Analysis
-
max time kernel
86s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
21-03-2023 23:52
Static task
static1
Behavioral task
behavioral1
Sample
42e0396cc71e970555db3e997f8718e9448b904a70b7d78a3fe7e6078eb96192.exe
Resource
win10v2004-20230221-en
General
-
Target
42e0396cc71e970555db3e997f8718e9448b904a70b7d78a3fe7e6078eb96192.exe
-
Size
908KB
-
MD5
4aad7596697ba719c509e1758ad10e20
-
SHA1
329f7da79a9616a6a46080c5ac9514b26329c1a1
-
SHA256
42e0396cc71e970555db3e997f8718e9448b904a70b7d78a3fe7e6078eb96192
-
SHA512
445dd67cc34f3c49ccb74536c0930648eaccddecf5a1d41a01098d933b6d73155a6f9f1a07cb2b4ae3d50571f9dbd0476240f16216f9f19024d079b3f051dcef
-
SSDEEP
24576:vyDM+TLPmxxtYEWbCSyq4mT61DkZDA6JA:6DxLPGeEWtypo
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
sint
193.233.20.31:4125
-
auth_value
9d9b763b4dcfbff1c06ef4743cc0399e
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" f0055sL.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h85IS35.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h85IS35.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h85IS35.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h85IS35.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection f0055sL.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" f0055sL.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" f0055sL.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" f0055sL.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" f0055sL.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h85IS35.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h85IS35.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/4520-201-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4520-204-0x0000000004ED0000-0x0000000004EE0000-memory.dmp family_redline behavioral1/memory/4520-207-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4520-203-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4520-209-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4520-213-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4520-211-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4520-215-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4520-217-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4520-219-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4520-221-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4520-223-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4520-225-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4520-227-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4520-229-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4520-231-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4520-233-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4520-235-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4520-237-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 2388 niba3264.exe 4784 niba8024.exe 1776 f0055sL.exe 3892 h85IS35.exe 4520 iiVhf79.exe 3548 l97zC44.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" f0055sL.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h85IS35.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h85IS35.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" niba3264.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce niba8024.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" niba8024.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 42e0396cc71e970555db3e997f8718e9448b904a70b7d78a3fe7e6078eb96192.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 42e0396cc71e970555db3e997f8718e9448b904a70b7d78a3fe7e6078eb96192.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce niba3264.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2152 3892 WerFault.exe 91 4936 4520 WerFault.exe 97 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1776 f0055sL.exe 1776 f0055sL.exe 3892 h85IS35.exe 3892 h85IS35.exe 4520 iiVhf79.exe 4520 iiVhf79.exe 3548 l97zC44.exe 3548 l97zC44.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1776 f0055sL.exe Token: SeDebugPrivilege 3892 h85IS35.exe Token: SeDebugPrivilege 4520 iiVhf79.exe Token: SeDebugPrivilege 3548 l97zC44.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4448 wrote to memory of 2388 4448 42e0396cc71e970555db3e997f8718e9448b904a70b7d78a3fe7e6078eb96192.exe 84 PID 4448 wrote to memory of 2388 4448 42e0396cc71e970555db3e997f8718e9448b904a70b7d78a3fe7e6078eb96192.exe 84 PID 4448 wrote to memory of 2388 4448 42e0396cc71e970555db3e997f8718e9448b904a70b7d78a3fe7e6078eb96192.exe 84 PID 2388 wrote to memory of 4784 2388 niba3264.exe 85 PID 2388 wrote to memory of 4784 2388 niba3264.exe 85 PID 2388 wrote to memory of 4784 2388 niba3264.exe 85 PID 4784 wrote to memory of 1776 4784 niba8024.exe 86 PID 4784 wrote to memory of 1776 4784 niba8024.exe 86 PID 4784 wrote to memory of 3892 4784 niba8024.exe 91 PID 4784 wrote to memory of 3892 4784 niba8024.exe 91 PID 4784 wrote to memory of 3892 4784 niba8024.exe 91 PID 2388 wrote to memory of 4520 2388 niba3264.exe 97 PID 2388 wrote to memory of 4520 2388 niba3264.exe 97 PID 2388 wrote to memory of 4520 2388 niba3264.exe 97 PID 4448 wrote to memory of 3548 4448 42e0396cc71e970555db3e997f8718e9448b904a70b7d78a3fe7e6078eb96192.exe 101 PID 4448 wrote to memory of 3548 4448 42e0396cc71e970555db3e997f8718e9448b904a70b7d78a3fe7e6078eb96192.exe 101 PID 4448 wrote to memory of 3548 4448 42e0396cc71e970555db3e997f8718e9448b904a70b7d78a3fe7e6078eb96192.