Analysis
-
max time kernel
56s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
23-03-2023 16:23
Static task
static1
Behavioral task
behavioral1
Sample
395e358ab8e7685f16c6858ff17359d5987db7cc71abf78ba5f8a4fffaf84846.exe
Resource
win10-20230220-en
General
-
Target
395e358ab8e7685f16c6858ff17359d5987db7cc71abf78ba5f8a4fffaf84846.exe
-
Size
544KB
-
MD5
e9cde2f39a3eb3d9573f06e83518a948
-
SHA1
98cac3864f9c8b8d7e045bb1e591f7af3e14f443
-
SHA256
395e358ab8e7685f16c6858ff17359d5987db7cc71abf78ba5f8a4fffaf84846
-
SHA512
8f15634d9e33297b9a747a958b17156e7530cfacbfcd1443ba2a562a6c48e4926c32db2bce4e420c75d3280536f9faeeb0a236ed833cba8a4d327d9521f38326
-
SSDEEP
12288:bMrIy90L3bHNmKe9Rx3jWLTCUa406JZqiV:HyupFepinC743qiV
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
lown
193.233.20.31:4125
-
auth_value
4cf836e062bcdc2a4fdbf410f5747ec7
Signatures
-
Processes:
h12Aj03.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h12Aj03.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h12Aj03.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h12Aj03.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h12Aj03.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h12Aj03.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/4596-139-0x00000000025C0000-0x0000000002606000-memory.dmp family_redline behavioral1/memory/4596-141-0x0000000005190000-0x00000000051D4000-memory.dmp family_redline behavioral1/memory/4596-146-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/4596-147-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/4596-149-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/4596-151-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/4596-153-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/4596-155-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/4596-157-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/4596-159-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/4596-161-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/4596-163-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/4596-165-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/4596-167-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/4596-169-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/4596-171-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/4596-173-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/4596-175-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/4596-177-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/4596-179-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/4596-181-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/4596-183-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/4596-185-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/4596-187-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/4596-189-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/4596-191-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/4596-193-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/4596-195-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/4596-197-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/4596-199-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/4596-201-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/4596-203-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/4596-205-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/4596-207-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/4596-209-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
niba0909.exeh12Aj03.exeidlrg24.exel31nS88.exepid process 8 niba0909.exe 3988 h12Aj03.exe 4596 idlrg24.exe 4392 l31nS88.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
h12Aj03.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" h12Aj03.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
395e358ab8e7685f16c6858ff17359d5987db7cc71abf78ba5f8a4fffaf84846.exeniba0909.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 395e358ab8e7685f16c6858ff17359d5987db7cc71abf78ba5f8a4fffaf84846.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 395e358ab8e7685f16c6858ff17359d5987db7cc71abf78ba5f8a4fffaf84846.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce niba0909.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" niba0909.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
h12Aj03.exeidlrg24.exel31nS88.exepid process 3988 h12Aj03.exe 3988 h12Aj03.exe 4596 idlrg24.exe 4596 idlrg24.exe 4392 l31nS88.exe 4392 l31nS88.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
