Analysis
-
max time kernel
131s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22-03-2023 10:28
Static task
static1
Behavioral task
behavioral1
Sample
1f3748db9ad59dfea19ad4fca867280b8c1ab9f60b2e45efcaa20cb5aa97a093.exe
Resource
win10v2004-20230220-en
General
-
Target
1f3748db9ad59dfea19ad4fca867280b8c1ab9f60b2e45efcaa20cb5aa97a093.exe
-
Size
536KB
-
MD5
bcef023a5dba9984f3ab3debbfa33228
-
SHA1
f320605ef0507fcc9413977e3dd58fca13fa1d83
-
SHA256
1f3748db9ad59dfea19ad4fca867280b8c1ab9f60b2e45efcaa20cb5aa97a093
-
SHA512
82d84ee7b6b0bc88ac558fcdcb30d779e77ef483034d6120f8c83de9446936c33b21272451c3597c49297d8acf2ce7b03bc9fd936dd97cf45a12151edde56dc6
-
SSDEEP
12288:LMr/y90sknnEmSzP4nZBN0VpErmc+xqMXnwK3mXZVZ:0ylknzSQr2Vpsmc+xqMXwK3QTZ
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
sint
193.233.20.31:4125
-
auth_value
9d9b763b4dcfbff1c06ef4743cc0399e
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h89xE56.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h89xE56.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h89xE56.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection h89xE56.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h89xE56.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h89xE56.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/1528-155-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/1528-156-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/1528-158-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/1528-160-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/1528-162-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/1528-164-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/1528-166-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/1528-168-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/1528-170-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/1528-172-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/1528-177-0x0000000004B60000-0x0000000004B70000-memory.dmp family_redline behavioral1/memory/1528-178-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/1528-175-0x0000000004B60000-0x0000000004B70000-memory.dmp family_redline behavioral1/memory/1528-180-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/1528-174-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/1528-182-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/1528-184-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/1528-186-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/1528-188-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/1528-190-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/1528-192-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/1528-194-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/1528-196-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/1528-198-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/1528-200-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/1528-202-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/1528-204-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/1528-206-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/1528-208-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/1528-210-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/1528-212-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/1528-214-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/1528-216-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/1528-218-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/1528-220-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1664 niba4937.exe 532 h89xE56.exe 1528 iwIrI10.exe 4524 l64Mh64.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" h89xE56.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1f3748db9ad59dfea19ad4fca867280b8c1ab9f60b2e45efcaa20cb5aa97a093.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1f3748db9ad59dfea19ad4fca867280b8c1ab9f60b2e45efcaa20cb5aa97a093.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce niba4937.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" niba4937.