exe 3860 h10Ee02.exe 1956 iIRqE64.exe 4808 l27Wp48.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" f2818rF.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h10Ee02.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h10Ee02.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4d362e718a8723a49dbaaa774ed4a67e6bdd88ae5426266ac3e3aaae2022a884.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4d362e718a8723a49dbaaa774ed4a67e6bdd88ae5426266ac3e3aaae2022a884.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce niba9576.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" niba9576.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce niba4005.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" niba4005.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 5012 f2818rF.exe 5012 f2818rF.exe 3860 h10Ee02.exe 3860 h10Ee02.exe 1956 iIRqE64.exe 1956 iIRqE64.exe 4808 l27Wp48.exe 4808 l27Wp48.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 5012 f2818rF.exe Token: SeDebugPrivilege 3860 h10Ee02.exe Token: SeDebugPrivilege 1956 iIRqE64.exe Token: SeDebugPrivilege 4808 l27Wp48.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2476 wrote to memory of 2804 2476 4d362e718a8723a49dbaaa774ed4a67e6bdd88ae5426266ac3e3aaae2022a884.exe 66 PID 2476 wrote to memory of 2804 2476 4d362e718a8723a49dbaaa774ed4a67e6bdd88ae5426266ac3e3aaae2022a884.exe 66 PID 2476 wrote to memory of 2804 2476 4d362e718a8723a49dbaaa774ed4a67e6bdd88ae5426266ac3e3aaae2022a884.exe 66 PID 2804 wrote to memory of 2592 2804 niba9576.exe 67 PID 2804 wrote to memory of 2592 2804 niba9576.exe 67 PID 2804 wrote to memory of 2592 2804 niba9576.exe 67 PID 2592 wrote to memory of 5012 2592 niba4005.exe 68 PID 2592 wrote to memory of 5012 2592 niba4005.exe 68 PID 2592 wrote to memory of 3860 2592 niba4005.exe 69 PID 2592 wrote to memory of 3860 2592 niba4005.exe 69 PID 2592 wrote to memory of 3860 2592 niba4005.exe 69 PID 2804 wrote to memory of 1956 2804 niba9576.exe 70 PID 2804 wrote to memory of 1956 2804 niba9576.exe 70 PID 2804 wrote to memory of 1956 2804 niba9576.exe 70 PID 2476 wrote to memory of 4808 2476 4d362e718a8723a49dbaaa774ed4a67e6bdd88ae5426266ac3e3aaae2022a884.exe 72 PID 2476 wrote to memory of 4808 2476 4d362e718a8723a49dbaaa774ed4a67e6bdd88ae5426266ac3e3aaae2022a884.exe 72 PID 2476 wrote to memory of 4808 2476 4d362e718a8723a49dbaaa774ed4a67e6bdd88ae5426266ac3e3aaae2022a884.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d362e718a8723a49dbaaa774ed4a67e6bdd88ae5426266ac3e3aaae2022a884.exe"C:\Users\Admin\AppData\Local\Temp\4d362e718a8723a49dbaaa774ed4a67e6bdd88ae5426266ac3e3aaae2022a884.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba9576.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba9576.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba4005.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba4005.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f2818rF.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f2818rF.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5012
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h10Ee02.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h10Ee02.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3860
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iIRqE64.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iIRqE64.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1956
