Analysis
-
max time kernel
85s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
21/03/2023, 16:17
Static task
static1
Behavioral task
behavioral1
Sample
9a46ce71ec40db74e3cafaea7b02b1a45e952499e4be14899e2e62c1a9cf72f9.exe
Resource
win10v2004-20230221-en
General
-
Target
9a46ce71ec40db74e3cafaea7b02b1a45e952499e4be14899e2e62c1a9cf72f9.exe
-
Size
876KB
-
MD5
0c236869705587cf117fd4207ad201c7
-
SHA1
a7f6643b03551e67f877cc8f3daa98af6b92fff6
-
SHA256
9a46ce71ec40db74e3cafaea7b02b1a45e952499e4be14899e2e62c1a9cf72f9
-
SHA512
87c1457151076abd06e751b8ca3d26ca5f91bd64d023e1a88c89f855fd74c43a100932d446a968273ffeee52f4d57e9d287d70bd55b37b0466252a0d3f9f4f7d
-
SSDEEP
12288:vMrAy90NwbzSS81keFMiMp0fLZ/bwFpK0jn5BuOilG5THk7/jATS1MYjGk:TykzpwFp3uOilG5g9Zd
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
relon
193.233.20.30:4125
-
auth_value
17da69809725577b595e217ba006b869
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" qu4368.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9253.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9253.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9253.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" qu4368.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" qu4368.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" qu4368.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection pro9253.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9253.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9253.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection qu4368.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" qu4368.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/3696-204-0x00000000029C0000-0x00000000029FE000-memory.dmp family_redline behavioral1/memory/3696-206-0x00000000029C0000-0x00000000029FE000-memory.dmp family_redline behavioral1/memory/3696-203-0x00000000029C0000-0x00000000029FE000-memory.dmp family_redline behavioral1/memory/3696-208-0x00000000029C0000-0x00000000029FE000-memory.dmp family_redline behavioral1/memory/3696-212-0x00000000029C0000-0x00000000029FE000-memory.dmp family_redline behavioral1/memory/3696-215-0x00000000029C0000-0x00000000029FE000-memory.dmp family_redline behavioral1/memory/3696-217-0x00000000029C0000-0x00000000029FE000-memory.dmp family_redline behavioral1/memory/3696-219-0x00000000029C0000-0x00000000029FE000-memory.dmp family_redline behavioral1/memory/3696-221-0x00000000029C0000-0x00000000029FE000-memory.dmp family_redline behavioral1/memory/3696-223-0x00000000029C0000-0x00000000029FE000-memory.dmp family_redline behavioral1/memory/3696-225-0x00000000029C0000-0x00000000029FE000-memory.dmp family_redline behavioral1/memory/3696-227-0x00000000029C0000-0x00000000029FE000-memory.dmp family_redline behavioral1/memory/3696-229-0x00000000029C0000-0x00000000029FE000-memory.dmp family_redline behavioral1/memory/3696-231-0x00000000029C0000-0x00000000029FE000-memory.dmp family_redline behavioral1/memory/3696-233-0x00000000029C0000-0x00000000029FE000-memory.dmp family_redline behavioral1/memory/3696-235-0x00000000029C0000-0x00000000029FE000-memory.dmp family_redline behavioral1/memory/3696-237-0x00000000029C0000-0x00000000029FE000-memory.dmp family_redline behavioral1/memory/3696-239-0x00000000029C0000-0x00000000029FE000-memory.dmp family_redline behavioral1/memory/3696-1123-0x0000000002870000-0x0000000002880000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 2504 unio9728.exe 1964 unio1734.exe 1708 pro9253.exe 4788 qu4368.exe 3696 rvN09s55.exe 1636 si310724.