h12Aj03.exeidlrg24.exel31nS88.exedescription pid process Token: SeDebugPrivilege 3988 h12Aj03.exe Token: SeDebugPrivilege 4596 idlrg24.exe Token: SeDebugPrivilege 4392 l31nS88.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
395e358ab8e7685f16c6858ff17359d5987db7cc71abf78ba5f8a4fffaf84846.exeniba0909.exedescription pid process target process PID 4036 wrote to memory of 8 4036 395e358ab8e7685f16c6858ff17359d5987db7cc71abf78ba5f8a4fffaf84846.exe niba0909.exe PID 4036 wrote to memory of 8 4036 395e358ab8e7685f16c6858ff17359d5987db7cc71abf78ba5f8a4fffaf84846.exe niba0909.exe PID 4036 wrote to memory of 8 4036 395e358ab8e7685f16c6858ff17359d5987db7cc71abf78ba5f8a4fffaf84846.exe niba0909.exe PID 8 wrote to memory of 3988 8 niba0909.exe h12Aj03.exe PID 8 wrote to memory of 3988 8 niba0909.exe h12Aj03.exe PID 8 wrote to memory of 4596 8 niba0909.exe idlrg24.exe PID 8 wrote to memory of 4596 8 niba0909.exe idlrg24.exe PID 8 wrote to memory of 4596 8 niba0909.exe idlrg24.exe PID 4036 wrote to memory of 4392 4036 395e358ab8e7685f16c6858ff17359d5987db7cc71abf78ba5f8a4fffaf84846.exe l31nS88.exe PID 4036 wrote to memory of 4392 4036 395e358ab8e7685f16c6858ff17359d5987db7cc71abf78ba5f8a4fffaf84846.exe l31nS88.exe PID 4036 wrote to memory of 4392 4036 395e358ab8e7685f16c6858ff17359d5987db7cc71abf78ba5f8a4fffaf84846.exe l31nS88.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\395e358ab8e7685f16c6858ff17359d5987db7cc71abf78ba5f8a4fffaf84846.exe"C:\Users\Admin\AppData\Local\Temp\395e358ab8e7685f16c6858ff17359d5987db7cc71abf78ba5f8a4fffaf84846.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba0909.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba0909.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h12Aj03.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h12Aj03.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\idlrg24.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\idlrg24.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l31nS88.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l31nS88.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l31nS88.exeFilesize
175KB
MD550809fe16d7c482c1f4a2ea19fdcbc0a
SHA111b6f69c06a724da15183b16039c5cbc86016158
SHA25609917b67829de37b5d6be8115c8f8321f436554f426a24e079257a8368051cb1
SHA512c35170e5eb6dabda9fd2d289153df829957ca8e9665178529a1ba36395155bb34f489372993ec694d10bea490c86cef2ae152e2df480288aca8e796ba135261f
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l31nS88.exeFilesize
175KB
MD550809fe16d7c482c1f4a2ea19fdcbc0a
SHA111b6f69c06a724da15183b16039c5cbc86016158
SHA25609917b67829de37b5d6be8115c8f8321f436554f426a24e079257a8368051cb1
SHA512c35170e5eb6dabda9fd2d289153df829957ca8e9665178529a1ba36395155bb34f489372993ec694d10bea490c86cef2ae152e2df480288aca8e796ba135261f
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba0909.exeFilesize
402KB
MD50770fbfcc17640734dc666e9930f1cca
SHA14ff70452e67d0e018553cd34c4a2dafe3096789c
SHA256942dfac25dfc7afcb98dd7199fb5600c56a2a446179b32fb7168c3b8a5c1bb7f
SHA5122835811c5e18a442d0dc821d8c047f2d7dd844e54e6ce1b62189aacec3ea19d88c0c53f6ffbbadb06c55f8a66ee75b9d9bc763250d5fa358550255be013086f1
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba0909.exeFilesize
402KB
MD50770fbfcc17640734dc666e9930f1cca
SHA14ff70452e67d0e018553cd34c4a2dafe3096789c
SHA256942dfac25dfc7afcb98dd7199fb5600c56a2a446179b32fb7168c3b8a5c1bb7f
SHA5122835811c5e18a442d0dc821d8c047f2d7dd844e54e6ce1b62189aacec3ea19d88c0c53f6ffbbadb06c55f8a66ee75b9d9bc763250d5fa358550255be013086f1
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h12Aj03.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h12Aj03.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\idlrg24.exeFilesize
349KB
MD51ea61ec22e19a5df3185c3c11c540fd0
SHA16040367f971b14016c1fa3aa9ac8d72a92e0e1ef
SHA2565e2d90b74c5ba527da820df1262ce80824ee65fa234cde15778cc79cf8906982
SHA5124c9100c2c8bf278a5bb4350624a8891089a2473e694575e1c71f24cdd31ea81b69f70149dee505a9cd7a2858b2194eba400160d1625abf700dc8d0bd25e111cf
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\idlrg24.exeFilesize
349KB
MD51ea61ec22e19a5df3185c3c11c540fd0
SHA16040367f971b14016c1fa3aa9ac8d72a92e0e1ef
SHA2565e2d90b74c5ba527da820df1262ce80824ee65fa234cde15778cc79cf8906982
SHA5124c9100c2c8bf278a5bb4350624a8891089a2473e694575e1c71f24cdd31ea81b69f70149dee505a9cd7a2858b2194eba400160d1625abf700dc8d0bd25e111cf
-
memory/3988-133-0x0000000000430000-0x000000000043A000-memory.dmpFilesize
40KB
-
memory/4392-1073-0x0000000000350000-0x0000000000382000-memory.dmpFilesize
200KB
-
memory/4392-1074-0x0000000004D90000-0x0000000004DDB000-memory.dmpFilesize