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\42e0396cc71e970555db3e997f8718e9448b904a70b7d78a3fe7e6078eb96192.exe"C:\Users\Admin\AppData\Local\Temp\42e0396cc71e970555db3e997f8718e9448b904a70b7d78a3fe7e6078eb96192.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba3264.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba3264.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba8024.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba8024.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f0055sL.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f0055sL.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1776
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h85IS35.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h85IS35.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3892 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3892 -s 10805⤵
- Program crash
PID:2152
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iiVhf79.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iiVhf79.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4520 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4520 -s 13364⤵
- Program crash
PID:4936
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l97zC44.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l97zC44.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3892 -ip 38921⤵PID:2164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4520 -ip 45201⤵PID:792
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD587d8308e8cda648f980eaded98c6dd64
SHA18e1213fea55c704c3d133c4b8675b99a66c08fc1
SHA256dfb2378d9e691c98c02a4ebd3196a313185549e72cd0d770972ea47888889246
SHA51204add36bd3e21f02b1fa836caddfbc0a0adfa480f18a369a5974bf98e093f17f36ab68251d5acdda4d8a94458451953b1fcf6ab7706b5e7125fc852c5dc71200
-
Filesize
175KB
MD587d8308e8cda648f980eaded98c6dd64
SHA18e1213fea55c704c3d133c4b8675b99a66c08fc1
SHA256dfb2378d9e691c98c02a4ebd3196a313185549e72cd0d770972ea47888889246
SHA51204add36bd3e21f02b1fa836caddfbc0a0adfa480f18a369a5974bf98e093f17f36ab68251d5acdda4d8a94458451953b1fcf6ab7706b5e7125fc852c5dc71200
-
Filesize
766KB
MD50ebea8106f13132e5ef72eb3c4d59e07
SHA13c2606341b54e254d125a0b607db7f6ead792c9b
SHA256d580f8df7e33774ad772af745e27c2bd983217ae9153966e34cb5987cb692742
SHA51219706aad2713c0a5534ca4642147b245e19bd9311497f618bb0f9f62070bb40c3608bce73497e42fa137e50cb620f5566a40338edbf4a08fb2c137a822d24d71
-
Filesize
766KB
MD50ebea8106f13132e5ef72eb3c4d59e07
SHA13c2606341b54e254d125a0b607db7f6ead792c9b
SHA256d580f8df7e33774ad772af745e27c2bd983217ae9153966e34cb5987cb692742
SHA51219706aad2713c0a5534ca4642147b245e19bd9311497f618bb0f9f62070bb40c3608bce73497e42fa137e50cb620f5566a40338edbf4a08fb2c137a822d24d71
-
Filesize
457KB
MD5103b69223a2f8c89f717d8d126002eaf
SHA1249c58d3064b072f03a136d52048e75391cb18a6
SHA256cab55118a032925385326ffaebd7dc9ed5b83aa4601068e49405594189bc20ee
SHA512c156dacaaa3c6949ce2c84e0fa4bd11ddcba347fa905a26a04d847889053a94f5e4207ec92675c9082e36c66b5052e9494a0a60fcb3f9bb1374286d56381fa49
-
Filesize
457KB
MD5103b69223a2f8c89f717d8d126002eaf
SHA1249c58d3064b072f03a136d52048e75391cb18a6
SHA256cab55118a032925385326ffaebd7dc9ed5b83aa4601068e49405594189bc20ee
SHA512c156dacaaa3c6949ce2c84e0fa4bd11ddcba347fa905a26a04d847889053a94f5e4207ec92675c9082e36c66b5052e9494a0a60fcb3f9bb1374286d56381fa49
-
Filesize
380KB
MD5d28ab90c25815af7b2ee0c5851100861
SHA1da0cfb9503838a1b8c5154a33d6110ed7caa6533
SHA25662c8a3879664b38e290bf410bd3949d0036af5578dfc4da499aa3b88077ac392
SHA512aeaf789b61a375e16ae40d3404e7f90761cd828840e774c0c2a20334ead53b20ef8c175c08b2f16674e0918ed6182d25f670676eda42d2c576e93e5de69880bf
-
Filesize
380KB
MD5d28ab90c25815af7b2ee0c5851100861
SHA1da0cfb9503838a1b8c5154a33d6110ed7caa6533
SHA25662c8a3879664b38e290bf410bd3949d0036af5578dfc4da499aa3b88077ac392
SHA512aeaf789b61a375e16ae40d3404e7f90761cd828840e774c0c2a20334ead53b20ef8c175c08b2f16674e0918ed6182d25f670676eda42d2c576e93e5de69880bf
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
399KB
MD524e880db0698dbbb6e8e25f9bdc57ea8
SHA174698e82cac4fdf7b2ebeabc99eb9b253126c5d2
SHA2561b36b64e83958b08b6ce4853bfedce661ee051837c8dd85968f863faa2e3f846
SHA512834bc04019d8f3047f1cacf9443cdd6729f55fa9f71cf971c34990d157d38de2e873711af28e3246cdbbaf2c22fb7c4c12e57d8e3677977b3274a4b5d5fd4c82
-
Filesize
399KB
MD524e880db0698dbbb6e8e25f9bdc57ea8
SHA174698e82cac4fdf7b2ebeabc99eb9b253126c5d2
SHA2561b36b64e83958b08b6ce4853bfedce661ee051837c8dd85968f863faa2e3f846
SHA512834bc04019d8f3047f1cacf9443cdd6729f55fa9f71cf971c34990d157d38de2e873711af28e3246cdbbaf2c22fb7c4c12e57d8e3677977b3274a4b5d5fd4c82