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9253.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features qu4368.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" qu4368.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9a46ce71ec40db74e3cafaea7b02b1a45e952499e4be14899e2e62c1a9cf72f9.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce unio9728.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio9728.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce unio1734.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" unio1734.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9a46ce71ec40db74e3cafaea7b02b1a45e952499e4be14899e2e62c1a9cf72f9.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3204 4788 WerFault.exe 87 4232 3696 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1708 pro9253.exe 1708 pro9253.exe 4788 qu4368.exe 4788 qu4368.exe 3696 rvN09s55.exe 3696 rvN09s55.exe 1636 si310724.exe 1636 si310724.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1708 pro9253.exe Token: SeDebugPrivilege 4788 qu4368.exe Token: SeDebugPrivilege 3696 rvN09s55.exe Token: SeDebugPrivilege 1636 si310724.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4780 wrote to memory of 2504 4780 9a46ce71ec40db74e3cafaea7b02b1a45e952499e4be14899e2e62c1a9cf72f9.exe 84 PID 4780 wrote to memory of 2504 4780 9a46ce71ec40db74e3cafaea7b02b1a45e952499e4be14899e2e62c1a9cf72f9.exe 84 PID 4780 wrote to memory of 2504 4780 9a46ce71ec40db74e3cafaea7b02b1a45e952499e4be14899e2e62c1a9cf72f9.exe 84 PID 2504 wrote to memory of 1964 2504 unio9728.exe 85 PID 2504 wrote to memory of 1964 2504 unio9728.exe 85 PID 2504 wrote to memory of 1964 2504 unio9728.exe 85 PID 1964 wrote to memory of 1708 1964 unio1734.exe 86 PID 1964 wrote to memory of 1708 1964 unio1734.exe 86 PID 1964 wrote to memory of 4788 1964 unio1734.exe 87 PID 1964 wrote to memory of 4788 1964 unio1734.exe 87 PID 1964 wrote to memory of 4788 1964 unio1734.exe 87 PID 2504 wrote to memory of 3696 2504 unio9728.exe 90 PID 2504 wrote to memory of 3696 2504 unio9728.exe 90 PID 2504 wrote to memory of 3696 2504 unio9728.exe 90 PID 4780 wrote to memory of 1636 4780 9a46ce71ec40db74e3cafaea7b02b1a45e952499e4be14899e2e62c1a9cf72f9.exe 94 PID 4780 wrote to memory of 1636 4780 9a46ce71ec40db74e3cafaea7b02b1a45e952499e4be14899e2e62c1a9cf72f9.exe 94 PID 4780 wrote to memory of 1636 4780 9a46ce71ec40db74e3cafaea7b02b1a45e952499e4be14899e2e62c1a9cf72f9.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a46ce71ec40db74e3cafaea7b02b1a45e952499e4be14899e2e62c1a9cf72f9.exe"C:\Users\Admin\AppData\Local\Temp\9a46ce71ec40db74e3cafaea7b02b1a45e952499e4be14899e2e62c1a9cf72f9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio9728.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio9728.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio1734.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio1734.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro9253.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro9253.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1708
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu4368.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu4368.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4788 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4788 -s 10365⤵
- Program crash
PID:3204
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rvN09s55.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rvN09s55.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3696 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3696 -s 16644⤵
