Analysis
-
max time kernel
78s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24-03-2023 06:37
Static task
static1
Behavioral task
behavioral1
Sample
9777dc6f2e370f6b97fe7573145f1f1c4891eecdea2b1c019b940c12e7c78886.exe
Resource
win10v2004-20230220-en
General
-
Target
9777dc6f2e370f6b97fe7573145f1f1c4891eecdea2b1c019b940c12e7c78886.exe
-
Size
539KB
-
MD5
3223ab5f99c0f20737cc89b7371f7cbe
-
SHA1
e2586bfdf13d2f056182486ea62a2768ee9757cd
-
SHA256
9777dc6f2e370f6b97fe7573145f1f1c4891eecdea2b1c019b940c12e7c78886
-
SHA512
e1e05dd18ab6280122a5d94e4d0823479a1aa293e8b5d105e881161e1ae31aae57840ce4a073b8af03a3ed8c8c070fcb3730e3a2ccdc4a1704767ba5827a65df
-
SSDEEP
12288:YMrny90PuAngYW+gv5+Y0E6E28LM5Q//i1JGx0wqgh6V:fy4nBW7v5n019Q/6G2Tg6
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
bolt
193.233.20.31:4125
-
auth_value
29540c7bf0277243e2faf6601e15a754
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h17ce55.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h17ce55.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h17ce55.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h17ce55.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h17ce55.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection h17ce55.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/2216-154-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/2216-157-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/2216-155-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/2216-159-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/2216-161-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/2216-165-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/2216-167-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/2216-163-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/2216-173-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/2216-175-0x0000000007300000-0x0000000007310000-memory.dmp family_redline behavioral1/memory/2216-177-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/2216-179-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/2216-169-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/2216-181-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/2216-185-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/2216-187-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/2216-183-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/2216-189-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/2216-191-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/2216-193-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/2216-195-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/2216-197-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/2216-199-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/2216-201-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/2216-205-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/2216-203-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/2216-207-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/2216-209-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/2216-211-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/2216-213-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/2216-215-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/2216-217-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/2216-219-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/2216-221-0x0000000007180000-0x00000000071BE000-memory.dmp family_redline behavioral1/memory/2216-1073-0x0000000007300000-0x0000000007310000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 5104 niba4025.exe 1292 h17ce55.exe 2216 iaroL86.exe 1680 l60EZ85.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" h17ce55.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce niba4025.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" niba4025.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9777dc6f2e370f6b97fe7573145f1f1c4891eecdea2b1c019b940c12e7c78886.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9777dc6f2e370f6b97fe7573145f1f1c4891eecdea2b1c019b940c12e7c78886.