Analysis
-
max time kernel
113s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24-03-2023 22:31
Static task
static1
Behavioral task
behavioral1
Sample
582569e51ca973baaee7ff6ec657ef5ed37a60b4371b4acf52977f00bae6372a.exe
Resource
win10v2004-20230220-en
General
-
Target
582569e51ca973baaee7ff6ec657ef5ed37a60b4371b4acf52977f00bae6372a.exe
-
Size
553KB
-
MD5
e5d5e677d66cb8c189286defe6569a08
-
SHA1
8482ddbe33e3dc03dbfd6e2a1aea831a6f3285c3
-
SHA256
582569e51ca973baaee7ff6ec657ef5ed37a60b4371b4acf52977f00bae6372a
-
SHA512
50cdac93832d8e44415dfd9d052acffe0b1635124e0a2fa7c745b8794927f666f15454899ef5a29507b3e470ea9085454e928e346d3dda7d3131ddc90bd422da
-
SSDEEP
12288:NMrwy90oEpjprMtzVzRSYgh8NNlgDdBWzcDZ8Bvs:ZyuFlSVzYhclGdY4Nuvs
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
lida
193.233.20.32:4125
-
auth_value
24052aa2e9b85984a98d80cf08623e8d
Signatures
-
Processes:
h33lv84.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h33lv84.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h33lv84.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection h33lv84.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h33lv84.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h33lv84.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h33lv84.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/1616-157-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1616-158-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1616-160-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1616-162-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1616-164-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1616-166-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1616-168-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1616-170-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1616-172-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1616-174-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1616-176-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1616-178-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1616-180-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1616-182-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1616-184-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1616-186-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1616-188-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1616-190-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1616-192-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1616-194-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1616-196-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1616-198-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1616-200-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1616-202-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1616-204-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1616-206-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1616-208-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1616-210-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1616-212-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1616-214-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1616-216-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1616-218-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1616-220-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
niba1824.exeh33lv84.exeiSKXc27.exel65rG86.exepid process 2008 niba1824.exe 2840 h33lv84.exe 1616 iSKXc27.exe 3020 l65rG86.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
h33lv84.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" h33lv84.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
582569e51ca973baaee7ff6ec657ef5ed37a60b4371b4acf52977f00bae6372a.exeniba1824.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 582569e51ca973baaee7ff6ec657ef5ed37a60b4371b4acf52977f00bae6372a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 582569e51ca973baaee7ff6ec657ef5ed37a60b4371b4acf52977f00bae6372a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce niba1824.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" niba1824.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4048 1616 WerFault.exe iSKXc27.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
h33lv84.exeiSKXc27.exel65rG86.exepid process 2840 h33lv84.exe 2840 h33lv84.exe 1616 iSKXc27.exe 1616 iSKXc27.exe 3020 l65rG86.exe 3020 l65rG86.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
h33lv84.exeiSKXc27.exel65rG86.exedescription pid process Token: SeDebugPrivilege 2840 h33lv84.exe Token: SeDebugPrivilege 1616 iSKXc27.exe Token: SeDebugPrivilege 3020 l65rG86.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
582569e51ca973baaee7ff6ec657ef5ed37a60b4371b4acf52977f00bae6372a.exeniba1824.exedescription pid process target process PID 4556 wrote to memory of 2008 4556 582569e51ca973baaee7ff6ec657ef5ed37a60b4371b4acf52977f00bae6372a.exe niba1824.exe PID 4556 wrote to memory of 2008 4556 582569e51ca973baaee7ff6ec657ef5ed37a60b4371b4acf52977f00bae6372a.exe niba1824.exe PID 4556 wrote to memory of 2008 4556 582569e51ca973baaee7ff6ec657ef5ed37a60b4371b4acf52977f00bae6372a.exe niba1824.exe PID 2008 wrote to memory of 2840 2008 niba1824.exe h33lv84.exe PID 2008 wrote to memory of 2840 2008 niba1824.exe h33lv84.exe PID 2008 wrote to memory of 1616 2008 niba1824.exe iSKXc27.exe PID 2008 wrote to memory of 1616 2008 niba1824.exe iSKXc27.exe PID 2008 wrote to memory of 1616 2008 niba1824.exe iSKXc27.exe PID 4556 wrote to memory of 3020 4556 582569e51ca973baaee7ff6ec657ef5ed37a60b4371b4acf52977f00bae6372a.exe l65rG86.exe PID 4556 wrote to memory of 3020 4556 582569e51ca973baaee7ff6ec657ef5ed37a60b4371b4acf52977f00bae6372a.exe l65rG86.exe PID 4556 wrote to memory of 3020 4556 582569e51ca973baaee7ff6ec657ef5ed37a60b4371b4acf52977f00bae6372a.exe l65rG86.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\582569e51ca973baaee7ff6ec657ef5ed37a60b4371b4acf52977f00bae6372a.exe"C:\Users\Admin\AppData\Local\Temp\582569e51ca973baaee7ff6ec657ef5ed37a60b4371b4acf52977f00bae6372a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba1824.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba1824.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h33lv84.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h33lv84.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iSKXc27.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iSKXc27.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1616 -s 15764⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l65rG86.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l65rG86.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1616 -ip 16161⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l65rG86.exeFilesize