- Program crash
PID:4232
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si310724.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si310724.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4788 -ip 47881⤵PID:3916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3696 -ip 36961⤵PID:2992
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD56fbff2d7c9ba7f0a71f02a5c70df9dfc
SHA1003da0075734cd2d7f201c5b0e4779b8e1f33621
SHA256cb56407367a42f61993842b66bcd24993a30c87116313c26d6af9e37bbb1b6b3
SHA51225842b9df4767b16096f2bfcedc9d368a9696e6c6d9c7b2c75987769a5b338ae04b23b1e89f18eef2244e84f04e4acf6af56643a97abfe5b605f66cba0bac27f
-
Filesize
175KB
MD56fbff2d7c9ba7f0a71f02a5c70df9dfc
SHA1003da0075734cd2d7f201c5b0e4779b8e1f33621
SHA256cb56407367a42f61993842b66bcd24993a30c87116313c26d6af9e37bbb1b6b3
SHA51225842b9df4767b16096f2bfcedc9d368a9696e6c6d9c7b2c75987769a5b338ae04b23b1e89f18eef2244e84f04e4acf6af56643a97abfe5b605f66cba0bac27f
-
Filesize
734KB
MD5cccef3b85d1af84089bba3721390ca24
SHA1e9991d20bac7896b606cccde4b2d2ff1dceb4a7e
SHA256f66c3e0a24bf529e29f0d60e3f83c89bb00ae0b1f6580ba0ff4b982b504a67db
SHA5125c1935c0a0fd4ecb04471038273a2396d2b044c4509bbca34d3b8e7662b0b118901dddd990f1fc43d06f1ed8bbb72512827c0bb3fcb326e0c0441ab570c20e65
-
Filesize
734KB
MD5cccef3b85d1af84089bba3721390ca24
SHA1e9991d20bac7896b606cccde4b2d2ff1dceb4a7e
SHA256f66c3e0a24bf529e29f0d60e3f83c89bb00ae0b1f6580ba0ff4b982b504a67db
SHA5125c1935c0a0fd4ecb04471038273a2396d2b044c4509bbca34d3b8e7662b0b118901dddd990f1fc43d06f1ed8bbb72512827c0bb3fcb326e0c0441ab570c20e65
-
Filesize
420KB
MD5816813bb08f2d457af9e6f6019a239f1
SHA119957e16a48268103b7b7329461b59fb99a40992
SHA25685832017824820f193e2079ea5f684816761b45b04e99206e242eb24c8223cf1
SHA5126a1dd30f51f93fc525c2d788b432752cdebcdbd4f1ed6c75916ea1a86dddb427f6fbfeb4a64e42b4ec975d7ceed35b3a406a74071337423ce28bd7a088148dca
-
Filesize
420KB
MD5816813bb08f2d457af9e6f6019a239f1
SHA119957e16a48268103b7b7329461b59fb99a40992
SHA25685832017824820f193e2079ea5f684816761b45b04e99206e242eb24c8223cf1
SHA5126a1dd30f51f93fc525c2d788b432752cdebcdbd4f1ed6c75916ea1a86dddb427f6fbfeb4a64e42b4ec975d7ceed35b3a406a74071337423ce28bd7a088148dca
-
Filesize
363KB
MD52643d8363c5b4be8d30baac7958e9d67
SHA1bc9ed57e5044d9f4a467b688c2cbf61a3effcfca
SHA2562d2a60ae16b5898d619276ead179ba788118712bdca61a7a3012c285bc4cfb30
SHA5122b9f0f262f41750e0d8c82c067336415d713bc2bc83d3c14f1083f9e1aa95b1ccc8e9aff4f7d590a2db8eaae0c2b06fd5b93ba33c700496fde08cd5bbcd0c66e
-
Filesize
363KB
MD52643d8363c5b4be8d30baac7958e9d67
SHA1bc9ed57e5044d9f4a467b688c2cbf61a3effcfca
SHA2562d2a60ae16b5898d619276ead179ba788118712bdca61a7a3012c285bc4cfb30
SHA5122b9f0f262f41750e0d8c82c067336415d713bc2bc83d3c14f1083f9e1aa95b1ccc8e9aff4f7d590a2db8eaae0c2b06fd5b93ba33c700496fde08cd5bbcd0c66e
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
363KB
MD5bea994720d03381c034d50a31a6a5f43
SHA17d666c57e0bce955c3190af345f0fd8597e32c50
SHA2568d08c12713a3959688ef1de496a5756230b5332e3ff39df408f1136de16649b1
SHA512f30dcf833e78327a71bac44c87a046cfba5bf1e26754804d9865d73ad19306aeeea66b3940fba06a3a12193e1a92c23ede9eff991d5488574157e17a50cbeef1
-
Filesize
363KB
MD5bea994720d03381c034d50a31a6a5f43
SHA17d666c57e0bce955c3190af345f0fd8597e32c50
SHA2568d08c12713a3959688ef1de496a5756230b5332e3ff39df408f1136de16649b1
SHA512f30dcf833e78327a71bac44c87a046cfba5bf1e26754804d9865d73ad19306aeeea66b3940fba06a3a12193e1a92c23ede9eff991d5488574157e17a50cbeef1