Analysis
-
max time kernel
76s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22-03-2023 18:01
Static task
static1
Behavioral task
behavioral1
Sample
3572c9b19e8c36dd9d0307b08511c0b1.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
3572c9b19e8c36dd9d0307b08511c0b1.exe
Resource
win10v2004-20230220-en
General
-
Target
3572c9b19e8c36dd9d0307b08511c0b1.exe
-
Size
538KB
-
MD5
3572c9b19e8c36dd9d0307b08511c0b1
-
SHA1
af40874ddfe51ca33ad35ee32a84908ede90dcf1
-
SHA256
e27f343d59451541202e9e87a12b98b7a6d8ff1f2031a014198b6312e6e8c5ac
-
SHA512
5777bf077cb0a01e955627e1be8ba5c077d955b121002bcc16fde13a9a1a63d12f8d420a6a033879ad8a507833560d366d748bf95956f00d27fc2c176dbc5fce
-
SSDEEP
12288:BMrsy90vu8UorljsOp35Dd/D4pHK+AwYt1M9wdiJyO09RWMUFK:FyChl11r/Drdnt1QwdJTUo
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
sint
193.233.20.31:4125
-
auth_value
9d9b763b4dcfbff1c06ef4743cc0399e
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection h13Dw68.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h13Dw68.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h13Dw68.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h13Dw68.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h13Dw68.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h13Dw68.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 34 IoCs
resource yara_rule behavioral2/memory/940-155-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral2/memory/940-156-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral2/memory/940-158-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral2/memory/940-160-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral2/memory/940-162-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral2/memory/940-164-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral2/memory/940-166-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral2/memory/940-168-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral2/memory/940-170-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral2/memory/940-172-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral2/memory/940-174-0x0000000004D10000-0x0000000004D20000-memory.dmp family_redline behavioral2/memory/940-176-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral2/memory/940-179-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral2/memory/940-181-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral2/memory/940-183-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral2/memory/940-185-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral2/memory/940-187-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral2/memory/940-189-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral2/memory/940-191-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral2/memory/940-193-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral2/memory/940-195-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral2/memory/940-197-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral2/memory/940-199-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral2/memory/940-201-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral2/memory/940-203-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral2/memory/940-205-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral2/memory/940-207-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral2/memory/940-209-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral2/memory/940-211-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral2/memory/940-213-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral2/memory/940-215-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral2/memory/940-219-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral2/memory/940-221-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral2/memory/940-217-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 788 niba0550.exe 2732 h13Dw68.exe 940 iYIoK56.exe 1620 l90Kg54.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" h13Dw68.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3572c9b19e8c36dd9d0307b08511c0b1.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce niba0550.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" niba0550.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3572c9b19e8c36dd9d0307b08511c0b1.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2860 940 WerFault.exe 94 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2732 h13Dw68.exe 2732 h13Dw68.exe 940 iYIoK56.exe 940 iYIoK56.exe 1620 l90Kg54.exe 1620 l90Kg54.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2732 h13Dw68.exe Token: SeDebugPrivilege 940 iYIoK56.exe Token: SeDebugPrivilege 1620 l90Kg54.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2284 wrote to memory of 788 2284 3572c9b19e8c36dd9d0307b08511c0b1.exe 86 PID 2284 wrote to memory of 788 2284 3572c9b19e8c36dd9d0307b08511c0b1.exe 86 PID 2284 wrote to memory of 788 2284 3572c9b19e8c36dd9d0307b08511c0b1.exe 86 PID 788 wrote to memory of 2732 788 niba0550.exe 87 PID 788 wrote to memory of 2732 788 niba0550.exe 87 PID 788 wrote to memory of 940 788 niba0550.exe 94 PID 788 wrote to memory of 940 788 niba0550.exe 94 PID 788 wrote to memory of 940 788 niba0550.exe 94 PID 2284 wrote to memory of 1620 2284 3572c9b19e8c36dd9d0307b08511c0b1.exe 104 PID 2284 wrote to memory of 1620 2284 3572c9b19e8c36dd9d0307b08511c0b1.exe 104 PID 2284 wrote to memory of 1620 2284 3572c9b19e8c36dd9d0307b08511c0b1.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\3572c9b19e8c36dd9d0307b08511c0b1.exe"C:\Users\Admin\AppData\Local\Temp\3572c9b19e8c36dd9d0307b08511c0b1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba0550.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba0550.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h13Dw68.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h13Dw68.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2732
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iYIoK56.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iYIoK56.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:940 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 940 -s 15364⤵
- Program crash
PID:2860
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l90Kg54.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l90Kg54.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 940 -ip 9401⤵PID:840
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD587d8308e8cda648f980eaded98c6dd64
SHA18e1213fea55c704c3d133c4b8675b99a66c08fc1
SHA256dfb2378d9e691c98c02a4ebd3196a313185549e72cd0d770972ea47888889246
SHA51204add36bd3e21f02b1fa836caddfbc0a0adfa480f18a369a5974bf98e093f17f36ab68251d5acdda4d8a94458451953b1fcf6ab7706b5e7125fc852c5dc71200
-
Filesize
175KB
MD587d8308e8cda648f980eaded98c6dd64
SHA18e1213fea55c704c3d133c4b8675b99a66c08fc1
SHA256dfb2378d9e691c98c02a4ebd3196a313185549e72cd0d770972ea47888889246
SHA51204add36bd3e21f02b1fa836caddfbc0a0adfa480f18a369a5974bf98e093f17f36ab68251d5acdda4d8a94458451953b1fcf6ab7706b5e7125fc852c5dc71200
-
Filesize
396KB
MD5909068e613de7596881a4665f931dada
SHA1746f75b2f32a24f2089b83c2595fde6f6c6050c8
SHA25659640cf9968c81779a6aa14c085e5129a5b33210f555d7040de3d14b606bd9ff
SHA5127039be723d6066efbbbb572a740e4d40754a09b2d478b7f69c6024912619934bb1e7c08677890698914c3a0a42ad70c3c2a690d81b488b52a6d49463ed2880f7
-
Filesize
396KB
MD5909068e613de7596881a4665f931dada
SHA1746f75b2f32a24f2089b83c2595fde6f6c6050c8
SHA25659640cf9968c81779a6aa14c085e5129a5b33210f555d7040de3d14b606bd9ff
SHA5127039be723d6066efbbbb572a740e4d40754a09b2d478b7f69c6024912619934bb1e7c08677890698914c3a0a42ad70c3c2a690d81b488b52a6d49463ed2880f7
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
469KB
MD59c650f00776c29170a9fa99b1b48ee82
SHA101342a684ea86f28df2d20000ab69cffdca69dd8
SHA256a0f12b7ea69a1d353d158172a195898d8bc5b86023ea4997af0dc05da79178f2
SHA5120c223f54059a344eadd6a72aedadcc29874e7d6f2e8432bd14a9adc68520866fbb2eed25fcf880f2e5906b272ee032c5ca8afe7cf3dda0546371e9e4d5f988c0
-
Filesize
469KB
MD59c650f00776c29170a9fa99b1b48ee82
SHA101342a684ea86f28df2d20000ab69cffdca69dd8
SHA256a0f12b7ea69a1d353d158172a195898d8bc5b86023ea4997af0dc05da79178f2
SHA5120c223f54059a344eadd6a72aedadcc29874e7d6f2e8432bd14a9adc68520866fbb2eed25fcf880f2e5906b272ee032c5ca8afe7cf3dda0546371e9e4d5f988c0