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4540 2216 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1292 h17ce55.exe 1292 h17ce55.exe 2216 iaroL86.exe 2216 iaroL86.exe 1680 l60EZ85.exe 1680 l60EZ85.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1292 h17ce55.exe Token: SeDebugPrivilege 2216 iaroL86.exe Token: SeDebugPrivilege 1680 l60EZ85.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4808 wrote to memory of 5104 4808 9777dc6f2e370f6b97fe7573145f1f1c4891eecdea2b1c019b940c12e7c78886.exe 85 PID 4808 wrote to memory of 5104 4808 9777dc6f2e370f6b97fe7573145f1f1c4891eecdea2b1c019b940c12e7c78886.exe 85 PID 4808 wrote to memory of 5104 4808 9777dc6f2e370f6b97fe7573145f1f1c4891eecdea2b1c019b940c12e7c78886.exe 85 PID 5104 wrote to memory of 1292 5104 niba4025.exe 87 PID 5104 wrote to memory of 1292 5104 niba4025.exe 87 PID 5104 wrote to memory of 2216 5104 niba4025.exe 92 PID 5104 wrote to memory of 2216 5104 niba4025.exe 92 PID 5104 wrote to memory of 2216 5104 niba4025.exe 92 PID 4808 wrote to memory of 1680 4808 9777dc6f2e370f6b97fe7573145f1f1c4891eecdea2b1c019b940c12e7c78886.exe 99 PID 4808 wrote to memory of 1680 4808 9777dc6f2e370f6b97fe7573145f1f1c4891eecdea2b1c019b940c12e7c78886.exe 99 PID 4808 wrote to memory of 1680 4808 9777dc6f2e370f6b97fe7573145f1f1c4891eecdea2b1c019b940c12e7c78886.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\9777dc6f2e370f6b97fe7573145f1f1c4891eecdea2b1c019b940c12e7c78886.exe"C:\Users\Admin\AppData\Local\Temp\9777dc6f2e370f6b97fe7573145f1f1c4891eecdea2b1c019b940c12e7c78886.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba4025.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba4025.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h17ce55.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h17ce55.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1292
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iaroL86.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iaroL86.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2216 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2216 -s 18204⤵
- Program crash
PID:4540
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l60EZ85.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l60EZ85.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2216 -ip 22161⤵PID:2488
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD578efaf7292c2027da40635ca1aae855a
SHA1686227a48e23b382a06c74f17d9b6f36e76042fd
SHA2562f1381bbe319ee3d19b3e07704205a3d31a7ffb7b5b7c282b9d884682bc892ab
SHA51219e22ec7ad2295a1a3f4cbabb2e005df674ff3731cc33b74e175e10fcc4e482c8f0ce9c8722a8d14a0f9f9ad6e37360ce6816215512bea8324cd87a9fefc852a
-
Filesize
175KB
MD578efaf7292c2027da40635ca1aae855a
SHA1686227a48e23b382a06c74f17d9b6f36e76042fd
SHA2562f1381bbe319ee3d19b3e07704205a3d31a7ffb7b5b7c282b9d884682bc892ab
SHA51219e22ec7ad2295a1a3f4cbabb2e005df674ff3731cc33b74e175e10fcc4e482c8f0ce9c8722a8d14a0f9f9ad6e37360ce6816215512bea8324cd87a9fefc852a
-
Filesize
397KB
MD5248caaf4c9fd2c3c5b8d5ad7c990cf40
SHA171c5a158b8fc989e86a56b6b1f795ceff17a9bbc
SHA256e996bd2aefde21dce4681d71fa838fe4ad179691fc0831e3934b1926251f19da
SHA512f507f6ea93f5182435a997d31b5f5f5bf5a5ff4abbba09236546e7277b271703a5a6c552191afa0997dfedb1563eddb77e23bbe9e4e70cd2670eda9edd53fa46
-
Filesize
397KB
MD5248caaf4c9fd2c3c5b8d5ad7c990cf40
SHA171c5a158b8fc989e86a56b6b1f795ceff17a9bbc
SHA256e996bd2aefde21dce4681d71fa838fe4ad179691fc0831e3934b1926251f19da
SHA512f507f6ea93f5182435a997d31b5f5f5bf5a5ff4abbba09236546e7277b271703a5a6c552191afa0997dfedb1563eddb77e23bbe9e4e70cd2670eda9edd53fa46
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
355KB
MD5323b83385dc95802130bfd8b0f235a5d
SHA12a52526c6908aab94379b1682bee3db734950186
SHA256abf19116172304eb2b48d75deb28993d392423b8ad29d4ad606957ced882dc93
SHA512940be0860ab477578280a6f5d7ba99e3c041831a9de0f267e6c2fd5853eb4f02f35af345ebd2a6ce1245931f6d8d336f1cf39804cec449e95289c9e1f2a07cd7
-
Filesize
355KB
MD5323b83385dc95802130bfd8b0f235a5d
SHA12a52526c6908aab94379b1682bee3db734950186
SHA256abf19116172304eb2b48d75deb28993d392423b8ad29d4ad606957ced882dc93
SHA512940be0860ab477578280a6f5d7ba99e3c041831a9de0f267e6c2fd5853eb4f02f35af345ebd2a6ce1245931f6d8d336f1cf39804cec449e95289c9e1f2a07cd7