175KB
MD56b06147bf5fd26306978a93fe83127a4
SHA17b14ff42f4441b985591ef5b7d4cc703f0bbcdfa
SHA25611e6d45ae92fc4505f14f550d01d97a42fba91a999b900daf843251772c755e0
SHA512603007d99e52da5739040fee891c193123dc5741985de1c3dde091dd07e759336ec749312e4ab95d05c1c6681f10e56b4e9aee67d633a97b6aa25c5119f4d6b4
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l65rG86.exeFilesize
175KB
MD56b06147bf5fd26306978a93fe83127a4
SHA17b14ff42f4441b985591ef5b7d4cc703f0bbcdfa
SHA25611e6d45ae92fc4505f14f550d01d97a42fba91a999b900daf843251772c755e0
SHA512603007d99e52da5739040fee891c193123dc5741985de1c3dde091dd07e759336ec749312e4ab95d05c1c6681f10e56b4e9aee67d633a97b6aa25c5119f4d6b4
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba1824.exeFilesize
411KB
MD549dd63dba7ec03000d8417185fc25254
SHA17d01292d5b27ceee79d09769a40e3330be5b55e0
SHA256259a76bae2107497c3647f1a90696a122a8d2465ba0e01883bacb5edb85b82d8
SHA512f5143bea89bf2e90a867e59b45bf2c8e0a22af69033284360474c0363d024ad5872fe73582cbab5e256bb1b032892854336fb418e92966bcf034e87503847a00
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba1824.exeFilesize
411KB
MD549dd63dba7ec03000d8417185fc25254
SHA17d01292d5b27ceee79d09769a40e3330be5b55e0
SHA256259a76bae2107497c3647f1a90696a122a8d2465ba0e01883bacb5edb85b82d8
SHA512f5143bea89bf2e90a867e59b45bf2c8e0a22af69033284360474c0363d024ad5872fe73582cbab5e256bb1b032892854336fb418e92966bcf034e87503847a00
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h33lv84.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h33lv84.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iSKXc27.exeFilesize
387KB
MD521717e280aaaad98361855d8a6e10f3f
SHA1afcd45936394ac8c16cb49b3e79b7202bf0a9636
SHA256b9c4715c1946e4765d0ff5dd2bf2a5d684b56cf8d9727b188161089aa3fd5e5b
SHA5128a2d80a51e22b99369fad4f1806348c85676a582d13001d71ee7cead76ef235d6c68230189f6d09ef829b56db3aefcf58be6b6d98a7b421d150899c693ed549c
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iSKXc27.exeFilesize
387KB
MD521717e280aaaad98361855d8a6e10f3f
SHA1afcd45936394ac8c16cb49b3e79b7202bf0a9636
SHA256b9c4715c1946e4765d0ff5dd2bf2a5d684b56cf8d9727b188161089aa3fd5e5b
SHA5128a2d80a51e22b99369fad4f1806348c85676a582d13001d71ee7cead76ef235d6c68230189f6d09ef829b56db3aefcf58be6b6d98a7b421d150899c693ed549c
-
memory/1616-153-0x0000000007330000-0x00000000078D4000-memory.dmpFilesize
5.6MB
-
memory/1616-154-0x0000000002CB0000-0x0000000002CFB000-memory.dmpFilesize
300KB
-
memory/1616-155-0x0000000007320000-0x0000000007330000-memory.dmpFilesize
64KB
-
memory/1616-156-0x0000000007320000-0x0000000007330000-memory.dmpFilesize
64KB
-
memory/1616-157-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/1616-158-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/1616-160-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/1616-162-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/1616-164-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/1616-166-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/1616-168-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/1616-170-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/1616-172-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/1616-174-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/1616-176-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/1616-178-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/1616-180-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/1616-182-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/1616-184-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/1616-186-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/1616-188-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/1616-190-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/1616-192-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/1616-194-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/1616-196-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/1616-198-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/1616-200-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/1616-202-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/1616-204-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/1616-206-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/1616-208-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/1616-210-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/1616-212-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/1616-214-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/1616-216-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/1616-218-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/1616-220-0x0000000004BD0000-0x0000000004C0F000-memory.dmpFilesize
252KB
-
memory/1616-1063-0x00000000078E0000-0x0000000007EF8000-memory.dmpFilesize
6.1MB
-
memory/1616-1064-0x0000000007F00000-0x000000000800A000-memory.dmpFilesize
1.0MB
-
memory/1616-1066-0x0000000007320000-0x0000000007330000-memory.dmpFilesize
64KB
-
memory/1616-1065-0x0000000007280000-0x0000000007292000-memory.dmpFilesize
72KB
-
memory/1616-1067-0x00000000072A0000-0x00000000072DC000-memory.dmpFilesize
240KB
-
memory/1616-1069-0x0000000008280000-0x00000000082E6000-memory.dmpFilesize
408KB
-
memory/1616-1070-0x0000000008930000-0x00000000089C2000-memory.dmpFilesize
584KB
-
memory/1616-1071-0x0000000007320000-0x0000000007330000-memory.dmpFilesize
64KB
-
memory/1616-1072-0x0000000007320000-0x0000000007330000-memory.dmpFilesize
64KB
-
memory/1616-1073-0x0000000007320000-0x0000000007330000-memory.dmpFilesize
64KB
-
memory/1616-1074-0x0000000007320000-0x0000000007330000-memory.dmpFilesize
64KB
-
memory/1616-1075-0x0000000009DA0000-0x0000000009F62000-memory.dmpFilesize
1.8MB
-
memory/1616-1076-0x0000000009F70000-0x000000000A49C000-memory.dmpFilesize
5.2MB
-
memory/1616-1077-0x0000000008B60000-0x0000000008BD6000-memory.dmpFilesize
472KB
-
memory/1616-1078-0x0000000008BF0000-0x0000000008C40000-memory.dmpFilesize
320KB
-
memory/2840-147-0x0000000000660000-0x000000000066A000-memory.dmpFilesize
40KB
-
memory/3020-1085-0x00000000008A0000-0x00000000008D2000-memory.dmpFilesize
200KB
-
memory/3020-1086-0x0000000005120000-0x0000000005130000-memory.dmpFilesize
64KB