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l27Wp48.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l27Wp48.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4808
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD56c4c2a56d5dd785adbe4fe60fa3cc1f2
SHA1f8bd4379310258f8e54c47b56f5eec7394adb9a2
SHA256b182f2d3d49bdda2e29a0ed312deef4bee03983de54080c5e97ad6422de192d2
SHA512f6958cab80e2f7736cea307b51be546e50acd5494b72db0343a09e6ef8c446114f51be6c9826fcb6e9f7190e4ec8415c0a403c3c1706183577c2604b877ff830
-
Filesize
175KB
MD56c4c2a56d5dd785adbe4fe60fa3cc1f2
SHA1f8bd4379310258f8e54c47b56f5eec7394adb9a2
SHA256b182f2d3d49bdda2e29a0ed312deef4bee03983de54080c5e97ad6422de192d2
SHA512f6958cab80e2f7736cea307b51be546e50acd5494b72db0343a09e6ef8c446114f51be6c9826fcb6e9f7190e4ec8415c0a403c3c1706183577c2604b877ff830
-
Filesize
635KB
MD52855def5a5bc43263eb5820de021bce3
SHA10f13757bf0ae11537ea56f5cf48f7a7321bfc6c6
SHA2562ebf8248947a5b817dd0a8d9099dcf44ba864f4483f5c0afc3049f3818330092
SHA5128600dba3a28adb50d8b4f9b09848cbdc2e1200bc5bb379622ad40b5d74111779a10aeed2aa0f7fbc22e3b833b8aafb9526fddc7e2843bf325945efb25ec6e00c
-
Filesize
635KB
MD52855def5a5bc43263eb5820de021bce3
SHA10f13757bf0ae11537ea56f5cf48f7a7321bfc6c6
SHA2562ebf8248947a5b817dd0a8d9099dcf44ba864f4483f5c0afc3049f3818330092
SHA5128600dba3a28adb50d8b4f9b09848cbdc2e1200bc5bb379622ad40b5d74111779a10aeed2aa0f7fbc22e3b833b8aafb9526fddc7e2843bf325945efb25ec6e00c
-
Filesize
288KB
MD556a5e95197e2f1fbce6d7ac1c73ae7a9
SHA14e918eb8447ef0d5838c12c6cacc3574a5c85d73
SHA2569d5d72c6a16f505804031f7c594b1800eb539500a7d1eb2a085b5c69aaf6b87a
SHA5123e7d77f19ad81c9312dfdcdc761befd82248154972078bcfa48ad2e05a42dfef5c85c07825214b576dbf3a0b3a0eee12c2b5482a4c0d6c63a0bb29562faaa1bf
-
Filesize
288KB
MD556a5e95197e2f1fbce6d7ac1c73ae7a9
SHA14e918eb8447ef0d5838c12c6cacc3574a5c85d73
SHA2569d5d72c6a16f505804031f7c594b1800eb539500a7d1eb2a085b5c69aaf6b87a
SHA5123e7d77f19ad81c9312dfdcdc761befd82248154972078bcfa48ad2e05a42dfef5c85c07825214b576dbf3a0b3a0eee12c2b5482a4c0d6c63a0bb29562faaa1bf
-
Filesize
314KB
MD5ce300ed9496f348847c79c274437bc71
SHA18b9ce6ea4e576b49f6c003c2eaacb37bccc16180
SHA256e799f8cb378245cf618cbbab19c5c057c99d7e90cbf83449d5aac552ad4755d9
SHA512ea4d08056fd40e3bb98b770f66d88d3b7c6afbef1c24e43f759c1a85636e173161c29883a54952dd37114b5f5ee19054dab187e962c93ff7e9097f74712504d6
-
Filesize
314KB
MD5ce300ed9496f348847c79c274437bc71
SHA18b9ce6ea4e576b49f6c003c2eaacb37bccc16180
SHA256e799f8cb378245cf618cbbab19c5c057c99d7e90cbf83449d5aac552ad4755d9
SHA512ea4d08056fd40e3bb98b770f66d88d3b7c6afbef1c24e43f759c1a85636e173161c29883a54952dd37114b5f5ee19054dab187e962c93ff7e9097f74712504d6
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
230KB
MD58234faf622b521670cd217ee6baebff9
SHA1c5e367e91b23e3728a0abc74d8ff29028bf84e95
SHA2564a7070654b8b43dabe834b19b3069486e523af1201e6061236f6d84bf426546f
SHA51257e33e77ce53405090d422b8413dfe2cf330afd228bf5e6a532efe091ccbbbee7ed2f8779d7786cfbf3f2b9e51e759a8b93bbad52ec5ecad6582ad1b3eaf83d0
-
Filesize
230KB
MD58234faf622b521670cd217ee6baebff9
SHA1c5e367e91b23e3728a0abc74d8ff29028bf84e95
SHA2564a7070654b8b43dabe834b19b3069486e523af1201e6061236f6d84bf426546f
SHA51257e33e77ce53405090d422b8413dfe2cf330afd228bf5e6a532efe091ccbbbee7ed2f8779d7786cfbf3f2b9e51e759a8b93bbad52ec5ecad6582ad1b3eaf83d0