300KB
-
memory/4392-1075-0x0000000004E90000-0x0000000004EA0000-memory.dmpFilesize
64KB
-
memory/4596-173-0x0000000005190000-0x00000000051CE000-memory.dmpFilesize
248KB
-
memory/4596-187-0x0000000005190000-0x00000000051CE000-memory.dmpFilesize
248KB
-
memory/4596-142-0x0000000000720000-0x000000000076B000-memory.dmpFilesize
300KB
-
memory/4596-143-0x0000000002830000-0x0000000002840000-memory.dmpFilesize
64KB
-
memory/4596-144-0x0000000002830000-0x0000000002840000-memory.dmpFilesize
64KB
-
memory/4596-145-0x0000000002830000-0x0000000002840000-memory.dmpFilesize
64KB
-
memory/4596-146-0x0000000005190000-0x00000000051CE000-memory.dmpFilesize
248KB
-
memory/4596-147-0x0000000005190000-0x00000000051CE000-memory.dmpFilesize
248KB
-
memory/4596-149-0x0000000005190000-0x00000000051CE000-memory.dmpFilesize
248KB
-
memory/4596-151-0x0000000005190000-0x00000000051CE000-memory.dmpFilesize
248KB
-
memory/4596-153-0x0000000005190000-0x00000000051CE000-memory.dmpFilesize
248KB
-
memory/4596-155-0x0000000005190000-0x00000000051CE000-memory.dmpFilesize
248KB
-
memory/4596-157-0x0000000005190000-0x00000000051CE000-memory.dmpFilesize
248KB
-
memory/4596-159-0x0000000005190000-0x00000000051CE000-memory.dmpFilesize
248KB
-
memory/4596-161-0x0000000005190000-0x00000000051CE000-memory.dmpFilesize
248KB
-
memory/4596-163-0x0000000005190000-0x00000000051CE000-memory.dmpFilesize
248KB
-
memory/4596-165-0x0000000005190000-0x00000000051CE000-memory.dmpFilesize
248KB
-
memory/4596-167-0x0000000005190000-0x00000000051CE000-memory.dmpFilesize
248KB
-
memory/4596-169-0x0000000005190000-0x00000000051CE000-memory.dmpFilesize
248KB
-
memory/4596-171-0x0000000005190000-0x00000000051CE000-memory.dmpFilesize
248KB
-
memory/4596-140-0x0000000004C90000-0x000000000518E000-memory.dmpFilesize
5.0MB
-
memory/4596-175-0x0000000005190000-0x00000000051CE000-memory.dmpFilesize
248KB
-
memory/4596-177-0x0000000005190000-0x00000000051CE000-memory.dmpFilesize
248KB
-
memory/4596-179-0x0000000005190000-0x00000000051CE000-memory.dmpFilesize
248KB
-
memory/4596-181-0x0000000005190000-0x00000000051CE000-memory.dmpFilesize
248KB
-
memory/4596-183-0x0000000005190000-0x00000000051CE000-memory.dmpFilesize
248KB
-
memory/4596-185-0x0000000005190000-0x00000000051CE000-memory.dmpFilesize
248KB
-
memory/4596-141-0x0000000005190000-0x00000000051D4000-memory.dmpFilesize
272KB
-
memory/4596-189-0x0000000005190000-0x00000000051CE000-memory.dmpFilesize
248KB
-
memory/4596-191-0x0000000005190000-0x00000000051CE000-memory.dmpFilesize
248KB
-
memory/4596-193-0x0000000005190000-0x00000000051CE000-memory.dmpFilesize
248KB
-
memory/4596-195-0x0000000005190000-0x00000000051CE000-memory.dmpFilesize
248KB
-
memory/4596-197-0x0000000005190000-0x00000000051CE000-memory.dmpFilesize
248KB
-
memory/4596-199-0x0000000005190000-0x00000000051CE000-memory.dmpFilesize
248KB
-
memory/4596-201-0x0000000005190000-0x00000000051CE000-memory.dmpFilesize
248KB
-
memory/4596-203-0x0000000005190000-0x00000000051CE000-memory.dmpFilesize
248KB
-
memory/4596-205-0x0000000005190000-0x00000000051CE000-memory.dmpFilesize
248KB
-
memory/4596-207-0x0000000005190000-0x00000000051CE000-memory.dmpFilesize
248KB
-
memory/4596-209-0x0000000005190000-0x00000000051CE000-memory.dmpFilesize
248KB
-
memory/4596-1052-0x0000000005980000-0x0000000005F86000-memory.dmpFilesize
6.0MB
-
memory/4596-1053-0x00000000053F0000-0x00000000054FA000-memory.dmpFilesize
1.0MB
-
memory/4596-1054-0x0000000005530000-0x0000000005542000-memory.dmpFilesize
72KB
-
memory/4596-1055-0x0000000005550000-0x000000000558E000-memory.dmpFilesize
248KB
-
memory/4596-1056-0x0000000002830000-0x0000000002840000-memory.dmpFilesize
64KB
-
memory/4596-1057-0x00000000056A0000-0x00000000056EB000-memory.dmpFilesize
300KB
-
memory/4596-1059-0x0000000005830000-0x0000000005896000-memory.dmpFilesize
408KB
-
memory/4596-1060-0x0000000006530000-0x00000000065C2000-memory.dmpFilesize
584KB
-
memory/4596-1061-0x0000000002830000-0x0000000002840000-memory.dmpFilesize
64KB
-
memory/4596-1062-0x0000000002830000-0x0000000002840000-memory.dmpFilesize
64KB
-
memory/4596-1063-0x0000000002830000-0x0000000002840000-memory.dmpFilesize
64KB
-
memory/4596-139-0x00000000025C0000-0x0000000002606000-memory.dmpFilesize
280KB
-
memory/4596-1064-0x00000000066E0000-0x00000000068A2000-memory.dmpFilesize
1.8MB
-
memory/4596-1065-0x00000000068D0000-0x0000000006DFC000-memory.dmpFilesize
5.2MB
-
memory/4596-1066-0x00000000071C0000-0x0000000007236000-memory.dmpFilesize
472KB
-
memory/4596-1067-0x0000000007240000-0x0000000007290000-memory.dmpFilesize
320KB