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 620 1528 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 532 h89xE56.exe 532 h89xE56.exe 1528 iwIrI10.exe 1528 iwIrI10.exe 4524 l64Mh64.exe 4524 l64Mh64.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 532 h89xE56.exe Token: SeDebugPrivilege 1528 iwIrI10.exe Token: SeDebugPrivilege 4524 l64Mh64.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 60 wrote to memory of 1664 60 1f3748db9ad59dfea19ad4fca867280b8c1ab9f60b2e45efcaa20cb5aa97a093.exe 83 PID 60 wrote to memory of 1664 60 1f3748db9ad59dfea19ad4fca867280b8c1ab9f60b2e45efcaa20cb5aa97a093.exe 83 PID 60 wrote to memory of 1664 60 1f3748db9ad59dfea19ad4fca867280b8c1ab9f60b2e45efcaa20cb5aa97a093.exe 83 PID 1664 wrote to memory of 532 1664 niba4937.exe 84 PID 1664 wrote to memory of 532 1664 niba4937.exe 84 PID 1664 wrote to memory of 1528 1664 niba4937.exe 85 PID 1664 wrote to memory of 1528 1664 niba4937.exe 85 PID 1664 wrote to memory of 1528 1664 niba4937.exe 85 PID 60 wrote to memory of 4524 60 1f3748db9ad59dfea19ad4fca867280b8c1ab9f60b2e45efcaa20cb5aa97a093.exe 92 PID 60 wrote to memory of 4524 60 1f3748db9ad59dfea19ad4fca867280b8c1ab9f60b2e45efcaa20cb5aa97a093.exe 92 PID 60 wrote to memory of 4524 60 1f3748db9ad59dfea19ad4fca867280b8c1ab9f60b2e45efcaa20cb5aa97a093.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f3748db9ad59dfea19ad4fca867280b8c1ab9f60b2e45efcaa20cb5aa97a093.exe"C:\Users\Admin\AppData\Local\Temp\1f3748db9ad59dfea19ad4fca867280b8c1ab9f60b2e45efcaa20cb5aa97a093.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba4937.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba4937.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h89xE56.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h89xE56.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:532
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iwIrI10.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iwIrI10.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1528 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1528 -s 15644⤵
- Program crash
PID:620
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l64Mh64.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l64Mh64.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1528 -ip 15281⤵PID:444
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD587d8308e8cda648f980eaded98c6dd64
SHA18e1213fea55c704c3d133c4b8675b99a66c08fc1
SHA256dfb2378d9e691c98c02a4ebd3196a313185549e72cd0d770972ea47888889246
SHA51204add36bd3e21f02b1fa836caddfbc0a0adfa480f18a369a5974bf98e093f17f36ab68251d5acdda4d8a94458451953b1fcf6ab7706b5e7125fc852c5dc71200
-
Filesize
175KB
MD587d8308e8cda648f980eaded98c6dd64
SHA18e1213fea55c704c3d133c4b8675b99a66c08fc1
SHA256dfb2378d9e691c98c02a4ebd3196a313185549e72cd0d770972ea47888889246
SHA51204add36bd3e21f02b1fa836caddfbc0a0adfa480f18a369a5974bf98e093f17f36ab68251d5acdda4d8a94458451953b1fcf6ab7706b5e7125fc852c5dc71200
-
Filesize
394KB
MD5f90c48c42383e4325ebc69c8d9da7754
SHA1eb67a2848f0e482858dc6b22a20fac18f4724a3c
SHA25696b8b3be628446efb645590ec9599ed5ebc511d24b914ac6d045e513633b70ff
SHA5127c3900fbfa970e77664fc0985547529759d9e45dd28aa852f26d82ca7aabcd39715ce0b108e392fdc24164bb5a899fd1768d73e9602e08f3b74ae9c620093b1f
-
Filesize
394KB
MD5f90c48c42383e4325ebc69c8d9da7754
SHA1eb67a2848f0e482858dc6b22a20fac18f4724a3c
SHA25696b8b3be628446efb645590ec9599ed5ebc511d24b914ac6d045e513633b70ff
SHA5127c3900fbfa970e77664fc0985547529759d9e45dd28aa852f26d82ca7aabcd39715ce0b108e392fdc24164bb5a899fd1768d73e9602e08f3b74ae9c620093b1f
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
470KB
MD5d8edb8801931be239e3292445d7449f1
SHA1a667115edfa74b4e0e3eb2f9aef04b71a9f659f1
SHA2562c4c7f74aad8cd57badaaafe2ddc1bfd3bca04e3175ceb7f48984bfa4c8de60e
SHA512282d62e2415628676351987a60f5cf92e285ddfede232a02611218067e2dc583964e27c15583f5f1990108348c19b615590556f41828388947e58482c6e6802f
-
Filesize
470KB
MD5d8edb8801931be239e3292445d7449f1
SHA1a667115edfa74b4e0e3eb2f9aef04b71a9f659f1
SHA2562c4c7f74aad8cd57badaaafe2ddc1bfd3bca04e3175ceb7f48984bfa4c8de60e
SHA512282d62e2415628676351987a60f5cf92e285ddfede232a02611218067e2dc583964e27c15583f5f1990108348c19b615590556f41828388947e58482c6e6802f